Trend Micro Certified Professional OfficeScan XG SP1


Pris kr 17.500  Ekskl. moms
Varighed: 3 Dage
Lunch : Included
Courseware : Included
Delivery Type


Se sessioner for andre lande
Dato Sted
  • Arrow Ballerup (Virtual classroom)
    kr 17.500  Ekskl. moms
Disse oplysninger findes også beregnet for intra-virksomhedsuddannelsen. Tøv ikke med at kontakte os for at få flere oplysninger


In this course, you will learn how to use Trend Micro™ OfficeScan XG SP1. This course provides information regarding basic architecture, protection functionality, deployment scenarios, and troubleshooting. Through hands-on labs, participants practice configuring OfficeScan protection features, along with the administration options needed for a successful implementation and long-term maintenance. Taught by Trend Micro certified trainers, this course incorporates a variety of hands-on lab exercises, allowing participants to put the lesson content into action.


After completing this course, participants will be able to:

  • Describe the purpose, features, functions, and capabilities of Trend Micro OfficeScan XG SP1

  • Define the components that make up OfficeScan XG

  • Implement security using OfficeScan Agents

  • Configure and administer OfficeScan XG servers and Agents

  • Deploy OfficeScan policies using Trend Micro Control Manager

  • Troubleshoot common issues

  • Attempt the Trend Micro Certified Professional for OfficeScan Certification Exam


This course is designed for  IT professionals responsible for protecting endpoint computers from data breaches and targeted attacks.

This includes those involved with:

•• Operations

•• Deployment

•• Security Response

•• Compliance


There are no prerequisites to attend this course, however, a working knowledge of Trend Micro products and services, as well as an understanding of basic networking concepts and principles will be helpful. Basic knowledge of the following topics is also beneficial:

  • Windows® servers and clients

  • Microsoft® Internet Information Server (IIS)

  • General understanding of malware

Participants are required to bring a laptop computer with a recommended screen resolution of at least 1980 x 1080 or above, and a display size of 15” or above.


OfficeScan XG Overview

•• Key features in OfficeScan XG

•• OfficeScan XG components

•• Deployment methods

OfficeScan Server

•• OfficeScan Server tasks

•• OfficeScan Server services and components

•• Database and repositories

•• Installing/upgrading OfficeScan XG and SP1

•• Migrating the database to Microsoft SQL

•• OfficeScan XG plug-ins and utilities

OfficeScan XG Web Management Console

•• Logging into the console

•• Integrating with Active Directory

•• Creating new administrative accounts

OfficeScan Agents

•• OfficeScan Agent tasks

•• OfficeScan Agent services and components

•• Installing Agents

•• Agent to server communication

•• Agent settings and grouping

•• Agent privileges

Managing Off-Premise Agents

•• Installing the OfficeScan Edge Relay Server

•• Edge Relay Server and external Agent


Keeping OfficeScan Up To Date

•• Updating the OfficeScan Server

•• Updating the OfficeScan Agent

Trend Micro Smart Protection

•• Smart Protection services and sources

•• Configuring the Smart Protection source

Protecting Endpoint Computers

From Malware

•• Scanning for malware

•• Scan settings

•• Quarantining malware

•• Outbreak prevention

Protecting Endpoint Computers Through

Behavior Monitoring

•• Malware behavior blocking

•• Ransomware protection

•• Anti-exploit protection

•• Newly encountered program detection

•• Event monitoring

Protecting Endpoint Computers From

Unknown Threats

•• Predictive machine learning

Detecting Emerging Malware Through

Connected Threat Defense

•• Connecting OfficeScan XG to Deep

Discovery Analyzer and Trend Micro

Control Manager

•• Configuring sample submission

•• Subscribing OfficeScan to the Suspicious

Objects List

Blocking Web Threats

•• Web reputation

•• Detecting suspicious connections

•• Protecting against browser exploits

Protecting Endpoint Computers

Through Traffic Filtering

•• Firewall filtering

•• Application filtering

•• Certified Safe Software list

•• Stateful inspection

•• Intrusion Detection System

Preventing Data Leaks on Endpoint


•• Installing Data Loss protection

•• Configuring data identifiers and data loss


•• Device control

Deploying OfficeScan Policies Through

Control Manager

•• Connecting OfficeScan XG to Trend Micro

Control Manager

•• Identifying policy targets

•• Deploying policies

•• Policy inheritance

•• Data Loss Prevention and Data Discovery

through Control Manager

Troubleshooting OfficeScan XG

•• Debugging the OfficeScan Server and


•• Troubleshooting communication issues

•• Troubleshooting virus infection

•• Troubleshooting OfficeScan services

•• Troubleshooting sample submission

© 2019 VALit Aps - Arrow ECS. All rights reserved.