CAS Quick Deployment Guide January 2018

Similar documents
Trend Micro TM Cloud App Security Best Practice Guide

The Reigning King of IP Camera Botnets and its Challengers

DRIDEX s New Tricks Lead to Global Spam Outbreak

This hot fix provides four registry keys to hide redundant notification/log created for cached messages.

Android Backdoor GhostCtrl can Silently Record Your Audio, Video, and More

SOLUTION MANAGEMENT GROUP

TREND MICRO LEGAL DISCLAIMER

Correlation and Phishing

Integrating Trend Micro Hosted Security with Google Gmail

Network Security Protection Alternatives for the Cloud

InterScan Messaging Security Virtual Appliance (IMSVA) Sender Policy Framework. Best practice guide for versions 9.0 and 9.1

Using Trustwave SEG Cloud with Cloud-Based Solutions


This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action.

TREND MICRO LEGAL DISCLAIMER

TREND MICRO LEGAL DISCLAIMER

Trend Micro Deep Discovery Training Advanced Threat Detection 2.0 for Certified. Professionals Course Description

HIPAA Compliance. with O365 Manager Plus.


FighterPOS Pos Malware Gets Worm Routine

GLBA Compliance. with O365 Manager Plus.

1 Introduction Requirements Architecture Feature List... 3

Symantec Protection Suite Add-On for Hosted Security

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Trend Micro Deep Discovery Training for Certified Professionals

TREND MICRO LEGAL DISCLAIMER

Commercial Product Matrix

Symantec Security.cloud


EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Deep Security Integration with Sumo Logic

TREND MICRO SMART PROTECTION SUITES

HDDCryptor: Subtle Updates, Still a Credible Threat

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector

PUA Operation Spreads Thousands of Explicit Apps in the Wild and on Legitimate App Stores

Using Trustwave SEG Cloud with Exchange Online

TREND MICRO SMART PROTECTION SUITES

Trend Micro Antivirus for Mac 2015

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions

Securing Enterprise or User Brought mobile devices

FISMA Compliance. with O365 Manager Plus.

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

Trend Micro Deep Discovery Training for Certified Professionals

CloudSOC and Security.cloud for Microsoft Office 365

Technical Brochure F-SECURE THREAT SHIELD

Competitive Matrix - IRONSCALES vs Alternatives

Office 365 Buyers Guide: Best Practices for Securing Office 365

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Office 365 Integration Guide Software Version 6.7

Office 365 Inbound and Outbound SMX configuration. 4 th January 2018



Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

Update on new Microsoft Cloud Technology

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong


Device Vulnerabilities in the Connected Home: Uncovering Remote Code Execution and More

Copyright 2018 Trend Micro Incorporated. All rights reserved.

Cyber Security Guide for NHSmail

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro


Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

for Small and Medium Business Quick Start Guide


TREND MICRO LEGAL DISCLAIMER


JUNIPER NETWORKS PRODUCT BULLETIN

How to Secure Your Cloud with...a Cloud?

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

PCI Compliance. with O365 Manager Plus.

Comodo Antispam Gateway Software Version 2.12

2.5. Smart Protection Server Security Made Smarter. Administrator s Guide. Endpoint Security. Messaging Security

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Moving Beyond Prevention: Proactive Security with Integrity Monitoring

Symantec Endpoint Protection

GSX 365 Usage Usage & Compliance Reporting Collect, Analyze & Anticipate

Protecting Your Digital World

Sophos Central Partner. help



Security Gap Analysis: Aggregrated Results


1 Introduction Requirements Architecture Feature List... 4

Enabling Office 365 Services (347)


Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

The Growing Problem of Mobile Adware

KillDisk and BlackEnergy Are Not Just Energy Sector Threats

A guideline for selling. The essential package for a successful business

The Urpage Connection to Bahamut, Confucius and Patchwork

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Siemens Industrial SIMATIC. Process Control System PCS 7 Configuration Trend Micro OfficeScan Server XG. Security information 1.

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Automated Context and Incident Response

Transcription:

CAS January 2018 Page 2 of 18 Trend Micro

CAS January 2018 This document is to guide TrendMicro SE and Solution Architect team run a successful Cloud App Security POC with prospective customers. It is an internal use document. It is RECOMMENDED to use the Automatically Provisioning Delegate Accounts, because this is very easy. Page 3 of 18 Trend Micro

CAS January 2018 For customers who have the security concerns when adding O365 global admin on CAS console, please suggest them to use manually provision. Manually Provisioning an Exchange Online Delegate Account Manually Provisioning a SharePoint Online Delegate Account Before Provisioning, please make sure that: You have the administrator's credentials for your cloud application, for example, Box. You have not logged on to the cloud application using any other user account. Provisioning a Service Account for Box Provision a service account for Box to allow Cloud App Security to scan files stored in Box. Provisioning a Service Account for Dropbox Provision a service account for Dropbox to allow Cloud App Security to scan files stored in Dropbox. Provisioning a Service Account for Google Drive Provision a service account for Google Drive to allow Cloud App Security to scan files stored in Google Drive Page 4 of 18 Trend Micro

CAS January 2018 The key to success is how to maximize Cloud App Security protection. Below product settings are strongly recommended during POC testing. Enable most of the Cloud App Security features (such as: advanced spam prevention, malware scanning etc.) After new user is created, suggest to firstly clock the click here to sync new users before testing In the case when mailbox migration from on-prem to cloud, a manual cloud mailbox scan is needed. After done the RMS protection provision, go to the policy to enable the RMS protection. Customers will NOT take risks when enabling more testing users or more protections during POC, due to its architecture advantage Cloud App Security have Zero impact to customer s mail, SharePoint/OneDrive and Box/Dropbox/Google Drive flow. Page 5 of 18 Trend Micro

CAS January 2018 We suggest our customer to create a new policy for the specific targets, instead of using the default policy. Create a new policy. Select the specific targets. Page 6 of 18 Trend Micro

CAS January 2018 Apply the Rules to the <All messages>. Enable the Writing Style Analysis In order to reduce the FP, we suggest the customer to add the trust sender into CAS Approved Sender List. Page 7 of 18 Trend Micro

CAS January 2018 Setup a malware policy to detect malicious files, which uses the virus scan engine to detect emerging threats. User can set a scan for all file types, and enable all of Trend Micro s technology. Click HERE to get testing sample. Predictive Machine Learning is disabled by default. Page 8 of 18 Trend Micro

CAS January 2018 Setup a File Blocking policy to block according to the file type. Normally, we d like to suggest the customer blocking exe files, but this depends on the customer s company s specific security policy. Page 9 of 18 Trend Micro

CAS January 2018 Setup a web reputation policy to detect the bad URLs.(Especially, we have a ability to detect the O365 credential phishing URL.) It s also highly recommended the customer add internal domains to the approved URL List. Page 10 of 18 Trend Micro

CAS January 2018 Setup a virtual analyzer policy to test sand boxing capability. A cloud-based virtual environment designed for analyzing suspicious files. Click HERE to get testing sample. In order to make our customer understand this feature better, we suggest the customer to use monitor mode first. In this mode, CAS s VA feature will only record the VA detection result, but will not take any action. Page 11 of 18 Trend Micro

CAS January 2018 Running a manual scan performs an on-demand scan of targets based on the selected policy configuration. It can detect the potential threat before the customer uses CAS. Then there will be new pop-up window: Customer can refer to the Scan Result to see how long the current manual scan will take. Add Report Recipient to add users who can receive the notification when the manual scan is finished If the customer wants more detection, you might need run the manual scan for more users For trail accounts, there is a limitation where the scan scope only covers files that are 1-day old. Manual Scan does not contain the Virtual Analyzer scanning. Page 12 of 18 Trend Micro

CAS January 2018 Click the scan history to get the manual scan result. Show details Page 13 of 18 Trend Micro

CAS January 2018 Manage the widgets to show CAS s detections Then, please select all: Page 14 of 18 Trend Micro

CAS January 2018 Overall Threat Detections Page 15 of 18 Trend Micro

CAS January 2018 On CAS console, the user is provided with a place to view the scan logs that are collected from different CAS server roles and detections. Select the right time range for the detection result on log view console. Page 16 of 18 Trend Micro

CAS January 2018 Page 17 of 18 Trend Micro

CAS January 2018 CAS BP CAS WR BP CAS POC Guide CAS L3 Go to Cloud App Security Console to Apply a Trial Account For EU customers/partners go to https://admin-eu.tmcas.trendmicro.com/#!/ For JP customers/partners go to https://admin.tmcas.trendmicro.co.jp/#!/ Other region customers/partners go to https://admin.tmcas.trendmicro.com/#!/ Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro Smart Protection Network, and are supported by over 1,200 threat experts around the globe. For more information, visit www.trendmicro.com. 2018 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. Page 18 of 18 Trend Micro