Trellix

Trellix

Incident detection, analysis, and resolution at endpoints "Trellix (former FireEye) HX"

Telework is also safe! ! ~ Leave everything from detection to recovery support using Trellix (formerly FireEye) Endpoint ~

Endpoint is an endpoint security product that detects, analyzes, and resolves incidents that occur on endpoints. Based on Network Security/Server Email detection information and Mandiant intelligence information, infected terminals can be identified and quarantined. At the same time, it is possible to check the infection status of other endpoints.

Identification of infected terminals and scope of influence

  • Identify infected terminals based on Network Security/Server Email detection information. Identify terminals with the same threat at the same time
  • Detection of potentially infected devices using Mandiant intelligence information
  • Detection of potentially infected devices using 3rd party, proprietary IOC information

Infection status confirmation, investigation, and isolation

  • Status display of threat progress whether malware was sent to the actual terminal or whether it was infected
  • Automatically collect activity history such as process startup, communication history, file creation, modification, and deletion on the terminal agent side. Investigation is possible retroactively to the event occurrence time

Detect, investigate and quarantine anywhere

We offer two forms of usage: on-premise and cloud. In both cases, it is possible to detect, investigate, and isolate not only internal terminals but also external terminals and remote work terminals.

Detect/block unknown malware and exploits

Four different engines provide defense in depth for endpoints: Malware Protection, Malware Guard, Exploit Guard, and IOC.

Search for the operation status of administrator terminals and the spread of damage

  • Investigate whether or not processes of malware file names and hash values obtained from outside are running
  • Proactively search for malware and malicious behavior by attackers
  • Analysis and tracking of damage spread for all devices

Operation image

  1. Agent constantly records the operation and change history on the terminal
  2. Send alerts from each device (Network Security/Server Email) to Endpoint
  3. Receive alerts from each device with Endpoint
  4. Automatically generate Indicators (IOC) in Endpoint
  5. Distribute IOCs to all terminals and investigate the presence or absence of traces on the terminal side (agent)
  6. Generates and acquires an investigation file (Triage Package) that identifies infected terminals and further investigates
  7. Execute network isolation of infected terminals from Endpoint
Operation image

Types of IOCs

Types of IOCs

What is an IOC (Indicator of Compromise)?

  • "Definitions" and "standards" proposed by Mandiant for searching and detecting traces indicating the presence or threats on terminals infected with malware, etc.
  • Information that can generate an IOC
    • file name/folder path
    • File/folder path
    • File MD5 hash
    • boot process
    • registry
    • DNS
    • External communication port, etc.

Inquiry/Document request

In charge of Macnica Trellix Co., Ltd.

  • TEL:045-476-2010

Mon-Fri 8:45-17:30