Trend Micro Apex One (OfficeScan) - Isolate, Restore, Relocate Security Agent

Trend Micro Apex One (OfficeScan) - Isolate, Restore, Relocate Security Agent isolates, restores, relocates, or uninstalls the security agent assigned to each entity that is the result of the saved query supplied as a trigger (or assets selected in the asset table).

See Creating Enforcement Sets to learn more about adding Enforcement Actions to Enforcement Sets.

📘

Note:

General Settings

  • Action name - The name of this Enforcement Action. The system sets a default name. You can change the name.
  • Configure Dynamic Values - Toggle on to enter a Dynamic Value statement. See Creating Enforcement Action Dynamic Value Statements to learn more about Dynamic Value statement syntax.

Use stored credentials from the Trend Micro Apex One Adapter - Select this option to use Trend Micro Apex One connected adapter credentials. When you select this option, the Select Adapter Connection drop-down is available, and you can choose which adapter connection to use for this Enforcement Action.

Action Settings

  • Action type - Select the action to run. Possible options (in dropdown) are:

    • Isolate Security Agent - Isolate the agent on all queried devices.
    • Restore Security Agent - Restore the agent on all queried devices.
    • Uninstall Security Agent - Uninstall the agent from all queried devices.
  • Compute Node - The Axonius node to use when connecting to the specified host. For more details, see Working with Axonius Compute Nodes.

Additional Fields

💡

Connection and Credentials

When Use stored credentials from the adapter is toggled off, some of the connection fields below are required to create the connection, while other fields are optional.

  • Trend Micro Apex Central IP Address -The hostname or IP address of the Trend Micro Apex One server that Axonius can communicate with.
  • Application ID - The application unique Identifier assigned for Axonius to consume Trend Micro Control Manager Automation APIs.
  • API Key - Enter your Trend Micro Apex One API Key.
  • The api-key and api-secret are retrieved via the Axonius website. See Get an API Key.
  • Verify SSL (optional) - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.

  • HTTPS Proxy (optional) - Connect the adapter to a proxy instead of directly connecting it to the domain.


For more details about other enforcement actions available, see Action Library.