📖
Trellix ePolicy Orchestrator - On-prem 5.1
  • INTRODUCTION
    • 👋Introduction
  • PRODUCT OVERVIEW
    • Module Intro
    • ePO Overview
      • Security Management Framework
      • How it Works
      • Basic Product Components
      • Communications: Tomcat Service
      • Communications: Security Keys
      • ePO Console
    • Trellix Agent Overview
      • Product Overview
      • Key Features
      • Services
    • ePO Resources
    • Module Summary
  • INSTALLATION AND UPGRADE
    • Module Intro
    • Installation and Upgrade
    • Pre-Installation Auditor Tool
    • Post-Installation Tasks
    • Upgrade
    • Module Summary
  • SERVER CONFIGURATION
    • Module Intro
    • ePServer Configuration
    • System Tree
    • Tag Management
    • Module Summary
  • PRODUCT MANAGEMENT
    • Module Intro
    • Software Catalog
    • Extension and Package Management
    • Product Deployment
    • Client Task Management
    • Creating a Custom Properties Client Task Simulation
    • Module Summary
  • POLICY MANAGEMENT
    • Module Intro
    • Policies Overview
    • Duplicating and Editing a Policy Simulation
    • Module Summary
  • USER MANAGEMENT
    • Module Intro
    • User Accounts
    • Permission Sets
    • Contacts
    • Creating a New Permission Set Simulation
    • Module Summary
  • DASHBOERDS, QUERIES, REPORTS
    • Module Intro
    • ePO Dashboards
    • Queries and Reports
    • Reports
    • Creating a New Dashboard Simulation
    • Building a Report Simulation
    • Module Summary
  • DISASTER RECOVERY
    • Module Intro
    • Disaster Recovery Overview
    • Running a Disaster Recovery Snapshot Simulation
    • Module Summary
  • TROUBLESHOOTINGS BASICS
    • Module Intro
    • Troubleshooting using Log Files
    • Troubleshooting Tools
    • Module Summary
  • Summary
    • Course Summary
Powered by GitBook
On this page
  1. PRODUCT OVERVIEW
  2. ePO Overview

How it Works

PreviousSecurity Management FrameworkNextBasic Product Components

Last updated 1 year ago

rellix security software and ePO work together to stop malware attacks on your systems and notify you when they occur. During an attack, ePO components and processes stop an attack, notify you when it occurs, and record the incident.

Click on the numbers below to see what happens during an attack.