To ensure that agents stay protected from the latest security risks, update agent components regularly.
Before updating agents, check if their update source (Apex One server or a custom update source) has the latest components. For information on how to update the Apex One server, see Apex One Server Updates.
The following table lists all components that update sources deploy to agents and the components in use when using a particular scan method.
Component |
Distribution |
|
---|---|---|
Conventional Scan Agents |
Smart Scan Agents |
|
Antivirus |
||
Smart Scan Agent Pattern |
No |
Yes |
Virus Pattern |
Yes |
No |
IntelliTrap Pattern |
Yes |
Yes |
IntelliTrap Exception Pattern |
Yes |
Yes |
Virus Scan Engine 32/64-bit |
Yes |
Yes |
Memory Inspection Pattern |
Yes |
Yes |
Early Launch Anti-Malware Pattern 32/64-bit |
Yes |
Yes |
Contextual Intelligence Engine 32/64-bit |
Yes |
Yes |
Contextual Intelligence Pattern |
Yes |
Yes |
Contextual Intelligence Query Handler 32/64-bit |
Yes |
Yes |
Advanced Threat Scan Engine 32/64-bit |
Yes |
Yes |
Advanced Threat Correlation Pattern |
Yes |
Yes |
Anti-spyware |
||
Spyware/Grayware Pattern |
Yes |
Yes |
Spyware Active-monitoring Pattern |
Yes |
No |
Spyware/Grayware Scan Engine 32/64-bit |
Yes |
Yes |
Damage Cleanup Services |
||
Damage Cleanup Template |
Yes |
Yes |
Damage Cleanup Engine 32/64-bit |
Yes |
Yes |
Early Boot Cleanup Driver 32/64-bit |
Yes |
Yes |
Web Reputation Services |
||
URL Filtering Engine |
Yes |
Yes |
Firewall |
||
Common Firewall Pattern |
Yes |
Yes |
Common Firewall Driver 32/64-bit |
Yes |
Yes |
Behavior Monitoring Components |
||
Behavior Monitoring Detection Pattern 32/64-bit |
Yes |
Yes |
Behavior Monitoring Core Driver 32/64-bit |
Yes |
Yes |
Behavior Monitoring Core Service 32/64-bit |
Yes |
Yes |
Behavior Monitoring Configuration Pattern |
Yes |
Yes |
Policy Enforcement Pattern |
Yes |
Yes |
Digital Signature Pattern |
Yes |
Yes |
Memory Scan Trigger Pattern (32/64-bit) |
Yes |
Yes |
Program Inspection Monitoring Pattern |
Yes |
Yes |
Damage Recovery Pattern |
Yes |
Yes |
Suspicious Connections |
||
Global C&C IP List |
Yes |
Yes |
Relevance Rule Pattern |
Yes |
Yes |
Browser Exploit Solution |
||
Browser Exploit Prevention Pattern |
Yes |
Yes |
Script Analyzer Unified Pattern |
Yes |
Yes |