- Threat Intelligence Fundamentals — Understand the role of TIE in reducing threat response time from days to milliseconds
- Architecture & Components — Identify and describe the function of TIE clients, servers, and communication layers
- File Reputation Management — Explain how reputation scores are assigned, prioritized, and overridden
- Dashboard Operations — Navigate and interpret TIE dashboards for threat monitoring and analysis
- Sandbox Integration — Configure and utilize sandbox environments for deep file analysis
- Database Administration — Perform routine maintenance tasks to sustain TIE system health
- 7 Instructional Modules — Topic-focused content with practical context and technical depth
- Knowledge Checks — Per-module assessments to reinforce comprehension
- Audio Narration — Section narration available via the Listen button on applicable content blocks
- Final Examination — 15-question assessment covering all course material
- Certificate of Completion — Issued upon achieving a passing score of 80% or higher
TIE narrows the gap between threat detection and containment from days, weeks, or months down to milliseconds. When a file is identified as malicious on one endpoint, that intelligence is immediately propagated to all other endpoints across the environment, enabling simultaneous blocking without manual intervention.
For each file execution attempt, TIE evaluates multiple data sources to determine whether the file should be permitted or blocked:
- Global Threat Intelligence (GTI) — Worldwide threat reputation data maintained by Trellix
- Enterprise Reputation Database — Local intelligence accumulated within the organization's environment
- Administrative Overrides — Manually defined trust or block decisions applied by authorized administrators
- Decision Output — Allow or block, enforced immediately across all connected endpoints
TIE monitors and protects a broad range of endpoint categories within the enterprise:
- Cloud Workloads — Virtual machines and cloud-hosted services
- BYOD & Mobile Devices — Personally owned devices accessing corporate resources
- Workstations & Laptops — Standard user computing devices
- Servers — On-premises and hosted server infrastructure
- Network Appliances — Connected networking and security equipment
- Global Threat Intelligence (GTI) — Trellix-maintained cloud database of worldwide threat signatures, continuously updated
- Local Enterprise Intelligence — Organization-specific reputation data derived from observed file behavior within the environment
The TIE Client is deployed on endpoint devices as a component of Trellix Endpoint Security Adaptive Threat Protection (ENS ATP). It serves as the primary enforcement layer within the TIE architecture.
- File Execution Monitoring — Intercepts and evaluates every file execution attempt on the host
- Reputation Queries — Communicates with the TIE Server to retrieve current reputation data
- Allow/Block Enforcement — Applies policy decisions based on returned reputation scores
- Telemetry Reporting — Reports observed file activity and findings back to the TIE Server
The TIE Server functions as the central intelligence repository and decision authority within the TIE architecture.
- Reputation Storage — Maintains a local database of file and certificate reputation data
- Intelligence Aggregation — Combines local enterprise data with GTI cloud reputation feeds
- Administrative Override Management — Stores and applies manually defined reputation decisions
- Real-Time Notification — Propagates updated threat intelligence to all connected endpoints instantly
- Execution Tracking — Records which files executed on which systems for forensic and investigative use
DXL is the messaging fabric that enables real-time communication between all TIE components and integrated security products.
- Broker Architecture — Clients connect to DXL brokers that manage message routing across the environment
- Real-Time Delivery — Threat intelligence is pushed to all endpoints simultaneously upon update
- Firewall/NAT Compatibility — Functions across network boundaries without requiring direct connectivity
- Bidirectional Messaging — Supports both event publishing and request/response communication patterns
OpenDXL is the open-source extension of the DXL framework, enabling third-party products and custom integrations to participate in the TIE communication fabric.
- Vendor-Agnostic Integration — Connects non-Trellix products to the DXL messaging bus
- Accelerated Development — Reduces integration timelines from months to days
- Full Message Participation — Third-party products can publish events, subscribe to feeds, and invoke actions
GTI is Trellix's cloud-based threat reputation service, providing continuously updated file and certificate reputation data sourced from Trellix's global sensor network.
- Continuous Updates — Threat signatures and reputation data refreshed in real time
- Deployment Models — Available as public shared cloud or private cloud instances
- Automatic Synchronization — TIE Server pulls GTI updates automatically without manual intervention
TIE assigns one of five standardized reputation classifications to each file:
- Known Trusted — File is confirmed safe; execution permitted
- Most Likely Trusted — File is likely safe based on available data; execution typically permitted
- Unknown — Insufficient data to classify; policy-dependent action
- Most Likely Malicious — File exhibits malicious indicators; execution typically blocked
- Known Malicious — File is confirmed malicious; execution blocked
When multiple reputation sources provide conflicting assessments, TIE resolves the conflict using the following priority order (highest to lowest):
| Priority | Source | Description |
|---|---|---|
| 1 | Admin Override | Manually defined by an authorized administrator; supersedes all automated sources |
| 2 | Enterprise Reputation | Locally derived reputation data specific to the organization's environment |
| 3 | Trellix GTI | Cloud-based global threat intelligence maintained by Trellix |
| 4 | Sandbox Analysis | Behavioral analysis results from TIS, IVX, or IVX Cloud sandbox environments |
| 5 | Third-Party Sources | External data sources including VirusTotal integration |
In addition to reputation scores, TIE considers supplementary metadata when evaluating files:
- File Age — The duration since the file was first observed; older files generally correlate with higher trustworthiness
- Prevalence — The number of distinct systems that have executed the file; higher prevalence is associated with lower risk
- First Instance — The first endpoint to observe a file; useful for tracing infection origin and propagation paths
Administrators have full authority to modify the reputation of any file within the TIE environment:
- Override Scope — Changes apply across the entire enterprise environment immediately upon submission
- Custom Application Whitelisting — Internal applications flagged by GTI can be designated as Trusted to prevent false positives
- Malware Blacklisting — Newly identified threats can be immediately designated as Known Malicious organization-wide
- Bulk Import — Pre-populated reputation lists can be imported to accelerate initial deployment and policy configuration
Provides operational visibility into file analysis activity across integrated sandbox environments (TIS, IVX, IVX Cloud):
- Sample Volume Trending — Daily analysis throughput and submission volume
- Report Type Distribution — Breakdown of reputation lookups vs. full behavioral analysis reports
- Recent Activity Feed — New and recent sandbox submission results
- Top Prevalence Submissions — Files submitted most frequently for analysis
The primary threat visibility console, presenting a real-time overview of reputation activity across the environment:
- Reputation Distribution — File counts trending by classification (Trusted, Unknown, Malicious)
- GTI Change Tracking — New files and GTI reputation changes observed in the prior week
- Suspicious File Trending — Volume trend of files classified as suspicious
- Discovery Leaders — Endpoints with the highest rate of new file discovery
- Override Analytics — Distribution of administrative overrides by score classification
- Certificate Intelligence — Parallel reputation tracking for digital certificates
Provides operational visibility into the state of the administrative override repository:
- New Overrides — Recently added manual reputation decisions
- Active Overrides — Overrides that have been referenced during active reputation evaluations
- Redundant Overrides — Duplicate entries consuming unnecessary storage and processing
- Conflicting Overrides — Entries with contradictory definitions requiring administrator review
- Unclassified Files — Signed and unsigned files with Unknown reputation present in the environment
Operational health and performance visibility for the TIE infrastructure:
- Infrastructure Monitor — DXL broker connectivity status, component version inventory, GTI synchronization counts
- Data Cleanup Monitor — Cleanup task execution history, new file ingestion rates, current database utilization
TIE integrates with VirusTotal to provide supplementary threat intelligence directly within the TIE console:
- On-Demand Analysis — Any file in TIE can be submitted to VirusTotal for multi-engine analysis with a single action
- Corroborating Intelligence — VirusTotal results serve as a secondary validation source for reputation decisions
- Investigation Support — Accelerates incident response workflows by consolidating external intelligence
A sandbox is an isolated execution environment in which suspicious files can be safely detonated and monitored. All activity is contained and cannot propagate to the production network.
- Isolated Execution — File executes within a containerized environment, fully separated from production infrastructure
- Comprehensive Telemetry — All system interactions are recorded: disk writes, registry modifications, network connections, process spawning
- Risk-Free Observation — Malicious behavior can be analyzed without exposure to live systems
- Detailed Analysis Reports — Structured behavioral reports returned upon analysis completion
- Submission — Administrator or automated policy triggers file submission to a configured sandbox
- Target Environments — TIE supports submission to TIS (on-premises), IVX (on-premises), or IVX Cloud (cloud-hosted)
- Behavioral Simulation — Sandbox executes the file and monitors all resulting system activity
- Report Generation — Analysis results returned as a structured behavioral report with a verdict (Malicious, Benign, or Suspicious)
- Intelligence Propagation — Resulting reputation updates are immediately distributed across all TIE-connected endpoints via DXL
Administrators can define granular submission policies to optimize resource utilization:
- File Type Filtering — Restrict analysis to specific file extensions (e.g., .exe, .dll, .pdf)
- File Size Thresholds — Exclude oversized files from analysis where behavioral analysis is less practical
- Path-Based Scoping — Limit submissions to files originating from specified directory paths
- Deduplication Controls — Prevent redundant re-analysis of previously evaluated files
TIE Server provides a suite of pre-built and customizable reports:
- Summary Report — High-level overview of threat activity, file intelligence, and sandbox operations
- Files Report — Detailed log of file executions observed within the environment
- Certificates Report — Certificate reputation data and status change history
- Custom Reports — User-defined queries for targeted data extraction
- Scheduled Distribution — Automated report delivery via email on a configurable schedule
- Data Cleanup — Periodic removal of stale, unused file records to control database growth and maintain query performance
- Index Optimization — Rebuilding and maintaining database indexes to sustain lookup speed under high load
- Historical Data Archiving — Migrating aged data to archive storage to free active database capacity
- Growth Monitoring — Continuous tracking of database size to identify capacity issues before they impact operations
TIE continuously refines its local intelligence through metadata aggregation from managed endpoints:
- Endpoint Telemetry Collection — File execution events and reputation changes gathered from all managed endpoints
- Pattern Aggregation — Collected data synthesized into organization-specific behavioral baselines
- Adaptive Intelligence — TIE's local reputation model improves over time as environment-specific patterns are established
- Anomaly Detection — Deviations from established baselines — such as a modified version of a known application — are flagged for review
Administrators should monitor the following health indicators to ensure continuous TIE availability:
- Disk Utilization — Available storage capacity; critically low levels can interrupt database operations
- DXL Connectivity — Broker reachability status for all registered endpoint clients
- GTI Synchronization — Confirmation that reputation updates are being received from the GTI cloud service
- CPU & Memory Utilization — Server resource consumption under current workload
- Query Response Time — Latency metrics for reputation lookup operations
Alert policies should be configured to notify administrators proactively when any monitored metric breaches defined thresholds.
Enterprises operating multiple TIE Server instances can configure topology synchronization to maintain consistent reputation data across all nodes:
- Cross-Server Replication — Reputation data synchronized between geographically distributed TIE Server instances
- High Availability — Endpoint protection is maintained even if a single TIE Server becomes unavailable
- Multi-ePO Integration — Bridges multiple on-premises ePO environments within a unified TIE topology
- Cleanup Scheduling — Configure database cleanup tasks to execute during off-peak windows to minimize operational impact
- Growth Trend Analysis — Review database size trends regularly to plan for storage capacity requirements
- Failover Testing — Periodically validate failover behavior to backup TIE Server instances
- Health Log Review — Regular review of system health logs to identify emerging issues
- Certificate Authority Maintenance — Update certificate authority records as required to maintain accurate certificate reputation evaluation
Subject Matter Expert Training