The following table lists the features supported under API-based Protection and Inline
Protection for Exchange Online and Gmail.
Feature
|
Settings
|
Exchange Online
|
Gmail
|
||
API-based Protection
|
Inline Protection
|
API-based Protection
|
Inline Protection
|
||
Advanced Threat Protection > General
|
Do not scan the Junk Email / Spam folder
|
Yes
|
No
|
Yes
|
No
|
MIP Encrypted Email Scanning
|
Yes
|
No for inbound protection
Yes for outbound protection
|
No
|
No
|
|
Target - users /groups
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Target - domain
|
No
|
Yes
|
No
|
Yes
|
|
Advanced Threat Protection > Advanced Spam Protection
|
Allow Trend Micro to collect suspicious email information to improve its
detection capabilities
|
Yes
|
Yes
|
Yes
|
Yes
|
Apply to
|
Yes
|
N/A
|
Yes
|
N/A
|
|
Detection Level
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Display Name Spoofing Detection
|
Yes
|
Yes for inbound protection
No for outbound protection
|
Yes
|
Yes for inbound protection
No for outbound protection
|
|
Suspicious Sender Detection
|
Yes
|
No
|
No
|
No
|
|
Retro Scan & Auto Remediate
|
Yes
|
No
|
Yes
|
No
|
|
Enhanced BEC Detection
|
Yes
|
Yes for inbound protection
No for outbound protection
|
Yes
|
Yes for inbound protection
No for outbound protection
|
|
Graymail Detection
|
Yes
|
Yes for inbound protection
No for outbound protection
|
Yes
|
Yes for inbound protection
No for outbound protection
|
|
Writing Style Analysis for BEC
|
Yes
|
Yes for inbound protection
No for outbound protection
|
Yes
|
Yes for inbound protection
No for outbound protection
|
|
Approved/Blocked Sender List
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Approved Header Field List
|
Yes
|
Yes
|
No
|
No
|
|
Advanced Threat Protection > Malware Scanning
|
Apply to
|
Yes
|
N/A
|
Yes
|
N/A
|
Malware Scanning
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Active Content Sanitizing
|
Yes
|
Yes
|
No
|
No
|
|
File Blocking
|
Apply to
|
Yes
|
N/A
|
Yes
|
N/A
|
Type of File Blocking
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Compressed Files
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Approved Sender List
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Advanced Threat Protection > Web Reputation
|
Apply to
|
Yes
|
N/A
|
Yes
|
N/A
|
Security Level
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Message Attachments
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Dynamic URL Scanning
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Computer Vision
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Retro Scan & Auto Remediate
|
Yes
|
No
|
Yes
|
No
|
|
Time-of-Click Protection
|
Yes
|
Yes for inbound protection
No for outbound protection
|
No
|
No
|
|
Approved Sender List
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Approved/Blocked URL List
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Approved Header Field List
|
Yes
|
Yes
|
No
|
No
|
|
Virtual Analyzer
|
Monitor and log only (monitor mode)
|
Yes
|
Yes
|
No
|
No
|
Analyze the following
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Apply to
|
Yes
|
N/A
|
Yes
|
N/A
|
|
Approved Sender List
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Approved File List
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Data Loss Prevention > General
|
Do not scan emails in the Junk Email / Spam folder
|
Yes
|
No
|
Yes
|
No
|
Data Loss Prevention > Data Loss Prevention
|
Apply to
|
Yes
|
N/A
|
Yes
|
N/A
|
Display violating content in logs with sensitive data masked or unmasked
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Scan Target
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Compliance Rule(s) > Compliance Template(s)
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Compliance Rule(s) > Sensitivity Labels
|
Yes
|
No
|
No
|
No
|
|
Actions |
Pass
|
Yes
|
Yes
|
Yes
|
Yes
|
Delete
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Quarantine
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Tag subject
|
Yes
|
Yes
|
No
|
Yes
|
|
Label email
|
No
|
No
|
Yes
|
No | |
Move to Junk Email / Spam folder
|
Yes
|
Yes for inbound protection
No for outbound protection
|
Yes
|
Yes
|
|
Sanitize file
|
Yes
|
Yes
|
No
|
No
|
|
Replace with text/file
|
Yes
|
Yes
|
No
|
Yes
|
|
Pass without logging
|
Yes
|
Yes
|
Yes
|
Yes
|
|
Add disclaimer
|
Yes
|
Yes
|
No
|
Yes for inbound protection
No for outbound protection
|
|
Change recipient
|
No
|
Yes
|
No
|
Yes for inbound protection
No for outbound protection
|
|
Manual Scan |
-
|
Yes
|
No
|
Yes
|
No
|
Add-in for Outlook
|
Manage Quarantine
|
Yes
|
Yes
|
No
|
No
|
Report Emails
|
Yes
|
Yes
|
No
|
No
|
|
Automation and Integration APIs
|
Log Retrieval API
|
Yes
|
Yes
|
Yes
|
No
|
Threat Investigation API
|
Yes
|
Yes
|
Yes
|
No
|
|
Threat Mitigation API
|
Yes
|
No
|
Yes
|
No
|
|
Threat Remediation API
|
Yes
|
Yes
|
No
|
No
|