Cloud App Security
|
-
Events: Displays system and threat
events
-
Users: Allows you to create or delete Cloud
App Security users, and reset users' passwords
|
Cloud Edge
|
- For service plans:
-
Events: Displays a summary of events
from all Cloud Edge devices in the service plan
-
Firmware Updates: Displays the current
firmware version of each device and the latest available version; provides
the option to manually update firmware
-
Devices: Displays the name and serial
number of each registered device
- For registered devices:
-
Events: Displays system and threat
events
-
Components: Displays the current version
of each component, the latest available version, and the date of the last
update
-
Network: Displays the user name, remote
IP address, and MAC address of endpoints that connected to the network
through the Cloud Edge device
-
VPN: Displays the user name, remote IP
address, and virtual IP address of endpoints that connected to the network
through a Virtual Private Network and the Cloud Edge device
|
Note
To make more detailed changes, access the Cloud Edge console.
|
|
Hosted Email Security
|
-
Live Status: Displays the latest Hosted
Email Security information.
-
Policies: Lists all the available
policies.
-
Approved Senders: Email messages from
senders added to this list are not subject to IP reputation-based, spam,
phishing, BEC attack, social engineering attack, Web reputation, or graymail
message filtering. Hosted Email Security still performs malware and attachment
scanning on all messages received and takes the action configured in policy
rules after detecting a malware threat or an attachment policy violation.
-
Blocked Senders: Lists all the addresses or
domains that will blocked from sending messages.
|
Note
To make more detailed changes, access the Hosted Email Security
console.
|
|
Trend Micro Email Security
|
-
Live Status: Displays the latest Trend Micro
Email Security information.
-
Policies: Lists all the available
policies.
-
Approved Senders: Email messages from
senders added to this list are not subject to IP reputation-based, spam,
phishing, BEC attack, social engineering attack, Web reputation, or graymail
message filtering. Trend Micro Email Security still performs malware and
attachment scanning on all messages received and takes the action configured in
policy rules after detecting a malware threat or an attachment policy
violation.
-
Blocked Senders: Lists all the addresses or
domains that will blocked from sending messages.
|
Note
To make more detailed changes, access the Trend Micro Email Security
console.
|
|
Trend Micro Web Security
|
Displays the latest Trend Micro Web Security threat and system
information.
|
Note
To make more detailed changes, access the Trend Micro Web Security
console.
|
|
Worry-Free Business Security
|
-
Events: Lists system and threat events that
may or may not need an action.
-
Groups: Lists the different groups
configured on the server. You can request to start or stop a scan from here.
-
Domain Settings: Configure settings for the
entire domain.
Refer to the Trend Micro Worry-Free Business Security
documentation for detailed information:
-
Managed Server: Displays all the details of
the server. You can request to update the server and update agents from
here.
-
TMRM Agent: Contains general information
about the Trend Micro Remote
Manager agent
including the availability, the Globally Unique Identifier (GUID) or
Authorization Key, and the IP address.
-
Devices: Lists the name, IP Address,
online/offline status, and details of the scan engine, pattern file, and the
platform.
|
Note
You can see Devices and
Security Settings once you expand the product and
click Servers or Desktops.
|
-
Security Settings: Configure the security
settings of a particular group (applicable only for Worry-Free Business Security
6.0 and above). Refer to the Trend Micro Worry-Free Business Security documentation
for detailed information.
|
Worry-Free Business Security Services
|
-
Events: Lists system and threat events that
may or may not need an action.
-
Groups: Lists the configured groups and the
types.
-
Devices: Lists the name, IP Address,
online/offline status, and details of the scan engine, pattern file, and the
platform.
|
Note
You can see Devices and
Security Settings once you expand the product and
click Servers or Desktops.
|
-
Security Settings: Configure the security
settings of Worry-Free Business Security Services. Refer to the Trend Micro
Worry-Free Business Security Services documentation for detailed
information:
|
Note
To make more detailed changes, access the Worry-Free Business
Security Services console.
|
|