Override the configured policy settings for selected endpoints.
ImportantOverriding some features might impact your credit usage. Verify your selection before
applying overrides. For more information, see How are credits calculated for TrendAI Vision One™ Endpoint Security?.
|
Policy overrides provide the capability to manage configuration differences on specifically
selected endpoints in your security environment. Overrides can be used to temporarily
enact more strict monitoring of endpoints targeted by an attack, or to better tailor
security settings for individual endpoints.
To manage policy overrides, select one or more endpoints. Then click Endpoint security policy and select one of the following options:
Override actions
|
Option
|
Description
|
Override settings
|
|
Override endpoint security policy
|
Override certain settings configured by the applied endpoint security policies
The overrides remain in place until you remove the overrides.
|
Use the Override Endpoint Security Policy window to configure your override settings
Refer to the following steps to configure your overrides.
|
|
Remove override settings
|
Removes override settings configured by using the Override endpoint security policy action
This only effects overrides implemented using the feature in Endpoint Inventory. This
does not remove endpoint overrides configured in .
|
Confirm your selection and click Remove overrides
|
|
Remove Intrusion Prevention rule overrides
|
Removes overrides applied to Intrusion Prevention rules configured in
This action removes any overrides in Intrusion Prevention and resets the agent to
using the configuration in the assigned policy. Depending on the configured policy
and overrides, this action might impact your credit usage and requirements. The following
features impacted by this action are Endpoint Security Pro features:
|
Confirm your selection and click Remove Intrusion Prevention overrides
|
To configure policy overrides, use the following steps.
Procedure
- In TrendAI Vision One™, go to .
- Select the endpoints you want to configure.
- To apply or manage overrides, click Endpoint policy override and select Override endpoint security policy.The Override Endpoint Security Policy window appears.
- Select the security module you want to configure.

Important
Managing endpoint security features using Endpoint Security Policies is a pre-release feature. To manage settings for Anti-Malware, Intrusion Prevention, and Exclusions using the centralized Endpoint Security Policies and manage overrides using Endpoint Inventory, go to Platform Directory to opt-in. If you are unable to opt-in, contact your system administrator for assistance.If you are modifying more than one security module, click Save override before moving from one module to another. Leaving the current screen discards any unsaved changes. - For each setting, review the Policy configuration and select Follow policy or configure the Override configuration.
-
Configuring the module to Disable disables the module and prevents applying any overrides to the other settings.
-
To configure each setting, either use the dropdown to select one or more items, or click the edit icon (
) to edit the setting in detail. The specific method to edit settings is different
for each setting.
-
- Click Save override to save your settings.
