Gain a better understanding of which features and settings migrate when you upgrade from InterScan Web Security products, including InterScan Web Security Virtual Appliance and InterScan Web Security Suite, to Zero Trust Secure Access Internet Access.
The following tables detail how InterScan Web Security features and settings migrate
when you
upgrade to Internet Access.
Features
Feature
|
Migratable
|
Notes
|
||
Dashboard
|
No
|
All relevant information and settings are found in the Zero Trust Secure Access app
in Trend Vision One.
Go to
and click the Internet Access tab for an overview of
the Internet Access service.Go to
to configure your Internet Access settings. |
||
Logs
|
No
|
Activity logs are available via the Search app in Trend Vision One.
Go to
and select Secure Access Activity Data in the
Search Method dropdown menu.
|
||
Reports
|
No
|
Reports are available via the Reports app in Trend Vision One.
Go to
.
|
||
Updates
|
No
|
Zero Trust Secure Access Internet Access pattern and engine updates occur every 8
hours
from midnight local time. The schedule is not configurable.
|
||
Notifications
|
No
|
Notifications are not migrated to Trend Vision One.
Go to
and click Secure Access Module Notification to
customize your notifications. |
||
Audit Log
|
No
|
Log auditing is available via the Audit Logs app.
Go to
and select Zero Trust Secure Access from the
Category dropdown menu. |
||
Deployment Wizard
|
No
|
The Zero Trust Secure Access app features a deployment wizard to assist you in setting
up
various services.
Go to
and click Deployment Wizard. In the Internet
Access section, click Configure to launch the wizard. |
Settings
InterScan Web Security Setting
|
Migratable
|
Notes
|
||
|
Yes (Partial)
|
Only policies with granular actions migrate to Internet Access.
Go to
and click the Internet Access Control tab to manage
rules. |
||
|
No
|
Go to
and click Configure Bandwidth Control in the
On-Premises Gateways section to manage global bandwidth
control rules for Internet Access On-Premises Gateways. |
||
|
Yes (Partial)
|
Only the global policy migrates to Internet Access.
Go to
and click HTTPS Inspection to manage HTTPS inspection
rules.Go to
and click Inspection Exceptions in the
HTTPS Inspection dropdown menu to manage HTTPS inspection
exceptions. |
||
|
Yes (Partial)
|
The Compressed File Handling and Large File Handling settings of policies do not migrate
to Internet Access.
The URL list exceptions of policies do not migrate to Internet Access.
Blocking and scanning by file type settings migrate to Internet Access as file profiles.
Go to
and click the File Profiles tab to manage file
profiles. |
||
|
No
|
Go to
and click the HTTP/HTTPS Request Filters tab
to manage filters for HTTP and HTTPS requests. |
||
|
No
|
Go to
and click the Data Loss Prevent tab to manage data
loss prevention rules. |
||
|
Yes (Partial)
|
Only policies with the block action migrate to Internet Access.
|
||
|
No
|
-
|
||
|
Yes (Partial)
|
Items in Exceptions to the Block List do not migrate to Internet
Access.
Go to
and select URL Deny List in the Allow
List/Deny List dropdown menu. |
||
|
Yes (Partial)
|
Items in Exceptions to the Trusted URL List do not migrate to
Internet Access.
Go to
and select URL Allow List in the Allow
List/Deny List dropdown menu. |
||
|
No
|
-
|
||
|
No
|
Internet Access does not support the configuration of exception rule lists.
|
||
|
No
|
-
|
||
|
Yes
|
Go to
and click the Custom URL Categories tab to manage
custom categories. |
||
|
Yes
|
Go to
and select TLS/SSL Certificates from the
HTTPS Inspection dropdown menu. |
||
|
No
|
-
|
||
|
No
|
-
|
||
|
No
|
-
|
||
|
No
|
Go to
to sync user data and enforce user access. |
||
|
No
|
-
|
||
|
No
|
-
|
||
|
No
|
-
|
||
|
No
|
-
|
||
|
Yes
|
-
|
||
|
No
|
Zero Trust Secure Access Internet Access references suspicious objects from the Threat
Intelligence app.
|
||
|
No
|
-
|
||
|
No
|
-
|
||
|
No
|
-
|
||
|
No
|
PAC files are not migrated to Trend Vision One. Use the
default PAC file provided by Zero Trust Secure Access Internet Access or copy the
PAC file from InterScan Web Security and replace the proxy address with the FQDN or
IP address of your Internet Access Cloud Gateway or Internet Access On-Premises
Gateway.
Go to
and click the PAC Files tab to manage your PAC
files. |
||
|
No
|
-
|
||
|
No
|
-
|
||
|
No
|
-
|
||
|
No
|
-
|
||
|
No
|
-
|
||
No
|
Go to
to manage accounts.
|
|||
|
No
|
Go to
to manage user roles. |
||
|
No
|
-
|
||
|
No
|
-
|
||
|
No
|
-
|
||
|
No
|
-
|
||
|
No
|
Your InterScan Web Security license entitles to complimentary use of Zero Trust Secure
Access Internet Access for the duration of the license. After the license expires,
you must allocate credits to continue using Internet Access.
For more information, see Introducing credit-based licensing.
|
||
|
No
|
-
|