Learn about the information available in Security Configuration Overview within Cyber Risk Overview.
Security Configuration Overview displays your risk level and risk score within the security configuration risk category.
The risk level is a comprehensive rating of your organization's protection product
status and is based on the deployment and status of protection products within your
endpoint, email, and network security layers plus adoption rates for key product features
or risk events based on product configurations. An overall high security configuration
risk level or a high risk level within a specific security layer indicates that you
may need to review the status of deployed products and optimize product security features
and configurations.
![]() |
ImportantThe security configuration risk level is determined using all data received from your
business without applying asset visibility scope limits.
|
The following tables detail the widgets available for each security layer within Security Configuration Overview.
![]() |
NoteThe Security Configuration Overview widgets only show data for devices within the asset visibility scope of the current
user.
|
For the endpoint security layer, you can switch data sources using the dropdown menu.
Trend Vision One Endpoint Security is the default data source. If you have the Microsoft
Defender for Endpoint integration enabled, you can change the data source view for
your endpoint security configuration to show your Microsoft Defender for Endpoint security configuration status. To access Microsoft Defender for Endpoint data, you must enable the product integration
via a connected Azure subscription in Cloud Accounts. To learn how to enable the Microsoft
Defender for Endpoint integration, see Enable Microsoft Defender for Endpoint Log Collection.
Endpoint Security Widgets - Trend Vision One Endpoint Security
Widget
|
Description
|
Product data sources
|
Endpoint Protection
|
The number of endpoint protection agents deployed on different operating systems
throughout your network
|
For customers that have updated to the Foundation Services release, the following products are also supported:
|
Endpoint Sensor
|
The number of supported endpoint sensor products deployed throughout your network
|
|
Endpoint Protection Agent Version Status
|
The number of endpoint protection agents running unsupported, older supported, and
up-to-date versions of the agent software
|
For customers that have updated to the Foundation Services release, the following products are also supported:
|
Endpoint Sensor Version Status
|
The number of unsupported, older supported, up-to-date, and legacy endpoint sensor
product versions deployed throughout your network
|
|
Endpoint Protection Component Version Status
|
The number of endpoints running up-to-date or outdated endpoint protection component
versions
|
|
Endpoint Sensor Component Version Status
|
The number of endpoints running up-to-date, outdated, or legacy endpoint sensor component
versions
|
|
Key Feature Adoption Rates
|
A list of the major protection features offered by agent and sensor products and the
total number of endpoints to which each feature is applied
Expand each listed key feature to see detailed adoption rate and compliance information.
|
|
Key Feature Adoption and Pattern Update Status
|
A list of the major protection features offered by agents, the number of endpoints
with the features enabled, and the number of endpoints with outdated patterns or non-optimized
configurations for each key feature
Expand each listed key feature to see detailed adoption rate and status information.
|
|
![]() |
Important
|
![]() |
ImportantThis is a "Pre-release" feature and is not considered an official release. Please
review the Pre-release disclaimer before using the feature.
|
Endpoint Security Widgets - Microsoft Defender for Endpoint
Widget
|
Description
|
||
Endpoint operating system distribution
|
The distribution of operating systems on your Microsoft Defender for Endpoint-managed
endpoints. Supported operating systems include:
Click the discovered endpoint total to view your discovered Microsoft Defender for
Endpoint endpoints on the device list in Attack Surface Discovery. Click the total
for each operating system to view discovered endpoints filtered by operating system.
|
||
Risk events by category
|
Total security configuration risk events detected by security category. Click a total
to view corresponding risk events in Risk Reduction Measures within Threat and Exposure
Management. Available categories and corresponding risk events include:
|
||
Endpoint protection version status
|
Total endpoints running outdated, up-to-date, and unknown Microsoft Defender for Endpoint
update components, including engine, platform, and security intelligence components.
You should apply the latest Microsoft security intelligence update for any endpoints
with outdated versions to strengthen your security posture. For information on the
latest Microsoft security intelligence updates, see the Microsoft documentation.
|
Email Security Widgets
Widget
|
Description
|
Supported products
|
||
Email Protection
|
A list of your configured Trend Micro email protection solutions and the number of assets protected
|
|
||
Email Sensor
|
A list of your email account assets that have Email Sensor detection enabled
|
|
||
Trend Micro Cloud App Security or Cloud Email and Collaboration Protection
|
Displays the number of email accounts with and without a policy assigned
|
|
||
Trend Micro Email Security or Cloud Email Gateway Protection
|
Displays the number of email domains that are and are not properly configured
|
|
||
Key Feature Adoption Rates
|
A list of the major security features offered by Trend Micro email protection solutions that includes the number of email accounts and email domains
for which each feature is enabled.
For more information, see Enabling Key Features for Email Accounts with Cloud App Security and Inbound and Outbound Protection.
Expand each listed key feature to see detailed adoption rate and compliance information.
|
|
Network Security Widgets
Widget
|
Description
|
Supported products
|
||
Network Security Appliances
|
The number of Deep Discovery Inspector appliances deployed in your environment
|
|
||
Network Sensor
|
The number of network sensors enabled in your environment
|
|
||
Appliance Health
|
Displays the number of Virtual Network Sensor and Deep Discovery Inspector appliances that are properly connected and the number of appliances that are not
receiving traffic
|
|
||
Software Version
|
Displays the software version status of your connected Virtual Network Sensor and
Deep Discovery Inspector appliances
|
|
||
Component Version Status
|
Displays the number of appliances using the latest version or outdated versions of
components.
|
|
||
Key Feature Adoption and Configuration
|
A list of the major protection features offered by Virtual Network Sensor and Deep Discovery Inspector, and the number of appliances that have each feature enabled or configured
Expand each listed key feature to see detailed adoption rate and status information.
|
|
![]() |
ImportantTo enable visibility over your Deep Discovery Inspector appliances, update to Deep Discovery Inspector 6.7 or later.
|