Manage threat protection rules to scan web traffic for threats and apply them to secure access rules for enhanced protection.
The internet access service provides threat protection rules to secure your files
by protecting
them from emerging advanced threats. It also integrates with Trend Micro Web Reputation Services to prevent you from
accessing infected websites, and provides Advanced Threat Scanning that leverages
Predictive Machine Learning and Threat Intelligence to detect botnets, unknown threats,
and
suspicious objects.
NoteThreat protection rules can be applied to the following:
|
The following table outlines the actions available on the Threat
Protection tab (
).
Action
|
Description
|
||
Add a threat protection rule
|
|
||
Check threat protection rule details
|
View the basic information about a threat protection rule, including the number of
rules
that are using the rule.
|
||
Configure a threat protection rule
|
Click in the Action column
to change the basic information about a threat protection rule.
Click in the Action column
to duplicate a threat protection rule. This provides a convenient way of adding a
new threat
protection rule with settings similar to an existing rule.
Click in the Action column
to delete a threat protection rule from Trend Vision One.
To delete more than one threat protection rule, select the rules and click
Delete in the upper left.
|