web
You’re offline. This is a read only version of the page.
close

Online Help Center

  • Search
  • Support
    • For Home
    • For Business
  • English (US)
    • Bahasa Indonesia (Indonesian)
    • Dansk (Danish)
    • Deutsch (German)
    • English (Australia)
    • English (US)
    • Español (Spanish)
    • Français (French)
    • Français Canadien
      (Canadian French)
    • Italiano (Italian)
    • Nederlands (Dutch)
    • Norsk (Norwegian)
    • Polski (Polish)
    • Português - Brasil
      (Portuguese - Brazil)
    • Português - Portugal
      (Portuguese - Portugal)
    • Svenska (Swedish)
    • ภาษาไทย (Thai)
    • Tiếng Việt (Vietnamese)
    • Türkçe (Turkish)
    • Čeština (Czech)
    • Ελληνικά (Greek)
    • Български (Bulgarian)
    • Русский (Russian)
    • עברית (Hebrew)
    • اللغة العربية (Arabic)
    • 日本語 (Japanese)
    • 简体中文
      (Simplified Chinese)
    • 繁體中文
      (Traditional Chinese)
    • 繁體中文 HK
      (Traditional Chinese)
    • 한국어 (Korean)
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More Yes, I agree
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
  • Preface
    • Documentation
    • Audience
    • Document Conventions
    • Terminology
  • Introduction
    • The Dashboard
      • About the Dashboard
      • Tabs and Widgets
        • Working with Tabs
        • Working with Widgets
      • Security Posture Tab
        • Compliance Indicators
        • Critical Threats
        • Resolved Events
        • Security Posture Chart
        • Security Posture Details Pane
      • Summary Tab
        • Critical Threats Widget
        • Users with Threats Widget
        • Endpoints with Threats Widget
        • Apex Central Top Threats Widget
        • Product Component Status Widget
        • Product Connection Status Widget
        • Ransomware Prevention Widget
      • Data Loss Prevention Tab
        • DLP Incident Trends by User Widget
        • DLP Incidents by Severity and Status Widget
        • DLP Incidents by User Widget
        • DLP Incidents by Channel Widget
        • DLP Template Matches Widget
        • Top DLP Incident Sources Widget
        • DLP Violated Policy Widget
      • Compliance Tab
        • Product Application Compliance Widget
        • Product Component Status Widget
        • Product Connection Status Widget
        • Agent Connection Status Widget
      • Threat Statistics Tab
        • Apex Central Top Threats Widget
        • Apex Central Threat Statistics Widget
        • Threat Detection Results Widget
        • Policy Violation Detections Widget
        • C&C Callback Events Widget
    • Policy Management
      • Policy Management
        • Creating a New Policy
          • Filtering by Criteria
            • Assigning Endpoints to Filtered Policies
          • Specifying Policy Targets
          • Working with Parent Policy Settings
        • Copying Policy Settings
        • Inheriting Policy Settings
        • Modifying a Policy
        • Importing and Exporting Policies
        • Deleting a Policy
        • Changing the Policy Owner
        • Understanding the Policy List
        • Reordering the Policy List
      • Policy Status
    • Policy Resources
      • Application Control Criteria
        • Defining Allowed Application Criteria
        • Defining Blocked Application Criteria
        • Application Match Methods
          • Application Reputation List
          • File Paths
            • File Path Example Usage
          • Certificates
          • Hash Values
      • Data Loss Prevention
        • Data Identifier Types
          • Expressions
            • Predefined Expressions
              • Viewing Settings for Predefined Expressions
            • Customized Expressions
              • Criteria for Customized Expressions
              • Creating a Customized Expression
              • Importing Customized Expressions
          • File Attributes
            • Creating a File Attribute List
            • Importing a File Attribute List
          • Keywords
            • Predefined Keyword Lists
            • How Keyword Lists Work
              • Number of Keywords Condition
              • Distance Condition
            • Customized Keyword Lists
              • Customized Keyword List Criteria
              • Creating a Keyword List
              • Importing a Keyword List
        • Data Loss Prevention Templates
          • Predefined DLP Templates
          • Customized DLP Templates
            • Condition Statements and Logical Operators
            • Creating a Template
            • Importing Templates
      • Intrusion Prevention Rules
        • Intrusion Prevention Rule Properties
      • Device Control Allowed Devices
  • Apex Central Widgets
    • Apex Central Dashboard Widgets
      • Apex Central Top File-based Threats Widgets
      • Endpoint Protection Verification Widget
      • Hosts with C&C Callback Attempts Widget
      • Policy Status
      • Quick Launch
      • Unique Compromised Hosts Over Time Widget
  • Apex One Widgets
    • Apex One Dashboard Widgets
      • Attack Discovery Detections Widget
      • Quick Investigation Widget
      • Top Blocked Applications
      • Top Endpoints Affected by IPS Events Widget
      • Top IPS Attack Sources
      • Top IPS Events
      • Top Violated Application Control Criteria
  • Apex One Security Agent Policies
    • Security Agent Program Settings
      • Additional Service Settings
        • Configuring Additional Security Agent Services
      • Privileges and Other Settings
        • Configuring Agent Privileges
        • Configuring Other Agent Settings
          • Security Agent Self-protection
            • Protect Security Agent Services
            • Protect Files in the Security Agent Installation Folder
            • Protect Security Agent Registry Keys
            • Protect Security Agent Processes
          • Cache Settings for Scans
            • Digital Signature Cache
            • On-demand Scan Cache
          • POP3 Mail Scan
      • Update Agents
        • Assigning Security Agents as Update Agents
    • Application Control Policy Settings
      • Application Control
        • Configuring Application Control Settings (Agent)
    • Behavior Monitoring Policy Settings
      • Behavior Monitoring
        • Malware Behavior Blocking
          • Ransomware Protection
          • Anti-Exploit Protection
        • Newly Encountered Program Protection
        • Event Monitoring
        • Behavior Monitoring Exception List
          • Exception List Wildcard Support
          • Exception List Environment Variable Support
      • Configuring Behavior Monitoring Rules and Exceptions
    • Anti-malware Policy Settings
      • Scan Method Types
        • Guidelines for Switching Scan Methods
      • Manual Scan
        • Configuring Manual Scan Settings
          • Manual Scan: Target Tab
          • Manual Scan: Action Tab
          • Manual Scan: Scan Exclusion Tab
      • Real-time Scan
        • Configuring Real-time Scan Settings
          • Real-time Scan: Target Tab
          • Real-time Scan: Action Tab
          • Real-time Scan: Scan Exclusion Tab
      • Scan Now
        • Configuring Scan Now Settings
          • Scan Now: Target Tab
          • Scan Now: Action Tab
          • Scan Now: Scan Exclusion Tab
      • Scheduled Scan
        • Configuring Scheduled Scan Settings
          • Scheduled Scan: Target Tab
          • Scheduled Scan: Action Tab
          • Scheduled Scan: Scan Exclusion Tab
      • Scan Actions
        • ActiveAction
        • Custom Scan Actions
          • Quarantine Directory
        • Uncleanable Files
          • Files Infected with Trojans
          • Files Infected with Worms
          • Write-protected Infected Files
          • Password-protected Files
          • Backup Files
      • Scan Exclusion Support
        • Trend Micro Product Directory Exclusions
        • Wildcard Exceptions
    • Web Reputation Policy Settings
      • Web Reputation
      • Configuring a Web Reputation Policy
        • HTTPS URL Scan Support
    • Unknown Threat Protection
      • Predictive Machine Learning
        • Configuring Predictive Machine Learning Settings
      • Configuring Sample Submission Settings
      • Configuring Suspicious Connection Settings
    • Device Control Policy Settings
      • Device Control
      • Configuring Device Control Settings
        • Permissions for Devices
        • Wildcard Support for the Device Control Allowed Programs List
        • Specifying a Digital Signature Provider
    • Scan Exclusion Lists
      • Spyware/Grayware Approved List
        • Managing the Spyware/Grayware Approved List
      • Trusted Program List
        • Configuring the Trusted Programs List
    • Endpoint Sensor Policy Settings
      • Endpoint Sensor
      • Configuring Endpoint Sensor Settings
    • Vulnerability Protection Policy Settings
      • Vulnerability Protection
      • Configuring Vulnerability Protection Settings
        • Advanced Logging Policy Modes
  • Apex One Server Policies
    • Apex One Server Policy Settings
  • Apex One Data Loss Prevention Policies
    • Apex One Data Discovery Dashboard Widgets
      • Top Sensitive File Policy Detections Widget
      • Top Endpoints with Sensitive Files Widget
      • Top Data Discovery Template Matches Widget
      • Top Sensitive Files Widget
    • Apex One Data Discovery Policy Settings
      • Creating Data Discovery Policies
    • Apex One Data Loss Prevention Policy Settings
      • Data Loss Prevention (DLP)
      • Configuring a Data Loss Prevention Policy
        • Configuring Data Loss Prevention Rules
          • Transmission Scope and Targets for Network Channels
          • Network Channels
            • Email Clients
          • System and Application Channels
          • Device List Tool
            • Running the Device List Tool
          • Data Loss Prevention Actions
        • Data Loss Prevention Exceptions
          • Defining Non-monitored and Monitored Targets
            • Transmission Scope: All Transmissions
            • Transmission Scope: Only Transmissions Outside the Local Area Network
          • Decompression Rules
  • Apex One (Mac) Widgets and Policies
    • Apex One (Mac) Dashboard Widgets
      • Key Performance Indicators Widget
        • Configuring Key Performance Indicators
        • Configuring Widget Settings
    • Apex One (Mac) Policy Settings
      • Cache Settings for Scans
      • Device Control
        • Configuring Device Control Settings
        • Permissions for Storage Devices
      • Endpoint Sensor
        • Configuring Endpoint Sensor Settings
      • Predictive Machine Learning Settings
      • Privileges and Other Settings
        • Protected Security Agent Files
      • Scan Method Types
        • Scan Methods Compared
        • Switching from Smart Scan to Conventional Scan
        • Switching from Conventional Scan to Smart Scan
      • Scan Types
        • Real-time Scan
          • Configuring Real-time Scan Settings
            • Real-time Scan: Target Tab
            • Real-time Scan: Action Tab
            • Supported Compressed File Types
            • Scan Actions
        • Manual Scan
          • Configuring Manual Scan Settings
            • Manual Scan: Target Tab
            • Manual Scan: Action Tab
            • Supported Compressed File Types
            • Scan Actions
        • Scheduled Scan
          • Configuring Scheduled Scan Settings
            • Scheduled Scan: Target Tab
            • Scheduled Scan: Action Tab
            • Supported Compressed File Types
            • Scan Actions
      • Scan Exclusions
        • Configuring Scan Exclusion Lists
      • Trusted Program List
        • Configuring the Trusted Program List
      • Update Settings
        • Pure IPv6 Agent Limitations
        • Configuring Agent Update Settings
      • Web Reputation
        • Configuring Web Reputation Settings
        • Configuring the Approved and Blocked URL Lists
  • Deep Discovery Widgets and Policies
    • Deep Discovery Analyzer and Email Inspector Dashboard Widgets
      • Deep Discovery Analyzer Widgets
        • Virtual Analyzer Summary Widget
      • Deep Discovery Email Inspector Widgets
        • Email Messages with Advanced Threats Widget
        • Top Email Recipients of Advanced Threats Widget
    • Deep Discovery Inspector Integration and Policy Settings
      • Deep Discovery Inspector Integration Summary
        • Deep Discovery Inspector Affected Hosts Widget
          • Deep Discovery Inspector Affected Hosts Detections
        • Deep Discovery Inspector System Status Widget
      • Deep Discovery Inspector Policy Settings
        • Deny List/Allow List
          • Creating a Custom Deny List
          • Creating a Custom Allow List
          • Importing/Exporting Custom Deny or Allow Lists
        • Adding Monitored Network Groups
        • Adding Registered Services
        • Configuring Virtual Analyzer Settings
  • Deep Security Manager Widgets
    • Deep Security Manager Dashboard Widgets
      • Deep Security Anti-Malware Event History Widget
      • Deep Security Anti-Malware Status (Malware) Widget
      • Deep Security Application Type Activity (Detected) Widget
      • Deep Security Application Type Activity (Prevented) Widget
      • Deep Security Component Summary Widget
      • Deep Security Feature Summary Widget
      • Deep Security Firewall Activity (Detected) Widget
      • Deep Security Firewall Activity (Prevented) Widget
      • Deep Security Firewall Event History Widget
      • Deep Security Integrity Monitoring Activity Widget
      • Deep Security Integrity Monitoring Event History Widget
      • Deep Security Intrusion Prevention Event History Widget
      • Deep Security IPS Activity (Detected) Widget
      • Deep Security IPS Activity (Prevented) Widget
      • Deep Security Log Inspection Activity Widget
      • Deep Security Log Inspection Event History Widget
      • Deep Security Reconnaissance Scan Event History Widget
      • Deep Security Status Summary Widget
      • Deep Security Web Reputation Event History Widget
      • Deep Security Web Reputation URL Activity Widget
  • Endpoint Application Control Widgets and Policies
    • Endpoint Application Control Dashboard Widgets
      • Endpoint Application Control Key Performance Indicators Widget
      • Endpoint Application Control Rule Management
      • Endpoint Application Control User and Endpoint Summary Widget
      • Endpoint Application Control Application, Rule, and Policy Events Widget
    • Endpoint Application Control Policy Settings
      • Policy Rules
      • Policy Logging
      • Policy Deployment
      • Policy Server Connection
      • Policy User Experience
  • Endpoint Encryption Widgets and Policies
    • Endpoint Encryption Dashboard Widgets
      • Endpoint Encryption Users
      • Endpoint Encryption Devices
      • Full Disk Encryption Status
      • Endpoint Encryption Unsuccessful Device Logon
      • Endpoint Encryption Unsuccessful User Logon
      • Endpoint Encryption Device Lockout
      • Endpoint Encryption Security Violations Report
    • Endpoint Encryption Policy Settings
      • Authentication Overview
      • Configuring Endpoint Encryption Users Rules
      • Configuring Full Disk Encryption Rules
      • Configuring File Encryption Rules
      • Configuring Common Policy Rules
      • Migrating Groups to Apex Central
  • Endpoint Sensor Widgets and Policies
    • Trend Micro Endpoint Sensor Dashboard Widgets
      • Endpoint Sensor Investigation
      • Intelligent Monitoring Summary by Host
      • Top Critical Threats by Dwell Time Widget
    • Trend Micro Endpoint Sensor Integration and Policy Settings
      • Endpoint Sensor Integration
      • Registering with Apex Central
      • Adding the Endpoint Sensor Widgets
      • Using Apex Central to Check Status
      • Using the Endpoint Sensor Investigation Widget
      • Using Automatic Updates
      • Trend Micro Endpoint Sensor Policy
        • Preparing the Server for Policy Deployment
        • Creating and Deploying Policies
        • Managing Monitoring Rules
        • Managing Submission Settings
  • InterScan Security Policies
    • InterScan Messaging Security Suite Policy Settings
      • IMSS Rules
      • Adding IMSS Rules
        • Step 1: Set Rule Name
        • Step 2: Select Recipients and Senders
          • Configuring Exceptions
          • Using the Asterisk Wildcard
        • Step 3: Select Templates
        • Step 4: Select Actions
      • Modifying Existing IMSS Rules
      • Deleting IMSS Rules
    • InterScan Messaging Security Virtual Appliance Policy Settings
      • IMSVA Rules
      • Adding IMSVA Rules
        • Step 1: Set Rule Name
        • Step 2: Select Recipients and Senders
          • Configuring Exceptions
          • Using the Asterisk Wildcard
        • Step 3: Select Templates
        • Step 4: Select Actions
      • Modifying Existing IMSVA Rules
      • Deleting IMSVA Rules
    • InterScan Web Security Suite Policy Settings
      • Data Loss Prevention Rule List
        • Step 1: Set Rule Name
        • Step 2: Select Accounts
        • Step 3: Select Compliance Templates to Block
        • Step 4: Select Compliance Templates to Monitor
    • InterScan Web Security Virtual Appliance Policy Settings
      • Data Loss Prevention Rule List
        • Step 1: Set Rule Name
        • Step 2: Select Accounts
        • Step 3: Select Compliance Templates to Block
        • Step 4: Select Compliance Templates to Monitor
  • ScanMail for Microsoft Exchange Policies
    • ScanMail for Microsoft Exchange Policy Settings
      • Configuring a Data Loss Prevention Policy
        • Selecting Accounts
        • Configuring DLP Targets
        • Configuring DLP Actions
        • Configuring DLP Notifications
        • Enabling a DLP Policy
  • Smart Protection Server Widgets
    • Smart Protection Server Dashboard Widgets
      • Active Users for File Reputation
      • Active Users for Web Reputation
      • HTTP Traffic Report for File Reputation
      • HTTP Traffic Report for Web Reputation
      • Real Time Status
      • Top 10 Infected Computers for File Reputation
      • Top 10 Blocked Computers for Web Reputation
  • Trend Micro Mobile Security Widgets and Policies
    • Trend Micro Mobile Security Dashboard Widgets
      • Android Device Health Status
      • Android Device Encryption Status Summary Widget
      • Android Device Operating System Version Summary Widget
      • Android Device Rooted Status Summary Widget
      • Android Device Security Status Widget
      • Android Malware Scan Summary Widget
      • Android Modified App Scan Summary Widget
      • Android Privacy Data Leak Scan Summary Widget
      • Android Vulnerability Scan Summary Widget
      • Components Update Status Widget
      • Cyber Security News for Mobile Widget
      • iOS Device Encryption Status Summary Widget
      • iOS Device Health Status Widget
      • iOS Device Security Status Widget
      • iOS Device Jailbreak Status Summary Widget
      • iOS Device Operating System Version Summary Widget
      • iOS Malware Scan Summary Widget
      • Mobile Device App Control Status Summary Widget
      • Mobile Device Encryption Status Summary Widget
      • Mobile Device Health Status Widget
      • Mobile Device Jailbreak Status Summary Widget
      • Mobile Device Operating System Version Summary Widget
      • Mobile Device Ransomware Scan Summary Widget
      • Mobile Device Security Status Widget
      • Mobile Device Vendors Summary Widget
      • Policy Update Status Summary Widget
      • Server Component Health Status Summary Widget
      • Telephone Carriers Summary Widget
      • Top 10 Applications Installed Widget
      • Top Five Android Ransomware Detected Widget
      • Top Five Blocked Web Sites Widget
      • Top Five iOS Ransomware Detected
      • Top Five Malware Detected Widget
      • Windows Phone Device Encryption Status Summary Widget
      • Windows Phone Device Health Status Widget
      • Windows Phone Device Operating System Version Summary Widget
    • Trend Micro Mobile Security Policy Settings
      • Protecting Devices with Policies
        • Common Policy in Full Version Deployment Mode
        • Common Policy in Security Scan Deployment Mode
        • Wi-Fi Policy
        • Exchange ActiveSync Policy
        • Certificate Policy
        • VPN Policy
        • Global HTTP Proxy Policy
        • Single Sign-On Policy
        • Cellular Network Policy
        • AirPlay/AirPrint Policy
        • Theme Policy
        • Managed Domains Policy
        • Security Policy in Full Version Deployment Mode
        • Security Policy in Security Scan Deployment Mode
        • Spam Prevention Policy
          • Spam SMS Prevention Policies
          • Spam WAP Push Prevention Policies
        • Call Filtering Policy
        • Web Threat Protection Policy
          • Web Threat Protection for Android Mobile Devices
          • Web Threat Protection for iOS Mobile Devices
        • Password Policy
        • Feature Lock Policy
          • Supported Mobile Device OS Features
        • Compliance Policy
        • Application Monitor and Control Policy
        • Volume Purchasing Program Policy
          • Adding an Application
        • Container Policy
  • Virtual Mobile Infrastructure Widgets
    • Virtual Mobile Infrastructure Dashboard Widgets
      • Top 5 Trend Micro Virtual Mobile Infrastructure Launched Applications Widget
      • Top 5 Trend Micro Virtual Mobile Infrastructure Launched Web Applications Widget
      • Top 5 Trend Micro Virtual Mobile Infrastructure Online Users Widget
      • Trend Micro Virtual Mobile Infrastructure Server CPU Usage Status Widget
      • Trend Micro Virtual Mobile Infrastructure Server Disk Usage Status Widget
      • Trend Micro Virtual Mobile Infrastructure Server Memory Usage Status
      • Trend Micro Virtual Mobile Infrastructure User Status Widget
  • Vulnerability Protection Widgets
    • Vulnerability Protection Dashboard Widgets
      • Vulnerability Protection Application Type Activity (Detected) Widget
      • Vulnerability Protection Application Type Activity (Prevented) Widget
      • Vulnerability Protection Feature Summary Widget
      • Vulnerability Protection Firewall Event History Widget
      • Vulnerability Protection Intrusion Prevention Event History Widget
      • Vulnerability Protection IPS Activity (Detected) Widget
      • Vulnerability Protection IPS Activity (Prevented) Widget
      • Vulnerability Protection Key Performance Indicator Widget
      • Vulnerability Protection Reconnaissance Scan Event History Widget
      • Vulnerability Protection Status Summary Widget
      • Vulnerability Protection Vulnerable Endpoints Widget
Apex Central Widgets
  • Apex Central Dashboard Widgets
Online Help Center

Support
For Home For Business


Privacy Notice
© 2025 Trend Micro Incorporated. All rights reserved.
Table of Contents
  • Preface
    • Documentation
    • Audience
    • Document Conventions
    • Terminology
  • Introduction
    • The Dashboard
      • About the Dashboard
      • Tabs and Widgets
        • Working with Tabs
        • Working with Widgets
      • Security Posture Tab
        • Compliance Indicators
        • Critical Threats
        • Resolved Events
        • Security Posture Chart
        • Security Posture Details Pane
      • Summary Tab
        • Critical Threats Widget
        • Users with Threats Widget
        • Endpoints with Threats Widget
        • Apex Central Top Threats Widget
        • Product Component Status Widget
        • Product Connection Status Widget
        • Ransomware Prevention Widget
      • Data Loss Prevention Tab
        • DLP Incident Trends by User Widget
        • DLP Incidents by Severity and Status Widget
        • DLP Incidents by User Widget
        • DLP Incidents by Channel Widget
        • DLP Template Matches Widget
        • Top DLP Incident Sources Widget
        • DLP Violated Policy Widget
      • Compliance Tab
        • Product Application Compliance Widget
        • Product Component Status Widget
        • Product Connection Status Widget
        • Agent Connection Status Widget
      • Threat Statistics Tab
        • Apex Central Top Threats Widget
        • Apex Central Threat Statistics Widget
        • Threat Detection Results Widget
        • Policy Violation Detections Widget
        • C&C Callback Events Widget
    • Policy Management
      • Policy Management
        • Creating a New Policy
          • Filtering by Criteria
            • Assigning Endpoints to Filtered Policies
          • Specifying Policy Targets
          • Working with Parent Policy Settings
        • Copying Policy Settings
        • Inheriting Policy Settings
        • Modifying a Policy
        • Importing and Exporting Policies
        • Deleting a Policy
        • Changing the Policy Owner
        • Understanding the Policy List
        • Reordering the Policy List
      • Policy Status
    • Policy Resources
      • Application Control Criteria
        • Defining Allowed Application Criteria
        • Defining Blocked Application Criteria
        • Application Match Methods
          • Application Reputation List
          • File Paths
            • File Path Example Usage
          • Certificates
          • Hash Values
      • Data Loss Prevention
        • Data Identifier Types
          • Expressions
            • Predefined Expressions
              • Viewing Settings for Predefined Expressions
            • Customized Expressions
              • Criteria for Customized Expressions
              • Creating a Customized Expression
              • Importing Customized Expressions
          • File Attributes
            • Creating a File Attribute List
            • Importing a File Attribute List
          • Keywords
            • Predefined Keyword Lists
            • How Keyword Lists Work
              • Number of Keywords Condition
              • Distance Condition
            • Customized Keyword Lists
              • Customized Keyword List Criteria
              • Creating a Keyword List
              • Importing a Keyword List
        • Data Loss Prevention Templates
          • Predefined DLP Templates
          • Customized DLP Templates
            • Condition Statements and Logical Operators
            • Creating a Template
            • Importing Templates
      • Intrusion Prevention Rules
        • Intrusion Prevention Rule Properties
      • Device Control Allowed Devices
  • Apex Central Widgets
    • Apex Central Dashboard Widgets
      • Apex Central Top File-based Threats Widgets
      • Endpoint Protection Verification Widget
      • Hosts with C&C Callback Attempts Widget
      • Policy Status
      • Quick Launch
      • Unique Compromised Hosts Over Time Widget
  • Apex One Widgets
    • Apex One Dashboard Widgets
      • Attack Discovery Detections Widget
      • Quick Investigation Widget
      • Top Blocked Applications
      • Top Endpoints Affected by IPS Events Widget
      • Top IPS Attack Sources
      • Top IPS Events
      • Top Violated Application Control Criteria
  • Apex One Security Agent Policies
    • Security Agent Program Settings
      • Additional Service Settings
        • Configuring Additional Security Agent Services
      • Privileges and Other Settings
        • Configuring Agent Privileges
        • Configuring Other Agent Settings
          • Security Agent Self-protection
            • Protect Security Agent Services
            • Protect Files in the Security Agent Installation Folder
            • Protect Security Agent Registry Keys
            • Protect Security Agent Processes
          • Cache Settings for Scans
            • Digital Signature Cache
            • On-demand Scan Cache
          • POP3 Mail Scan
      • Update Agents
        • Assigning Security Agents as Update Agents
    • Application Control Policy Settings
      • Application Control
        • Configuring Application Control Settings (Agent)
    • Behavior Monitoring Policy Settings
      • Behavior Monitoring
        • Malware Behavior Blocking
          • Ransomware Protection
          • Anti-Exploit Protection
        • Newly Encountered Program Protection
        • Event Monitoring
        • Behavior Monitoring Exception List
          • Exception List Wildcard Support
          • Exception List Environment Variable Support
      • Configuring Behavior Monitoring Rules and Exceptions
    • Anti-malware Policy Settings
      • Scan Method Types
        • Guidelines for Switching Scan Methods
      • Manual Scan
        • Configuring Manual Scan Settings
          • Manual Scan: Target Tab
          • Manual Scan: Action Tab
          • Manual Scan: Scan Exclusion Tab
      • Real-time Scan
        • Configuring Real-time Scan Settings
          • Real-time Scan: Target Tab
          • Real-time Scan: Action Tab
          • Real-time Scan: Scan Exclusion Tab
      • Scan Now
        • Configuring Scan Now Settings
          • Scan Now: Target Tab
          • Scan Now: Action Tab
          • Scan Now: Scan Exclusion Tab
      • Scheduled Scan
        • Configuring Scheduled Scan Settings
          • Scheduled Scan: Target Tab
          • Scheduled Scan: Action Tab
          • Scheduled Scan: Scan Exclusion Tab
      • Scan Actions
        • ActiveAction
        • Custom Scan Actions
          • Quarantine Directory
        • Uncleanable Files
          • Files Infected with Trojans
          • Files Infected with Worms
          • Write-protected Infected Files
          • Password-protected Files
          • Backup Files
      • Scan Exclusion Support
        • Trend Micro Product Directory Exclusions
        • Wildcard Exceptions
    • Web Reputation Policy Settings
      • Web Reputation
      • Configuring a Web Reputation Policy
        • HTTPS URL Scan Support
    • Unknown Threat Protection
      • Predictive Machine Learning
        • Configuring Predictive Machine Learning Settings
      • Configuring Sample Submission Settings
      • Configuring Suspicious Connection Settings
    • Device Control Policy Settings
      • Device Control
      • Configuring Device Control Settings
        • Permissions for Devices
        • Wildcard Support for the Device Control Allowed Programs List
        • Specifying a Digital Signature Provider
    • Scan Exclusion Lists
      • Spyware/Grayware Approved List
        • Managing the Spyware/Grayware Approved List
      • Trusted Program List
        • Configuring the Trusted Programs List
    • Endpoint Sensor Policy Settings
      • Endpoint Sensor
      • Configuring Endpoint Sensor Settings
    • Vulnerability Protection Policy Settings
      • Vulnerability Protection
      • Configuring Vulnerability Protection Settings
        • Advanced Logging Policy Modes
  • Apex One Server Policies
    • Apex One Server Policy Settings
  • Apex One Data Loss Prevention Policies
    • Apex One Data Discovery Dashboard Widgets
      • Top Sensitive File Policy Detections Widget
      • Top Endpoints with Sensitive Files Widget
      • Top Data Discovery Template Matches Widget
      • Top Sensitive Files Widget
    • Apex One Data Discovery Policy Settings
      • Creating Data Discovery Policies
    • Apex One Data Loss Prevention Policy Settings
      • Data Loss Prevention (DLP)
      • Configuring a Data Loss Prevention Policy
        • Configuring Data Loss Prevention Rules
          • Transmission Scope and Targets for Network Channels
          • Network Channels
            • Email Clients
          • System and Application Channels
          • Device List Tool
            • Running the Device List Tool
          • Data Loss Prevention Actions
        • Data Loss Prevention Exceptions
          • Defining Non-monitored and Monitored Targets
            • Transmission Scope: All Transmissions
            • Transmission Scope: Only Transmissions Outside the Local Area Network
          • Decompression Rules
  • Apex One (Mac) Widgets and Policies
    • Apex One (Mac) Dashboard Widgets
      • Key Performance Indicators Widget
        • Configuring Key Performance Indicators
        • Configuring Widget Settings
    • Apex One (Mac) Policy Settings
      • Cache Settings for Scans
      • Device Control
        • Configuring Device Control Settings
        • Permissions for Storage Devices
      • Endpoint Sensor
        • Configuring Endpoint Sensor Settings
      • Predictive Machine Learning Settings
      • Privileges and Other Settings
        • Protected Security Agent Files
      • Scan Method Types
        • Scan Methods Compared
        • Switching from Smart Scan to Conventional Scan
        • Switching from Conventional Scan to Smart Scan
      • Scan Types
        • Real-time Scan
          • Configuring Real-time Scan Settings
            • Real-time Scan: Target Tab
            • Real-time Scan: Action Tab
            • Supported Compressed File Types
            • Scan Actions
        • Manual Scan
          • Configuring Manual Scan Settings
            • Manual Scan: Target Tab
            • Manual Scan: Action Tab
            • Supported Compressed File Types
            • Scan Actions
        • Scheduled Scan
          • Configuring Scheduled Scan Settings
            • Scheduled Scan: Target Tab
            • Scheduled Scan: Action Tab
            • Supported Compressed File Types
            • Scan Actions
      • Scan Exclusions
        • Configuring Scan Exclusion Lists
      • Trusted Program List
        • Configuring the Trusted Program List
      • Update Settings
        • Pure IPv6 Agent Limitations
        • Configuring Agent Update Settings
      • Web Reputation
        • Configuring Web Reputation Settings
        • Configuring the Approved and Blocked URL Lists
  • Deep Discovery Widgets and Policies
    • Deep Discovery Analyzer and Email Inspector Dashboard Widgets
      • Deep Discovery Analyzer Widgets
        • Virtual Analyzer Summary Widget
      • Deep Discovery Email Inspector Widgets
        • Email Messages with Advanced Threats Widget
        • Top Email Recipients of Advanced Threats Widget
    • Deep Discovery Inspector Integration and Policy Settings
      • Deep Discovery Inspector Integration Summary
        • Deep Discovery Inspector Affected Hosts Widget
          • Deep Discovery Inspector Affected Hosts Detections
        • Deep Discovery Inspector System Status Widget
      • Deep Discovery Inspector Policy Settings
        • Deny List/Allow List
          • Creating a Custom Deny List
          • Creating a Custom Allow List
          • Importing/Exporting Custom Deny or Allow Lists
        • Adding Monitored Network Groups
        • Adding Registered Services
        • Configuring Virtual Analyzer Settings
  • Deep Security Manager Widgets
    • Deep Security Manager Dashboard Widgets
      • Deep Security Anti-Malware Event History Widget
      • Deep Security Anti-Malware Status (Malware) Widget
      • Deep Security Application Type Activity (Detected) Widget
      • Deep Security Application Type Activity (Prevented) Widget
      • Deep Security Component Summary Widget
      • Deep Security Feature Summary Widget
      • Deep Security Firewall Activity (Detected) Widget
      • Deep Security Firewall Activity (Prevented) Widget
      • Deep Security Firewall Event History Widget
      • Deep Security Integrity Monitoring Activity Widget
      • Deep Security Integrity Monitoring Event History Widget
      • Deep Security Intrusion Prevention Event History Widget
      • Deep Security IPS Activity (Detected) Widget
      • Deep Security IPS Activity (Prevented) Widget
      • Deep Security Log Inspection Activity Widget
      • Deep Security Log Inspection Event History Widget
      • Deep Security Reconnaissance Scan Event History Widget
      • Deep Security Status Summary Widget
      • Deep Security Web Reputation Event History Widget
      • Deep Security Web Reputation URL Activity Widget
  • Endpoint Application Control Widgets and Policies
    • Endpoint Application Control Dashboard Widgets
      • Endpoint Application Control Key Performance Indicators Widget
      • Endpoint Application Control Rule Management
      • Endpoint Application Control User and Endpoint Summary Widget
      • Endpoint Application Control Application, Rule, and Policy Events Widget
    • Endpoint Application Control Policy Settings
      • Policy Rules
      • Policy Logging
      • Policy Deployment
      • Policy Server Connection
      • Policy User Experience
  • Endpoint Encryption Widgets and Policies
    • Endpoint Encryption Dashboard Widgets
      • Endpoint Encryption Users
      • Endpoint Encryption Devices
      • Full Disk Encryption Status
      • Endpoint Encryption Unsuccessful Device Logon
      • Endpoint Encryption Unsuccessful User Logon
      • Endpoint Encryption Device Lockout
      • Endpoint Encryption Security Violations Report
    • Endpoint Encryption Policy Settings
      • Authentication Overview
      • Configuring Endpoint Encryption Users Rules
      • Configuring Full Disk Encryption Rules
      • Configuring File Encryption Rules
      • Configuring Common Policy Rules
      • Migrating Groups to Apex Central
  • Endpoint Sensor Widgets and Policies
    • Trend Micro Endpoint Sensor Dashboard Widgets
      • Endpoint Sensor Investigation
      • Intelligent Monitoring Summary by Host
      • Top Critical Threats by Dwell Time Widget
    • Trend Micro Endpoint Sensor Integration and Policy Settings
      • Endpoint Sensor Integration
      • Registering with Apex Central
      • Adding the Endpoint Sensor Widgets
      • Using Apex Central to Check Status
      • Using the Endpoint Sensor Investigation Widget
      • Using Automatic Updates
      • Trend Micro Endpoint Sensor Policy
        • Preparing the Server for Policy Deployment
        • Creating and Deploying Policies
        • Managing Monitoring Rules
        • Managing Submission Settings
  • InterScan Security Policies
    • InterScan Messaging Security Suite Policy Settings
      • IMSS Rules
      • Adding IMSS Rules
        • Step 1: Set Rule Name
        • Step 2: Select Recipients and Senders
          • Configuring Exceptions
          • Using the Asterisk Wildcard
        • Step 3: Select Templates
        • Step 4: Select Actions
      • Modifying Existing IMSS Rules
      • Deleting IMSS Rules
    • InterScan Messaging Security Virtual Appliance Policy Settings
      • IMSVA Rules
      • Adding IMSVA Rules
        • Step 1: Set Rule Name
        • Step 2: Select Recipients and Senders
          • Configuring Exceptions
          • Using the Asterisk Wildcard
        • Step 3: Select Templates
        • Step 4: Select Actions
      • Modifying Existing IMSVA Rules
      • Deleting IMSVA Rules
    • InterScan Web Security Suite Policy Settings
      • Data Loss Prevention Rule List
        • Step 1: Set Rule Name
        • Step 2: Select Accounts
        • Step 3: Select Compliance Templates to Block
        • Step 4: Select Compliance Templates to Monitor
    • InterScan Web Security Virtual Appliance Policy Settings
      • Data Loss Prevention Rule List
        • Step 1: Set Rule Name
        • Step 2: Select Accounts
        • Step 3: Select Compliance Templates to Block
        • Step 4: Select Compliance Templates to Monitor
  • ScanMail for Microsoft Exchange Policies
    • ScanMail for Microsoft Exchange Policy Settings
      • Configuring a Data Loss Prevention Policy
        • Selecting Accounts
        • Configuring DLP Targets
        • Configuring DLP Actions
        • Configuring DLP Notifications
        • Enabling a DLP Policy
  • Smart Protection Server Widgets
    • Smart Protection Server Dashboard Widgets
      • Active Users for File Reputation
      • Active Users for Web Reputation
      • HTTP Traffic Report for File Reputation
      • HTTP Traffic Report for Web Reputation
      • Real Time Status
      • Top 10 Infected Computers for File Reputation
      • Top 10 Blocked Computers for Web Reputation
  • Trend Micro Mobile Security Widgets and Policies
    • Trend Micro Mobile Security Dashboard Widgets
      • Android Device Health Status
      • Android Device Encryption Status Summary Widget
      • Android Device Operating System Version Summary Widget
      • Android Device Rooted Status Summary Widget
      • Android Device Security Status Widget
      • Android Malware Scan Summary Widget
      • Android Modified App Scan Summary Widget
      • Android Privacy Data Leak Scan Summary Widget
      • Android Vulnerability Scan Summary Widget
      • Components Update Status Widget
      • Cyber Security News for Mobile Widget
      • iOS Device Encryption Status Summary Widget
      • iOS Device Health Status Widget
      • iOS Device Security Status Widget
      • iOS Device Jailbreak Status Summary Widget
      • iOS Device Operating System Version Summary Widget
      • iOS Malware Scan Summary Widget
      • Mobile Device App Control Status Summary Widget
      • Mobile Device Encryption Status Summary Widget
      • Mobile Device Health Status Widget
      • Mobile Device Jailbreak Status Summary Widget
      • Mobile Device Operating System Version Summary Widget
      • Mobile Device Ransomware Scan Summary Widget
      • Mobile Device Security Status Widget
      • Mobile Device Vendors Summary Widget
      • Policy Update Status Summary Widget
      • Server Component Health Status Summary Widget
      • Telephone Carriers Summary Widget
      • Top 10 Applications Installed Widget
      • Top Five Android Ransomware Detected Widget
      • Top Five Blocked Web Sites Widget
      • Top Five iOS Ransomware Detected
      • Top Five Malware Detected Widget
      • Windows Phone Device Encryption Status Summary Widget
      • Windows Phone Device Health Status Widget
      • Windows Phone Device Operating System Version Summary Widget
    • Trend Micro Mobile Security Policy Settings
      • Protecting Devices with Policies
        • Common Policy in Full Version Deployment Mode
        • Common Policy in Security Scan Deployment Mode
        • Wi-Fi Policy
        • Exchange ActiveSync Policy
        • Certificate Policy
        • VPN Policy
        • Global HTTP Proxy Policy
        • Single Sign-On Policy
        • Cellular Network Policy
        • AirPlay/AirPrint Policy
        • Theme Policy
        • Managed Domains Policy
        • Security Policy in Full Version Deployment Mode
        • Security Policy in Security Scan Deployment Mode
        • Spam Prevention Policy
          • Spam SMS Prevention Policies
          • Spam WAP Push Prevention Policies
        • Call Filtering Policy
        • Web Threat Protection Policy
          • Web Threat Protection for Android Mobile Devices
          • Web Threat Protection for iOS Mobile Devices
        • Password Policy
        • Feature Lock Policy
          • Supported Mobile Device OS Features
        • Compliance Policy
        • Application Monitor and Control Policy
        • Volume Purchasing Program Policy
          • Adding an Application
        • Container Policy
  • Virtual Mobile Infrastructure Widgets
    • Virtual Mobile Infrastructure Dashboard Widgets
      • Top 5 Trend Micro Virtual Mobile Infrastructure Launched Applications Widget
      • Top 5 Trend Micro Virtual Mobile Infrastructure Launched Web Applications Widget
      • Top 5 Trend Micro Virtual Mobile Infrastructure Online Users Widget
      • Trend Micro Virtual Mobile Infrastructure Server CPU Usage Status Widget
      • Trend Micro Virtual Mobile Infrastructure Server Disk Usage Status Widget
      • Trend Micro Virtual Mobile Infrastructure Server Memory Usage Status
      • Trend Micro Virtual Mobile Infrastructure User Status Widget
  • Vulnerability Protection Widgets
    • Vulnerability Protection Dashboard Widgets
      • Vulnerability Protection Application Type Activity (Detected) Widget
      • Vulnerability Protection Application Type Activity (Prevented) Widget
      • Vulnerability Protection Feature Summary Widget
      • Vulnerability Protection Firewall Event History Widget
      • Vulnerability Protection Intrusion Prevention Event History Widget
      • Vulnerability Protection IPS Activity (Detected) Widget
      • Vulnerability Protection IPS Activity (Prevented) Widget
      • Vulnerability Protection Key Performance Indicator Widget
      • Vulnerability Protection Reconnaissance Scan Event History Widget
      • Vulnerability Protection Status Summary Widget
      • Vulnerability Protection Vulnerable Endpoints Widget
Close