Manage rule, lists, and other settings to use with your policies.
![]() |
Important
|
Policy Resources provides a central location to create, manage, and configure settings
that are reusable across your Endpoint Security Policies. Policy Resources includes
rules, lists, schedules, and authorization tokens. There are several actions you can
take depending on the resource type.
![]() |
NoteSome actions are not available for every resource. Authorization tokens have a different
set of actions. For more information, see Authorization tokens.
Trend Micro provides pre-defined lists for some resource types. Pre-defined lists cannot be modified or deleted.
|
Common resource actions
Action
|
Description
|
||
Add a resource
|
Click the add button to create a new rule, list, or schedule.
|
||
Find a resource
|
Use the search field to find a rule, list, or schedule. Some resources also have filter
options.
|
||
Edit a resource
|
Click the name and edit the details under General.
|
||
View which policies use a resource
|
Click the rule name and click Policies or Policies and resources to view a list of policies that use the rule, list, or schedule. Some resources are
also used by other resources and appear in the list.
|
||
Duplicate a resource
|
Select a resource and click Duplicate.
In the Duplicate window, specify a unique name for the new resource and click Duplicate.
|
||
Delete a resource
|
Select one or more rules, lists, or schedules and click Delete.
In the Delete window, review the selection and click Delete. You can remove a selected resource using the remove icon (
![]()
|