You’re offline. This is a read only version of the page.
Online Help Center
Search
Support
For Home
For Business
English (US)
Bahasa Indonesia (Indonesian)
Dansk (Danish)
Deutsch (German)
English (Australia)
English (US)
Español (Spanish)
Français (French)
Français Canadien
(Canadian French)
Italiano (Italian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português - Brasil
(Portuguese - Brazil)
Português - Portugal
(Portuguese - Portugal)
Svenska (Swedish)
ภาษาไทย (Thai)
Tiếng Việt (Vietnamese)
Türkçe (Turkish)
Čeština (Czech)
Ελληνικά (Greek)
Български (Bulgarian)
Русский (Russian)
עברית (Hebrew)
اللغة العربية (Arabic)
日本語 (Japanese)
简体中文
(Simplified Chinese)
繁體中文
(Traditional Chinese)
繁體中文 HK
(Traditional Chinese)
한국어 (Korean)
Cancel
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More
Yes, I agree
Online Help Center
XDR and Management Platforms
Apex Central
Apex Central Widget and Policy Management Guide
Endpoint Application Control Widgets and Policies
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
Preface
Documentation
Audience
Document Conventions
Terminology
Introduction
The Dashboard
About the Dashboard
Tabs and Widgets
Working with Tabs
Working with Widgets
Security Posture Tab
Compliance Indicators
Critical Threats
Resolved Events
Security Posture Chart
Security Posture Details Pane
Summary Tab
Critical Threats Widget
Users with Threats Widget
Endpoints with Threats Widget
Apex Central Top Threats Widget
Product Component Status Widget
Product Connection Status Widget
Ransomware Prevention Widget
Data Loss Prevention Tab
DLP Incident Trends by User Widget
DLP Incidents by Severity and Status Widget
DLP Incidents by User Widget
DLP Incidents by Channel Widget
DLP Template Matches Widget
Top DLP Incident Sources Widget
DLP Violated Policy Widget
Compliance Tab
Product Application Compliance Widget
Product Component Status Widget
Product Connection Status Widget
Agent Connection Status Widget
Threat Statistics Tab
Apex Central Top Threats Widget
Apex Central Threat Statistics Widget
Threat Detection Results Widget
Policy Violation Detections Widget
C&C Callback Events Widget
Policy Management
Policy Management
Creating a New Policy
Filtering by Criteria
Assigning Endpoints to Filtered Policies
Specifying Policy Targets
Working with Parent Policy Settings
Copying Policy Settings
Inheriting Policy Settings
Modifying a Policy
Importing and Exporting Policies
Deleting a Policy
Changing the Policy Owner
Understanding the Policy List
Reordering the Policy List
Policy Status
Policy Resources
Application Control Criteria
Defining Allowed Application Criteria
Defining Blocked Application Criteria
Application Match Methods
Application Reputation List
File Paths
File Path Example Usage
Certificates
Hash Values
Data Loss Prevention
Data Identifier Types
Expressions
Predefined Expressions
Viewing Settings for Predefined Expressions
Customized Expressions
Criteria for Customized Expressions
Creating a Customized Expression
Importing Customized Expressions
File Attributes
Creating a File Attribute List
Importing a File Attribute List
Keywords
Predefined Keyword Lists
How Keyword Lists Work
Number of Keywords Condition
Distance Condition
Customized Keyword Lists
Customized Keyword List Criteria
Creating a Keyword List
Importing a Keyword List
Data Loss Prevention Templates
Predefined DLP Templates
Customized DLP Templates
Condition Statements and Logical Operators
Creating a Template
Importing Templates
Intrusion Prevention Rules
Intrusion Prevention Rule Properties
Device Control Allowed Devices
Apex Central Widgets
Apex Central Dashboard Widgets
Apex Central Top File-based Threats Widgets
Endpoint Protection Verification Widget
Hosts with C&C Callback Attempts Widget
Policy Status
Quick Launch
Unique Compromised Hosts Over Time Widget
Apex One Widgets
Apex One Dashboard Widgets
Attack Discovery Detections Widget
Quick Investigation Widget
Top Blocked Applications
Top Endpoints Affected by IPS Events Widget
Top IPS Attack Sources
Top IPS Events
Top Violated Application Control Criteria
Apex One Security Agent Policies
Security Agent Program Settings
Additional Service Settings
Configuring Additional Security Agent Services
Privileges and Other Settings
Configuring Agent Privileges
Configuring Other Agent Settings
Security Agent Self-protection
Protect Security Agent Services
Protect Files in the Security Agent Installation Folder
Protect Security Agent Registry Keys
Protect Security Agent Processes
Cache Settings for Scans
Digital Signature Cache
On-demand Scan Cache
POP3 Mail Scan
Update Agents
Assigning Security Agents as Update Agents
Application Control Policy Settings
Application Control
Configuring Application Control Settings (Agent)
Behavior Monitoring Policy Settings
Behavior Monitoring
Malware Behavior Blocking
Ransomware Protection
Anti-Exploit Protection
Newly Encountered Program Protection
Event Monitoring
Behavior Monitoring Exception List
Exception List Wildcard Support
Exception List Environment Variable Support
Configuring Behavior Monitoring Rules and Exceptions
Anti-malware Policy Settings
Scan Method Types
Guidelines for Switching Scan Methods
Manual Scan
Configuring Manual Scan Settings
Manual Scan: Target Tab
Manual Scan: Action Tab
Manual Scan: Scan Exclusion Tab
Real-time Scan
Configuring Real-time Scan Settings
Real-time Scan: Target Tab
Real-time Scan: Action Tab
Real-time Scan: Scan Exclusion Tab
Scan Now
Configuring Scan Now Settings
Scan Now: Target Tab
Scan Now: Action Tab
Scan Now: Scan Exclusion Tab
Scheduled Scan
Configuring Scheduled Scan Settings
Scheduled Scan: Target Tab
Scheduled Scan: Action Tab
Scheduled Scan: Scan Exclusion Tab
Scan Actions
ActiveAction
Custom Scan Actions
Quarantine Directory
Uncleanable Files
Files Infected with Trojans
Files Infected with Worms
Write-protected Infected Files
Password-protected Files
Backup Files
Scan Exclusion Support
Trend Micro Product Directory Exclusions
Wildcard Exceptions
Web Reputation Policy Settings
Web Reputation
Configuring a Web Reputation Policy
HTTPS URL Scan Support
Unknown Threat Protection
Predictive Machine Learning
Configuring Predictive Machine Learning Settings
Configuring Sample Submission Settings
Configuring Suspicious Connection Settings
Device Control Policy Settings
Device Control
Configuring Device Control Settings
Permissions for Devices
Wildcard Support for the Device Control Allowed Programs List
Specifying a Digital Signature Provider
Scan Exclusion Lists
Spyware/Grayware Approved List
Managing the Spyware/Grayware Approved List
Trusted Program List
Configuring the Trusted Programs List
Endpoint Sensor Policy Settings
Endpoint Sensor
Configuring Endpoint Sensor Settings
Vulnerability Protection Policy Settings
Vulnerability Protection
Configuring Vulnerability Protection Settings
Advanced Logging Policy Modes
Apex One Server Policies
Apex One Server Policy Settings
Apex One Data Loss Prevention Policies
Apex One Data Discovery Dashboard Widgets
Top Sensitive File Policy Detections Widget
Top Endpoints with Sensitive Files Widget
Top Data Discovery Template Matches Widget
Top Sensitive Files Widget
Apex One Data Discovery Policy Settings
Creating Data Discovery Policies
Apex One Data Loss Prevention Policy Settings
Data Loss Prevention (DLP)
Configuring a Data Loss Prevention Policy
Configuring Data Loss Prevention Rules
Transmission Scope and Targets for Network Channels
Network Channels
Email Clients
System and Application Channels
Device List Tool
Running the Device List Tool
Data Loss Prevention Actions
Data Loss Prevention Exceptions
Defining Non-monitored and Monitored Targets
Transmission Scope: All Transmissions
Transmission Scope: Only Transmissions Outside the Local Area Network
Decompression Rules
Apex One (Mac) Widgets and Policies
Apex One (Mac) Dashboard Widgets
Key Performance Indicators Widget
Configuring Key Performance Indicators
Configuring Widget Settings
Apex One (Mac) Policy Settings
Cache Settings for Scans
Device Control
Configuring Device Control Settings
Permissions for Storage Devices
Endpoint Sensor
Configuring Endpoint Sensor Settings
Predictive Machine Learning Settings
Privileges and Other Settings
Protected Security Agent Files
Scan Method Types
Scan Methods Compared
Switching from Smart Scan to Conventional Scan
Switching from Conventional Scan to Smart Scan
Scan Types
Real-time Scan
Configuring Real-time Scan Settings
Real-time Scan: Target Tab
Real-time Scan: Action Tab
Supported Compressed File Types
Scan Actions
Manual Scan
Configuring Manual Scan Settings
Manual Scan: Target Tab
Manual Scan: Action Tab
Supported Compressed File Types
Scan Actions
Scheduled Scan
Configuring Scheduled Scan Settings
Scheduled Scan: Target Tab
Scheduled Scan: Action Tab
Supported Compressed File Types
Scan Actions
Scan Exclusions
Configuring Scan Exclusion Lists
Trusted Program List
Configuring the Trusted Program List
Update Settings
Pure IPv6 Agent Limitations
Configuring Agent Update Settings
Web Reputation
Configuring Web Reputation Settings
Configuring the Approved and Blocked URL Lists
Deep Discovery Widgets and Policies
Deep Discovery Analyzer and Email Inspector Dashboard Widgets
Deep Discovery Analyzer Widgets
Virtual Analyzer Summary Widget
Deep Discovery Email Inspector Widgets
Email Messages with Advanced Threats Widget
Top Email Recipients of Advanced Threats Widget
Deep Discovery Inspector Integration and Policy Settings
Deep Discovery Inspector Integration Summary
Deep Discovery Inspector Affected Hosts Widget
Deep Discovery Inspector Affected Hosts Detections
Deep Discovery Inspector System Status Widget
Deep Discovery Inspector Policy Settings
Deny List/Allow List
Creating a Custom Deny List
Creating a Custom Allow List
Importing/Exporting Custom Deny or Allow Lists
Adding Monitored Network Groups
Adding Registered Services
Configuring Virtual Analyzer Settings
Deep Security Manager Widgets
Deep Security Manager Dashboard Widgets
Deep Security Anti-Malware Event History Widget
Deep Security Anti-Malware Status (Malware) Widget
Deep Security Application Type Activity (Detected) Widget
Deep Security Application Type Activity (Prevented) Widget
Deep Security Component Summary Widget
Deep Security Feature Summary Widget
Deep Security Firewall Activity (Detected) Widget
Deep Security Firewall Activity (Prevented) Widget
Deep Security Firewall Event History Widget
Deep Security Integrity Monitoring Activity Widget
Deep Security Integrity Monitoring Event History Widget
Deep Security Intrusion Prevention Event History Widget
Deep Security IPS Activity (Detected) Widget
Deep Security IPS Activity (Prevented) Widget
Deep Security Log Inspection Activity Widget
Deep Security Log Inspection Event History Widget
Deep Security Reconnaissance Scan Event History Widget
Deep Security Status Summary Widget
Deep Security Web Reputation Event History Widget
Deep Security Web Reputation URL Activity Widget
Endpoint Application Control Widgets and Policies
Endpoint Application Control Dashboard Widgets
Endpoint Application Control Key Performance Indicators Widget
Endpoint Application Control Rule Management
Endpoint Application Control User and Endpoint Summary Widget
Endpoint Application Control Application, Rule, and Policy Events Widget
Endpoint Application Control Policy Settings
Policy Rules
Policy Logging
Policy Deployment
Policy Server Connection
Policy User Experience
Endpoint Encryption Widgets and Policies
Endpoint Encryption Dashboard Widgets
Endpoint Encryption Users
Endpoint Encryption Devices
Full Disk Encryption Status
Endpoint Encryption Unsuccessful Device Logon
Endpoint Encryption Unsuccessful User Logon
Endpoint Encryption Device Lockout
Endpoint Encryption Security Violations Report
Endpoint Encryption Policy Settings
Authentication Overview
Configuring Endpoint Encryption Users Rules
Configuring Full Disk Encryption Rules
Configuring File Encryption Rules
Configuring Common Policy Rules
Migrating Groups to Apex Central
Endpoint Sensor Widgets and Policies
Trend Micro Endpoint Sensor Dashboard Widgets
Endpoint Sensor Investigation
Intelligent Monitoring Summary by Host
Top Critical Threats by Dwell Time Widget
Trend Micro Endpoint Sensor Integration and Policy Settings
Endpoint Sensor Integration
Registering with Apex Central
Adding the Endpoint Sensor Widgets
Using Apex Central to Check Status
Using the Endpoint Sensor Investigation Widget
Using Automatic Updates
Trend Micro Endpoint Sensor Policy
Preparing the Server for Policy Deployment
Creating and Deploying Policies
Managing Monitoring Rules
Managing Submission Settings
InterScan Security Policies
InterScan Messaging Security Suite Policy Settings
IMSS Rules
Adding IMSS Rules
Step 1: Set Rule Name
Step 2: Select Recipients and Senders
Configuring Exceptions
Using the Asterisk Wildcard
Step 3: Select Templates
Step 4: Select Actions
Modifying Existing IMSS Rules
Deleting IMSS Rules
InterScan Messaging Security Virtual Appliance Policy Settings
IMSVA Rules
Adding IMSVA Rules
Step 1: Set Rule Name
Step 2: Select Recipients and Senders
Configuring Exceptions
Using the Asterisk Wildcard
Step 3: Select Templates
Step 4: Select Actions
Modifying Existing IMSVA Rules
Deleting IMSVA Rules
InterScan Web Security Suite Policy Settings
Data Loss Prevention Rule List
Step 1: Set Rule Name
Step 2: Select Accounts
Step 3: Select Compliance Templates to Block
Step 4: Select Compliance Templates to Monitor
InterScan Web Security Virtual Appliance Policy Settings
Data Loss Prevention Rule List
Step 1: Set Rule Name
Step 2: Select Accounts
Step 3: Select Compliance Templates to Block
Step 4: Select Compliance Templates to Monitor
ScanMail for Microsoft Exchange Policies
ScanMail for Microsoft Exchange Policy Settings
Configuring a Data Loss Prevention Policy
Selecting Accounts
Configuring DLP Targets
Configuring DLP Actions
Configuring DLP Notifications
Enabling a DLP Policy
Smart Protection Server Widgets
Smart Protection Server Dashboard Widgets
Active Users for File Reputation
Active Users for Web Reputation
HTTP Traffic Report for File Reputation
HTTP Traffic Report for Web Reputation
Real Time Status
Top 10 Infected Computers for File Reputation
Top 10 Blocked Computers for Web Reputation
Trend Micro Mobile Security Widgets and Policies
Trend Micro Mobile Security Dashboard Widgets
Android Device Health Status
Android Device Encryption Status Summary Widget
Android Device Operating System Version Summary Widget
Android Device Rooted Status Summary Widget
Android Device Security Status Widget
Android Malware Scan Summary Widget
Android Modified App Scan Summary Widget
Android Privacy Data Leak Scan Summary Widget
Android Vulnerability Scan Summary Widget
Components Update Status Widget
Cyber Security News for Mobile Widget
iOS Device Encryption Status Summary Widget
iOS Device Health Status Widget
iOS Device Security Status Widget
iOS Device Jailbreak Status Summary Widget
iOS Device Operating System Version Summary Widget
iOS Malware Scan Summary Widget
Mobile Device App Control Status Summary Widget
Mobile Device Encryption Status Summary Widget
Mobile Device Health Status Widget
Mobile Device Jailbreak Status Summary Widget
Mobile Device Operating System Version Summary Widget
Mobile Device Ransomware Scan Summary Widget
Mobile Device Security Status Widget
Mobile Device Vendors Summary Widget
Policy Update Status Summary Widget
Server Component Health Status Summary Widget
Telephone Carriers Summary Widget
Top 10 Applications Installed Widget
Top Five Android Ransomware Detected Widget
Top Five Blocked Web Sites Widget
Top Five iOS Ransomware Detected
Top Five Malware Detected Widget
Windows Phone Device Encryption Status Summary Widget
Windows Phone Device Health Status Widget
Windows Phone Device Operating System Version Summary Widget
Trend Micro Mobile Security Policy Settings
Protecting Devices with Policies
Common Policy in Full Version Deployment Mode
Common Policy in Security Scan Deployment Mode
Wi-Fi Policy
Exchange ActiveSync Policy
Certificate Policy
VPN Policy
Global HTTP Proxy Policy
Single Sign-On Policy
Cellular Network Policy
AirPlay/AirPrint Policy
Theme Policy
Managed Domains Policy
Security Policy in Full Version Deployment Mode
Security Policy in Security Scan Deployment Mode
Spam Prevention Policy
Spam SMS Prevention Policies
Spam WAP Push Prevention Policies
Call Filtering Policy
Web Threat Protection Policy
Web Threat Protection for Android Mobile Devices
Web Threat Protection for iOS Mobile Devices
Password Policy
Feature Lock Policy
Supported Mobile Device OS Features
Compliance Policy
Application Monitor and Control Policy
Volume Purchasing Program Policy
Adding an Application
Container Policy
Virtual Mobile Infrastructure Widgets
Virtual Mobile Infrastructure Dashboard Widgets
Top 5 Trend Micro Virtual Mobile Infrastructure Launched Applications Widget
Top 5 Trend Micro Virtual Mobile Infrastructure Launched Web Applications Widget
Top 5 Trend Micro Virtual Mobile Infrastructure Online Users Widget
Trend Micro Virtual Mobile Infrastructure Server CPU Usage Status Widget
Trend Micro Virtual Mobile Infrastructure Server Disk Usage Status Widget
Trend Micro Virtual Mobile Infrastructure Server Memory Usage Status
Trend Micro Virtual Mobile Infrastructure User Status Widget
Vulnerability Protection Widgets
Vulnerability Protection Dashboard Widgets
Vulnerability Protection Application Type Activity (Detected) Widget
Vulnerability Protection Application Type Activity (Prevented) Widget
Vulnerability Protection Feature Summary Widget
Vulnerability Protection Firewall Event History Widget
Vulnerability Protection Intrusion Prevention Event History Widget
Vulnerability Protection IPS Activity (Detected) Widget
Vulnerability Protection IPS Activity (Prevented) Widget
Vulnerability Protection Key Performance Indicator Widget
Vulnerability Protection Reconnaissance Scan Event History Widget
Vulnerability Protection Status Summary Widget
Vulnerability Protection Vulnerable Endpoints Widget
Endpoint Application Control Widgets and Policies
Endpoint Application Control Dashboard Widgets
Endpoint Application Control Policy Settings
Table of Contents
Preface
Documentation
Audience
Document Conventions
Terminology
Introduction
The Dashboard
About the Dashboard
Tabs and Widgets
Working with Tabs
Working with Widgets
Security Posture Tab
Compliance Indicators
Critical Threats
Resolved Events
Security Posture Chart
Security Posture Details Pane
Summary Tab
Critical Threats Widget
Users with Threats Widget
Endpoints with Threats Widget
Apex Central Top Threats Widget
Product Component Status Widget
Product Connection Status Widget
Ransomware Prevention Widget
Data Loss Prevention Tab
DLP Incident Trends by User Widget
DLP Incidents by Severity and Status Widget
DLP Incidents by User Widget
DLP Incidents by Channel Widget
DLP Template Matches Widget
Top DLP Incident Sources Widget
DLP Violated Policy Widget
Compliance Tab
Product Application Compliance Widget
Product Component Status Widget
Product Connection Status Widget
Agent Connection Status Widget
Threat Statistics Tab
Apex Central Top Threats Widget
Apex Central Threat Statistics Widget
Threat Detection Results Widget
Policy Violation Detections Widget
C&C Callback Events Widget
Policy Management
Policy Management
Creating a New Policy
Filtering by Criteria
Assigning Endpoints to Filtered Policies
Specifying Policy Targets
Working with Parent Policy Settings
Copying Policy Settings
Inheriting Policy Settings
Modifying a Policy
Importing and Exporting Policies
Deleting a Policy
Changing the Policy Owner
Understanding the Policy List
Reordering the Policy List
Policy Status
Policy Resources
Application Control Criteria
Defining Allowed Application Criteria
Defining Blocked Application Criteria
Application Match Methods
Application Reputation List
File Paths
File Path Example Usage
Certificates
Hash Values
Data Loss Prevention
Data Identifier Types
Expressions
Predefined Expressions
Viewing Settings for Predefined Expressions
Customized Expressions
Criteria for Customized Expressions
Creating a Customized Expression
Importing Customized Expressions
File Attributes
Creating a File Attribute List
Importing a File Attribute List
Keywords
Predefined Keyword Lists
How Keyword Lists Work
Number of Keywords Condition
Distance Condition
Customized Keyword Lists
Customized Keyword List Criteria
Creating a Keyword List
Importing a Keyword List
Data Loss Prevention Templates
Predefined DLP Templates
Customized DLP Templates
Condition Statements and Logical Operators
Creating a Template
Importing Templates
Intrusion Prevention Rules
Intrusion Prevention Rule Properties
Device Control Allowed Devices
Apex Central Widgets
Apex Central Dashboard Widgets
Apex Central Top File-based Threats Widgets
Endpoint Protection Verification Widget
Hosts with C&C Callback Attempts Widget
Policy Status
Quick Launch
Unique Compromised Hosts Over Time Widget
Apex One Widgets
Apex One Dashboard Widgets
Attack Discovery Detections Widget
Quick Investigation Widget
Top Blocked Applications
Top Endpoints Affected by IPS Events Widget
Top IPS Attack Sources
Top IPS Events
Top Violated Application Control Criteria
Apex One Security Agent Policies
Security Agent Program Settings
Additional Service Settings
Configuring Additional Security Agent Services
Privileges and Other Settings
Configuring Agent Privileges
Configuring Other Agent Settings
Security Agent Self-protection
Protect Security Agent Services
Protect Files in the Security Agent Installation Folder
Protect Security Agent Registry Keys
Protect Security Agent Processes
Cache Settings for Scans
Digital Signature Cache
On-demand Scan Cache
POP3 Mail Scan
Update Agents
Assigning Security Agents as Update Agents
Application Control Policy Settings
Application Control
Configuring Application Control Settings (Agent)
Behavior Monitoring Policy Settings
Behavior Monitoring
Malware Behavior Blocking
Ransomware Protection
Anti-Exploit Protection
Newly Encountered Program Protection
Event Monitoring
Behavior Monitoring Exception List
Exception List Wildcard Support
Exception List Environment Variable Support
Configuring Behavior Monitoring Rules and Exceptions
Anti-malware Policy Settings
Scan Method Types
Guidelines for Switching Scan Methods
Manual Scan
Configuring Manual Scan Settings
Manual Scan: Target Tab
Manual Scan: Action Tab
Manual Scan: Scan Exclusion Tab
Real-time Scan
Configuring Real-time Scan Settings
Real-time Scan: Target Tab
Real-time Scan: Action Tab
Real-time Scan: Scan Exclusion Tab
Scan Now
Configuring Scan Now Settings
Scan Now: Target Tab
Scan Now: Action Tab
Scan Now: Scan Exclusion Tab
Scheduled Scan
Configuring Scheduled Scan Settings
Scheduled Scan: Target Tab
Scheduled Scan: Action Tab
Scheduled Scan: Scan Exclusion Tab
Scan Actions
ActiveAction
Custom Scan Actions
Quarantine Directory
Uncleanable Files
Files Infected with Trojans
Files Infected with Worms
Write-protected Infected Files
Password-protected Files
Backup Files
Scan Exclusion Support
Trend Micro Product Directory Exclusions
Wildcard Exceptions
Web Reputation Policy Settings
Web Reputation
Configuring a Web Reputation Policy
HTTPS URL Scan Support
Unknown Threat Protection
Predictive Machine Learning
Configuring Predictive Machine Learning Settings
Configuring Sample Submission Settings
Configuring Suspicious Connection Settings
Device Control Policy Settings
Device Control
Configuring Device Control Settings
Permissions for Devices
Wildcard Support for the Device Control Allowed Programs List
Specifying a Digital Signature Provider
Scan Exclusion Lists
Spyware/Grayware Approved List
Managing the Spyware/Grayware Approved List
Trusted Program List
Configuring the Trusted Programs List
Endpoint Sensor Policy Settings
Endpoint Sensor
Configuring Endpoint Sensor Settings
Vulnerability Protection Policy Settings
Vulnerability Protection
Configuring Vulnerability Protection Settings
Advanced Logging Policy Modes
Apex One Server Policies
Apex One Server Policy Settings
Apex One Data Loss Prevention Policies
Apex One Data Discovery Dashboard Widgets
Top Sensitive File Policy Detections Widget
Top Endpoints with Sensitive Files Widget
Top Data Discovery Template Matches Widget
Top Sensitive Files Widget
Apex One Data Discovery Policy Settings
Creating Data Discovery Policies
Apex One Data Loss Prevention Policy Settings
Data Loss Prevention (DLP)
Configuring a Data Loss Prevention Policy
Configuring Data Loss Prevention Rules
Transmission Scope and Targets for Network Channels
Network Channels
Email Clients
System and Application Channels
Device List Tool
Running the Device List Tool
Data Loss Prevention Actions
Data Loss Prevention Exceptions
Defining Non-monitored and Monitored Targets
Transmission Scope: All Transmissions
Transmission Scope: Only Transmissions Outside the Local Area Network
Decompression Rules
Apex One (Mac) Widgets and Policies
Apex One (Mac) Dashboard Widgets
Key Performance Indicators Widget
Configuring Key Performance Indicators
Configuring Widget Settings
Apex One (Mac) Policy Settings
Cache Settings for Scans
Device Control
Configuring Device Control Settings
Permissions for Storage Devices
Endpoint Sensor
Configuring Endpoint Sensor Settings
Predictive Machine Learning Settings
Privileges and Other Settings
Protected Security Agent Files
Scan Method Types
Scan Methods Compared
Switching from Smart Scan to Conventional Scan
Switching from Conventional Scan to Smart Scan
Scan Types
Real-time Scan
Configuring Real-time Scan Settings
Real-time Scan: Target Tab
Real-time Scan: Action Tab
Supported Compressed File Types
Scan Actions
Manual Scan
Configuring Manual Scan Settings
Manual Scan: Target Tab
Manual Scan: Action Tab
Supported Compressed File Types
Scan Actions
Scheduled Scan
Configuring Scheduled Scan Settings
Scheduled Scan: Target Tab
Scheduled Scan: Action Tab
Supported Compressed File Types
Scan Actions
Scan Exclusions
Configuring Scan Exclusion Lists
Trusted Program List
Configuring the Trusted Program List
Update Settings
Pure IPv6 Agent Limitations
Configuring Agent Update Settings
Web Reputation
Configuring Web Reputation Settings
Configuring the Approved and Blocked URL Lists
Deep Discovery Widgets and Policies
Deep Discovery Analyzer and Email Inspector Dashboard Widgets
Deep Discovery Analyzer Widgets
Virtual Analyzer Summary Widget
Deep Discovery Email Inspector Widgets
Email Messages with Advanced Threats Widget
Top Email Recipients of Advanced Threats Widget
Deep Discovery Inspector Integration and Policy Settings
Deep Discovery Inspector Integration Summary
Deep Discovery Inspector Affected Hosts Widget
Deep Discovery Inspector Affected Hosts Detections
Deep Discovery Inspector System Status Widget
Deep Discovery Inspector Policy Settings
Deny List/Allow List
Creating a Custom Deny List
Creating a Custom Allow List
Importing/Exporting Custom Deny or Allow Lists
Adding Monitored Network Groups
Adding Registered Services
Configuring Virtual Analyzer Settings
Deep Security Manager Widgets
Deep Security Manager Dashboard Widgets
Deep Security Anti-Malware Event History Widget
Deep Security Anti-Malware Status (Malware) Widget
Deep Security Application Type Activity (Detected) Widget
Deep Security Application Type Activity (Prevented) Widget
Deep Security Component Summary Widget
Deep Security Feature Summary Widget
Deep Security Firewall Activity (Detected) Widget
Deep Security Firewall Activity (Prevented) Widget
Deep Security Firewall Event History Widget
Deep Security Integrity Monitoring Activity Widget
Deep Security Integrity Monitoring Event History Widget
Deep Security Intrusion Prevention Event History Widget
Deep Security IPS Activity (Detected) Widget
Deep Security IPS Activity (Prevented) Widget
Deep Security Log Inspection Activity Widget
Deep Security Log Inspection Event History Widget
Deep Security Reconnaissance Scan Event History Widget
Deep Security Status Summary Widget
Deep Security Web Reputation Event History Widget
Deep Security Web Reputation URL Activity Widget
Endpoint Application Control Widgets and Policies
Endpoint Application Control Dashboard Widgets
Endpoint Application Control Key Performance Indicators Widget
Endpoint Application Control Rule Management
Endpoint Application Control User and Endpoint Summary Widget
Endpoint Application Control Application, Rule, and Policy Events Widget
Endpoint Application Control Policy Settings
Policy Rules
Policy Logging
Policy Deployment
Policy Server Connection
Policy User Experience
Endpoint Encryption Widgets and Policies
Endpoint Encryption Dashboard Widgets
Endpoint Encryption Users
Endpoint Encryption Devices
Full Disk Encryption Status
Endpoint Encryption Unsuccessful Device Logon
Endpoint Encryption Unsuccessful User Logon
Endpoint Encryption Device Lockout
Endpoint Encryption Security Violations Report
Endpoint Encryption Policy Settings
Authentication Overview
Configuring Endpoint Encryption Users Rules
Configuring Full Disk Encryption Rules
Configuring File Encryption Rules
Configuring Common Policy Rules
Migrating Groups to Apex Central
Endpoint Sensor Widgets and Policies
Trend Micro Endpoint Sensor Dashboard Widgets
Endpoint Sensor Investigation
Intelligent Monitoring Summary by Host
Top Critical Threats by Dwell Time Widget
Trend Micro Endpoint Sensor Integration and Policy Settings
Endpoint Sensor Integration
Registering with Apex Central
Adding the Endpoint Sensor Widgets
Using Apex Central to Check Status
Using the Endpoint Sensor Investigation Widget
Using Automatic Updates
Trend Micro Endpoint Sensor Policy
Preparing the Server for Policy Deployment
Creating and Deploying Policies
Managing Monitoring Rules
Managing Submission Settings
InterScan Security Policies
InterScan Messaging Security Suite Policy Settings
IMSS Rules
Adding IMSS Rules
Step 1: Set Rule Name
Step 2: Select Recipients and Senders
Configuring Exceptions
Using the Asterisk Wildcard
Step 3: Select Templates
Step 4: Select Actions
Modifying Existing IMSS Rules
Deleting IMSS Rules
InterScan Messaging Security Virtual Appliance Policy Settings
IMSVA Rules
Adding IMSVA Rules
Step 1: Set Rule Name
Step 2: Select Recipients and Senders
Configuring Exceptions
Using the Asterisk Wildcard
Step 3: Select Templates
Step 4: Select Actions
Modifying Existing IMSVA Rules
Deleting IMSVA Rules
InterScan Web Security Suite Policy Settings
Data Loss Prevention Rule List
Step 1: Set Rule Name
Step 2: Select Accounts
Step 3: Select Compliance Templates to Block
Step 4: Select Compliance Templates to Monitor
InterScan Web Security Virtual Appliance Policy Settings
Data Loss Prevention Rule List
Step 1: Set Rule Name
Step 2: Select Accounts
Step 3: Select Compliance Templates to Block
Step 4: Select Compliance Templates to Monitor
ScanMail for Microsoft Exchange Policies
ScanMail for Microsoft Exchange Policy Settings
Configuring a Data Loss Prevention Policy
Selecting Accounts
Configuring DLP Targets
Configuring DLP Actions
Configuring DLP Notifications
Enabling a DLP Policy
Smart Protection Server Widgets
Smart Protection Server Dashboard Widgets
Active Users for File Reputation
Active Users for Web Reputation
HTTP Traffic Report for File Reputation
HTTP Traffic Report for Web Reputation
Real Time Status
Top 10 Infected Computers for File Reputation
Top 10 Blocked Computers for Web Reputation
Trend Micro Mobile Security Widgets and Policies
Trend Micro Mobile Security Dashboard Widgets
Android Device Health Status
Android Device Encryption Status Summary Widget
Android Device Operating System Version Summary Widget
Android Device Rooted Status Summary Widget
Android Device Security Status Widget
Android Malware Scan Summary Widget
Android Modified App Scan Summary Widget
Android Privacy Data Leak Scan Summary Widget
Android Vulnerability Scan Summary Widget
Components Update Status Widget
Cyber Security News for Mobile Widget
iOS Device Encryption Status Summary Widget
iOS Device Health Status Widget
iOS Device Security Status Widget
iOS Device Jailbreak Status Summary Widget
iOS Device Operating System Version Summary Widget
iOS Malware Scan Summary Widget
Mobile Device App Control Status Summary Widget
Mobile Device Encryption Status Summary Widget
Mobile Device Health Status Widget
Mobile Device Jailbreak Status Summary Widget
Mobile Device Operating System Version Summary Widget
Mobile Device Ransomware Scan Summary Widget
Mobile Device Security Status Widget
Mobile Device Vendors Summary Widget
Policy Update Status Summary Widget
Server Component Health Status Summary Widget
Telephone Carriers Summary Widget
Top 10 Applications Installed Widget
Top Five Android Ransomware Detected Widget
Top Five Blocked Web Sites Widget
Top Five iOS Ransomware Detected
Top Five Malware Detected Widget
Windows Phone Device Encryption Status Summary Widget
Windows Phone Device Health Status Widget
Windows Phone Device Operating System Version Summary Widget
Trend Micro Mobile Security Policy Settings
Protecting Devices with Policies
Common Policy in Full Version Deployment Mode
Common Policy in Security Scan Deployment Mode
Wi-Fi Policy
Exchange ActiveSync Policy
Certificate Policy
VPN Policy
Global HTTP Proxy Policy
Single Sign-On Policy
Cellular Network Policy
AirPlay/AirPrint Policy
Theme Policy
Managed Domains Policy
Security Policy in Full Version Deployment Mode
Security Policy in Security Scan Deployment Mode
Spam Prevention Policy
Spam SMS Prevention Policies
Spam WAP Push Prevention Policies
Call Filtering Policy
Web Threat Protection Policy
Web Threat Protection for Android Mobile Devices
Web Threat Protection for iOS Mobile Devices
Password Policy
Feature Lock Policy
Supported Mobile Device OS Features
Compliance Policy
Application Monitor and Control Policy
Volume Purchasing Program Policy
Adding an Application
Container Policy
Virtual Mobile Infrastructure Widgets
Virtual Mobile Infrastructure Dashboard Widgets
Top 5 Trend Micro Virtual Mobile Infrastructure Launched Applications Widget
Top 5 Trend Micro Virtual Mobile Infrastructure Launched Web Applications Widget
Top 5 Trend Micro Virtual Mobile Infrastructure Online Users Widget
Trend Micro Virtual Mobile Infrastructure Server CPU Usage Status Widget
Trend Micro Virtual Mobile Infrastructure Server Disk Usage Status Widget
Trend Micro Virtual Mobile Infrastructure Server Memory Usage Status
Trend Micro Virtual Mobile Infrastructure User Status Widget
Vulnerability Protection Widgets
Vulnerability Protection Dashboard Widgets
Vulnerability Protection Application Type Activity (Detected) Widget
Vulnerability Protection Application Type Activity (Prevented) Widget
Vulnerability Protection Feature Summary Widget
Vulnerability Protection Firewall Event History Widget
Vulnerability Protection Intrusion Prevention Event History Widget
Vulnerability Protection IPS Activity (Detected) Widget
Vulnerability Protection IPS Activity (Prevented) Widget
Vulnerability Protection Key Performance Indicator Widget
Vulnerability Protection Reconnaissance Scan Event History Widget
Vulnerability Protection Status Summary Widget
Vulnerability Protection Vulnerable Endpoints Widget