web
You’re offline. This is a read only version of the page.
close

Online Help Center

  • Search
  • Support
    • For Home
    • For Business
  • English (US)
    • Bahasa Indonesia (Indonesian)
    • Dansk (Danish)
    • Deutsch (German)
    • English (Australia)
    • English (US)
    • Español (Spanish)
    • Français (French)
    • Français Canadien
      (Canadian French)
    • Italiano (Italian)
    • Nederlands (Dutch)
    • Norsk (Norwegian)
    • Polski (Polish)
    • Português - Brasil
      (Portuguese - Brazil)
    • Português - Portugal
      (Portuguese - Portugal)
    • Svenska (Swedish)
    • ภาษาไทย (Thai)
    • Tiếng Việt (Vietnamese)
    • Türkçe (Turkish)
    • Čeština (Czech)
    • Ελληνικά (Greek)
    • Български (Bulgarian)
    • Русский (Russian)
    • עברית (Hebrew)
    • اللغة العربية (Arabic)
    • 日本語 (Japanese)
    • 简体中文
      (Simplified Chinese)
    • 繁體中文
      (Traditional Chinese)
    • 繁體中文 HK
      (Traditional Chinese)
    • 한국어 (Korean)
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More Yes, I agree
  • Online Help Center
  • XDR and Management Platforms
  • Apex Central
  • Apex Central Widget and Policy Management Guide
  • Endpoint Application Control Widgets and Policies
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
  • Preface
    • Documentation
    • Audience
    • Document Conventions
    • Terminology
  • Introduction
    • The Dashboard
      • About the Dashboard
      • Tabs and Widgets
        • Working with Tabs
        • Working with Widgets
      • Security Posture Tab
        • Compliance Indicators
        • Critical Threats
        • Resolved Events
        • Security Posture Chart
        • Security Posture Details Pane
      • Summary Tab
        • Critical Threats Widget
        • Users with Threats Widget
        • Endpoints with Threats Widget
        • Apex Central Top Threats Widget
        • Product Component Status Widget
        • Product Connection Status Widget
        • Ransomware Prevention Widget
      • Data Loss Prevention Tab
        • DLP Incident Trends by User Widget
        • DLP Incidents by Severity and Status Widget
        • DLP Incidents by User Widget
        • DLP Incidents by Channel Widget
        • DLP Template Matches Widget
        • Top DLP Incident Sources Widget
        • DLP Violated Policy Widget
      • Compliance Tab
        • Product Application Compliance Widget
        • Product Component Status Widget
        • Product Connection Status Widget
        • Agent Connection Status Widget
      • Threat Statistics Tab
        • Apex Central Top Threats Widget
        • Apex Central Threat Statistics Widget
        • Threat Detection Results Widget
        • Policy Violation Detections Widget
        • C&C Callback Events Widget
    • Policy Management
      • Policy Management
        • Creating a New Policy
          • Filtering by Criteria
            • Assigning Endpoints to Filtered Policies
          • Specifying Policy Targets
          • Working with Parent Policy Settings
        • Copying Policy Settings
        • Inheriting Policy Settings
        • Modifying a Policy
        • Importing and Exporting Policies
        • Deleting a Policy
        • Changing the Policy Owner
        • Understanding the Policy List
        • Reordering the Policy List
      • Policy Status
    • Policy Resources
      • Application Control Criteria
        • Defining Allowed Application Criteria
        • Defining Blocked Application Criteria
        • Application Match Methods
          • Application Reputation List
          • File Paths
            • File Path Example Usage
          • Certificates
          • Hash Values
      • Data Loss Prevention
        • Data Identifier Types
          • Expressions
            • Predefined Expressions
              • Viewing Settings for Predefined Expressions
            • Customized Expressions
              • Criteria for Customized Expressions
              • Creating a Customized Expression
              • Importing Customized Expressions
          • File Attributes
            • Creating a File Attribute List
            • Importing a File Attribute List
          • Keywords
            • Predefined Keyword Lists
            • How Keyword Lists Work
              • Number of Keywords Condition
              • Distance Condition
            • Customized Keyword Lists
              • Customized Keyword List Criteria
              • Creating a Keyword List
              • Importing a Keyword List
        • Data Loss Prevention Templates
          • Predefined DLP Templates
          • Customized DLP Templates
            • Condition Statements and Logical Operators
            • Creating a Template
            • Importing Templates
      • Intrusion Prevention Rules
        • Intrusion Prevention Rule Properties
      • Device Control Allowed Devices
  • Apex Central Widgets
    • Apex Central Dashboard Widgets
      • Apex Central Top File-based Threats Widgets
      • Endpoint Protection Verification Widget
      • Hosts with C&C Callback Attempts Widget
      • Policy Status
      • Quick Launch
      • Unique Compromised Hosts Over Time Widget
  • Apex One Widgets
    • Apex One Dashboard Widgets
      • Attack Discovery Detections Widget
      • Quick Investigation Widget
      • Top Blocked Applications
      • Top Endpoints Affected by IPS Events Widget
      • Top IPS Attack Sources
      • Top IPS Events
      • Top Violated Application Control Criteria
  • Apex One Security Agent Policies
    • Security Agent Program Settings
      • Additional Service Settings
        • Configuring Additional Security Agent Services
      • Privileges and Other Settings
        • Configuring Agent Privileges
        • Configuring Other Agent Settings
          • Security Agent Self-protection
            • Protect Security Agent Services
            • Protect Files in the Security Agent Installation Folder
            • Protect Security Agent Registry Keys
            • Protect Security Agent Processes
          • Cache Settings for Scans
            • Digital Signature Cache
            • On-demand Scan Cache
          • POP3 Mail Scan
      • Update Agents
        • Assigning Security Agents as Update Agents
    • Application Control Policy Settings
      • Application Control
        • Configuring Application Control Settings (Agent)
    • Behavior Monitoring Policy Settings
      • Behavior Monitoring
        • Malware Behavior Blocking
          • Ransomware Protection
          • Anti-Exploit Protection
        • Newly Encountered Program Protection
        • Event Monitoring
        • Behavior Monitoring Exception List
          • Exception List Wildcard Support
          • Exception List Environment Variable Support
      • Configuring Behavior Monitoring Rules and Exceptions
    • Anti-malware Policy Settings
      • Scan Method Types
        • Guidelines for Switching Scan Methods
      • Manual Scan
        • Configuring Manual Scan Settings
          • Manual Scan: Target Tab
          • Manual Scan: Action Tab
          • Manual Scan: Scan Exclusion Tab
      • Real-time Scan
        • Configuring Real-time Scan Settings
          • Real-time Scan: Target Tab
          • Real-time Scan: Action Tab
          • Real-time Scan: Scan Exclusion Tab
      • Scan Now
        • Configuring Scan Now Settings
          • Scan Now: Target Tab
          • Scan Now: Action Tab
          • Scan Now: Scan Exclusion Tab
      • Scheduled Scan
        • Configuring Scheduled Scan Settings
          • Scheduled Scan: Target Tab
          • Scheduled Scan: Action Tab
          • Scheduled Scan: Scan Exclusion Tab
      • Scan Actions
        • ActiveAction
        • Custom Scan Actions
          • Quarantine Directory
        • Uncleanable Files
          • Files Infected with Trojans
          • Files Infected with Worms
          • Write-protected Infected Files
          • Password-protected Files
          • Backup Files
      • Scan Exclusion Support
        • Trend Micro Product Directory Exclusions
        • Wildcard Exceptions
    • Web Reputation Policy Settings
      • Web Reputation
      • Configuring a Web Reputation Policy
        • HTTPS URL Scan Support
    • Unknown Threat Protection
      • Predictive Machine Learning
        • Configuring Predictive Machine Learning Settings
      • Configuring Sample Submission Settings
      • Configuring Suspicious Connection Settings
    • Device Control Policy Settings
      • Device Control
      • Configuring Device Control Settings
        • Permissions for Devices
        • Wildcard Support for the Device Control Allowed Programs List
        • Specifying a Digital Signature Provider
    • Scan Exclusion Lists
      • Spyware/Grayware Approved List
        • Managing the Spyware/Grayware Approved List
      • Trusted Program List
        • Configuring the Trusted Programs List
    • Endpoint Sensor Policy Settings
      • Endpoint Sensor
      • Configuring Endpoint Sensor Settings
    • Vulnerability Protection Policy Settings
      • Vulnerability Protection
      • Configuring Vulnerability Protection Settings
        • Advanced Logging Policy Modes
  • Apex One Server Policies
    • Apex One Server Policy Settings
  • Apex One Data Loss Prevention Policies
    • Apex One Data Discovery Dashboard Widgets
      • Top Sensitive File Policy Detections Widget
      • Top Endpoints with Sensitive Files Widget
      • Top Data Discovery Template Matches Widget
      • Top Sensitive Files Widget
    • Apex One Data Discovery Policy Settings
      • Creating Data Discovery Policies
    • Apex One Data Loss Prevention Policy Settings
      • Data Loss Prevention (DLP)
      • Configuring a Data Loss Prevention Policy
        • Configuring Data Loss Prevention Rules
          • Transmission Scope and Targets for Network Channels
          • Network Channels
            • Email Clients
          • System and Application Channels
          • Device List Tool
            • Running the Device List Tool
          • Data Loss Prevention Actions
        • Data Loss Prevention Exceptions
          • Defining Non-monitored and Monitored Targets
            • Transmission Scope: All Transmissions
            • Transmission Scope: Only Transmissions Outside the Local Area Network
          • Decompression Rules
  • Apex One (Mac) Widgets and Policies
    • Apex One (Mac) Dashboard Widgets
      • Key Performance Indicators Widget
        • Configuring Key Performance Indicators
        • Configuring Widget Settings
    • Apex One (Mac) Policy Settings
      • Cache Settings for Scans
      • Device Control
        • Configuring Device Control Settings
        • Permissions for Storage Devices
      • Endpoint Sensor
        • Configuring Endpoint Sensor Settings
      • Predictive Machine Learning Settings
      • Privileges and Other Settings
        • Protected Security Agent Files
      • Scan Method Types
        • Scan Methods Compared
        • Switching from Smart Scan to Conventional Scan
        • Switching from Conventional Scan to Smart Scan
      • Scan Types
        • Real-time Scan
          • Configuring Real-time Scan Settings
            • Real-time Scan: Target Tab
            • Real-time Scan: Action Tab
            • Supported Compressed File Types
            • Scan Actions
        • Manual Scan
          • Configuring Manual Scan Settings
            • Manual Scan: Target Tab
            • Manual Scan: Action Tab
            • Supported Compressed File Types
            • Scan Actions
        • Scheduled Scan
          • Configuring Scheduled Scan Settings
            • Scheduled Scan: Target Tab
            • Scheduled Scan: Action Tab
            • Supported Compressed File Types
            • Scan Actions
      • Scan Exclusions
        • Configuring Scan Exclusion Lists
      • Trusted Program List
        • Configuring the Trusted Program List
      • Update Settings
        • Pure IPv6 Agent Limitations
        • Configuring Agent Update Settings
      • Web Reputation
        • Configuring Web Reputation Settings
        • Configuring the Approved and Blocked URL Lists
  • Deep Discovery Widgets and Policies
    • Deep Discovery Analyzer and Email Inspector Dashboard Widgets
      • Deep Discovery Analyzer Widgets
        • Virtual Analyzer Summary Widget
      • Deep Discovery Email Inspector Widgets
        • Email Messages with Advanced Threats Widget
        • Top Email Recipients of Advanced Threats Widget
    • Deep Discovery Inspector Integration and Policy Settings
      • Deep Discovery Inspector Integration Summary
        • Deep Discovery Inspector Affected Hosts Widget
          • Deep Discovery Inspector Affected Hosts Detections
        • Deep Discovery Inspector System Status Widget
      • Deep Discovery Inspector Policy Settings
        • Deny List/Allow List
          • Creating a Custom Deny List
          • Creating a Custom Allow List
          • Importing/Exporting Custom Deny or Allow Lists
        • Adding Monitored Network Groups
        • Adding Registered Services
        • Configuring Virtual Analyzer Settings
  • Deep Security Manager Widgets
    • Deep Security Manager Dashboard Widgets
      • Deep Security Anti-Malware Event History Widget
      • Deep Security Anti-Malware Status (Malware) Widget
      • Deep Security Application Type Activity (Detected) Widget
      • Deep Security Application Type Activity (Prevented) Widget
      • Deep Security Component Summary Widget
      • Deep Security Feature Summary Widget
      • Deep Security Firewall Activity (Detected) Widget
      • Deep Security Firewall Activity (Prevented) Widget
      • Deep Security Firewall Event History Widget
      • Deep Security Integrity Monitoring Activity Widget
      • Deep Security Integrity Monitoring Event History Widget
      • Deep Security Intrusion Prevention Event History Widget
      • Deep Security IPS Activity (Detected) Widget
      • Deep Security IPS Activity (Prevented) Widget
      • Deep Security Log Inspection Activity Widget
      • Deep Security Log Inspection Event History Widget
      • Deep Security Reconnaissance Scan Event History Widget
      • Deep Security Status Summary Widget
      • Deep Security Web Reputation Event History Widget
      • Deep Security Web Reputation URL Activity Widget
  • Endpoint Application Control Widgets and Policies
    • Endpoint Application Control Dashboard Widgets
      • Endpoint Application Control Key Performance Indicators Widget
      • Endpoint Application Control Rule Management
      • Endpoint Application Control User and Endpoint Summary Widget
      • Endpoint Application Control Application, Rule, and Policy Events Widget
    • Endpoint Application Control Policy Settings
      • Policy Rules
      • Policy Logging
      • Policy Deployment
      • Policy Server Connection
      • Policy User Experience
  • Endpoint Encryption Widgets and Policies
    • Endpoint Encryption Dashboard Widgets
      • Endpoint Encryption Users
      • Endpoint Encryption Devices
      • Full Disk Encryption Status
      • Endpoint Encryption Unsuccessful Device Logon
      • Endpoint Encryption Unsuccessful User Logon
      • Endpoint Encryption Device Lockout
      • Endpoint Encryption Security Violations Report
    • Endpoint Encryption Policy Settings
      • Authentication Overview
      • Configuring Endpoint Encryption Users Rules
      • Configuring Full Disk Encryption Rules
      • Configuring File Encryption Rules
      • Configuring Common Policy Rules
      • Migrating Groups to Apex Central
  • Endpoint Sensor Widgets and Policies
    • Trend Micro Endpoint Sensor Dashboard Widgets
      • Endpoint Sensor Investigation
      • Intelligent Monitoring Summary by Host
      • Top Critical Threats by Dwell Time Widget
    • Trend Micro Endpoint Sensor Integration and Policy Settings
      • Endpoint Sensor Integration
      • Registering with Apex Central
      • Adding the Endpoint Sensor Widgets
      • Using Apex Central to Check Status
      • Using the Endpoint Sensor Investigation Widget
      • Using Automatic Updates
      • Trend Micro Endpoint Sensor Policy
        • Preparing the Server for Policy Deployment
        • Creating and Deploying Policies
        • Managing Monitoring Rules
        • Managing Submission Settings
  • InterScan Security Policies
    • InterScan Messaging Security Suite Policy Settings
      • IMSS Rules
      • Adding IMSS Rules
        • Step 1: Set Rule Name
        • Step 2: Select Recipients and Senders
          • Configuring Exceptions
          • Using the Asterisk Wildcard
        • Step 3: Select Templates
        • Step 4: Select Actions
      • Modifying Existing IMSS Rules
      • Deleting IMSS Rules
    • InterScan Messaging Security Virtual Appliance Policy Settings
      • IMSVA Rules
      • Adding IMSVA Rules
        • Step 1: Set Rule Name
        • Step 2: Select Recipients and Senders
          • Configuring Exceptions
          • Using the Asterisk Wildcard
        • Step 3: Select Templates
        • Step 4: Select Actions
      • Modifying Existing IMSVA Rules
      • Deleting IMSVA Rules
    • InterScan Web Security Suite Policy Settings
      • Data Loss Prevention Rule List
        • Step 1: Set Rule Name
        • Step 2: Select Accounts
        • Step 3: Select Compliance Templates to Block
        • Step 4: Select Compliance Templates to Monitor
    • InterScan Web Security Virtual Appliance Policy Settings
      • Data Loss Prevention Rule List
        • Step 1: Set Rule Name
        • Step 2: Select Accounts
        • Step 3: Select Compliance Templates to Block
        • Step 4: Select Compliance Templates to Monitor
  • ScanMail for Microsoft Exchange Policies
    • ScanMail for Microsoft Exchange Policy Settings
      • Configuring a Data Loss Prevention Policy
        • Selecting Accounts
        • Configuring DLP Targets
        • Configuring DLP Actions
        • Configuring DLP Notifications
        • Enabling a DLP Policy
  • Smart Protection Server Widgets
    • Smart Protection Server Dashboard Widgets
      • Active Users for File Reputation
      • Active Users for Web Reputation
      • HTTP Traffic Report for File Reputation
      • HTTP Traffic Report for Web Reputation
      • Real Time Status
      • Top 10 Infected Computers for File Reputation
      • Top 10 Blocked Computers for Web Reputation
  • Trend Micro Mobile Security Widgets and Policies
    • Trend Micro Mobile Security Dashboard Widgets
      • Android Device Health Status
      • Android Device Encryption Status Summary Widget
      • Android Device Operating System Version Summary Widget
      • Android Device Rooted Status Summary Widget
      • Android Device Security Status Widget
      • Android Malware Scan Summary Widget
      • Android Modified App Scan Summary Widget
      • Android Privacy Data Leak Scan Summary Widget
      • Android Vulnerability Scan Summary Widget
      • Components Update Status Widget
      • Cyber Security News for Mobile Widget
      • iOS Device Encryption Status Summary Widget
      • iOS Device Health Status Widget
      • iOS Device Security Status Widget
      • iOS Device Jailbreak Status Summary Widget
      • iOS Device Operating System Version Summary Widget
      • iOS Malware Scan Summary Widget
      • Mobile Device App Control Status Summary Widget
      • Mobile Device Encryption Status Summary Widget
      • Mobile Device Health Status Widget
      • Mobile Device Jailbreak Status Summary Widget
      • Mobile Device Operating System Version Summary Widget
      • Mobile Device Ransomware Scan Summary Widget
      • Mobile Device Security Status Widget
      • Mobile Device Vendors Summary Widget
      • Policy Update Status Summary Widget
      • Server Component Health Status Summary Widget
      • Telephone Carriers Summary Widget
      • Top 10 Applications Installed Widget
      • Top Five Android Ransomware Detected Widget
      • Top Five Blocked Web Sites Widget
      • Top Five iOS Ransomware Detected
      • Top Five Malware Detected Widget
      • Windows Phone Device Encryption Status Summary Widget
      • Windows Phone Device Health Status Widget
      • Windows Phone Device Operating System Version Summary Widget
    • Trend Micro Mobile Security Policy Settings
      • Protecting Devices with Policies
        • Common Policy in Full Version Deployment Mode
        • Common Policy in Security Scan Deployment Mode
        • Wi-Fi Policy
        • Exchange ActiveSync Policy
        • Certificate Policy
        • VPN Policy
        • Global HTTP Proxy Policy
        • Single Sign-On Policy
        • Cellular Network Policy
        • AirPlay/AirPrint Policy
        • Theme Policy
        • Managed Domains Policy
        • Security Policy in Full Version Deployment Mode
        • Security Policy in Security Scan Deployment Mode
        • Spam Prevention Policy
          • Spam SMS Prevention Policies
          • Spam WAP Push Prevention Policies
        • Call Filtering Policy
        • Web Threat Protection Policy
          • Web Threat Protection for Android Mobile Devices
          • Web Threat Protection for iOS Mobile Devices
        • Password Policy
        • Feature Lock Policy
          • Supported Mobile Device OS Features
        • Compliance Policy
        • Application Monitor and Control Policy
        • Volume Purchasing Program Policy
          • Adding an Application
        • Container Policy
  • Virtual Mobile Infrastructure Widgets
    • Virtual Mobile Infrastructure Dashboard Widgets
      • Top 5 Trend Micro Virtual Mobile Infrastructure Launched Applications Widget
      • Top 5 Trend Micro Virtual Mobile Infrastructure Launched Web Applications Widget
      • Top 5 Trend Micro Virtual Mobile Infrastructure Online Users Widget
      • Trend Micro Virtual Mobile Infrastructure Server CPU Usage Status Widget
      • Trend Micro Virtual Mobile Infrastructure Server Disk Usage Status Widget
      • Trend Micro Virtual Mobile Infrastructure Server Memory Usage Status
      • Trend Micro Virtual Mobile Infrastructure User Status Widget
  • Vulnerability Protection Widgets
    • Vulnerability Protection Dashboard Widgets
      • Vulnerability Protection Application Type Activity (Detected) Widget
      • Vulnerability Protection Application Type Activity (Prevented) Widget
      • Vulnerability Protection Feature Summary Widget
      • Vulnerability Protection Firewall Event History Widget
      • Vulnerability Protection Intrusion Prevention Event History Widget
      • Vulnerability Protection IPS Activity (Detected) Widget
      • Vulnerability Protection IPS Activity (Prevented) Widget
      • Vulnerability Protection Key Performance Indicator Widget
      • Vulnerability Protection Reconnaissance Scan Event History Widget
      • Vulnerability Protection Status Summary Widget
      • Vulnerability Protection Vulnerable Endpoints Widget
Endpoint Application Control Widgets and Policies
  • Endpoint Application Control Dashboard Widgets
  • Endpoint Application Control Policy Settings
Online Help Center

Support
For Home For Business


Privacy Notice
© 2025 Trend Micro Incorporated. All rights reserved.
Table of Contents
  • Preface
    • Documentation
    • Audience
    • Document Conventions
    • Terminology
  • Introduction
    • The Dashboard
      • About the Dashboard
      • Tabs and Widgets
        • Working with Tabs
        • Working with Widgets
      • Security Posture Tab
        • Compliance Indicators
        • Critical Threats
        • Resolved Events
        • Security Posture Chart
        • Security Posture Details Pane
      • Summary Tab
        • Critical Threats Widget
        • Users with Threats Widget
        • Endpoints with Threats Widget
        • Apex Central Top Threats Widget
        • Product Component Status Widget
        • Product Connection Status Widget
        • Ransomware Prevention Widget
      • Data Loss Prevention Tab
        • DLP Incident Trends by User Widget
        • DLP Incidents by Severity and Status Widget
        • DLP Incidents by User Widget
        • DLP Incidents by Channel Widget
        • DLP Template Matches Widget
        • Top DLP Incident Sources Widget
        • DLP Violated Policy Widget
      • Compliance Tab
        • Product Application Compliance Widget
        • Product Component Status Widget
        • Product Connection Status Widget
        • Agent Connection Status Widget
      • Threat Statistics Tab
        • Apex Central Top Threats Widget
        • Apex Central Threat Statistics Widget
        • Threat Detection Results Widget
        • Policy Violation Detections Widget
        • C&C Callback Events Widget
    • Policy Management
      • Policy Management
        • Creating a New Policy
          • Filtering by Criteria
            • Assigning Endpoints to Filtered Policies
          • Specifying Policy Targets
          • Working with Parent Policy Settings
        • Copying Policy Settings
        • Inheriting Policy Settings
        • Modifying a Policy
        • Importing and Exporting Policies
        • Deleting a Policy
        • Changing the Policy Owner
        • Understanding the Policy List
        • Reordering the Policy List
      • Policy Status
    • Policy Resources
      • Application Control Criteria
        • Defining Allowed Application Criteria
        • Defining Blocked Application Criteria
        • Application Match Methods
          • Application Reputation List
          • File Paths
            • File Path Example Usage
          • Certificates
          • Hash Values
      • Data Loss Prevention
        • Data Identifier Types
          • Expressions
            • Predefined Expressions
              • Viewing Settings for Predefined Expressions
            • Customized Expressions
              • Criteria for Customized Expressions
              • Creating a Customized Expression
              • Importing Customized Expressions
          • File Attributes
            • Creating a File Attribute List
            • Importing a File Attribute List
          • Keywords
            • Predefined Keyword Lists
            • How Keyword Lists Work
              • Number of Keywords Condition
              • Distance Condition
            • Customized Keyword Lists
              • Customized Keyword List Criteria
              • Creating a Keyword List
              • Importing a Keyword List
        • Data Loss Prevention Templates
          • Predefined DLP Templates
          • Customized DLP Templates
            • Condition Statements and Logical Operators
            • Creating a Template
            • Importing Templates
      • Intrusion Prevention Rules
        • Intrusion Prevention Rule Properties
      • Device Control Allowed Devices
  • Apex Central Widgets
    • Apex Central Dashboard Widgets
      • Apex Central Top File-based Threats Widgets
      • Endpoint Protection Verification Widget
      • Hosts with C&C Callback Attempts Widget
      • Policy Status
      • Quick Launch
      • Unique Compromised Hosts Over Time Widget
  • Apex One Widgets
    • Apex One Dashboard Widgets
      • Attack Discovery Detections Widget
      • Quick Investigation Widget
      • Top Blocked Applications
      • Top Endpoints Affected by IPS Events Widget
      • Top IPS Attack Sources
      • Top IPS Events
      • Top Violated Application Control Criteria
  • Apex One Security Agent Policies
    • Security Agent Program Settings
      • Additional Service Settings
        • Configuring Additional Security Agent Services
      • Privileges and Other Settings
        • Configuring Agent Privileges
        • Configuring Other Agent Settings
          • Security Agent Self-protection
            • Protect Security Agent Services
            • Protect Files in the Security Agent Installation Folder
            • Protect Security Agent Registry Keys
            • Protect Security Agent Processes
          • Cache Settings for Scans
            • Digital Signature Cache
            • On-demand Scan Cache
          • POP3 Mail Scan
      • Update Agents
        • Assigning Security Agents as Update Agents
    • Application Control Policy Settings
      • Application Control
        • Configuring Application Control Settings (Agent)
    • Behavior Monitoring Policy Settings
      • Behavior Monitoring
        • Malware Behavior Blocking
          • Ransomware Protection
          • Anti-Exploit Protection
        • Newly Encountered Program Protection
        • Event Monitoring
        • Behavior Monitoring Exception List
          • Exception List Wildcard Support
          • Exception List Environment Variable Support
      • Configuring Behavior Monitoring Rules and Exceptions
    • Anti-malware Policy Settings
      • Scan Method Types
        • Guidelines for Switching Scan Methods
      • Manual Scan
        • Configuring Manual Scan Settings
          • Manual Scan: Target Tab
          • Manual Scan: Action Tab
          • Manual Scan: Scan Exclusion Tab
      • Real-time Scan
        • Configuring Real-time Scan Settings
          • Real-time Scan: Target Tab
          • Real-time Scan: Action Tab
          • Real-time Scan: Scan Exclusion Tab
      • Scan Now
        • Configuring Scan Now Settings
          • Scan Now: Target Tab
          • Scan Now: Action Tab
          • Scan Now: Scan Exclusion Tab
      • Scheduled Scan
        • Configuring Scheduled Scan Settings
          • Scheduled Scan: Target Tab
          • Scheduled Scan: Action Tab
          • Scheduled Scan: Scan Exclusion Tab
      • Scan Actions
        • ActiveAction
        • Custom Scan Actions
          • Quarantine Directory
        • Uncleanable Files
          • Files Infected with Trojans
          • Files Infected with Worms
          • Write-protected Infected Files
          • Password-protected Files
          • Backup Files
      • Scan Exclusion Support
        • Trend Micro Product Directory Exclusions
        • Wildcard Exceptions
    • Web Reputation Policy Settings
      • Web Reputation
      • Configuring a Web Reputation Policy
        • HTTPS URL Scan Support
    • Unknown Threat Protection
      • Predictive Machine Learning
        • Configuring Predictive Machine Learning Settings
      • Configuring Sample Submission Settings
      • Configuring Suspicious Connection Settings
    • Device Control Policy Settings
      • Device Control
      • Configuring Device Control Settings
        • Permissions for Devices
        • Wildcard Support for the Device Control Allowed Programs List
        • Specifying a Digital Signature Provider
    • Scan Exclusion Lists
      • Spyware/Grayware Approved List
        • Managing the Spyware/Grayware Approved List
      • Trusted Program List
        • Configuring the Trusted Programs List
    • Endpoint Sensor Policy Settings
      • Endpoint Sensor
      • Configuring Endpoint Sensor Settings
    • Vulnerability Protection Policy Settings
      • Vulnerability Protection
      • Configuring Vulnerability Protection Settings
        • Advanced Logging Policy Modes
  • Apex One Server Policies
    • Apex One Server Policy Settings
  • Apex One Data Loss Prevention Policies
    • Apex One Data Discovery Dashboard Widgets
      • Top Sensitive File Policy Detections Widget
      • Top Endpoints with Sensitive Files Widget
      • Top Data Discovery Template Matches Widget
      • Top Sensitive Files Widget
    • Apex One Data Discovery Policy Settings
      • Creating Data Discovery Policies
    • Apex One Data Loss Prevention Policy Settings
      • Data Loss Prevention (DLP)
      • Configuring a Data Loss Prevention Policy
        • Configuring Data Loss Prevention Rules
          • Transmission Scope and Targets for Network Channels
          • Network Channels
            • Email Clients
          • System and Application Channels
          • Device List Tool
            • Running the Device List Tool
          • Data Loss Prevention Actions
        • Data Loss Prevention Exceptions
          • Defining Non-monitored and Monitored Targets
            • Transmission Scope: All Transmissions
            • Transmission Scope: Only Transmissions Outside the Local Area Network
          • Decompression Rules
  • Apex One (Mac) Widgets and Policies
    • Apex One (Mac) Dashboard Widgets
      • Key Performance Indicators Widget
        • Configuring Key Performance Indicators
        • Configuring Widget Settings
    • Apex One (Mac) Policy Settings
      • Cache Settings for Scans
      • Device Control
        • Configuring Device Control Settings
        • Permissions for Storage Devices
      • Endpoint Sensor
        • Configuring Endpoint Sensor Settings
      • Predictive Machine Learning Settings
      • Privileges and Other Settings
        • Protected Security Agent Files
      • Scan Method Types
        • Scan Methods Compared
        • Switching from Smart Scan to Conventional Scan
        • Switching from Conventional Scan to Smart Scan
      • Scan Types
        • Real-time Scan
          • Configuring Real-time Scan Settings
            • Real-time Scan: Target Tab
            • Real-time Scan: Action Tab
            • Supported Compressed File Types
            • Scan Actions
        • Manual Scan
          • Configuring Manual Scan Settings
            • Manual Scan: Target Tab
            • Manual Scan: Action Tab
            • Supported Compressed File Types
            • Scan Actions
        • Scheduled Scan
          • Configuring Scheduled Scan Settings
            • Scheduled Scan: Target Tab
            • Scheduled Scan: Action Tab
            • Supported Compressed File Types
            • Scan Actions
      • Scan Exclusions
        • Configuring Scan Exclusion Lists
      • Trusted Program List
        • Configuring the Trusted Program List
      • Update Settings
        • Pure IPv6 Agent Limitations
        • Configuring Agent Update Settings
      • Web Reputation
        • Configuring Web Reputation Settings
        • Configuring the Approved and Blocked URL Lists
  • Deep Discovery Widgets and Policies
    • Deep Discovery Analyzer and Email Inspector Dashboard Widgets
      • Deep Discovery Analyzer Widgets
        • Virtual Analyzer Summary Widget
      • Deep Discovery Email Inspector Widgets
        • Email Messages with Advanced Threats Widget
        • Top Email Recipients of Advanced Threats Widget
    • Deep Discovery Inspector Integration and Policy Settings
      • Deep Discovery Inspector Integration Summary
        • Deep Discovery Inspector Affected Hosts Widget
          • Deep Discovery Inspector Affected Hosts Detections
        • Deep Discovery Inspector System Status Widget
      • Deep Discovery Inspector Policy Settings
        • Deny List/Allow List
          • Creating a Custom Deny List
          • Creating a Custom Allow List
          • Importing/Exporting Custom Deny or Allow Lists
        • Adding Monitored Network Groups
        • Adding Registered Services
        • Configuring Virtual Analyzer Settings
  • Deep Security Manager Widgets
    • Deep Security Manager Dashboard Widgets
      • Deep Security Anti-Malware Event History Widget
      • Deep Security Anti-Malware Status (Malware) Widget
      • Deep Security Application Type Activity (Detected) Widget
      • Deep Security Application Type Activity (Prevented) Widget
      • Deep Security Component Summary Widget
      • Deep Security Feature Summary Widget
      • Deep Security Firewall Activity (Detected) Widget
      • Deep Security Firewall Activity (Prevented) Widget
      • Deep Security Firewall Event History Widget
      • Deep Security Integrity Monitoring Activity Widget
      • Deep Security Integrity Monitoring Event History Widget
      • Deep Security Intrusion Prevention Event History Widget
      • Deep Security IPS Activity (Detected) Widget
      • Deep Security IPS Activity (Prevented) Widget
      • Deep Security Log Inspection Activity Widget
      • Deep Security Log Inspection Event History Widget
      • Deep Security Reconnaissance Scan Event History Widget
      • Deep Security Status Summary Widget
      • Deep Security Web Reputation Event History Widget
      • Deep Security Web Reputation URL Activity Widget
  • Endpoint Application Control Widgets and Policies
    • Endpoint Application Control Dashboard Widgets
      • Endpoint Application Control Key Performance Indicators Widget
      • Endpoint Application Control Rule Management
      • Endpoint Application Control User and Endpoint Summary Widget
      • Endpoint Application Control Application, Rule, and Policy Events Widget
    • Endpoint Application Control Policy Settings
      • Policy Rules
      • Policy Logging
      • Policy Deployment
      • Policy Server Connection
      • Policy User Experience
  • Endpoint Encryption Widgets and Policies
    • Endpoint Encryption Dashboard Widgets
      • Endpoint Encryption Users
      • Endpoint Encryption Devices
      • Full Disk Encryption Status
      • Endpoint Encryption Unsuccessful Device Logon
      • Endpoint Encryption Unsuccessful User Logon
      • Endpoint Encryption Device Lockout
      • Endpoint Encryption Security Violations Report
    • Endpoint Encryption Policy Settings
      • Authentication Overview
      • Configuring Endpoint Encryption Users Rules
      • Configuring Full Disk Encryption Rules
      • Configuring File Encryption Rules
      • Configuring Common Policy Rules
      • Migrating Groups to Apex Central
  • Endpoint Sensor Widgets and Policies
    • Trend Micro Endpoint Sensor Dashboard Widgets
      • Endpoint Sensor Investigation
      • Intelligent Monitoring Summary by Host
      • Top Critical Threats by Dwell Time Widget
    • Trend Micro Endpoint Sensor Integration and Policy Settings
      • Endpoint Sensor Integration
      • Registering with Apex Central
      • Adding the Endpoint Sensor Widgets
      • Using Apex Central to Check Status
      • Using the Endpoint Sensor Investigation Widget
      • Using Automatic Updates
      • Trend Micro Endpoint Sensor Policy
        • Preparing the Server for Policy Deployment
        • Creating and Deploying Policies
        • Managing Monitoring Rules
        • Managing Submission Settings
  • InterScan Security Policies
    • InterScan Messaging Security Suite Policy Settings
      • IMSS Rules
      • Adding IMSS Rules
        • Step 1: Set Rule Name
        • Step 2: Select Recipients and Senders
          • Configuring Exceptions
          • Using the Asterisk Wildcard
        • Step 3: Select Templates
        • Step 4: Select Actions
      • Modifying Existing IMSS Rules
      • Deleting IMSS Rules
    • InterScan Messaging Security Virtual Appliance Policy Settings
      • IMSVA Rules
      • Adding IMSVA Rules
        • Step 1: Set Rule Name
        • Step 2: Select Recipients and Senders
          • Configuring Exceptions
          • Using the Asterisk Wildcard
        • Step 3: Select Templates
        • Step 4: Select Actions
      • Modifying Existing IMSVA Rules
      • Deleting IMSVA Rules
    • InterScan Web Security Suite Policy Settings
      • Data Loss Prevention Rule List
        • Step 1: Set Rule Name
        • Step 2: Select Accounts
        • Step 3: Select Compliance Templates to Block
        • Step 4: Select Compliance Templates to Monitor
    • InterScan Web Security Virtual Appliance Policy Settings
      • Data Loss Prevention Rule List
        • Step 1: Set Rule Name
        • Step 2: Select Accounts
        • Step 3: Select Compliance Templates to Block
        • Step 4: Select Compliance Templates to Monitor
  • ScanMail for Microsoft Exchange Policies
    • ScanMail for Microsoft Exchange Policy Settings
      • Configuring a Data Loss Prevention Policy
        • Selecting Accounts
        • Configuring DLP Targets
        • Configuring DLP Actions
        • Configuring DLP Notifications
        • Enabling a DLP Policy
  • Smart Protection Server Widgets
    • Smart Protection Server Dashboard Widgets
      • Active Users for File Reputation
      • Active Users for Web Reputation
      • HTTP Traffic Report for File Reputation
      • HTTP Traffic Report for Web Reputation
      • Real Time Status
      • Top 10 Infected Computers for File Reputation
      • Top 10 Blocked Computers for Web Reputation
  • Trend Micro Mobile Security Widgets and Policies
    • Trend Micro Mobile Security Dashboard Widgets
      • Android Device Health Status
      • Android Device Encryption Status Summary Widget
      • Android Device Operating System Version Summary Widget
      • Android Device Rooted Status Summary Widget
      • Android Device Security Status Widget
      • Android Malware Scan Summary Widget
      • Android Modified App Scan Summary Widget
      • Android Privacy Data Leak Scan Summary Widget
      • Android Vulnerability Scan Summary Widget
      • Components Update Status Widget
      • Cyber Security News for Mobile Widget
      • iOS Device Encryption Status Summary Widget
      • iOS Device Health Status Widget
      • iOS Device Security Status Widget
      • iOS Device Jailbreak Status Summary Widget
      • iOS Device Operating System Version Summary Widget
      • iOS Malware Scan Summary Widget
      • Mobile Device App Control Status Summary Widget
      • Mobile Device Encryption Status Summary Widget
      • Mobile Device Health Status Widget
      • Mobile Device Jailbreak Status Summary Widget
      • Mobile Device Operating System Version Summary Widget
      • Mobile Device Ransomware Scan Summary Widget
      • Mobile Device Security Status Widget
      • Mobile Device Vendors Summary Widget
      • Policy Update Status Summary Widget
      • Server Component Health Status Summary Widget
      • Telephone Carriers Summary Widget
      • Top 10 Applications Installed Widget
      • Top Five Android Ransomware Detected Widget
      • Top Five Blocked Web Sites Widget
      • Top Five iOS Ransomware Detected
      • Top Five Malware Detected Widget
      • Windows Phone Device Encryption Status Summary Widget
      • Windows Phone Device Health Status Widget
      • Windows Phone Device Operating System Version Summary Widget
    • Trend Micro Mobile Security Policy Settings
      • Protecting Devices with Policies
        • Common Policy in Full Version Deployment Mode
        • Common Policy in Security Scan Deployment Mode
        • Wi-Fi Policy
        • Exchange ActiveSync Policy
        • Certificate Policy
        • VPN Policy
        • Global HTTP Proxy Policy
        • Single Sign-On Policy
        • Cellular Network Policy
        • AirPlay/AirPrint Policy
        • Theme Policy
        • Managed Domains Policy
        • Security Policy in Full Version Deployment Mode
        • Security Policy in Security Scan Deployment Mode
        • Spam Prevention Policy
          • Spam SMS Prevention Policies
          • Spam WAP Push Prevention Policies
        • Call Filtering Policy
        • Web Threat Protection Policy
          • Web Threat Protection for Android Mobile Devices
          • Web Threat Protection for iOS Mobile Devices
        • Password Policy
        • Feature Lock Policy
          • Supported Mobile Device OS Features
        • Compliance Policy
        • Application Monitor and Control Policy
        • Volume Purchasing Program Policy
          • Adding an Application
        • Container Policy
  • Virtual Mobile Infrastructure Widgets
    • Virtual Mobile Infrastructure Dashboard Widgets
      • Top 5 Trend Micro Virtual Mobile Infrastructure Launched Applications Widget
      • Top 5 Trend Micro Virtual Mobile Infrastructure Launched Web Applications Widget
      • Top 5 Trend Micro Virtual Mobile Infrastructure Online Users Widget
      • Trend Micro Virtual Mobile Infrastructure Server CPU Usage Status Widget
      • Trend Micro Virtual Mobile Infrastructure Server Disk Usage Status Widget
      • Trend Micro Virtual Mobile Infrastructure Server Memory Usage Status
      • Trend Micro Virtual Mobile Infrastructure User Status Widget
  • Vulnerability Protection Widgets
    • Vulnerability Protection Dashboard Widgets
      • Vulnerability Protection Application Type Activity (Detected) Widget
      • Vulnerability Protection Application Type Activity (Prevented) Widget
      • Vulnerability Protection Feature Summary Widget
      • Vulnerability Protection Firewall Event History Widget
      • Vulnerability Protection Intrusion Prevention Event History Widget
      • Vulnerability Protection IPS Activity (Detected) Widget
      • Vulnerability Protection IPS Activity (Prevented) Widget
      • Vulnerability Protection Key Performance Indicator Widget
      • Vulnerability Protection Reconnaissance Scan Event History Widget
      • Vulnerability Protection Status Summary Widget
      • Vulnerability Protection Vulnerable Endpoints Widget
Close