Views:

Frequently Asked Questions (FAQs)

Question
Answer
How does Cloud App Security ensure high availability?
All Cloud App Security service components maintain a stateless design. As such, they freely scale when volume increases. By default, all customer-facing services are set up redundantly behind the Windows Azure Load Balancer to ensure high availability.
How does Cloud App Security guarantee data privacy in a multi-tenant environment?
Cloud App Security does not store original content (email messages and files). Cloud App Security gets access to email and file content in cloud applications and processes it in memory, without storing it upon completion.
Will Cloud App Security impede access speed to messages and files?
Cloud App Security has no impact on performance when customers receive email messages, upload files to, or download files from cloud applications and services.
How can a customer with a trial license migrate the configurations on the trial Cloud App Security management console to the production management console after they purchase Smart Protection Complete with a full license?
You need to attach the CLP account you created with the Cloud App Security trial license to your Smart Protection Complete full license first.
  1. Log on to the Trend Micro Customer Licensing Portal (CLP) https://clp.trendmicro.com using your CLP account credentials.
  2. Go to My Products/Services, and then click Provide Key.
  3. On the License Key screen, type your registration key, not the activation code, in the Provide your Activation Code or product key text box, and then click Continue.
  4. Select the check box and then click Continue to finish the process.
After you re-log on to the Cloud App Security production management console, all the configurations are migrated and your license is updated.
How do employees log on to Cloud App Security using Internet Explorer on Windows Server?
Internet Explorer has different default settings on Windows Server and other Windows versions. Enable active scripts for the Internet zone to log on to Cloud App Security through Internet Explorer on Windows Server.
  1. Open Internet Explorer.
  2. Go to ToolsInternet optionsSecurity.
  3. Select the Internet zone.
  4. Click Custom Level. The Security Settings – Internet Zone window appears.
  5. Under the Scripting section, enable Active scripting.
  6. Click OK to close the Security Settings – Internet Zone window.
  7. Click OK to close Internet Options window.
Is a customer who purchased Trend Micro Smart Protection Complete able to use Cloud App Security in a different site from the one dictated by the customer's registration key or activation code?
No, Cloud App Security serves a customer in the site based on the region or country dictated by the customer's registration key or activation code. To use Cloud App Security in a different site, the customer needs to apply for a new Customer Licensing Portal account with a new registration key corresponding to the site they want to use.
Why cannot I restore or delete an email message that has been quarantined by Cloud App Security?
When an email message is quarantined, it is stored in the quarantine folder created by Cloud App Security for further processing. Upon receiving a request to restore or delete the message, Cloud App Security fails to do so if it cannot locate the message in the quarantine folder. When the issue occurs, check whether this message was moved out of the quarantine folder to somewhere else. You can go to Quarantine and view the Mail Location column to find the quarantine folder of the message.
When and how does Cloud App Security remove a service account for the Microsoft 365 services if the customer's license expires?
If your license has reached the end of the grace period, Cloud App Security disables your CLP account. This means that the Cloud App Security management console is no longer accessible and Cloud App Security does not protect your services any more.
After 30 days of the grace period, Cloud App Security automatically removes your CLP account.
Microsoft removes the SharePoint user profiles 30 days after service account removal. There is still remaining data created for Cloud App Security that requires manual cleanup. For details, see Changes made by Cloud App Security.
How can a customer enable multi-factor authentication (MFA) on the Exchange Online and SharePoint Online Delegate Accounts after automatic access grant?
On August 2, 2019, Microsoft implemented a mandatory Multi-Factor Authentication (MFA) policy for all partners re-selling Microsoft 365 licenses to end users. The policy requires all administrator accounts in the Cloud Solution Provider (CSP) tenant to have Multi-Factor Authentication.
  • For the Authorized Accounts created using token-based modern authentication, it is the recommended approach and has no impact by MFA enforcement.
  • For the Exchange Online and SharePoint Online Delegate Accounts created using the automatic access grant process, they need to meet this partner security requirement, while at the same time maintaining their capability of being used to protect the Microsoft 365 services. For more information about how to enable MFA for the Delegate Accounts, see https://success.trendmicro.com/solution/1123706.
How can a customer specify a name and location when downloading quarantined items, instead of using the default name?
When you download quarantined items through a web browser, Cloud App Security automatically generates a file name in a default format: <timestamp>_<email subject or file name>_<affected user's name>.
To customize the file name and location, configure the Downloads settings of your browser to always ask where to save each file before downloading.
Why does Cloud App Security still quarantine or delete email messages even when all policies are in the Monitor Only mode?
In Cloud App Security, the default Monitor Only policy takes effect only at the policy level. When requested to quarantine or delete an email message by integrated products or the Cloud App Security Threat Mitigation APIs, Cloud App Security quarantines or deletes the email message even if the default Monitor Only policy is enabled.
To ensure that Cloud App Security does not take any actions other than "Pass" when the default Monitor Only policy is enabled, perform the following:
  • Go to AdministrationGlobal SettingsSuspicious Object List and disable the feature.
  • Go to AdministrationGlobal SettingsBlocked Lists for Exchange Online, select your organization, and disable the feature.
  • Avoid taking actions on email messages through integrated products or the Threat Mitigation APIs.
For internal messages that are scanned by Cloud App Security Inline Protection, how can I prevent the messages from being marked as internal email spoofing by Microsoft Exchange Online Protection (EOP)?
Note
Note
Normally, Cloud App Security Inline Protection does not scan internal messages. However, in some cases, such as when internal messages are sent using a private mail server, the Exchange Online transport rule used by Cloud App Security Inline Protection can identify internal messages as inbound messages from external users and route the messages to Cloud App Security Inline Protection for scanning.
Solution: Add the record of Cloud App Security Inline Protection MTAs for inbound messages to the SPF record for your domains.
The record of Cloud App Security for inbound protection are as follows:
  • US site: spf-inpost.tmcas.trendmicro.com
  • EU site: spf-inpost-eu.tmcas.trendmicro.com
  • Japan site: spf-inpost.tmcas.trendmicro.co.jp
  • Australia and New Zealand site: spf-inpost-au.tmcas.trendmicro.com
  • Canada site: spf-inpost-ca.tmcas.trendmicro.com
  • Singapore site: spf-inpost.tmcas.trendmicro.com.sg
  • UK site: spf-inpost.tmcas.trendmicro.co.uk
  • India site: spf-inpost-in.tmcas.trendmicro.com
  • Middle East (UAE): spf-inpost-mea.tmcas.trendmicro.com
Is it necessary to add the IP addresses of Cloud App Security Inline Protection MTAs for outbound messages to the SPF record for my domains?
As recommended by Microsoft, you can add the record of Cloud App Security Inline Protection MTAs for outbound messages to the SPF record for your domains.
The record of Cloud App Security for outbound protection are as follows:
  • US site: spf-repost.tmcas.trendmicro.com
  • EU site: spf-repost-eu.tmcas.trendmicro.com
  • Japan site: spf-repost.tmcas.trendmicro.co.jp
  • Australia and New Zealand site: spf-repost-au.tmcas.trendmicro.com
  • Canada site: spf-repost-ca.tmcas.trendmicro.com
  • Singapore site: spf-repost.tmcas.trendmicro.com.sg
  • UK site: spf-repost.tmcas.trendmicro.co.uk
  • India site: spf-repost-in.tmcas.trendmicro.com
  • Middle East (UAE) site: spf-repost-mea.tmcas.trendmicro.com
What is the session timeout period for the Cloud App Security management console?
The session timeout period for the Cloud App Security management console is 1 hour. If you perform no operation in the management console within 1 hour, you are automatically logged out of the console.
Why my users cannot receive emails when I use both Cloud App Security Inline Protection and Trend Micro Email Security?
If you have added the transport rule Restrict messages by sender or recipient... to accept emails only from Trend Micro Email Security, the mail server of Microsoft 365 will reject emails from Cloud App Security MTAs for Inline Protection. For Inline Protection to work properly, you need to add the IP addresses of Cloud App Security MTAs for your serving site to the exception list of the rule Restrict messages by sender or recipient...:
The IP addresses of Cloud App Security for inbound protection are as follows:
  • US site: 20.245.215.64/28, 104.42.189.70, 104.210.58.247, 20.72.147.113, 20.72.140.32
  • EU site: 20.4.48.48/28, 20.107.69.176, 20.126.6.52, 20.54.65.186, 20.54.68.116
  • Japan site: 13.78.70.144/28, 20.222.63.30, 20.222.57.14, 104.46.234.4, 138.91.24.196
  • Australia and New Zealand site: 20.70.30.192/28, 20.213.240.47, 20.227.136.26, 20.39.98.128, 20.39.97.72
  • Canada site: 52.228.5.240/28, 52.228.125.192, 52.139.13.199, 52.229.100.53, 20.104.170.121
  • Singapore site: 52.163.102.112/28, 20.43.148.81, 20.195.17.218
  • UK site: 20.254.97.192/28, 20.68.25.194, 20.68.210.42, 52.142.171.1, 52.142.170.52
  • India site: 20.204.179.112/28, 20.204.44.59, 20.204.113.71, 20.219.110.223, 13.71.71.12
  • Middle East (UAE) site: 20.233.170.224/28, 20.216.24.7, 20.216.9.36, 20.21.106.199, 20.21.252.69
The IP addresses of Cloud App Security for outbound protection are as follows:
  • US site: 20.66.85.0/28, 104.210.59.109, 104.42.190.154, 20.72.147.115, 20.72.140.41
  • EU site: 20.160.56.80/28, 20.126.64.109, 20.126.70.251, 20.54.65.179, 20.54.68.120
  • Japan site: 20.78.49.240/28, 20.222.60.8, 52.140.200.104, 104.46.227.238, 104.46.237.93
  • Australia and New Zealand site: 20.227.209.48/28, 20.227.165.104, 20.213.244.63, 20.39.98.131, 20.39.97.73
  • Canada site: 20.220.229.208/28, 52.228.125.196, 52.139.13.202, 20.104.170.106, 20.104.172.35
  • Singapore site: 52.163.216.240/28, 20.43.148.85, 20.195.17.222
  • UK site: 20.0.233.224/28, 20.68.214.138, 20.68.212.120, 52.142.171.6, 52.142.170.53
  • India site: 20.235.86.144/28, 4.213.51.121, 4.213.51.126, 104.211.202.104, 52.172.7.14
  • Middle East (UAE) site: 20.233.170.240/28, 20.74.137.84, 20.74.179.106, 20.21.106.164, 20.21.108.130
Does Cloud App Security use Smart Scan? Do I need to configure anything to use Smart Scan?
Yes, Cloud App Security uses Smart Scan, a cloud-based scanning solution with dynamically updated patterns. Cloud App Security leverage this Trend Micro-developed solution to provide up-to-date protection against malware.
After enabling Malware Scanning in Cloud App Security, you do not need to make any configuration for Smart Scan to work.