web
You’re offline. This is a read only version of the page.
close

Online Help Center

  • Search
  • Support
    • For Home
    • For Business
  • English (US)
    • Bahasa Indonesia (Indonesian)
    • Dansk (Danish)
    • Deutsch (German)
    • English (Australia)
    • English (US)
    • Español (Spanish)
    • Français (French)
    • Français Canadien
      (Canadian French)
    • Italiano (Italian)
    • Nederlands (Dutch)
    • Norsk (Norwegian)
    • Polski (Polish)
    • Português - Brasil
      (Portuguese - Brazil)
    • Português - Portugal
      (Portuguese - Portugal)
    • Svenska (Swedish)
    • ภาษาไทย (Thai)
    • Tiếng Việt (Vietnamese)
    • Türkçe (Turkish)
    • Čeština (Czech)
    • Ελληνικά (Greek)
    • Български (Bulgarian)
    • Русский (Russian)
    • עברית (Hebrew)
    • اللغة العربية (Arabic)
    • 日本語 (Japanese)
    • 简体中文
      (Simplified Chinese)
    • 繁體中文
      (Traditional Chinese)
    • 繁體中文 HK
      (Traditional Chinese)
    • 한국어 (Korean)
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More Yes, I agree
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
  • Privacy and Personal Data Collection Disclosure
    • Pre-release disclaimer
  • Cloud App Security data privacy, security, and compliance
  • Introduction
    • About Cloud App Security
      • Features and benefits
      • What's new
      • How Cloud App Security works
        • Protection modes for email services
          • Features support under API-based protection and inline protection
      • How Cloud App Security protects your data privacy
      • Data center geography
      • System requirements
    • About Cloud App Security for Salesforce
    • Trend Micro Customer Licensing Portal
    • Trend Micro Licensing Management Platform
  • Getting started
    • Accessing the Cloud App Security management console
      • Accessing the management console
    • Selecting a serving site for the first-time use
    • Switching among Cloud App Security tenants using one local account
    • Protecting multiple service provider tenants with one account
    • Changes made by Cloud App Security
      • Changes made under API-based protection
      • Changes made under inline protection
  • Granting Cloud App Security access to services
    • Service account
      • Delegate account
      • Authorized account
    • Different ways to begin granting access
    • Granting access to Microsoft 365 services
      • Granting access to Exchange Online
        • Granting access to Exchange Online with an authorized account
        • Granting access to Exchange Online (inline mode) with an authorized account
          • Verifying related security settings in Microsoft
          • Connectors, transport rules, groups, and allow lists for inline protection
      • Granting access to SharePoint Online with an authorized account
      • Granting access to OneDrive with an authorized account
      • Migrating to authorized account for SharePoint Online and OneDrive
      • Granting access to Microsoft teams
      • Granting access to Teams
        • Creating an Microsoft Entra ID app for Teams protection
      • Using a MIP account
        • Adding a MIP account
        • Removing an MIP account
      • Using a Microsoft Identity Protection account
        • Adding a Microsoft Identity Protection account
        • Removing a Microsoft Identity Protection account
      • Data synchronized by Cloud App Security
    • Granting access to Box, Dropbox and Google Drive
      • Before you start
      • Granting access to Box
      • Granting access to Dropbox
      • Granting access to Google Drive
    • Granting access to Gmail
      • Granting access to Gmail
      • Granting access to Gmail (inline mode)
        • Configuring email routing for inline protection
        • Configuring email routing for outbound protection
    • Granting access to Salesforce
    • Revoking access to services
      • Revoking access to Microsoft 365 services
      • Revoking access to Box
      • Revoking access to Dropbox
      • Revoking access to Google Drive
      • Revoking access to Gmail
      • Revoking access to Gmail (inline mode)
      • Revoking access to Gmail (inline mode) - inbound protection
      • Revoking access to Salesforce
  • Dashboard
    • Service status
    • Threat detection
      • Scam widgets
      • Quishing widgets
      • Ransomware widgets
      • Business email compromise (BEC) widgets
      • Summary widgets
      • Security risk scan widgets
      • Virtual Analyzer widgets
      • Data Loss Prevention widgets
      • Viewing threat detection data
    • Risky user detection
      • Internal distributors widgets
      • Top users with targeted attack risks widgets
      • Internal user risk analytics widgets
    • Configuration health
      • Protection feature adoption
  • Policies
    • Advanced Threat Protection
      • Real-time and on-demand scanning
      • Actions available for different services
      • Menu controls for ATP policies
      • Internal domains
        • Configuring internal domains
      • Adding advanced threat protection policies
        • General
        • Advanced Spam Protection
        • Malware Scanning
        • File Blocking
        • Web Reputation Services
        • Virtual Analyzer
        • Correlated Intelligence
      • Running a manual scan
      • Compressed file handling
      • Quishing detection
      • Token list
    • Data Loss Prevention
      • Real-time and on-demand scanning
      • Data identifiers
        • Expressions
        • Keywords
      • Compliance templates
      • Adding Data Loss Prevention policies
        • General
        • Data Loss Prevention
        • Keyword extraction
      • Configuring the Box shared links control policy
      • Running a manual scan
    • Global settings
      • Managing synchronized user list for Exchange Online
      • Viewing correlation rules and detection signals
        • Adding a custom correlation rule
        • Adding a custom detection signal
      • Configuring approved/blocked lists
        • Configuring approved Exchange Online users
        • Configuring approved header field list for Exchange Online
        • Viewing blocked lists for Exchange Online
        • Configuring approved header field list for Gmail
      • Configuring high profile lists
        • Configuring high profile domains
        • Configuring high profile users
        • Configuring high profile user exception list
      • Configuring the internal domain list
      • Managing Predictive Machine Learning exception list
      • Configuring display name spoofing detection exception list
      • Configuring notification settings
        • Configuring recipient groups
        • Configuring notification email settings
      • Configuring suspicious object settings
      • Configuring time-of-click protection settings
      • Configuring attachment password guessing
      • Configuring conditional access policies for risky users
      • Configuring Microsoft licensing model settings for Teams
      • Configuring inline protection settings for Exchange Online
      • Configuring inline protection settings for Gmail
  • Logs
    • Log types
    • Log facets
    • Searching logs
  • Operations
    • Quarantine
      • Quarantine facets
      • Searching quarantine
      • Managing quarantine
      • Previewing quarantined emails
    • User-reported emails
    • Correlated Intelligence
      • Threat types of security risks and anomalies
  • Reports
    • Configuring reports
  • Administration
    • Organization management
    • Service account
    • Administrator and role
      • Administrator management
      • Role management
    • Single sign-on
      • Configuring Microsoft Entra ID
      • Configuring Active Directory Federation Services
      • Configuring Okta
      • Configuring Google Workspace
      • Configuring PingOne
      • Configuring single sign-on
    • Automation and integration APIs
    • Add-in for Outlook
      • Release notes
      • Deploying the add-in for Outlook
      • Configuring the add-in for Outlook
      • Using the add-in for Outlook
      • Updating the add-in for Outlook
      • Removing the add-in for Outlook
    • Email reporting
    • License
      • Maintenance agreement
      • License management
  • Integration with Trend Micro products
    • Trend Micro Apex Central integration
    • Trend Micro Control Manager integration
    • Trend Micro Remote Manager integration
    • Trend Micro scanmail for Microsoft Exchange integration
  • Troubleshooting and FAQs
    • Troubleshooting
      • License expiration error upon logon with valid clp account
      • Invalid account error upon console logon
      • "clp or lmp account already registered" error upon granting access to Microsoft 365 services
      • Access grant for Sharepoint Online/OneDrive failure when mfa is enabled
      • Internal domain scheduled synchronization failure for Gmail
      • Internal email messages in Exchange Online improperly handled as spam
      • Server not found or connection closed upon console logon
      • Access grant or migration for inline protection over Exchange Online always fail
      • Not authorized to view content error upon accessing certain screens
      • Associated mailbox not found error upon configuring Gmail quarantine settings
    • FAQs
  • Known issues
  • Cloud App Security protection glossary
Getting started
Related information
  • Accessing the Cloud App Security management console
  • Selecting a serving site for the first-time use
  • Switching among Cloud App Security tenants using one local account
  • Protecting multiple service provider tenants with one account
  • Changes made by Cloud App Security
Online Help Center

Support
For Home For Business


Privacy Notice
© 2025 Trend Micro Incorporated. All rights reserved.
Table of Contents
  • Privacy and Personal Data Collection Disclosure
    • Pre-release disclaimer
  • Cloud App Security data privacy, security, and compliance
  • Introduction
    • About Cloud App Security
      • Features and benefits
      • What's new
      • How Cloud App Security works
        • Protection modes for email services
          • Features support under API-based protection and inline protection
      • How Cloud App Security protects your data privacy
      • Data center geography
      • System requirements
    • About Cloud App Security for Salesforce
    • Trend Micro Customer Licensing Portal
    • Trend Micro Licensing Management Platform
  • Getting started
    • Accessing the Cloud App Security management console
      • Accessing the management console
    • Selecting a serving site for the first-time use
    • Switching among Cloud App Security tenants using one local account
    • Protecting multiple service provider tenants with one account
    • Changes made by Cloud App Security
      • Changes made under API-based protection
      • Changes made under inline protection
  • Granting Cloud App Security access to services
    • Service account
      • Delegate account
      • Authorized account
    • Different ways to begin granting access
    • Granting access to Microsoft 365 services
      • Granting access to Exchange Online
        • Granting access to Exchange Online with an authorized account
        • Granting access to Exchange Online (inline mode) with an authorized account
          • Verifying related security settings in Microsoft
          • Connectors, transport rules, groups, and allow lists for inline protection
      • Granting access to SharePoint Online with an authorized account
      • Granting access to OneDrive with an authorized account
      • Migrating to authorized account for SharePoint Online and OneDrive
      • Granting access to Microsoft teams
      • Granting access to Teams
        • Creating an Microsoft Entra ID app for Teams protection
      • Using a MIP account
        • Adding a MIP account
        • Removing an MIP account
      • Using a Microsoft Identity Protection account
        • Adding a Microsoft Identity Protection account
        • Removing a Microsoft Identity Protection account
      • Data synchronized by Cloud App Security
    • Granting access to Box, Dropbox and Google Drive
      • Before you start
      • Granting access to Box
      • Granting access to Dropbox
      • Granting access to Google Drive
    • Granting access to Gmail
      • Granting access to Gmail
      • Granting access to Gmail (inline mode)
        • Configuring email routing for inline protection
        • Configuring email routing for outbound protection
    • Granting access to Salesforce
    • Revoking access to services
      • Revoking access to Microsoft 365 services
      • Revoking access to Box
      • Revoking access to Dropbox
      • Revoking access to Google Drive
      • Revoking access to Gmail
      • Revoking access to Gmail (inline mode)
      • Revoking access to Gmail (inline mode) - inbound protection
      • Revoking access to Salesforce
  • Dashboard
    • Service status
    • Threat detection
      • Scam widgets
      • Quishing widgets
      • Ransomware widgets
      • Business email compromise (BEC) widgets
      • Summary widgets
      • Security risk scan widgets
      • Virtual Analyzer widgets
      • Data Loss Prevention widgets
      • Viewing threat detection data
    • Risky user detection
      • Internal distributors widgets
      • Top users with targeted attack risks widgets
      • Internal user risk analytics widgets
    • Configuration health
      • Protection feature adoption
  • Policies
    • Advanced Threat Protection
      • Real-time and on-demand scanning
      • Actions available for different services
      • Menu controls for ATP policies
      • Internal domains
        • Configuring internal domains
      • Adding advanced threat protection policies
        • General
        • Advanced Spam Protection
        • Malware Scanning
        • File Blocking
        • Web Reputation Services
        • Virtual Analyzer
        • Correlated Intelligence
      • Running a manual scan
      • Compressed file handling
      • Quishing detection
      • Token list
    • Data Loss Prevention
      • Real-time and on-demand scanning
      • Data identifiers
        • Expressions
        • Keywords
      • Compliance templates
      • Adding Data Loss Prevention policies
        • General
        • Data Loss Prevention
        • Keyword extraction
      • Configuring the Box shared links control policy
      • Running a manual scan
    • Global settings
      • Managing synchronized user list for Exchange Online
      • Viewing correlation rules and detection signals
        • Adding a custom correlation rule
        • Adding a custom detection signal
      • Configuring approved/blocked lists
        • Configuring approved Exchange Online users
        • Configuring approved header field list for Exchange Online
        • Viewing blocked lists for Exchange Online
        • Configuring approved header field list for Gmail
      • Configuring high profile lists
        • Configuring high profile domains
        • Configuring high profile users
        • Configuring high profile user exception list
      • Configuring the internal domain list
      • Managing Predictive Machine Learning exception list
      • Configuring display name spoofing detection exception list
      • Configuring notification settings
        • Configuring recipient groups
        • Configuring notification email settings
      • Configuring suspicious object settings
      • Configuring time-of-click protection settings
      • Configuring attachment password guessing
      • Configuring conditional access policies for risky users
      • Configuring Microsoft licensing model settings for Teams
      • Configuring inline protection settings for Exchange Online
      • Configuring inline protection settings for Gmail
  • Logs
    • Log types
    • Log facets
    • Searching logs
  • Operations
    • Quarantine
      • Quarantine facets
      • Searching quarantine
      • Managing quarantine
      • Previewing quarantined emails
    • User-reported emails
    • Correlated Intelligence
      • Threat types of security risks and anomalies
  • Reports
    • Configuring reports
  • Administration
    • Organization management
    • Service account
    • Administrator and role
      • Administrator management
      • Role management
    • Single sign-on
      • Configuring Microsoft Entra ID
      • Configuring Active Directory Federation Services
      • Configuring Okta
      • Configuring Google Workspace
      • Configuring PingOne
      • Configuring single sign-on
    • Automation and integration APIs
    • Add-in for Outlook
      • Release notes
      • Deploying the add-in for Outlook
      • Configuring the add-in for Outlook
      • Using the add-in for Outlook
      • Updating the add-in for Outlook
      • Removing the add-in for Outlook
    • Email reporting
    • License
      • Maintenance agreement
      • License management
  • Integration with Trend Micro products
    • Trend Micro Apex Central integration
    • Trend Micro Control Manager integration
    • Trend Micro Remote Manager integration
    • Trend Micro scanmail for Microsoft Exchange integration
  • Troubleshooting and FAQs
    • Troubleshooting
      • License expiration error upon logon with valid clp account
      • Invalid account error upon console logon
      • "clp or lmp account already registered" error upon granting access to Microsoft 365 services
      • Access grant for Sharepoint Online/OneDrive failure when mfa is enabled
      • Internal domain scheduled synchronization failure for Gmail
      • Internal email messages in Exchange Online improperly handled as spam
      • Server not found or connection closed upon console logon
      • Access grant or migration for inline protection over Exchange Online always fail
      • Not authorized to view content error upon accessing certain screens
      • Associated mailbox not found error upon configuring Gmail quarantine settings
    • FAQs
  • Known issues
  • Cloud App Security protection glossary
Close