web
You’re offline. This is a read only version of the page.
close

Online Help Center

  • Search
  • Support
    • For Home
    • For Business
  • English (US)
    • Bahasa Indonesia (Indonesian)
    • Dansk (Danish)
    • Deutsch (German)
    • English (Australia)
    • English (US)
    • Español (Spanish)
    • Français (French)
    • Français Canadien
      (Canadian French)
    • Italiano (Italian)
    • Nederlands (Dutch)
    • Norsk (Norwegian)
    • Polski (Polish)
    • Português - Brasil
      (Portuguese - Brazil)
    • Português - Portugal
      (Portuguese - Portugal)
    • Svenska (Swedish)
    • ภาษาไทย (Thai)
    • Tiếng Việt (Vietnamese)
    • Türkçe (Turkish)
    • Čeština (Czech)
    • Ελληνικά (Greek)
    • Български (Bulgarian)
    • Русский (Russian)
    • עברית (Hebrew)
    • اللغة العربية (Arabic)
    • 日本語 (Japanese)
    • 简体中文
      (Simplified Chinese)
    • 繁體中文
      (Traditional Chinese)
    • 繁體中文 HK
      (Traditional Chinese)
    • 한국어 (Korean)
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More Yes, I agree
  • Online Help Center
  • Trend Micro Cloud One
  • ...
    Trend Cloud OneTrend Cloud One Workload SecurityAutomateAutomate using the API and SDKSDK guides
  • Configure protection
  • Configure Application Control
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
  • Log4j Vulnerability Coverage
  • About Workload Security
    • About the Workload Security components
    • Endpoint Security and Workload Security protection modules
    • About billing and pricing
    • Workload Security release strategy and lifecycle policy
  • Compatibility
    • System requirements
    • Agent requirements
      • Agent platform compatibility
      • Linux kernel compatibility
        • Disable optional Linux kernel support package updates
        • Disable updates on a single computer
        • Disable updates on multiple computers
      • Linux file system compatibility
      • Linux systemd support
      • Linux Secure Boot support
      • SELinux support
      • Supported features by platform
    • Sizing
    • Port numbers, URLs, and IP addresses
      • Agent to Workload Security FQDNs for accounts created before 2020-11-23
      • Relays to Update Server FQDNs for accounts created before 2020-11-23
      • Relays to Download Center FQDNs for accounts created before 2020-11-23
      • Required Workload Security URLs for firewalls without wildcard support
  • Get started
    • Try the Workload Security demo
    • Transitioning from Deep Security as a Service
    • Migrate from an on-premises Deep Security Manager
    • Trend Cloud One - Endpoint & Workload Security
    • Configure Endpoint Security
    • Check digital signatures on software packages
      • Check the signature on software ZIP packages
      • Check the signature on installer files (EXE, MSI, RPM, DEB files)
      • Check the signature on an EXE or MSI file
      • Check the signature on an RPM file
      • Check the signature on a DEB file
    • Check relay connectivity
    • Deploy the agent
      • Get agent software
      • Configure Linux Secure Boot for agents
      • Configure Mobile Device Management on Workload Security for the macOS agent
      • Install the agent
        • Manual installation
        • Install the agent on Windows
        • Installation on Amazon WorkSpaces
        • Installation on Windows 2012 Server Core
        • Install the agent on Red Hat, Amazon, SUSE, Oracle, Alma, Rocky, Miracle, or Cloud Linux
        • Install the agent on Ubuntu or Debian
        • Install the agent on Solaris
        • Install the agent on AIX
        • Install the agent on macOS
        • Install the agent on Red Hat OpenShift
        • Install the agent using other methods
        • Post-installation tasks
      • Install the agent on Amazon EC2 and WorkSpaces
        • Add your AWS accounts to Workload Security
        • Configure the activation type
        • Open ports
        • Deploy agents to your Amazon EC2 instances and WorkSpaces
        • Verify that the agent was installed and activated
        • Assign a policy
      • Install the agent on an AMI or WorkSpace bundle
        • Add your AWS account to Workload Security
        • Configure the activation type
        • Launch a master Amazon EC2 instance or Amazon WorkSpace
        • Deploy an agent on the master
        • Verify that the agent was installed and activated properly
        • Set up policy auto-assignment
        • Create an AMI or custom WorkSpace bundle based on the master
        • Use the AMI
      • Install the agent on Azure VMs
      • Install the agent on Google Cloud Platform VMs
      • Activate the agent
        • Deactivate the agent
        • Start or stop the agent
  • Automate
    • Automate using the API and SDK
      • API reference
      • API and SDK - DevOps tools for automation
      • Send request using the API
      • About resource property values
      • About the overrides parameter
      • Search for resources
      • API rate limits
      • Performance tips
      • Troubleshooting
      • API cookbook
        • About the API Cookbook
        • Set up to use Bash or PowerShell
          • Bash or PowerShell?
          • Check your environment
          • Check your connection to Workload Security
          • Check your cURL software
          • Check your PowerShell software
          • Create an API key
          • Test your setup
          • Bash
          • PowerShell
          • Final comments
          • Related resources
        • Get a List of Computers (Bash and PowerShell)
        • Search for a policy (Bash and PowerShell)
          • Before you begin
          • Bash
          • PowerShell
          • Notes
          • Related resources
        • Assign a policy to a computer using Bash and PowerShell
          • Before you begin
          • Bash
          • PowerShell
          • Notes
          • Related resources
        • Assign a policy to many computers (Bash and PowerShell)
          • Before you begin
          • jq for Bash
          • Required information
          • Bash
          • Bash script details
          • PowerShell
          • PowerShell script details
          • Notes
          • Related Resources
      • SDK guides
        • Python SDK
          • Prepare to use the Python SDK
          • Prerequisites
          • Download and install the Python SDK
          • Install a Python IDE
          • Add the SDK to a project in PyCharm
          • Next Steps
        • SDK version compatibility
        • Run the code examples
        • Index of code examples
        • Deploy Workload Security
          • Use the API to generate an agent deployment script
            • General steps
            • Example
          • Integrate Workload Security with AWS Services
            • Workflow pattern
            • Amazon GuardDuty
            • Amazon Macie
            • Amazon Inspector
            • AWS WAF
            • AWS Config
          • Add Computers
          • Add a Google Cloud Platform Connector
            • Submit a Synchronization Action for a GCP Connector
          • Control Access Using Roles
            • General steps
            • Example: Create a role
          • Create and manage API keys
            • About API Keys
            • Create an API Key using code
              • Obtain a role ID
              • Create an API key using an SDK
              • Create an API key using a username and password
              • Obtain a session cookie and a request ID
              • Create an API key using the session cookie and the request ID
            • Create an API Key using the Workload Security console
              • Lock out an existing API key
            • Manage API keys after their creation
          • Configure Workload Security system settings
            • Retrieve, modify, or reset a single system setting
            • Example: Modify a single system setting
            • List or modify multiple system settings
            • Example: Modify multiple system settings
          • Monitor Workload Security events
        • Configure protection
          • Create and configure a policy
            • Create a policy
            • Assign a policy to a computer
            • Configure policy and default policy settings
            • Default setting values and overrides
            • Policy setting and default policy setting classes
            • Retrieve the value of a policy setting or default policy setting
            • List all policy or default policy settings
            • Configure a single policy or default policy setting
            • Configure multiple policy and default policy settings
            • Reset policy overrides
            • Reset an ID reference
            • Reset a setting
            • Reset the status of a security module
            • Reset a rule
            • Reset all overrides of a rule
            • Selectively reset overrides of a rule
          • Configure Firewall
            • General steps
            • Example
            • Create a firewall rule
            • Limitations to modifying stateful configurations
          • Configure Intrusion Prevention
            • General steps
            • Example
            • Create an Intrusion Prevention rule
          • Configure Anti-Malware
            • General steps
            • Example
            • Create and modify malware scan configurations
            • General steps for creating malware scan configurations
            • Example malware scan configuration
          • Configure Web Reputation
            • General steps
            • Example
          • Configure Device Control
            • General steps
            • Example
            • Create a USB Device Exception
          • Configure Application Control
            • Configure Application Control for a policy
            • Allow or block unrecognized software
            • Create a shared ruleset
            • Add global rules
            • Configure maintenance mode during upgrades
          • Configure Integrity Monitoring
            • General steps
            • Example
            • Create an Integrity Monitoring rule
          • Configure Log Inspection
            • General steps
            • Example
            • Create a Log Inspection rule
            • Create a basic Log Inspection rule
            • Create a log inspection rule using XML
          • Create and modify lists
          • Create and configure schedules
          • Override policies on a computer
            • Discover overrides
            • Configure computer overrides
            • Configure a single computer setting
            • Configure settings and protection modules
            • Rule overrides
        • Maintain protection
          • Report on computer status
            • Discover unprotected computers
            • Find computers based on agent status
            • Find computers based on module status
            • See the state of a virtual machine
            • Get computer configurations
            • Discover the Anti-Malware configuration of a computer
            • Get applied intrusion prevention rules
          • Patch unprotected computers
            • Example: Find the Intrusion Prevention rule for a CVE
            • Example: Find computers that are not protected against a CVE
            • Example: Add intrusion prevention rules to computers' policies
          • Assign rules with recommendation scans
            • Determine when a recommendation scan last ran
            • Example: Get the date of the last recommendation scan for all computers
            • Apply recommendations
          • Maintain protection using scheduled tasks
            • Related classes
            • Create a scheduled task
            • Configure general properties
            • Create the schedule
            • Example: Daily schedule
            • Example: Monthly schedule
            • Configure the task
            • Example: Create a scheduled task
            • Create, run, and delete a scheduled task
            • Run an existing scheduled task
      • Settings reference
      • Use the legacy APIs
        • Provide access for legacy APIs
        • Transition from the SOAP API
        • Use the legacy REST API
    • Automate using the console
      • Schedule Workload Security to perform tasks
      • Automatically perform tasks when a computer is added or changed
      • AWS Auto Scaling and Workload Security
        • Preinstall the agent
        • Install the agent with a deployment script
        • Delete instances from Workload Security as a result of Auto Scaling
      • Azure virtual machine scale sets and Workload Security
      • GCP auto scaling and Workload Security
        • Preinstall the agent
        • Install the agent with a deployment script
        • Delete instances from Workload Security as a result of GCP MIGs
      • Use deployment scripts to add and protect computers
        • Generate a deployment script
        • Troubleshooting and tips
      • URL format for the agent download
      • Automatically assign policies using cloud provider tags and labels
    • Command-line basics
      • Agent-initiated activation (dsa_control -a)
      • Activate an agent
  • User Guide
    • Add computers
      • About adding computers
      • Add local network computers
        • Manually add a computer
      • Set up a data center gateway
      • Add Active Directory computers
        • Add a data center gateway
        • Add an Active Directory
        • Additional Active Directory options
          • Remove directory
          • Synchronize
        • Server certificate usage
        • Keep Active Directory objects synchronized
        • Disable Active Directory synchronization
      • Add VMware VMs
        • Add a VMware vCenter to Workload Security
          • Add a data center gateway
          • Add a VMware vCenter
          • Protect workloads in VMware
        • Add virtual machines hosted on VMware vCloud
          • Benefits of adding a vCloud account
          • Configure proxy setting for cloud accounts
          • Create a VMware vCloud Organization account for Workload Security
          • Import computers from a VMware vCloud Organization account
          • Import computers from a VMware vCloud Air data center
          • Remove a cloud account
      • Add AWS instances
        • About adding AWS accounts
          • What happens when you add an AWS account?
          • Benefits of adding an AWS account
          • Supported AWS regions
          • Modify your AWS security group to allow outbound traffic over port 443
        • Add an AWS account using the quick setup
        • Add an AWS account using a cross-account role
          • Add the account using the Workload Security console
            • Note the Workload Security account ID
            • Configure the manager instance role
            • Retrieve the external ID
            • Configure an IAM policy for AWS Account A
            • Create a cross-account role for AWS Account A
            • Add AWS Account A to Workload Security
          • Add the account through the API
        • Add Amazon WorkSpaces
          • Protect Amazon WorkSpaces if you already added your AWS account
          • Protect Amazon WorkSpaces if you have not yet added your AWS account
        • Manage an AWS account
          • Edit an AWS account
          • Remove an AWS account
          • Synchronize an AWS account
        • Manage an AWS account external ID
          • About the external ID
          • Configure the external ID
          • Update the external ID
            • Use the Workload Security console to update the external ID
            • Use the Workload Security API to update the external ID
          • Retrieve the external ID
          • Disable retrieval of the external ID
        • Protect an account running in AWS Outposts
        • Cloud Formation template and added AWS account
      • Add Azure instances
        • Create an Azure application for Workload Security
          • Assign correct roles
          • Create the Azure application
          • Record the Azure application ID, Microsoft Entra ID, and password
          • Record the Subscription IDs
          • Assign the Azure application a role and connector
        • Add a Microsoft Azure account to Workload Security
          • Benefits of adding an Azure account
          • Supported Azure regions
          • Add virtual machines from a Microsoft Azure account to Workload Security
          • Manage Azure classic virtual machines with the Azure Resource Manager connector
          • Remove an Azure account
          • Synchronize an Azure account
        • Reasons to upgrade to the new Azure Resource Manager connection
      • Add GCP instances
        • Create a Google Cloud Platform service account
          • Prerequisite: Enable the Google APIs
          • Create a GCP service account
          • Add more projects to the GCP service account
          • Create multiple GCP service accounts
        • Add a Google Cloud Platform account
          • Benefits of adding a GCP account
          • Configure a proxy setting for the GCP account
          • Add a GCP account to Workload Security
          • Remove a GCP account
          • Synchronize a GCP account
      • Manually upgrade your AWS account connection
        • Verify the permissions associated with the AWS role
      • Migrate to the new cloud connector functionality
      • Protect Docker containers
      • Protect Red Hat OpenShift containers
      • Control CPU usage
      • Recommendation scans
        • Enhanced recommendation scan
        • Classic recommendation scan
          • Run a classic recommendation scan
          • Schedule a recommendation scan
          • Configure an ongoing recommendation scan
          • Manually run a classic recommendation scan
          • Cancel a classic recommendation scan
          • Exclude a rule or application type from classic recommendation scans
          • Automatically implement recommendations
          • Manually assign rules
          • Additional rules for common vulnerabilities
          • Troubleshooting classic recommendation scan
    • Configure policies
      • Create policies
        • Create a new policy
        • Alternative ways to create a policy
        • Import policies from an XML file
        • Duplicate an existing policy
        • Create a new policy based on the recommendation scan of a computer
        • Edit settings for a policy or individual computer
        • Assign a policy to a computer
        • Disable automatic policy updates
        • Send policy changes manually
        • Export a policy
      • Policies, inheritance, and overrides
      • Detect and configure interfaces available on a computer
        • Configure a policy for multiple interfaces
        • Enforce interface isolation
      • Overview section of the Computer editor
      • Overview section of the policy editor
      • Network engine settings
      • User mode solution
      • Create a list of User Lists for use in policies
        • Import and export User Lists
        • View rules that use an User List
      • Define rules, lists, and other common objects used by policies
        • About common objects
        • Manage role-based access control for common objects
          • Configure access scope for roles
          • Roles' access to granted objects
          • Roles' use of granted objects
          • Roles with All access scope can import objects
          • Roles' permission to allow malware exclusions
        • Create a firewall rule
        • Configure intrusion prevention rules
          • Intrusion prevention rules list
          • Intrusion prevention license types
          • View information about intrusion prevention rules
          • General Information
          • Details
          • Identification (Trend Micro rules only)
          • View information about associated vulnerability (Trend Micro rules only)
          • Assign and unassign rules
          • Automatically assign core Endpoint & Workload rules
          • Automatically assign updated required rules
          • Configure event logging for rules
          • Generate alerts
          • Setting configuration options (Trend Micro rules only)
          • Schedule active times
          • Exclude from recommendations
          • Set the context for a rule
          • Override the behavior mode for a rule
          • Override rule and application type configurations
          • Export and import rules
        • Create an Integrity Monitoring rule
          • Add a new rule
          • Enter Integrity Monitoring rule information
          • Select a rule template and define rule attributes
          • Registry Value template
          • File template
          • Custom template
          • Configure Trend Micro Integrity Monitoring rules
          • Configure rule events and alerts
          • Real-time event monitoring
          • Alerts
          • View policies and computers to which a rule is assigned
          • Export a rule
          • Delete a rule
        • Define a Log Inspection rule for use in policies
        • Create a list of directories for use in policies
        • Create a list of file extensions for use in policies
          • Import and export file extension lists
          • View malware scan configurations that use a file extension list
        • Create list of files for use in policies
        • Create a list of IP addresses for use in policies
          • Import and export IP lists
          • View rules that use an IP list
        • Create a list of ports for use in policies
          • Import and export port lists
          • View rules that use a port list
        • Create a list of MAC addresses for use in policies
          • Import and export MAC lists
          • View policies that use a MAC list
        • Define contexts for use in policies
          • Configure internet connectivity for the computer
          • Define a context
        • Define stateful firewall configurations
          • Add a stateful configuration
          • Provide stateful configuration information
          • Select packet inspection options
            • IP packet inspection
            • TCP packet inspection
            • FTP Options
            • UDP packet inspection
            • ICMP packet inspection
          • Export a stateful configuration
          • Delete a stateful configuration
          • View policies and computers with assigned stateful configuration
        • Define a schedule to apply to rules
    • Configure protection modules
      • Configure Intrusion Prevention
        • About Intrusion Prevention
        • Set up Intrusion Prevention
          • Enable Intrusion Prevention in Detect mode
          • Enable Auto Apply core Endpoint & Workload rules
          • Test Intrusion Prevention
          • Apply recommended rules
          • Check Intrusion Prevention events
          • Enable fail open for packet or system failures
          • Switch to Prevent mode
          • Implement best practices for specific rules
          • HTTP Protocol Decoding rule
          • Cross-site scripting and generic SQL injection rules
        • Configure intrusion prevention rules
          • Intrusion prevention rules list
          • Intrusion prevention license types
          • View information about intrusion prevention rules
          • General Information
          • Details
          • Identification (Trend Micro rules only)
          • View information about associated vulnerability (Trend Micro rules only)
          • Assign and unassign rules
          • Automatically assign core Endpoint & Workload rules
          • Automatically assign updated required rules
          • Configure event logging for rules
          • Generate alerts
          • Setting configuration options (Trend Micro rules only)
          • Schedule active times
          • Exclude from recommendations
          • Set the context for a rule
          • Override the behavior mode for a rule
          • Override rule and application type configurations
          • Export and import rules
        • Configure a SQL injection prevention rule
        • Application types
          • View a list of application types
          • General Information
          • Connection
          • Configuration
          • Options
          • Assigned To
        • Inspect TLS traffic
        • TLS inspection support
          • Manage TLS inspection support package updates
          • Disable TLS inspection support package updates on a single agent
          • Disable TLS inspection support package updates by policy
        • Configure anti-evasion settings
        • Performance tips for intrusion prevention
      • Configure Anti-Malware
        • About Anti-Malware
        • Set up Anti-Malware
          • Enable and configure Anti-Malware
            • Enable the Anti-Malware module
            • Select the types of scans to perform
            • Configure scan inclusions
            • Configure scan exclusions
            • Configure multiple scan list exclusions or inclusions
            • Ensure that Workload Security can keep up to date on the latest threats
          • Configure malware scans
          • Performance tips for Anti-Malware
            • Minimize disk usage
            • Optimize CPU usage
              • Enable multi-threaded processing
            • Optimize RAM usage
          • Configure Deep Security and Microsoft Defender Antivirus for Windows
        • Detect emerging threats with Predictive Machine Learning
          • Enable Predictive Machine Learning
        • Enhanced Anti-Malware and ransomware scanning with behavior monitoring
          • Enhanced scanning protection
          • Enable enhanced scanning
          • What happens when enhanced scanning finds a problem?
        • Smart Protection in Workload Security
          • Anti-Malware and Smart Protection
          • Benefits of Smart Scan
          • Enable Smart Scan
          • Smart Protection Server for File Reputation Service
          • Web Reputation and Smart Protection
          • Smart Feedback
          • Disable Smart Feedback
        • Handle malware
          • View and restore identified malware
            • View a list of identified files
            • Work with identified files
            • Search for an identified file
            • Restore identified files
              • Create a scan exclusion for the file
              • Restore the file
          • Create Anti-Malware exceptions
          • Increase debug logging for Anti-Malware in protected Linux instances
      • Configure Firewall
        • About Firewall
        • Set up the Workload Security firewall
        • Create a firewall rule
        • Allow trusted traffic to bypass the firewall
        • Firewall rule actions and priorities
          • Rule actions
            • Allow rules
            • Bypass rules
              • Default Bypass rule for Workload Security traffic
            • Force Allow rules
          • Rule processing sequence
            • Logging
          • Actions and priorities applied together
          • Rule priority
          • Rule action and priority order
        • Firewall settings
          • General
            • Firewall
            • Firewall Stateful Configurations
            • Assigned Firewall Rules
          • Interface Isolation
            • Interface patterns
          • Reconnaissance
          • Advanced
            • Events
          • Firewall Events
        • Define stateful firewall configurations
          • Add a stateful configuration
          • Provide stateful configuration information
          • Select packet inspection options
            • IP packet inspection
            • TCP packet inspection
            • FTP Options
            • UDP packet inspection
            • ICMP packet inspection
          • Export a stateful configuration
          • Delete a stateful configuration
          • View policies and computers with assigned stateful configuration
        • Container firewall rules
      • Manage Container Protection
        • Apply real-time scan
        • Apply your firewall settings
        • Apply your intrusion prevention settings
      • Configure Web Reputation
        • Enable the Web Reputation module
        • Enable the Trend Micro Toolbar
        • Install the toolbar for macOS
        • Install the toolbar for Windows
        • Switch between inline and tap mode
        • Enforce the security level
        • Configure the security level
        • Create exceptions
        • Create URL exceptions
        • Configure the Smart Protection Server
        • Smart Protection Server connection warning
        • Edit advanced settings
        • Blocking Page
        • Alert
        • Ports
        • Test Web Reputation
      • Configure Device Control
      • Configure Integrity Monitoring
        • About Integrity Monitoring
        • Set up Integrity Monitoring
          • Enable and configure Integrity Monitoring
          • Enable Integrity Monitoring
          • Run a recommendation scan
          • Disable real-time scanning
          • Apply the Integrity Monitoring rules
          • Build a baseline for the computer
          • Periodically scan for changes
          • Test Integrity Monitoring
          • Improve Integrity Monitoring scan performance
          • Limit resource usage
          • Change the content hash algorithm
          • Integrity Monitoring event tagging
        • Create an Integrity Monitoring rule
          • Add a new rule
          • Enter Integrity Monitoring rule information
          • Select a rule template and define rule attributes
          • Registry Value template
          • File template
          • Custom template
          • Configure Trend Micro Integrity Monitoring rules
          • Configure rule events and alerts
          • Real-time event monitoring
          • Alerts
          • View policies and computers to which a rule is assigned
          • Export a rule
          • Delete a rule
        • Integrity Monitoring rules language
          • About the Integrity Monitoring rules language
          • DirectorySet
          • FileSet
          • GroupSet
          • InstalledSoftwareSet
          • PortSet
          • ProcessSet
          • RegistryKeySet
          • RegistryValueSet
          • ServiceSet
          • UserSet
          • WQLSet
      • Configure Log Inspection
        • About Log Inspection
        • Set up Log Inspection
          • Enable the log inspection module
          • Run a recommendation scan
          • Apply the recommended log inspection rules
          • Test Log Inspection
          • Configure log inspection event forwarding and storage
        • Define a Log Inspection rule for use in policies
      • Configure Application Control
        • About Application Control
          • Key software ruleset concepts
          • How do Application Control software rulesets work?
          • The Application Control interface
          • Application Control: Software Changes (Actions)
          • Application Control Software Rulesets
          • Security Events
          • Application Control Trust Entities
          • What does Application Control detect as a software change?
        • Set up Application Control
          • Turn on Application Control
          • Monitor new and changed software
          • Guidelines for handling changes
          • Turn on maintenance mode when making planned changes
          • Application Control tips and considerations
        • Verify that Application Control is enabled
        • Monitor Application Control events
          • Select Application Control events to log
          • View Application Control event logs
          • Interpret aggregated security events
          • Monitor Application Control alerts
        • View and change Application Control software rulesets
          • View Application Control software rulesets
          • Security Events
          • Change the action for an Application Control rule
          • Delete an individual Application Control rule
          • Delete an Application Control ruleset
        • Application Control Trust Entities
          • Trust Rulesets
            • Create a trust ruleset
            • Create a trust ruleset from the Policies tab
            • Create a trust ruleset from the the Computer or Policies tab
            • Assign or unassign a trust ruleset
            • Assign a trust ruleset
            • Unassign a trust ruleset
            • Delete a trust ruleset
          • Trust rules
            • Types of trust rules
            • Create a trust rule
            • Change trust rule properties
            • Delete a trust rule
          • Types of trust rule properties
          • Application Control event aggregation and analysis
          • Trust rule property limitations for Linux
        • Reset Application Control after extensive software change
        • Use the API to create shared and global rulesets
          • Create a shared ruleset
          • Change from shared to computer-specific allow and block rules
    • Configure events and alerts
      • Workload Security event logging
      • Log and event storage
        • Limit log file sizes
        • Event logging guidelines
      • Anti-Malware scan failures and cancellations
      • Apply tags to identify and group events
        • Manual tagging
        • Auto-tagging
          • Set the precedence for auto-tagging rules
          • Auto-tagging log inspection events
        • Trusted source tagging
          • Tag events based on a local trusted computer
          • Workload Security event matching between target and trusted source computers
            • Tag events based on a local trusted computer
          • Tag events based on the Trend Micro Certified Safe Software Service
          • Tag events based on a trusted common baseline
        • Delete a tag
      • Reduce the number of logged events
      • Rank events to quantify their importance
      • Forward events to a Syslog or SIEM server
        • Forward Workload Security events to a Syslog or SIEM server
          • Allow event-forwarding network traffic
          • Define a Syslog configuration
          • Forward system events
          • Forward security events
          • Compatibility
          • Troubleshoot event forwarding
        • Syslog message formats
        • Configure Red Hat Enterprise Linux to receive event logs
          • Set up a Syslog on Red Hat Enterprise Linux 8
          • Set up a Syslog on Red Hat Enterprise Linux 6 or 7
          • Set up a Syslog on Red Hat Enterprise Linux 5
      • Access events with Amazon SNS
        • Set up Amazon SNS
          • Create an AWS user
          • Create an Amazon SNS topic
          • Enable SNS
          • Create subscriptions
        • SNS configuration in JSON format
        • Events in JSON format
      • Configure alerts
        • View alerts in the Workload Security console
        • Configure alert settings
        • Set up email notification for alerts
        • Enable and disable alert emails
        • Configure an individual user to receive alert emails
        • Configure recipients for all alert emails
      • Generate reports about alerts and other activity
        • Set up a single report
        • Set up a scheduled report
        • Troubleshoot: Scheduled report sending failed
        • About attack reports
      • Lists of events and alerts
        • Predefined alerts
        • Agent events
        • System events
        • Application Control events
        • Anti-Malware events
        • Device Control events
        • Firewall events
        • Intrusion prevention events
        • Integrity Monitoring events
        • Log inspection events
        • Web Reputation events
      • Troubleshoot common events, alerts, and errors
        • Why am I seeing firewall events when the Firewall module is disabled?
        • Troubleshoot event ID 771 Contact by Unrecognized Client
        • Troubleshoot Smart Protection Server Disconnected errors
        • Error: Activation Failed
        • Error: Agent version not supported
        • Error: Anti-Malware Engine Offline
          • Agent on Windows
          • Agent on Linux
        • Warning: Anti-Malware Engine has only Basic Functions
        • Error: Activity Monitoring Engine Offline
        • Warning: Activity Monitoring Engine has only Basic Functions
        • Error: Device Control Engine Offline
          • For Windows agents
        • Error: Check Status Failed
        • Error: Installation of Feature 'dpi' failed: Not available: Filter
        • Error: Intrusion Prevention Rule Compilation Failed
          • Apply Intrusion Prevention best practices
          • Manage rules
          • Unassign application types from a single port
        • Error: Log Inspection Rules Require Log Files
          • If the file location is required
          • If the files listed do not exist on the protected machine
        • Error: Module installation failed (Linux)
        • Error: MQTT Connection Offline
        • Error: There are one or more application type conflicts on this computer
          • Resolution
          • Consolidate ports
          • Disable the inherit option
        • Error: Unable to connect to the cloud account
        • Error: Unable to resolve instance hostname
        • Alert: Integrity Monitoring information collection has been delayed
        • Event: Max TCP connections
        • Warning: Census, Good File Reputation, and Predictive Machine Learning Service Disconnected
        • Warning: Insufficient disk space
        • Warning: Reconnaissance Detected
    • Configure proxies
      • Configure proxies
      • Proxy settings
      • Enable OS proxy
        • Enable OS proxy on the server console
        • Enable OS proxy from the endpoint
        • Configuration on agent side
        • Troubleshooting
    • Configure relays
      • About relays
      • Deploy more relays
        • Plan the number and location of relays
        • Create relay groups
        • Enable relays
        • Assign agents to a relay group
        • Connect agents to a relay's private IP address
      • Remove relay functionality from agent
    • Manage agents (protected computers)
      • Computer and agent statuses
      • Configure agent version control
      • Configure teamed NICs
      • Communication between Workload Security and Deep Security Agent
      • Configure agents that have no Internet access
      • Activate and protect agents using agent-initiated activation and communication
        • Enable agent-initiated activation
        • Create or modify policies with agent-initiated communication enabled
        • Enable agent-initiated activation
        • Assign the policy to agents
        • Use a deployment script to activate the agents
      • Automatically upgrade agents on activation
      • Using the agent with iptables
      • Enable Managed Detection and Response
      • Configure agent self-protection
        • Configure self-protection through the Workload Security console
        • Configure self-protection using the command line
        • Limitations on Linux
        • Troubleshooting the Linux agent
      • Are Offline agents still protected by Workload Security?
      • Automate offline computer removal with inactive agent cleanup
        • Enable inactive agent cleanup
          • Keep offline computers protected
          • Prevent computers from being removed
        • Check the audit trail for removed computers
          • Search system events
          • System event details
      • Agent settings
      • Custom network configuration
        • Add a custom network configuration
        • JSON parameter configuration examples
      • User mode solution
      • Notifier application
        • About the notifier
        • Trigger a manual scan
        • macOS
        • Windows
    • Implement SAML single sign-on (SSO)
      • About SAML single sign-on (SSO)
      • Configure SAML single sign-on
        • Prerequisites
        • Configure SAML in Workload Security
        • Import your identity provider's SAML metadata document
        • Create Workload Security roles for SAML users
        • Provide information to your identity provider administrator
        • Download the Workload Security service provider SAML metadata document
        • Send URNs and the Workload Security SAML metadata document to the identity provider administrator
        • SAML claims structure
        • Workload Security username (required)
        • Workload Security user role (required)
        • Maximum session duration (optional)
        • Preferred language (optional)
        • Test SAML single sign-on
        • Service and identity provider settings
      • Configure SAML single sign-on with Microsoft Entra ID
    • Roles and contacts for accounts
      • Define roles for users
      • Add contacts (users who can only receive reports)
        • Add or edit a contact
        • Delete a contact
    • Navigate and customize the Workload Security console
      • Customize the dashboard
      • Group computers dynamically with smart folders
      • Customize advanced system settings
    • Use the Notification Service
    • Harden Workload Security
      • About Workload Security hardening
      • Manage trusted certificates
        • Import trusted certificates
        • View trusted certificates
        • Remove trusted certificates
      • SSL implementation and credential provisioning
      • Protect the agent
      • If I have disabled the connection to the Smart Protection Network, is any other information sent to Trend Micro?
    • Upgrade Workload Security
      • About upgrades
      • Apply security updates
        • Configure the security update source
        • Initiate security updates
        • Check your security update status
        • View details about pattern updates
        • Revert, import, or view details about rule updates
        • Configure security updates
        • Enable automatic patches for rules
        • Enable automatic Anti-Malware engine updates
        • Change the alert threshold for late security updates
      • Disable emails for New Pattern Update alerts
      • Use a web server to distribute software updates
        • Web server requirements
        • Copy the folder structure
        • Configure agents to use the new software repository
      • Upgrade a relay
        • Upgrade a relay from Workload Security
        • Upgrade a relay by running the installer manually
      • Upgrade the agent
        • Before you begin
        • Upgrade the agent starting from an alert
        • Upgrade multiple agents at once
        • Upgrade the agent from the Computers page
        • Upgrade the agent on activation
        • Upgrade the agent from a Scheduled Task
        • Upgrade the agent manually
        • Upgrade the agent on Windows
        • Upgrade the agent on Linux
        • Upgrade the agent on Solaris
        • Upgrade the agent on AIX
        • Best practices for agent upgrade
      • Install Trend Vision One Endpoint Security Agent via Deep Security Agent
        • Install Trend Vision One Endpoint Security agent
        • Schedule a task
        • Use Trend Vision One Endpoint Sensor
    • Uninstall the agent
      • Uninstall an agent on Windows
      • Uninstall an agent on Linux
      • Uninstall an agent on Solaris 10
      • Uninstall an agent on Solaris 11
      • Uninstall an agent on AIX
      • Uninstall an agent on macOS
      • Uninstall an agent on Red Hat OpenShift
      • Uninstall the notifier
    • Evaluate Trend Vision One
      • Foundation Services and Endpoint Protection prerequisites
      • Export policies and configurations
      • Import policies and configurations
      • Configure proxy settings
      • Deactivate the agent in Trend Cloud One - Endpoint & Workload Security
      • Reactivate the agent in Trend Vision One
      • Revert agents to Trend Cloud One - Endpoint & Workload Security
  • Integrations
    • Integrate with AWS Control Tower
      • Integrate with AWS Control Tower
      • Upgrade AWS Control Tower integration
      • Remove AWS Control Tower integration
    • Integrate with AWS Systems Manager Distributor
      • Create an IAM policy
      • Create a role and assign the policy
      • Create parameters
      • Create association
      • Protect your computers
    • Integrate with SAP NetWeaver
    • Integrate with Apex Central
    • Integrate with Trend Vision One
      • Integrate Workload Security with Trend Vision One
        • Register with Trend Vision One using the Product Instance app XDR
        • Register with Trend Vision One using the Product Connector app XDR
        • Forward security events to Trend Vision One XDR
        • Enable Activity Monitoring
      • Enable Trend Vision One SSO to Trend Cloud One
        • Enable single sign-on
      • Trend Vision One extended detection and response (XDR) file collection
        • Requirements
        • Collect objects using file collection
          • Trigger file collection
          • Create a File Collection Task
          • Monitor task status
          • Download sample file
        • Troubleshoot common issues
          • Trend Vision One settings
          • Security module settings for your computers
      • Trend Vision One extended detection and response (XDR) network isolation
        • Requirements
        • Isolate endpoints using network isolation
        • Trigger network isolation
        • Create an Isolate Endpoint Task
        • Monitor task status
        • Restore connection to an endpoint
        • Troubleshoot common issues
        • Trend Vision One settings
        • Security module settings for your computers
      • Trend Vision One extended detection and response (XDR) remote shell
      • Trend Vision One Threat Intelligence - user-defined suspicious object
      • Trend Vision One extended detection and response (XDR) custom script
        • Run a remote custom script task
        • Trigger a custom script using Remote Shell
      • Integrate with Service Gateway
        • Integrate Trend Vision One Service Gateway
        • Integrate the Service Gateway Forward Proxy
        • Integrate the Service Gateway ActiveUpdate service
          • Enable the ActiveUpdate services
          • Get Trend Cloud One - Endpoint & Workload Security ActiveUpdate source URL
          • Configure the ActiveUpdate service
          • Configure update source on Trend Cloud One - Endpoint & Workload Security
        • Integrate the Service Gateway Smart Protection service
          • Enable Smart Protection services
          • Configure local File Reputation service on Trend Cloud One - Endpoint & Workload Security Policy
          • Configure local Web Reputation service on Trend Cloud One - Endpoint & Workload Security Policy
      • Unregister Trend Cloud One - Endpoint & Workload Security from Trend Vision One
        • Use the Trend Vision One product connectors
        • Use Postman and an HTTP API
  • FAQs
    • Why does my Windows machine lose network connectivity when I enable protection?
    • How does agent protection work for Solaris zones?
    • Can Workload Security protect AWS GovCloud or Azure Government workloads?
    • Amazon Instance Metadata Service use by Deep Security Agent
    • Why can't I add my Azure server using the Azure cloud connector?
    • Why can't I view all VMs in an Azure subscription in Workload Security?
  • Troubleshooting
    • Offline agent
      • Causes
      • Verify that the agent is running
      • Verify DNS
      • Ensure that the DNS service is reliable
      • Allow outbound ports (agent-initiated heartbeat)
      • Allow ICMP on Amazon AWS EC2 instances
      • Fix the upgrade issue on Solaris 11
    • High CPU usage
    • Diagnose problems with agent deployment on Windows
    • Anti-Malware Windows platform update failed
      • An incompatible Anti-Malware component from another Trend Micro product
      • An incompatible Anti-Malware component from a third-party product
      • Other/unknown Error
    • Security update connectivity
    • Network Engine Status (Windows)
      • Network Engine Status warnings
      • Verify the driver status in Windows
      • Disable Network Engine Status warnings
    • Prevent MTU-related agent communication issues across Amazon Virtual Private Clouds (VPC)
    • Issues adding your AWS account to Workload Security
      • AWS is taking longer than expected
      • Resource is not supported in this region
      • Template validation issue
      • Workload Security was unable to add your AWS account
    • Create a diagnostic package and logs
      • Agent diagnostics
      • Create an agent diagnostic package via Workload Security
      • Create an agent diagnostic package via CLI on a protected computer
      • Collect debug logs with DebugView on Windows
      • Collect debug logs with DebugView on macOS
    • Removal of older software versions
    • Troubleshoot SELinux alerts
      • SELinux blocks the Deep Security Agent service
      • Berkeley Packet Filter (BPF) operations blocked
    • Troubleshoot Azure Code Signing
  • Trust and compliance information
    • About compliance
    • Agent package integrity check
    • Meet PCI DSS requirements with Workload Security
    • GDPR
    • Set up AWS Config Rules
    • Bypass vulnerability management scan traffic in Workload Security
      • Create a new IP list from the vulnerability scan provider IP range or addresses
      • Create firewall rules for incoming and outbound scan traffic
      • Assign new firewall rules to a policy to bypass vulnerability scans
    • Use TLS 1.2 with Workload Security
      • TLS architecture
      • Enable the TLS 1.2 architecture
      • Deploy new agents and relays
      • Guidelines for using deployment scripts
    • Privacy and personal data collection disclosure
  • Release notes and scheduled maintenance
    • Maintenance
    • What's new in Workload Security?
    • What's new in Deep Security Agent for macOS
    • API changelog
Configure Application Control
Related information
  • Configure Application Control for a policy
  • Allow or block unrecognized software
  • Create a shared ruleset
  • Add global rules
  • Configure maintenance mode during upgrades
Online Help Center

Support
For Home For Business


Privacy Notice
© 2025 Trend Micro Incorporated. All rights reserved.
Table of Contents
  • Log4j Vulnerability Coverage
  • About Workload Security
    • About the Workload Security components
    • Endpoint Security and Workload Security protection modules
    • About billing and pricing
    • Workload Security release strategy and lifecycle policy
  • Compatibility
    • System requirements
    • Agent requirements
      • Agent platform compatibility
      • Linux kernel compatibility
        • Disable optional Linux kernel support package updates
        • Disable updates on a single computer
        • Disable updates on multiple computers
      • Linux file system compatibility
      • Linux systemd support
      • Linux Secure Boot support
      • SELinux support
      • Supported features by platform
    • Sizing
    • Port numbers, URLs, and IP addresses
      • Agent to Workload Security FQDNs for accounts created before 2020-11-23
      • Relays to Update Server FQDNs for accounts created before 2020-11-23
      • Relays to Download Center FQDNs for accounts created before 2020-11-23
      • Required Workload Security URLs for firewalls without wildcard support
  • Get started
    • Try the Workload Security demo
    • Transitioning from Deep Security as a Service
    • Migrate from an on-premises Deep Security Manager
    • Trend Cloud One - Endpoint & Workload Security
    • Configure Endpoint Security
    • Check digital signatures on software packages
      • Check the signature on software ZIP packages
      • Check the signature on installer files (EXE, MSI, RPM, DEB files)
      • Check the signature on an EXE or MSI file
      • Check the signature on an RPM file
      • Check the signature on a DEB file
    • Check relay connectivity
    • Deploy the agent
      • Get agent software
      • Configure Linux Secure Boot for agents
      • Configure Mobile Device Management on Workload Security for the macOS agent
      • Install the agent
        • Manual installation
        • Install the agent on Windows
        • Installation on Amazon WorkSpaces
        • Installation on Windows 2012 Server Core
        • Install the agent on Red Hat, Amazon, SUSE, Oracle, Alma, Rocky, Miracle, or Cloud Linux
        • Install the agent on Ubuntu or Debian
        • Install the agent on Solaris
        • Install the agent on AIX
        • Install the agent on macOS
        • Install the agent on Red Hat OpenShift
        • Install the agent using other methods
        • Post-installation tasks
      • Install the agent on Amazon EC2 and WorkSpaces
        • Add your AWS accounts to Workload Security
        • Configure the activation type
        • Open ports
        • Deploy agents to your Amazon EC2 instances and WorkSpaces
        • Verify that the agent was installed and activated
        • Assign a policy
      • Install the agent on an AMI or WorkSpace bundle
        • Add your AWS account to Workload Security
        • Configure the activation type
        • Launch a master Amazon EC2 instance or Amazon WorkSpace
        • Deploy an agent on the master
        • Verify that the agent was installed and activated properly
        • Set up policy auto-assignment
        • Create an AMI or custom WorkSpace bundle based on the master
        • Use the AMI
      • Install the agent on Azure VMs
      • Install the agent on Google Cloud Platform VMs
      • Activate the agent
        • Deactivate the agent
        • Start or stop the agent
  • Automate
    • Automate using the API and SDK
      • API reference
      • API and SDK - DevOps tools for automation
      • Send request using the API
      • About resource property values
      • About the overrides parameter
      • Search for resources
      • API rate limits
      • Performance tips
      • Troubleshooting
      • API cookbook
        • About the API Cookbook
        • Set up to use Bash or PowerShell
          • Bash or PowerShell?
          • Check your environment
          • Check your connection to Workload Security
          • Check your cURL software
          • Check your PowerShell software
          • Create an API key
          • Test your setup
          • Bash
          • PowerShell
          • Final comments
          • Related resources
        • Get a List of Computers (Bash and PowerShell)
        • Search for a policy (Bash and PowerShell)
          • Before you begin
          • Bash
          • PowerShell
          • Notes
          • Related resources
        • Assign a policy to a computer using Bash and PowerShell
          • Before you begin
          • Bash
          • PowerShell
          • Notes
          • Related resources
        • Assign a policy to many computers (Bash and PowerShell)
          • Before you begin
          • jq for Bash
          • Required information
          • Bash
          • Bash script details
          • PowerShell
          • PowerShell script details
          • Notes
          • Related Resources
      • SDK guides
        • Python SDK
          • Prepare to use the Python SDK
          • Prerequisites
          • Download and install the Python SDK
          • Install a Python IDE
          • Add the SDK to a project in PyCharm
          • Next Steps
        • SDK version compatibility
        • Run the code examples
        • Index of code examples
        • Deploy Workload Security
          • Use the API to generate an agent deployment script
            • General steps
            • Example
          • Integrate Workload Security with AWS Services
            • Workflow pattern
            • Amazon GuardDuty
            • Amazon Macie
            • Amazon Inspector
            • AWS WAF
            • AWS Config
          • Add Computers
          • Add a Google Cloud Platform Connector
            • Submit a Synchronization Action for a GCP Connector
          • Control Access Using Roles
            • General steps
            • Example: Create a role
          • Create and manage API keys
            • About API Keys
            • Create an API Key using code
              • Obtain a role ID
              • Create an API key using an SDK
              • Create an API key using a username and password
              • Obtain a session cookie and a request ID
              • Create an API key using the session cookie and the request ID
            • Create an API Key using the Workload Security console
              • Lock out an existing API key
            • Manage API keys after their creation
          • Configure Workload Security system settings
            • Retrieve, modify, or reset a single system setting
            • Example: Modify a single system setting
            • List or modify multiple system settings
            • Example: Modify multiple system settings
          • Monitor Workload Security events
        • Configure protection
          • Create and configure a policy
            • Create a policy
            • Assign a policy to a computer
            • Configure policy and default policy settings
            • Default setting values and overrides
            • Policy setting and default policy setting classes
            • Retrieve the value of a policy setting or default policy setting
            • List all policy or default policy settings
            • Configure a single policy or default policy setting
            • Configure multiple policy and default policy settings
            • Reset policy overrides
            • Reset an ID reference
            • Reset a setting
            • Reset the status of a security module
            • Reset a rule
            • Reset all overrides of a rule
            • Selectively reset overrides of a rule
          • Configure Firewall
            • General steps
            • Example
            • Create a firewall rule
            • Limitations to modifying stateful configurations
          • Configure Intrusion Prevention
            • General steps
            • Example
            • Create an Intrusion Prevention rule
          • Configure Anti-Malware
            • General steps
            • Example
            • Create and modify malware scan configurations
            • General steps for creating malware scan configurations
            • Example malware scan configuration
          • Configure Web Reputation
            • General steps
            • Example
          • Configure Device Control
            • General steps
            • Example
            • Create a USB Device Exception
          • Configure Application Control
            • Configure Application Control for a policy
            • Allow or block unrecognized software
            • Create a shared ruleset
            • Add global rules
            • Configure maintenance mode during upgrades
          • Configure Integrity Monitoring
            • General steps
            • Example
            • Create an Integrity Monitoring rule
          • Configure Log Inspection
            • General steps
            • Example
            • Create a Log Inspection rule
            • Create a basic Log Inspection rule
            • Create a log inspection rule using XML
          • Create and modify lists
          • Create and configure schedules
          • Override policies on a computer
            • Discover overrides
            • Configure computer overrides
            • Configure a single computer setting
            • Configure settings and protection modules
            • Rule overrides
        • Maintain protection
          • Report on computer status
            • Discover unprotected computers
            • Find computers based on agent status
            • Find computers based on module status
            • See the state of a virtual machine
            • Get computer configurations
            • Discover the Anti-Malware configuration of a computer
            • Get applied intrusion prevention rules
          • Patch unprotected computers
            • Example: Find the Intrusion Prevention rule for a CVE
            • Example: Find computers that are not protected against a CVE
            • Example: Add intrusion prevention rules to computers' policies
          • Assign rules with recommendation scans
            • Determine when a recommendation scan last ran
            • Example: Get the date of the last recommendation scan for all computers
            • Apply recommendations
          • Maintain protection using scheduled tasks
            • Related classes
            • Create a scheduled task
            • Configure general properties
            • Create the schedule
            • Example: Daily schedule
            • Example: Monthly schedule
            • Configure the task
            • Example: Create a scheduled task
            • Create, run, and delete a scheduled task
            • Run an existing scheduled task
      • Settings reference
      • Use the legacy APIs
        • Provide access for legacy APIs
        • Transition from the SOAP API
        • Use the legacy REST API
    • Automate using the console
      • Schedule Workload Security to perform tasks
      • Automatically perform tasks when a computer is added or changed
      • AWS Auto Scaling and Workload Security
        • Preinstall the agent
        • Install the agent with a deployment script
        • Delete instances from Workload Security as a result of Auto Scaling
      • Azure virtual machine scale sets and Workload Security
      • GCP auto scaling and Workload Security
        • Preinstall the agent
        • Install the agent with a deployment script
        • Delete instances from Workload Security as a result of GCP MIGs
      • Use deployment scripts to add and protect computers
        • Generate a deployment script
        • Troubleshooting and tips
      • URL format for the agent download
      • Automatically assign policies using cloud provider tags and labels
    • Command-line basics
      • Agent-initiated activation (dsa_control -a)
      • Activate an agent
  • User Guide
    • Add computers
      • About adding computers
      • Add local network computers
        • Manually add a computer
      • Set up a data center gateway
      • Add Active Directory computers
        • Add a data center gateway
        • Add an Active Directory
        • Additional Active Directory options
          • Remove directory
          • Synchronize
        • Server certificate usage
        • Keep Active Directory objects synchronized
        • Disable Active Directory synchronization
      • Add VMware VMs
        • Add a VMware vCenter to Workload Security
          • Add a data center gateway
          • Add a VMware vCenter
          • Protect workloads in VMware
        • Add virtual machines hosted on VMware vCloud
          • Benefits of adding a vCloud account
          • Configure proxy setting for cloud accounts
          • Create a VMware vCloud Organization account for Workload Security
          • Import computers from a VMware vCloud Organization account
          • Import computers from a VMware vCloud Air data center
          • Remove a cloud account
      • Add AWS instances
        • About adding AWS accounts
          • What happens when you add an AWS account?
          • Benefits of adding an AWS account
          • Supported AWS regions
          • Modify your AWS security group to allow outbound traffic over port 443
        • Add an AWS account using the quick setup
        • Add an AWS account using a cross-account role
          • Add the account using the Workload Security console
            • Note the Workload Security account ID
            • Configure the manager instance role
            • Retrieve the external ID
            • Configure an IAM policy for AWS Account A
            • Create a cross-account role for AWS Account A
            • Add AWS Account A to Workload Security
          • Add the account through the API
        • Add Amazon WorkSpaces
          • Protect Amazon WorkSpaces if you already added your AWS account
          • Protect Amazon WorkSpaces if you have not yet added your AWS account
        • Manage an AWS account
          • Edit an AWS account
          • Remove an AWS account
          • Synchronize an AWS account
        • Manage an AWS account external ID
          • About the external ID
          • Configure the external ID
          • Update the external ID
            • Use the Workload Security console to update the external ID
            • Use the Workload Security API to update the external ID
          • Retrieve the external ID
          • Disable retrieval of the external ID
        • Protect an account running in AWS Outposts
        • Cloud Formation template and added AWS account
      • Add Azure instances
        • Create an Azure application for Workload Security
          • Assign correct roles
          • Create the Azure application
          • Record the Azure application ID, Microsoft Entra ID, and password
          • Record the Subscription IDs
          • Assign the Azure application a role and connector
        • Add a Microsoft Azure account to Workload Security
          • Benefits of adding an Azure account
          • Supported Azure regions
          • Add virtual machines from a Microsoft Azure account to Workload Security
          • Manage Azure classic virtual machines with the Azure Resource Manager connector
          • Remove an Azure account
          • Synchronize an Azure account
        • Reasons to upgrade to the new Azure Resource Manager connection
      • Add GCP instances
        • Create a Google Cloud Platform service account
          • Prerequisite: Enable the Google APIs
          • Create a GCP service account
          • Add more projects to the GCP service account
          • Create multiple GCP service accounts
        • Add a Google Cloud Platform account
          • Benefits of adding a GCP account
          • Configure a proxy setting for the GCP account
          • Add a GCP account to Workload Security
          • Remove a GCP account
          • Synchronize a GCP account
      • Manually upgrade your AWS account connection
        • Verify the permissions associated with the AWS role
      • Migrate to the new cloud connector functionality
      • Protect Docker containers
      • Protect Red Hat OpenShift containers
      • Control CPU usage
      • Recommendation scans
        • Enhanced recommendation scan
        • Classic recommendation scan
          • Run a classic recommendation scan
          • Schedule a recommendation scan
          • Configure an ongoing recommendation scan
          • Manually run a classic recommendation scan
          • Cancel a classic recommendation scan
          • Exclude a rule or application type from classic recommendation scans
          • Automatically implement recommendations
          • Manually assign rules
          • Additional rules for common vulnerabilities
          • Troubleshooting classic recommendation scan
    • Configure policies
      • Create policies
        • Create a new policy
        • Alternative ways to create a policy
        • Import policies from an XML file
        • Duplicate an existing policy
        • Create a new policy based on the recommendation scan of a computer
        • Edit settings for a policy or individual computer
        • Assign a policy to a computer
        • Disable automatic policy updates
        • Send policy changes manually
        • Export a policy
      • Policies, inheritance, and overrides
      • Detect and configure interfaces available on a computer
        • Configure a policy for multiple interfaces
        • Enforce interface isolation
      • Overview section of the Computer editor
      • Overview section of the policy editor
      • Network engine settings
      • User mode solution
      • Create a list of User Lists for use in policies
        • Import and export User Lists
        • View rules that use an User List
      • Define rules, lists, and other common objects used by policies
        • About common objects
        • Manage role-based access control for common objects
          • Configure access scope for roles
          • Roles' access to granted objects
          • Roles' use of granted objects
          • Roles with All access scope can import objects
          • Roles' permission to allow malware exclusions
        • Create a firewall rule
        • Configure intrusion prevention rules
          • Intrusion prevention rules list
          • Intrusion prevention license types
          • View information about intrusion prevention rules
          • General Information
          • Details
          • Identification (Trend Micro rules only)
          • View information about associated vulnerability (Trend Micro rules only)
          • Assign and unassign rules
          • Automatically assign core Endpoint & Workload rules
          • Automatically assign updated required rules
          • Configure event logging for rules
          • Generate alerts
          • Setting configuration options (Trend Micro rules only)
          • Schedule active times
          • Exclude from recommendations
          • Set the context for a rule
          • Override the behavior mode for a rule
          • Override rule and application type configurations
          • Export and import rules
        • Create an Integrity Monitoring rule
          • Add a new rule
          • Enter Integrity Monitoring rule information
          • Select a rule template and define rule attributes
          • Registry Value template
          • File template
          • Custom template
          • Configure Trend Micro Integrity Monitoring rules
          • Configure rule events and alerts
          • Real-time event monitoring
          • Alerts
          • View policies and computers to which a rule is assigned
          • Export a rule
          • Delete a rule
        • Define a Log Inspection rule for use in policies
        • Create a list of directories for use in policies
        • Create a list of file extensions for use in policies
          • Import and export file extension lists
          • View malware scan configurations that use a file extension list
        • Create list of files for use in policies
        • Create a list of IP addresses for use in policies
          • Import and export IP lists
          • View rules that use an IP list
        • Create a list of ports for use in policies
          • Import and export port lists
          • View rules that use a port list
        • Create a list of MAC addresses for use in policies
          • Import and export MAC lists
          • View policies that use a MAC list
        • Define contexts for use in policies
          • Configure internet connectivity for the computer
          • Define a context
        • Define stateful firewall configurations
          • Add a stateful configuration
          • Provide stateful configuration information
          • Select packet inspection options
            • IP packet inspection
            • TCP packet inspection
            • FTP Options
            • UDP packet inspection
            • ICMP packet inspection
          • Export a stateful configuration
          • Delete a stateful configuration
          • View policies and computers with assigned stateful configuration
        • Define a schedule to apply to rules
    • Configure protection modules
      • Configure Intrusion Prevention
        • About Intrusion Prevention
        • Set up Intrusion Prevention
          • Enable Intrusion Prevention in Detect mode
          • Enable Auto Apply core Endpoint & Workload rules
          • Test Intrusion Prevention
          • Apply recommended rules
          • Check Intrusion Prevention events
          • Enable fail open for packet or system failures
          • Switch to Prevent mode
          • Implement best practices for specific rules
          • HTTP Protocol Decoding rule
          • Cross-site scripting and generic SQL injection rules
        • Configure intrusion prevention rules
          • Intrusion prevention rules list
          • Intrusion prevention license types
          • View information about intrusion prevention rules
          • General Information
          • Details
          • Identification (Trend Micro rules only)
          • View information about associated vulnerability (Trend Micro rules only)
          • Assign and unassign rules
          • Automatically assign core Endpoint & Workload rules
          • Automatically assign updated required rules
          • Configure event logging for rules
          • Generate alerts
          • Setting configuration options (Trend Micro rules only)
          • Schedule active times
          • Exclude from recommendations
          • Set the context for a rule
          • Override the behavior mode for a rule
          • Override rule and application type configurations
          • Export and import rules
        • Configure a SQL injection prevention rule
        • Application types
          • View a list of application types
          • General Information
          • Connection
          • Configuration
          • Options
          • Assigned To
        • Inspect TLS traffic
        • TLS inspection support
          • Manage TLS inspection support package updates
          • Disable TLS inspection support package updates on a single agent
          • Disable TLS inspection support package updates by policy
        • Configure anti-evasion settings
        • Performance tips for intrusion prevention
      • Configure Anti-Malware
        • About Anti-Malware
        • Set up Anti-Malware
          • Enable and configure Anti-Malware
            • Enable the Anti-Malware module
            • Select the types of scans to perform
            • Configure scan inclusions
            • Configure scan exclusions
            • Configure multiple scan list exclusions or inclusions
            • Ensure that Workload Security can keep up to date on the latest threats
          • Configure malware scans
          • Performance tips for Anti-Malware
            • Minimize disk usage
            • Optimize CPU usage
              • Enable multi-threaded processing
            • Optimize RAM usage
          • Configure Deep Security and Microsoft Defender Antivirus for Windows
        • Detect emerging threats with Predictive Machine Learning
          • Enable Predictive Machine Learning
        • Enhanced Anti-Malware and ransomware scanning with behavior monitoring
          • Enhanced scanning protection
          • Enable enhanced scanning
          • What happens when enhanced scanning finds a problem?
        • Smart Protection in Workload Security
          • Anti-Malware and Smart Protection
          • Benefits of Smart Scan
          • Enable Smart Scan
          • Smart Protection Server for File Reputation Service
          • Web Reputation and Smart Protection
          • Smart Feedback
          • Disable Smart Feedback
        • Handle malware
          • View and restore identified malware
            • View a list of identified files
            • Work with identified files
            • Search for an identified file
            • Restore identified files
              • Create a scan exclusion for the file
              • Restore the file
          • Create Anti-Malware exceptions
          • Increase debug logging for Anti-Malware in protected Linux instances
      • Configure Firewall
        • About Firewall
        • Set up the Workload Security firewall
        • Create a firewall rule
        • Allow trusted traffic to bypass the firewall
        • Firewall rule actions and priorities
          • Rule actions
            • Allow rules
            • Bypass rules
              • Default Bypass rule for Workload Security traffic
            • Force Allow rules
          • Rule processing sequence
            • Logging
          • Actions and priorities applied together
          • Rule priority
          • Rule action and priority order
        • Firewall settings
          • General
            • Firewall
            • Firewall Stateful Configurations
            • Assigned Firewall Rules
          • Interface Isolation
            • Interface patterns
          • Reconnaissance
          • Advanced
            • Events
          • Firewall Events
        • Define stateful firewall configurations
          • Add a stateful configuration
          • Provide stateful configuration information
          • Select packet inspection options
            • IP packet inspection
            • TCP packet inspection
            • FTP Options
            • UDP packet inspection
            • ICMP packet inspection
          • Export a stateful configuration
          • Delete a stateful configuration
          • View policies and computers with assigned stateful configuration
        • Container firewall rules
      • Manage Container Protection
        • Apply real-time scan
        • Apply your firewall settings
        • Apply your intrusion prevention settings
      • Configure Web Reputation
        • Enable the Web Reputation module
        • Enable the Trend Micro Toolbar
        • Install the toolbar for macOS
        • Install the toolbar for Windows
        • Switch between inline and tap mode
        • Enforce the security level
        • Configure the security level
        • Create exceptions
        • Create URL exceptions
        • Configure the Smart Protection Server
        • Smart Protection Server connection warning
        • Edit advanced settings
        • Blocking Page
        • Alert
        • Ports
        • Test Web Reputation
      • Configure Device Control
      • Configure Integrity Monitoring
        • About Integrity Monitoring
        • Set up Integrity Monitoring
          • Enable and configure Integrity Monitoring
          • Enable Integrity Monitoring
          • Run a recommendation scan
          • Disable real-time scanning
          • Apply the Integrity Monitoring rules
          • Build a baseline for the computer
          • Periodically scan for changes
          • Test Integrity Monitoring
          • Improve Integrity Monitoring scan performance
          • Limit resource usage
          • Change the content hash algorithm
          • Integrity Monitoring event tagging
        • Create an Integrity Monitoring rule
          • Add a new rule
          • Enter Integrity Monitoring rule information
          • Select a rule template and define rule attributes
          • Registry Value template
          • File template
          • Custom template
          • Configure Trend Micro Integrity Monitoring rules
          • Configure rule events and alerts
          • Real-time event monitoring
          • Alerts
          • View policies and computers to which a rule is assigned
          • Export a rule
          • Delete a rule
        • Integrity Monitoring rules language
          • About the Integrity Monitoring rules language
          • DirectorySet
          • FileSet
          • GroupSet
          • InstalledSoftwareSet
          • PortSet
          • ProcessSet
          • RegistryKeySet
          • RegistryValueSet
          • ServiceSet
          • UserSet
          • WQLSet
      • Configure Log Inspection
        • About Log Inspection
        • Set up Log Inspection
          • Enable the log inspection module
          • Run a recommendation scan
          • Apply the recommended log inspection rules
          • Test Log Inspection
          • Configure log inspection event forwarding and storage
        • Define a Log Inspection rule for use in policies
      • Configure Application Control
        • About Application Control
          • Key software ruleset concepts
          • How do Application Control software rulesets work?
          • The Application Control interface
          • Application Control: Software Changes (Actions)
          • Application Control Software Rulesets
          • Security Events
          • Application Control Trust Entities
          • What does Application Control detect as a software change?
        • Set up Application Control
          • Turn on Application Control
          • Monitor new and changed software
          • Guidelines for handling changes
          • Turn on maintenance mode when making planned changes
          • Application Control tips and considerations
        • Verify that Application Control is enabled
        • Monitor Application Control events
          • Select Application Control events to log
          • View Application Control event logs
          • Interpret aggregated security events
          • Monitor Application Control alerts
        • View and change Application Control software rulesets
          • View Application Control software rulesets
          • Security Events
          • Change the action for an Application Control rule
          • Delete an individual Application Control rule
          • Delete an Application Control ruleset
        • Application Control Trust Entities
          • Trust Rulesets
            • Create a trust ruleset
            • Create a trust ruleset from the Policies tab
            • Create a trust ruleset from the the Computer or Policies tab
            • Assign or unassign a trust ruleset
            • Assign a trust ruleset
            • Unassign a trust ruleset
            • Delete a trust ruleset
          • Trust rules
            • Types of trust rules
            • Create a trust rule
            • Change trust rule properties
            • Delete a trust rule
          • Types of trust rule properties
          • Application Control event aggregation and analysis
          • Trust rule property limitations for Linux
        • Reset Application Control after extensive software change
        • Use the API to create shared and global rulesets
          • Create a shared ruleset
          • Change from shared to computer-specific allow and block rules
    • Configure events and alerts
      • Workload Security event logging
      • Log and event storage
        • Limit log file sizes
        • Event logging guidelines
      • Anti-Malware scan failures and cancellations
      • Apply tags to identify and group events
        • Manual tagging
        • Auto-tagging
          • Set the precedence for auto-tagging rules
          • Auto-tagging log inspection events
        • Trusted source tagging
          • Tag events based on a local trusted computer
          • Workload Security event matching between target and trusted source computers
            • Tag events based on a local trusted computer
          • Tag events based on the Trend Micro Certified Safe Software Service
          • Tag events based on a trusted common baseline
        • Delete a tag
      • Reduce the number of logged events
      • Rank events to quantify their importance
      • Forward events to a Syslog or SIEM server
        • Forward Workload Security events to a Syslog or SIEM server
          • Allow event-forwarding network traffic
          • Define a Syslog configuration
          • Forward system events
          • Forward security events
          • Compatibility
          • Troubleshoot event forwarding
        • Syslog message formats
        • Configure Red Hat Enterprise Linux to receive event logs
          • Set up a Syslog on Red Hat Enterprise Linux 8
          • Set up a Syslog on Red Hat Enterprise Linux 6 or 7
          • Set up a Syslog on Red Hat Enterprise Linux 5
      • Access events with Amazon SNS
        • Set up Amazon SNS
          • Create an AWS user
          • Create an Amazon SNS topic
          • Enable SNS
          • Create subscriptions
        • SNS configuration in JSON format
        • Events in JSON format
      • Configure alerts
        • View alerts in the Workload Security console
        • Configure alert settings
        • Set up email notification for alerts
        • Enable and disable alert emails
        • Configure an individual user to receive alert emails
        • Configure recipients for all alert emails
      • Generate reports about alerts and other activity
        • Set up a single report
        • Set up a scheduled report
        • Troubleshoot: Scheduled report sending failed
        • About attack reports
      • Lists of events and alerts
        • Predefined alerts
        • Agent events
        • System events
        • Application Control events
        • Anti-Malware events
        • Device Control events
        • Firewall events
        • Intrusion prevention events
        • Integrity Monitoring events
        • Log inspection events
        • Web Reputation events
      • Troubleshoot common events, alerts, and errors
        • Why am I seeing firewall events when the Firewall module is disabled?
        • Troubleshoot event ID 771 Contact by Unrecognized Client
        • Troubleshoot Smart Protection Server Disconnected errors
        • Error: Activation Failed
        • Error: Agent version not supported
        • Error: Anti-Malware Engine Offline
          • Agent on Windows
          • Agent on Linux
        • Warning: Anti-Malware Engine has only Basic Functions
        • Error: Activity Monitoring Engine Offline
        • Warning: Activity Monitoring Engine has only Basic Functions
        • Error: Device Control Engine Offline
          • For Windows agents
        • Error: Check Status Failed
        • Error: Installation of Feature 'dpi' failed: Not available: Filter
        • Error: Intrusion Prevention Rule Compilation Failed
          • Apply Intrusion Prevention best practices
          • Manage rules
          • Unassign application types from a single port
        • Error: Log Inspection Rules Require Log Files
          • If the file location is required
          • If the files listed do not exist on the protected machine
        • Error: Module installation failed (Linux)
        • Error: MQTT Connection Offline
        • Error: There are one or more application type conflicts on this computer
          • Resolution
          • Consolidate ports
          • Disable the inherit option
        • Error: Unable to connect to the cloud account
        • Error: Unable to resolve instance hostname
        • Alert: Integrity Monitoring information collection has been delayed
        • Event: Max TCP connections
        • Warning: Census, Good File Reputation, and Predictive Machine Learning Service Disconnected
        • Warning: Insufficient disk space
        • Warning: Reconnaissance Detected
    • Configure proxies
      • Configure proxies
      • Proxy settings
      • Enable OS proxy
        • Enable OS proxy on the server console
        • Enable OS proxy from the endpoint
        • Configuration on agent side
        • Troubleshooting
    • Configure relays
      • About relays
      • Deploy more relays
        • Plan the number and location of relays
        • Create relay groups
        • Enable relays
        • Assign agents to a relay group
        • Connect agents to a relay's private IP address
      • Remove relay functionality from agent
    • Manage agents (protected computers)
      • Computer and agent statuses
      • Configure agent version control
      • Configure teamed NICs
      • Communication between Workload Security and Deep Security Agent
      • Configure agents that have no Internet access
      • Activate and protect agents using agent-initiated activation and communication
        • Enable agent-initiated activation
        • Create or modify policies with agent-initiated communication enabled
        • Enable agent-initiated activation
        • Assign the policy to agents
        • Use a deployment script to activate the agents
      • Automatically upgrade agents on activation
      • Using the agent with iptables
      • Enable Managed Detection and Response
      • Configure agent self-protection
        • Configure self-protection through the Workload Security console
        • Configure self-protection using the command line
        • Limitations on Linux
        • Troubleshooting the Linux agent
      • Are Offline agents still protected by Workload Security?
      • Automate offline computer removal with inactive agent cleanup
        • Enable inactive agent cleanup
          • Keep offline computers protected
          • Prevent computers from being removed
        • Check the audit trail for removed computers
          • Search system events
          • System event details
      • Agent settings
      • Custom network configuration
        • Add a custom network configuration
        • JSON parameter configuration examples
      • User mode solution
      • Notifier application
        • About the notifier
        • Trigger a manual scan
        • macOS
        • Windows
    • Implement SAML single sign-on (SSO)
      • About SAML single sign-on (SSO)
      • Configure SAML single sign-on
        • Prerequisites
        • Configure SAML in Workload Security
        • Import your identity provider's SAML metadata document
        • Create Workload Security roles for SAML users
        • Provide information to your identity provider administrator
        • Download the Workload Security service provider SAML metadata document
        • Send URNs and the Workload Security SAML metadata document to the identity provider administrator
        • SAML claims structure
        • Workload Security username (required)
        • Workload Security user role (required)
        • Maximum session duration (optional)
        • Preferred language (optional)
        • Test SAML single sign-on
        • Service and identity provider settings
      • Configure SAML single sign-on with Microsoft Entra ID
    • Roles and contacts for accounts
      • Define roles for users
      • Add contacts (users who can only receive reports)
        • Add or edit a contact
        • Delete a contact
    • Navigate and customize the Workload Security console
      • Customize the dashboard
      • Group computers dynamically with smart folders
      • Customize advanced system settings
    • Use the Notification Service
    • Harden Workload Security
      • About Workload Security hardening
      • Manage trusted certificates
        • Import trusted certificates
        • View trusted certificates
        • Remove trusted certificates
      • SSL implementation and credential provisioning
      • Protect the agent
      • If I have disabled the connection to the Smart Protection Network, is any other information sent to Trend Micro?
    • Upgrade Workload Security
      • About upgrades
      • Apply security updates
        • Configure the security update source
        • Initiate security updates
        • Check your security update status
        • View details about pattern updates
        • Revert, import, or view details about rule updates
        • Configure security updates
        • Enable automatic patches for rules
        • Enable automatic Anti-Malware engine updates
        • Change the alert threshold for late security updates
      • Disable emails for New Pattern Update alerts
      • Use a web server to distribute software updates
        • Web server requirements
        • Copy the folder structure
        • Configure agents to use the new software repository
      • Upgrade a relay
        • Upgrade a relay from Workload Security
        • Upgrade a relay by running the installer manually
      • Upgrade the agent
        • Before you begin
        • Upgrade the agent starting from an alert
        • Upgrade multiple agents at once
        • Upgrade the agent from the Computers page
        • Upgrade the agent on activation
        • Upgrade the agent from a Scheduled Task
        • Upgrade the agent manually
        • Upgrade the agent on Windows
        • Upgrade the agent on Linux
        • Upgrade the agent on Solaris
        • Upgrade the agent on AIX
        • Best practices for agent upgrade
      • Install Trend Vision One Endpoint Security Agent via Deep Security Agent
        • Install Trend Vision One Endpoint Security agent
        • Schedule a task
        • Use Trend Vision One Endpoint Sensor
    • Uninstall the agent
      • Uninstall an agent on Windows
      • Uninstall an agent on Linux
      • Uninstall an agent on Solaris 10
      • Uninstall an agent on Solaris 11
      • Uninstall an agent on AIX
      • Uninstall an agent on macOS
      • Uninstall an agent on Red Hat OpenShift
      • Uninstall the notifier
    • Evaluate Trend Vision One
      • Foundation Services and Endpoint Protection prerequisites
      • Export policies and configurations
      • Import policies and configurations
      • Configure proxy settings
      • Deactivate the agent in Trend Cloud One - Endpoint & Workload Security
      • Reactivate the agent in Trend Vision One
      • Revert agents to Trend Cloud One - Endpoint & Workload Security
  • Integrations
    • Integrate with AWS Control Tower
      • Integrate with AWS Control Tower
      • Upgrade AWS Control Tower integration
      • Remove AWS Control Tower integration
    • Integrate with AWS Systems Manager Distributor
      • Create an IAM policy
      • Create a role and assign the policy
      • Create parameters
      • Create association
      • Protect your computers
    • Integrate with SAP NetWeaver
    • Integrate with Apex Central
    • Integrate with Trend Vision One
      • Integrate Workload Security with Trend Vision One
        • Register with Trend Vision One using the Product Instance app XDR
        • Register with Trend Vision One using the Product Connector app XDR
        • Forward security events to Trend Vision One XDR
        • Enable Activity Monitoring
      • Enable Trend Vision One SSO to Trend Cloud One
        • Enable single sign-on
      • Trend Vision One extended detection and response (XDR) file collection
        • Requirements
        • Collect objects using file collection
          • Trigger file collection
          • Create a File Collection Task
          • Monitor task status
          • Download sample file
        • Troubleshoot common issues
          • Trend Vision One settings
          • Security module settings for your computers
      • Trend Vision One extended detection and response (XDR) network isolation
        • Requirements
        • Isolate endpoints using network isolation
        • Trigger network isolation
        • Create an Isolate Endpoint Task
        • Monitor task status
        • Restore connection to an endpoint
        • Troubleshoot common issues
        • Trend Vision One settings
        • Security module settings for your computers
      • Trend Vision One extended detection and response (XDR) remote shell
      • Trend Vision One Threat Intelligence - user-defined suspicious object
      • Trend Vision One extended detection and response (XDR) custom script
        • Run a remote custom script task
        • Trigger a custom script using Remote Shell
      • Integrate with Service Gateway
        • Integrate Trend Vision One Service Gateway
        • Integrate the Service Gateway Forward Proxy
        • Integrate the Service Gateway ActiveUpdate service
          • Enable the ActiveUpdate services
          • Get Trend Cloud One - Endpoint & Workload Security ActiveUpdate source URL
          • Configure the ActiveUpdate service
          • Configure update source on Trend Cloud One - Endpoint & Workload Security
        • Integrate the Service Gateway Smart Protection service
          • Enable Smart Protection services
          • Configure local File Reputation service on Trend Cloud One - Endpoint & Workload Security Policy
          • Configure local Web Reputation service on Trend Cloud One - Endpoint & Workload Security Policy
      • Unregister Trend Cloud One - Endpoint & Workload Security from Trend Vision One
        • Use the Trend Vision One product connectors
        • Use Postman and an HTTP API
  • FAQs
    • Why does my Windows machine lose network connectivity when I enable protection?
    • How does agent protection work for Solaris zones?
    • Can Workload Security protect AWS GovCloud or Azure Government workloads?
    • Amazon Instance Metadata Service use by Deep Security Agent
    • Why can't I add my Azure server using the Azure cloud connector?
    • Why can't I view all VMs in an Azure subscription in Workload Security?
  • Troubleshooting
    • Offline agent
      • Causes
      • Verify that the agent is running
      • Verify DNS
      • Ensure that the DNS service is reliable
      • Allow outbound ports (agent-initiated heartbeat)
      • Allow ICMP on Amazon AWS EC2 instances
      • Fix the upgrade issue on Solaris 11
    • High CPU usage
    • Diagnose problems with agent deployment on Windows
    • Anti-Malware Windows platform update failed
      • An incompatible Anti-Malware component from another Trend Micro product
      • An incompatible Anti-Malware component from a third-party product
      • Other/unknown Error
    • Security update connectivity
    • Network Engine Status (Windows)
      • Network Engine Status warnings
      • Verify the driver status in Windows
      • Disable Network Engine Status warnings
    • Prevent MTU-related agent communication issues across Amazon Virtual Private Clouds (VPC)
    • Issues adding your AWS account to Workload Security
      • AWS is taking longer than expected
      • Resource is not supported in this region
      • Template validation issue
      • Workload Security was unable to add your AWS account
    • Create a diagnostic package and logs
      • Agent diagnostics
      • Create an agent diagnostic package via Workload Security
      • Create an agent diagnostic package via CLI on a protected computer
      • Collect debug logs with DebugView on Windows
      • Collect debug logs with DebugView on macOS
    • Removal of older software versions
    • Troubleshoot SELinux alerts
      • SELinux blocks the Deep Security Agent service
      • Berkeley Packet Filter (BPF) operations blocked
    • Troubleshoot Azure Code Signing
  • Trust and compliance information
    • About compliance
    • Agent package integrity check
    • Meet PCI DSS requirements with Workload Security
    • GDPR
    • Set up AWS Config Rules
    • Bypass vulnerability management scan traffic in Workload Security
      • Create a new IP list from the vulnerability scan provider IP range or addresses
      • Create firewall rules for incoming and outbound scan traffic
      • Assign new firewall rules to a policy to bypass vulnerability scans
    • Use TLS 1.2 with Workload Security
      • TLS architecture
      • Enable the TLS 1.2 architecture
      • Deploy new agents and relays
      • Guidelines for using deployment scripts
    • Privacy and personal data collection disclosure
  • Release notes and scheduled maintenance
    • Maintenance
    • What's new in Workload Security?
    • What's new in Deep Security Agent for macOS
    • API changelog
Close