Views:
The dashboard lists only customers that need attention. To get details for any product, including those that are not listed on the dashboard, go to the Customers tab and access the product on the customer tree.
Click Customers{customer}{product} to display additional information.
Note
Note
The displayed options differ for each product/service.
Product
Options
Cloud App Security
  • Events: Displays system and threat events
  • Users: Allows you to create or delete Cloud App Security users, and reset users' passwords
Cloud Edge
  • For service plans:
    • Events: Displays a summary of events from all Cloud Edge devices in the service plan
    • Firmware Updates: Displays the current firmware version of each device and the latest available version; provides the option to manually update firmware
    • Devices: Displays the name and serial number of each registered device
  • For registered devices:
    • Events: Displays system and threat events
    • Components: Displays the current version of each component, the latest available version, and the date of the last update
    • Network: Displays the user name, remote IP address, and MAC address of endpoints that connected to the network through the Cloud Edge device
    • VPN: Displays the user name, remote IP address, and virtual IP address of endpoints that connected to the network through a Virtual Private Network and the Cloud Edge device
Note
Note
To make more detailed changes, access the Cloud Edge console.
Hosted Email Security
  • Live Status: Displays the latest Hosted Email Security information.
  • Policies: Lists all the available policies.
  • Approved Senders: Email messages from senders added to this list are not subject to IP reputation-based, spam, phishing, BEC attack, social engineering attack, Web reputation, or graymail message filtering. Hosted Email Security still performs malware and attachment scanning on all messages received and takes the action configured in policy rules after detecting a malware threat or an attachment policy violation.
  • Blocked Senders: Lists all the addresses or domains that will blocked from sending messages.
Note
Note
To make more detailed changes, access the Hosted Email Security console.
Trend Micro Email Security
  • Live Status: Displays the latest Trend Micro Email Security information.
  • Policies: Lists all the available policies.
  • Approved Senders: Email messages from senders added to this list are not subject to IP reputation-based, spam, phishing, BEC attack, social engineering attack, Web reputation, or graymail message filtering. Trend Micro Email Security still performs malware and attachment scanning on all messages received and takes the action configured in policy rules after detecting a malware threat or an attachment policy violation.
  • Blocked Senders: Lists all the addresses or domains that will blocked from sending messages.
Note
Note
To make more detailed changes, access the Trend Micro Email Security console.
Trend Micro Web Security
Displays the latest Trend Micro Web Security threat and system information.
Note
Note
To make more detailed changes, access the Trend Micro Web Security console.
Worry-Free Business Security
  • Events: Lists system and threat events that may or may not need an action.
  • Groups: Lists the different groups configured on the server. You can request to start or stop a scan from here.
  • Domain Settings: Configure settings for the entire domain.
    Refer to the Trend Micro Worry-Free Business Security documentation for detailed information:
    http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx.
    Note
    Note
    Security settings of individual groups cannot be configured from here. You will need to access the Worry-Free Business Security console to make these changes.
  • Managed Server: Displays all the details of the server. You can request to update the server and update agents from here.
  • TMRM Agent: Contains general information about the Trend Micro Remote Manager agent including the availability, the Globally Unique Identifier (GUID) or Authorization Key, and the IP address.
  • Devices: Lists the name, IP Address, online/offline status, and details of the scan engine, pattern file, and the platform.
    Note
    Note
    You can see Devices and Security Settings once you expand the product and click Servers or Desktops.
  • Security Settings: Configure the security settings of a particular group (applicable only for Worry-Free Business Security 6.0 and above). Refer to the Trend Micro Worry-Free Business Security documentation for detailed information.
Worry-Free Business Security Services
  • Events: Lists system and threat events that may or may not need an action.
  • Groups: Lists the configured groups and the types.
  • Devices: Lists the name, IP Address, online/offline status, and details of the scan engine, pattern file, and the platform.
    Note
    Note
    You can see Devices and Security Settings once you expand the product and click Servers or Desktops.
  • Security Settings: Configure the security settings of Worry-Free Business Security Services. Refer to the Trend Micro Worry-Free Business Security Services documentation for detailed information:
Note
Note
To make more detailed changes, access the Worry-Free Business Security Services console.