Gain a better understanding of which features and settings migrate when you upgrade from InterScan Web Security products, including InterScan Web Security Virtual Appliance and InterScan Web Security Suite, to Zero Trust Secure Access Internet Access.
The following tables detail how InterScan Web Security features and settings migrate
               when you
               upgrade to Internet Access.
Features
| 
 Feature 
 | 
 Migratable 
 | 
 Notes 
 | 
||
| 
 Dashboard 
 | 
 No 
 | 
 All relevant information and settings are found in the Zero Trust Secure Access app
                              in Trend Vision One. 
Go to  and click the Internet Access tab for an overview of
                              the Internet Access service. 
Go to  to configure your Internet Access settings. 
 | 
||
| 
 Logs 
 | 
 No 
 | 
 Activity logs are available via XDR Data Explorer in Trend Vision One. 
Go to  and select Secure Access Activity Data in the
                              Search Method dropdown menu. 
  | 
||
| 
 Reports 
 | 
 No 
 | 
 Reports are available via the Reports app in Trend Vision One. 
Go to . 
  | 
||
| 
 Updates 
 | 
 No 
 | 
 Zero Trust Secure Access Internet Access pattern and engine updates occur every 8
                              hours
                              from midnight local time. The schedule is not configurable. 
 | 
||
| 
 Notifications 
 | 
 No 
 | 
 Notifications are not migrated to Trend Vision One. 
Go to  and select the related block/warning page to customize your notifications. 
 | 
||
| 
 Audit Log 
 | 
 No 
 | 
 Log auditing is available via the Audit Logs app. 
Go to  and select Zero Trust Secure Access from the
                              Category dropdown menu. 
 | 
||
| 
 Deployment Wizard 
 | 
 No 
 | 
 The Zero Trust Secure Access app features a deployment wizard to assist you in setting
                              up
                              various services. 
Go to  and click Deployment Wizard. In the Internet
                                 Access section, click Configure to launch the wizard. 
 | 
Settings
| 
 InterScan Web Security Setting 
 | 
 Migratable 
 | 
 Notes 
 | 
||
| 
 | 
 Yes (Partial) 
 | 
 Only policies with granular actions migrate to Internet Access. 
Go to  and click the Internet Access Control tab to manage
                              rules. 
 | 
||
| 
 | 
 No 
 | 
 Go to  and click Configure Bandwidth Control in the
                              On-Premises Gateways section to manage global bandwidth
                              control rules for Internet Access On-Premises Gateways. 
 | 
||
| 
 | 
 Yes (Partial) 
 | 
 Only the global policy migrates to Internet Access. 
Go to  and click HTTPS Inspection to manage HTTPS inspection
                              rules. 
Go to  and click Inspection Exceptions in the
                              HTTPS Inspection dropdown menu to manage HTTPS inspection
                              exceptions. 
 | 
||
| 
 | 
 Yes (Partial) 
 | 
 The Compressed File Handling and Large File Handling settings of policies do not migrate
                              to Internet Access. 
The URL list exceptions of policies do not migrate to Internet Access. 
Blocking and scanning by file type settings migrate to Internet Access as file profiles.
                              Go to  and click the File Profiles tab to manage file
                              profiles. 
 | 
||
| 
 | 
 No 
 | 
 Go to  and click the HTTP/HTTPS Request Filters tab
                              to manage filters for HTTP and HTTPS requests. 
 | 
||
| 
 | 
 No 
 | 
 Go to  and click the Data Loss Prevent tab to manage data
                              loss prevention rules. 
 | 
||
| 
 | 
 Yes (Partial) 
 | 
 Only policies with the block action migrate to Internet Access. 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 Yes (Partial) 
 | 
 Items in Exceptions to the Block List do not migrate to Internet
                              Access. 
Go to  and select URL Deny List in the Allow
                                 List/Deny List dropdown menu. 
 | 
||
| 
 | 
 Yes (Partial) 
 | 
 Items in Exceptions to the Trusted URL List do not migrate to
                              Internet Access. 
Go to  and select URL Allow List in the Allow
                                 List/Deny List dropdown menu. 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 Yes, ZTSA Internet Access can support the exception lists in Access Rules/AI rules.
                              Migrate the Approved Lists to the ZTSA custom URL categories and then apply them to
                              the Access Rules/AI rules.  
Go to Zero Trust Secure Access
Secure Access Resources and click the Custom URL Categories tab to manage custom categories. 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 Yes 
 | 
 Go to  and click the Custom URL Categories tab to manage
                              custom categories. 
 | 
||
| 
 | 
 Yes 
 | 
 Go to  and select TLS/SSL Certificates from the
                              HTTPS Inspection dropdown menu. 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 ZTSA Internet Access can support the FTP scan rules, but only for the on-premises
                              gateways. And the setting is configured based on the on-premises gateways. It does
                              not support the FTP Scan Rules migration. 
 | 
||
| 
 | 
 No 
 | 
 Go to  to sync user data and enforce user access. 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 Yes 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 Zero Trust Secure Access Internet Access references suspicious objects from the Threat
                              Intelligence app. 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 PAC files are not migrated to Trend Vision One. Use the
                              default PAC file provided by Zero Trust Secure Access Internet Access or copy the
                              PAC file from InterScan Web Security and replace the proxy address with the FQDN or
                              IP address of your Internet Access Cloud Gateway or Internet Access On-Premises
                              Gateway. 
Go to  and click the PAC Files tab to manage your PAC
                              files. 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 No 
 | 
 Go to  to manage accounts. 
  | 
|||
| 
 | 
 No 
 | 
 Go to  to manage user roles. 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 Go to  and click Global Settings, then select Configuration Backup and Restoration to add some backup rules. 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
||
| 
 | 
 No 
 | 
 Your InterScan Web Security license entitles to complimentary use of Zero Trust Secure
                              Access Internet Access for the duration of the license. After the license expires,
                              you must allocate credits to continue using Internet Access. 
For more information, see Introduction to credit-based licensing. 
 | 
||
| 
 | 
 No 
 | 
 - 
 | 
		