Views:

To better manage your endpoint policies and regions, you can use the Product Instance app to provision new Protection Managers for your endpoint agents.

You can use the product instance app to provision new instances of Protection Managers, allowing you access to the advanced features of Trend Vision One Endpoint Security and Trend Vision One Email and Collaboration Security without needing to connect and update existing Trend Micro security solutions.

Procedure

  1. Go to Service ManagementProduct Instance.
  2. Click Create Product Instance.
  3. Define your new Protection Manager by specifying the required information.
    1. Select an Instance Type.
      You can create the following Protection Managers. Each type has certain limitations based on if you have already created instances or connected existing solutions.
      Protection Manager
      Associated App
      Notes and Limitations
      Standard Endpoint Protection
      Endpoint Security
      • You can create up to five instances from Product Instance.
      • Instances created by updating from pre-existing solutions do not count towards the limitation on created instances.
      Server & Workload Protection
      Endpoint Security
      • You can create up to five instances from Product Instance.
      • Instances created by updating from pre-existing solutions do not count towards the limitation on created instances.
      Cloud Email and Collaboration Protection
      Email and Collaboration Security
      • You can only have one instance.
      Cloud Email Gateway Protection
      Email and Collaboration Security
      • You can only have one instance.
    2. Specify a unique Display name to identify the instance in the associate app.
    3. Select the Region for the geographic location of the data center that hosts data being sent from endpoints to Trend Micro.
    4. Specify a description of the instance.
  4. Click Save.
    The Product Instance app starts provisioning the new environment. This process might take a few minutes to complete. Once the process is finished, you can access and configure the Protection Managers from their respective applications.