Cloud Email and Collaboration
Protection protects the following
services:
-
Microsoft 365 services, including Exchange Online, SharePoint Online, OneDrive, and Microsoft Teams
-
Google Workspace, including Google Drive and Gmail
-
Cloud storage applications, including Box and Dropbox
Cloud Email and Collaboration
Protection requires service accounts
to integrate with those applications and services that it protects. The service
accounts can be categorized as:
-
Delegate accounts to integrate with Exchange Online, SharePoint Online, and OneDrive
-
Authorized accounts to integrate with Exchange Online, SharePoint Online, OneDrive, Microsoft Teams (Teams and Chat), Box, Dropbox, Google Drive, and Gmail
In Cloud Email and Collaboration
Protection, go to , click Add, hover over the organization for which you
need to grant access to services, and select a service from the list that appears
on the right
side.
NoteIf you have granted Cloud Email and Collaboration
Protection access to a service in the organization, Cloud Email and Collaboration
Protection grays it out on the list to prevent it from being
selected again.
|
After you have granted Cloud Email and Collaboration
Protection access to Microsoft 365 services for an organization, you can view the name of the
Microsoft tenant associated with the organization.
NoteIf you have Trend Vision One, when you add a tenant in Cloud Email and Collaboration
Protection automatically associates the tenant with an organization with no service to which
Cloud Email and Collaboration
Protection has been granted access. If there is no such organization, Cloud Email and Collaboration
Protection creates an organization and associates it with the tenant.
, |
Re-creating an access token for Microsoft 365 services and Gmail
If the access token becomes invalid for any reason or you need to refresh the existing
token, re-create an access token to continue using the service account.
The following procedure uses Exchange Online as an example to outline how to re-create
an access token in the management console.
Note
|
Procedure
- Click Recreate Access Token under Status of the Exchange Online service account.
- On the Recreate Access Token for Exchange Online Service Account screen that appears, click Grant Permission, specify your Microsoft 365 Global Administrator credentials to sign in if prompted, and then click Accept on the screen that appears.
- Go back to the management console as instructed and verify that a checkmark icon appears for the step, indicating that the access token and the service account are valid.
- Click Close.
Note
If you have updated Cloud App Security to Cloud Email and Collaboration Protection, after re-creating an access token for Teams Chat, make sure you update the redirect URI to that of Cloud Email and Collaboration Protection in the app registration information in Microsoft Entra ID. For details, see Creating an Microsoft Entra ID app for Teams protection.
Re-creating an access token for Box, Dropbox, and Google Drive
If the access token becomes invalid for any reason or you need to refresh the existing
token, re-create an access token to continue using the service account.
The following procedure uses Box as an example to outline how to re-create an access
token in the management console.
Procedure
- Click Recreate Access Token under Status of the Box service account.
- In the Recreate Access Token for Box Service Account screen that appears, select to use the current Box administrator or a different Box
administrator.
Important
It is highly recommended to select the current administrator used for creating the Box service account. Changing administrators may result in the inability to access and recover files quarantined in the current administrator's quarantine folder, potentially leading to data loss. - If you need to use a different administrator, decide how you want to handle the existing
quarantined files:
-
By the current administrator: Restore or delete all these files before granting permission in the screen.
-
By the new administrator: Perform the following steps to transfer these files from the current administrator’s quarantine folder to the new administrator’s folder:
-
Sign in to the Box admin console as the current administrator.
-
Access the root directory, locate the quarantine folder
trendmicro_cas_quarantine__dont_change_or_delete
, rename the folder, and share it with the new administrator. -
Locate the temporary folder
trendmicro_cas_temp__dont_change_or_delete
, ensure that there are no files in the folder, and then unshare and delete the folder from the root directory.Note
If there are files in the temporary folder, use the Move function to transfer the files to the renamed quarantine folder first. -
Sign in to the Box admin console as the new administrator.
-
Navigate to the shared folder and use the Move function to transfer all quarantined files to the new administrator's quarantine folder
trendmicro_cas_quarantine__dont_change_or_delete
, which is under the root directory. This ensures the preservation of file integrity and maintains their accessibility.Note
If you cannot find the folder with the specified name, create it manually.
-
-
- Go back to the management console and open the Recreate Access Token for Box Service Account screen.
- Click Grant Permission, specify your Box administrator credentials to sign in if prompted, and then click Accept in the screen that appears.
- Go back to the management console as instructed and verify that a checkmark icon appears for the step, indicating that the access token and the service account are valid.
- Click Close.