Hosted Email Security Administrator's Guide
>
Configuring Administration Settings
>
About Account Management
> Enabling or Disabling an Administrator Account
Online Help Center Home
Privacy and Personal Data Collection Disclosure
About Trend Micro Hosted Email Security
Service Requirements
What's New
Inbound Message Flow
Connection-Based Filtering at the MTA Connection Level
Content-Based Filtering at the Message Level
Outbound Message Protection
Getting Started with Hosted Email Security
Accessing the Hosted Email Security Administrator Console
Accessing the Cloud App Security Management Console
Working with the Dashboard
Threats Tab
Ransomware Details Chart
Threats Chart
Threats Details Chart
Virtual Analyzer Analysis Details Chart
Domain-based Authentication Details Chart
Top Statistics Tab
Top Business Email Compromise Threats Chart
Top Analyzed Advanced Threats Chart
Top Malware Detected by Predictive Machine Learning Chart
Top Malware Detected by Pattern-based Scanning Chart
Top Spam Chart
Top Data Loss Prevention (DLP) Incidents Chart
Other Statistics Tab
Volume Chart
Bandwidth Chart
Time-of-Click Protection Chart
About Domain Management
Adding a Domain
Configuring a Domain
Adding SPF Records
Adding Office 365 Inbound Connectors
Adding Office 365 Outbound Connectors
Editing or Deleting Domains
Inbound and Outbound Protection
Managing Recipient Filter
Managing Sender Filter
Sender Address Types
Configuring Approved and Blocked Sender Lists
Adding Senders
Editing Senders
Importing and Exporting Senders
Configuring Policy Objects
About Keyword Expressions
Using Keyword Expressions
Adding Keyword Expressions
Editing Keyword Expressions
Managing Notifications
Managing Stamps
Managing the Web Reputation Approved List
Data Loss Prevention (DLP)
Data Identifier Types
Expressions
Predefined Expressions
Customized Expressions
Criteria for Customized Expressions
Creating a Customized Expression
Importing Customized Expressions
Keywords
Predefined Keyword Lists
Customized Keyword Lists
Customized Keyword List Criteria
Creating a Keyword List
Importing a Keyword List
File Attributes
Predefined File Attributes List
Creating a File Attribute List
Importing a File Attribute List
DLP Compliance Templates
Predefined DLP Templates
Customized DLP Templates
Condition Statements and Logical Operators
Creating a Template
Importing Templates
Configuring High Profile Users
Configuring Scan Exceptions
Scan Exception List
Configuring "Scan Exceptions" Actions
Understanding IP Reputation
About Dynamic IP Reputation Settings
About Standard IP Reputation Settings
About Approved and Blocked IP Addresses
Troubleshooting Issues
About Transport Layer Security (TLS) Peers
Adding TLS Peers
Editing TLS Peers
About Sender Policy Framework (SPF)
Enabling or Disabling Sender Policy Framework (SPF)
Adding an SPF Peer to the Ignored List
Editing an SPF Peer in the Ignored List
Deleting SPF Peers from Ignored List
About DomainKeys Identified Mail (DKIM)
Adding DKIM Verification Settings
Editing DKIM Verification Settings
Adding DKIM Signing Settings
Editing DKIM Signing Settings
About Domain-based Message Authentication, Reporting & Conformance (DMARC)
Adding DMARC Settings
Editing DMARC Settings
How DMARC Works with SPF and DKIM
Configuring Time-of-Click Protection Settings
Configuring Policies
Managing Policy Rules
Customizing the Rule Order
Naming and Enabling a Rule
Specifying Recipients and Senders
Inbound Policy Rules
Outbound Policy Rules
About Rule Scanning Criteria
Configuring Malware or Malicious Code Criteria
About Advanced Threat Scan Engine
About Predictive Machine Learning
Configuring Spam Criteria
Configuring Business Email Compromise Criteria
Configuring Phishing Criteria
Configuring Graymail Criteria
Configuring Web Reputation Criteria
Configuring Social Engineering Attack Criteria
Configuring Data Loss Prevention Criteria
Configuring Advanced Criteria
Using Attachment Name or Extension Criteria
Using Attachment MIME Content-type Criteria
Using Attachment True File Type Criteria
Using Message Size Criteria
Using Subject Matches Criteria
Using Subject is Blank Criteria
Using Body Matches Criteria
Using Specified Header Matches Criteria
Using Attachment Content Matches Keyword Criteria
Using Attachment Size Criteria
Using Attachment Number Criteria
Using Attachment is Password Protected Criteria
Using the Number of Recipients Criteria
About Rule Actions
Specifying Rule Actions
"Intercept" Actions
Using the Delete Action
Using the Deliver Now Action
Using the Quarantine Action
Using the Change Recipient Action
"Modify" Actions
Cleaning Cleanable Malware
Deleting Matching Attachments
Insert an X-Header
Inserting a Stamp
Configuring Stamps
Tagging the Subject Line
Rule Tokens/Variables
"Monitor" Actions
Using the Bcc Action
Encrypting Outbound Messages
Reading an Encrypted Email Message
About the Send Notification Action
Configuring Send Notification Actions
Duplicating or Copying Send Notification Actions
Removing Notifications from Rule Actions
Deleting Notifications from Lists of Messages
Understanding Quarantine
Querying the Quarantine
Configuring End User Quarantine Console Settings
About the Quarantine Digest
Configuring the Quarantine Digest
Logs in Hosted Email Security
Understanding Mail Tracking
About Accepted Traffic
About Blocked Traffic
Social Engineering Attack Log Details
Business Email Compromise Log Details
Understanding Policy Events
Predictive Machine Learning Log Details
Understanding URL Click Tracking
Understanding Audit Log
Configuring Administration Settings
About Account Management
Adding and Configuring an Administrator Account
Editing Administrator Account Configuration
Deleting Administrator Accounts
Changing Administrator Passwords
Enabling or Disabling an Administrator Account
Changing End-User Passwords
About End-User Managed Accounts
Removing End-User Managed Accounts
About Logon Methods
Configuring Active Directory Federation Services 2.0
Configuring Azure Active Directory
Configuring Single Sign-On
Configuring Automatic Logon in Web Browsers
About Directory Management
Importing User Directories
Synchronizing User Directory
Verifying User Directories
Installing Web Services and Active Directory Synchronization Tool
About Co-Branding
Accessing the Co-Branded Administrator Console and End User Quarantine Console
Viewing Your Service Level Agreement
Viewing License Information
FAQs and Instructions
About MX Records and Hosted Email Security
General Order of Evaluation
Sender Filter Order of Evaluation
IP Reputation Order of Evaluation
How to Work with Non-AD Directories
Feature Limits and Capability Restrictions
Known Issues
Technical Support
Contacting Support
Using the Support Portal
Speeding Up the Support Call
Sending Suspicious Content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Troubleshooting Resources
Threat Encyclopedia
Download Center
Documentation Feedback
Enabling or Disabling an Administrator Account
Go to
Administration
>
Account Management
.
Click
(enabled) or
(disabled) to toggle the status of the account, and then click
OK
on the confirmation dialog box.
Parent topic:
About Account Management