Trend Micro Email Security Online Help
>
Configuring Administration Settings
>
Administrator Management
>
Account Management
> Deleting Subaccounts or Superadmin Accounts
Online Help Center Home
Privacy and Personal Data Collection Disclosure
Pre-release Disclaimer
Pre-release Sub-feature Disclaimer
Trend Micro Email Security Data Privacy, Security, and Compliance
About Trend Micro Email Security
What's New
Service Requirements
Features and Benefits
Available License Versions
Data Center Geography
Inbound Message Protection
Inbound Message Flow
Outbound Message Protection
Integration with Trend Micro Products
Apex Central
Registering to Apex Central
Checking Trend Micro Email Security Server Status
Unregistering from Apex Central
Trend Micro Remote Manager
Getting Started with Trend Micro Email Security
Accessing the Trend Micro Email Security Administrator Console
Resetting Local Account Passwords
Selecting a Serving Site for First Time Use
Provisioning a Trend Micro Business Account
Setting Up Trend Micro Email Security
Working with the Dashboard
Threats Tab
Ransomware Details Chart
Threats Chart
Threats Details Chart
Virtual Analyzer File Analysis Details Chart
Virtual Analyzer URL Analysis Details Chart
Virtual Analyzer Quota Usage Details
Domain-based Authentication Details Chart
Blocked Message Details
Top Statistics Tab
Top BEC Attacks Detected by Antispam Engine Chart
Top BEC Attacks Detected by Writing Style Analysis Chart
Top Targeted High Profile Users
Top Analyzed Advanced Threats (Files) Chart
Top Analyzed Advanced Threats (URLs) Chart
Top Malware Detected by Predictive Machine Learning Chart
Top Malware Detected by Pattern-based Scanning Chart
Top Spam Chart
Top Data Loss Prevention (DLP) Incidents Chart
Other Statistics Tab
Volume Chart
Bandwidth Chart
Time-of-Click Protection Chart
Managing Domains
Adding a Domain
Configuring a Domain
Adding SPF Records
Adding Office 365 Inbound Connectors
Adding Office 365 Outbound Connectors
Editing or Deleting Domains
Inbound and Outbound Protection
Managing Recipient Filter
Managing Sender Filter
Configuring Approved and Blocked Sender Lists
Adding Senders
Deleting Senders
Importing Senders
Exporting Senders
Sender Filter Settings
Transport Layer Security (TLS) Peers
Adding Domain TLS Peers
Editing Domain TLS Peers
Understanding IP Reputation
About Quick IP List
About Standard IP Reputation Settings
About Approved and Blocked IP Addresses
Managing Approved and Blocked IP Addresses
IP Reputation Order of Evaluation
Troubleshooting Issues
Managing Reverse DNS Validation
Configuring Reverse DNS Validation Settings
Adding Reverse DNS Validation Settings
Editing Reverse DNS Validation Settings
Configuring the Blocked PTR Domain List
Adding PTR Domains
Editing PTR Domains
Domain-based Authentication
Sender IP Match
Adding Sender IP Match Settings
Editing Sender IP Match Settings
Sender Policy Framework (SPF)
Adding SPF Settings
Editing SPF Settings
DomainKeys Identified Mail (DKIM)
Adding DKIM Verification Settings
Editing DKIM Verification Settings
Adding DKIM Signing Settings
Editing DKIM Signing Settings
Domain-based Message Authentication, Reporting & Conformance (DMARC)
Adding DMARC Settings
Editing DMARC Settings
How DMARC Works with SPF and DKIM
File Password Analysis
Configuring File Password Analysis
Adding User-Defined Passwords
Importing User-Defined Passwords
Configuring Scan Exceptions
Scan Exception List
Configuring "Scan Exceptions" Actions
High Profile Domains
Configuring High Profile Domains
High Profile Users
Configuring High Profile Users
Configuring Time-of-Click Protection Settings
Data Loss Prevention
Data Identifier Types
Expressions
Predefined Expressions
Customized Expressions
Criteria for Customized Expressions
Creating a Customized Expression
Importing Customized Expressions
Keywords
Predefined Keyword Lists
Customized Keyword Lists
Customized Keyword List Criteria
Creating a Keyword List
Importing a Keyword List
File Attributes
Predefined File Attributes List
Creating a File Attribute List
Importing a File Attribute List
DLP Compliance Templates
Predefined DLP Templates
Customized DLP Templates
Condition Statements and Logical Operators
Creating a Template
Importing Templates
Configuring Policies
Policy Rule Overview
Default Policy Rules
Managing Policy Rules
Reordering Policy Rules
Naming and Enabling a Rule
Specifying Recipients and Senders
Inbound Policy Rules
Outbound Policy Rules
About Rule Scanning Criteria
Configuring Virus Scan Criteria
About Advanced Threat Scan Engine
About Predictive Machine Learning
Files Types in File Categories
Configuring Spam Filtering Criteria
Configuring Spam Criteria
Configuring Business Email Compromise Criteria
Configuring Phishing Criteria
Configuring Graymail Criteria
Configuring Web Reputation Criteria
Configuring Social Engineering Attack Criteria
Configuring Unusual Signal Criteria
Unusual Signals
Configuring Data Loss Prevention Criteria
Configuring Content Filtering Criteria
Using Envelope Sender Is Blank Criteria
Using Message Header Sender Differs from Envelope Sender Criteria
Using Message Header Sender Differs from Header Reply-To Criteria
Using Attachment File Name or Extension Criteria
Using Attachment MIME Content Type Criteria
Using Attachment True File Type Criteria
Using Message Size Criteria
Using Subject Matches Criteria
Using Subject is Blank Criteria
Using Body Matches Criteria
Using Body Is Blank Criteria
Using Specified Header Matches Criteria
Using Attachment Content Matches Keyword Criteria
Using Attachment Size Criteria
Using Attachment Number Criteria
Using Attachment is Password Protected Criteria
Using Attachment Contains Active Content Criteria
Using the Number of Recipients Criteria
About Rule Actions
Specifying Rule Actions
"Intercept" Actions
Using the Delete Action
Using the Deliver Now Action
Using the Quarantine Action
Using the Change Recipient Action
"Modify" Actions
Cleaning Cleanable Malware
Deleting Matching Attachments
Sanitizing Attachments
Inserting an X-Header
Inserting a Stamp
Configuring Stamps
Tagging the Subject Line
Tokens
"Monitor" Actions
Using the Bcc Action
Encrypting Outbound Messages
Reading an Encrypted Email Message
About the Send Notification Action
Configuring Send Notification Actions
Duplicating or Copying Send Notification Actions
Removing Notifications from Rule Actions
Deleting Notifications from Lists of Messages
Understanding Quarantine
Querying the Quarantine
Configuring End User Quarantine Settings
Quarantine Digest Settings
Adding or Editing a Digest Rule
Adding or Editing a Digest Template
Logs in Trend Micro Email Security
Understanding Mail Tracking
Social Engineering Attack Log Details
Business Email Compromise Log Details
Antispam Engine Scan Details
Understanding Policy Events
Predictive Machine Learning Log Details
Understanding URL Click Tracking
Understanding Audit Log
Configuring Syslog Settings
Syslog Forwarding
Syslog Server Profiles
Content Mapping Between Log Output and CEF Syslog Type
CEF Detection Logs
CEF Audit Logs
CEF Mail Tracking Logs (Accepted Traffic)
CEF URL Click Tracking Logs
Querying Log Export
Reports
My Reports
Scheduled Reports
Configuring Administration Settings
Policy Objects
Managing Address Groups
Managing the URL Keyword Exception List
Managing the Web Reputation Approved List
Keyword Expressions
About Regular Expressions
Characters
Bracket Expression and Character Classes
Boundary Matches
Greedy Quantifiers
Logical Operators
Shorthand and meta-symbol
Using Keyword Expressions
Adding Keyword Expressions
Editing Keyword Expressions
Managing Notifications
Managing Stamps
Administrator Management
Account Management
Accessible Features of the Local Accounts
Adding and Configuring a Subaccount
Adding and Configuring a Superadmin Account
Editing a Subaccount
Editing a Superadmin Account
Deleting Subaccounts or Superadmin Accounts
Changing the Password of a Subaccount or Superadmin Account
Enabling or Disabling a Subaccount or Superadmin Account
Logon Methods
Configuring Local Account Logon
Setting Up Two-Factor Authentication
Configuring Single Sign-On
Configuring Active Directory Federation Services
Configuring Azure Active Directory
Configuring Okta
End User Management
Local Accounts
Managed Accounts
Removing End User Managed Accounts
Logon Methods
Configuring Local Account Logon
Configuring Single Sign-On
Configuring Active Directory Federation Services
Configuring Azure Active Directory
Configuring Okta
Email Continuity
Adding an Email Continuity Record
Editing an Email Continuity Record
Logon Access Control
Configuring Access Control Settings
Configuring Approved IP Addresses
Directory Management
Synchronizing User Directories
Importing User Directories
Exporting User Directories
Installing the Directory Synchronization Tool
Co-Branding
Service Integration
API Access
Obtaining an API Key
Log Retrieval
Apex Central
Configuring Suspicious Object Settings
Trend Vision One
Configuring Suspicious Object Settings
Remote Manager
Phishing Simulation
Email Reporting Add-in for Outlook
Deploying the Add-in in the Microsoft 365 Admin Center
Deploying the Add-in in the Exchange Admin Center
Updating the Add-in in the Microsoft 365 Admin Center
License Information
Activating Sandbox as a Service
Migrating Data from IMSS or IMSVA
Data That Will Be Migrated
Data That Will Not Be Migrated
Prerequisites for Data Migration
Migrating Data to Trend Micro Email Security
Verifying Data After Migration
Migrating Data from Hosted Email Security
Data That Will Be Migrated
Data That Will Not Be Migrated
Setting Up Trend Micro Email Security After Data Migration
FAQs and Instructions
About MX Records and Trend Micro Email Security
About MTA-STS Records for Inbound Protection
Feature Limits and Capability Restrictions
Viewing Your Service Level Agreement
Technical Support
Contacting Support
Using the Support Portal
Speeding Up the Support Call
Sending Suspicious Content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Troubleshooting Resources
Threat Encyclopedia
Download Center
Documentation Feedback
Deleting Subaccounts or Superadmin Accounts
Go to
Administration
>
Administrator Management
>
Account Management
.
Select the subaccounts or superadmin accounts that you want to delete, and then click
Delete
.
Click
OK
in the confirmation dialog box.
Parent topic:
Account Management