Trend Micro Email Security Online Help > Technical Support
        • Online Help Center Home

        • Privacy and Personal Data Collection Disclosure
        • Trend Micro Email Security Data Privacy, Security, and Compliance
        • About Trend Micro Email Security
          • What's New
          • Service Requirements
          • Features and Benefits
          • Available License Versions
          • Data Center Geography
          • Inbound Message Protection
            • Inbound Message Flow
          • Outbound Message Protection
          • Integration with Trend Micro Products
            • Apex Central
              • Registering to Apex Central
              • Checking Trend Micro Email Security Server Status
              • Unregistering from Apex Central
            • Trend Micro Remote Manager
        • Getting Started with Trend Micro Email Security
          • Accessing the Trend Micro Email Security Administrator Console
            • Resetting Local Account Passwords
          • Selecting a Serving Site for First Time Use
          • Provisioning a Trend Micro Business Account
            • Setting Up Trend Micro Email Security
        • Working with the Dashboard
          • Threats Tab
            • Ransomware Details Chart
            • Threats Chart
            • Threats Details Chart
            • Virtual Analyzer File Analysis Details Chart
            • Virtual Analyzer URL Analysis Details Chart
            • Virtual Analyzer Quota Usage Details
            • Domain-based Authentication Details Chart
            • Blocked Message Details
          • Top Statistics Tab
            • Top BEC Attacks Detected by Antispam Engine Chart
            • Top BEC Attacks Detected by Writing Style Analysis Chart
            • Top Targeted High Profile Users
            • Top Analyzed Advanced Threats (Files) Chart
            • Top Analyzed Advanced Threats (URLs) Chart
            • Top Malware Detected by Predictive Machine Learning Chart
            • Top Malware Detected by Pattern-based Scanning Chart
            • Top Spam Chart
            • Top Data Loss Prevention (DLP) Incidents Chart
          • Other Statistics Tab
            • Volume Chart
            • Bandwidth Chart
            • Time-of-Click Protection Chart
        • Managing Domains
          • Adding a Domain
          • Configuring a Domain
            • Adding SPF Records
            • Adding Office 365 Inbound Connectors
            • Adding Office 365 Outbound Connectors
          • Editing or Deleting Domains
        • Inbound and Outbound Protection
          • Managing Recipient Filter
          • Managing Sender Filter
            • Configuring Approved and Blocked Sender Lists
              • Adding Senders
              • Deleting Senders
              • Importing Senders
              • Exporting Senders
            • Sender Filter Settings
          • Transport Layer Security (TLS) Peers
            • Adding Domain TLS Peers
            • Editing Domain TLS Peers
          • Understanding IP Reputation
            • About Quick IP List
            • About Standard IP Reputation Settings
            • About Approved and Blocked IP Addresses
              • Managing Approved and Blocked IP Addresses
            • IP Reputation Order of Evaluation
            • Troubleshooting Issues
          • Managing Reverse DNS Validation
            • Configuring Reverse DNS Validation Settings
              • Adding Reverse DNS Validation Settings
              • Editing Reverse DNS Validation Settings
            • Configuring the Blocked PTR Domain List
              • Adding PTR Domains
              • Editing PTR Domains
          • Domain-based Authentication
            • Sender IP Match
              • Adding Sender IP Match Settings
              • Editing Sender IP Match Settings
            • Sender Policy Framework (SPF)
              • Adding SPF Settings
              • Editing SPF Settings
            • DomainKeys Identified Mail (DKIM)
              • Adding DKIM Verification Settings
              • Editing DKIM Verification Settings
              • Adding DKIM Signing Settings
              • Editing DKIM Signing Settings
            • Domain-based Message Authentication, Reporting & Conformance (DMARC)
              • Adding DMARC Settings
              • Editing DMARC Settings
            • How DMARC Works with SPF and DKIM
          • File Password Analysis
            • Configuring File Password Analysis
            • Adding User-Defined Passwords
            • Importing User-Defined Passwords
          • Configuring Scan Exceptions
            • Scan Exception List
            • Configuring "Scan Exceptions" Actions
          • High Profile Domains
            • Configuring High Profile Domains
          • High Profile Users
            • Configuring High Profile Users
          • Configuring Time-of-Click Protection Settings
          • Data Loss Prevention
            • Data Identifier Types
              • Expressions
                • Predefined Expressions
                • Customized Expressions
                  • Criteria for Customized Expressions
                  • Creating a Customized Expression
                  • Importing Customized Expressions
              • Keywords
                • Predefined Keyword Lists
                • Customized Keyword Lists
                  • Customized Keyword List Criteria
                  • Creating a Keyword List
                  • Importing a Keyword List
              • File Attributes
                • Predefined File Attributes List
                • Creating a File Attribute List
                • Importing a File Attribute List
            • DLP Compliance Templates
              • Predefined DLP Templates
              • Customized DLP Templates
                • Condition Statements and Logical Operators
                • Creating a Template
                • Importing Templates
        • Configuring Policies
          • Policy Rule Overview
            • Default Policy Rules
          • Managing Policy Rules
          • Reordering Policy Rules
          • Naming and Enabling a Rule
          • Specifying Recipients and Senders
            • Inbound Policy Rules
            • Outbound Policy Rules
          • About Rule Scanning Criteria
            • Configuring Virus Scan Criteria
              • About Advanced Threat Scan Engine
              • About Predictive Machine Learning
            • Configuring Spam Filtering Criteria
              • Configuring Spam Criteria
              • Configuring Business Email Compromise Criteria
              • Configuring Phishing Criteria
              • Configuring Graymail Criteria
              • Configuring Web Reputation Criteria
              • Configuring Social Engineering Attack Criteria
            • Configuring Data Loss Prevention Criteria
            • Configuring Content Filtering Criteria
              • Using Envelope Sender Is Blank Criteria
              • Using Message Header Sender Differs from Envelope Sender Criteria
              • Using Message Header Sender Differs from Header Reply-To Criteria
              • Using Attachment File Name or Extension Criteria
              • Using Attachment MIME Content Type Criteria
              • Using Attachment True File Type Criteria
              • Using Message Size Criteria
              • Using Subject Matches Criteria
              • Using Subject is Blank Criteria
              • Using Body Matches Criteria
              • Using Body Is Blank Criteria
              • Using Specified Header Matches Criteria
              • Using Attachment Content Matches Keyword Criteria
              • Using Attachment Size Criteria
              • Using Attachment Number Criteria
              • Using Attachment is Password Protected Criteria
              • Using Attachment Contains Active Content Criteria
              • Using the Number of Recipients Criteria
          • About Rule Actions
            • Specifying Rule Actions
            • "Intercept" Actions
              • Using the Delete Action
              • Using the Deliver Now Action
              • Using the Quarantine Action
              • Using the Change Recipient Action
            • "Modify" Actions
              • Cleaning Cleanable Malware
              • Deleting Matching Attachments
              • Sanitizing Attachments
              • Inserting an X-Header
              • Inserting a Stamp
                • Configuring Stamps
              • Tagging the Subject Line
              • Tokens
            • "Monitor" Actions
              • Using the Bcc Action
            • Encrypting Outbound Messages
              • Reading an Encrypted Email Message
            • About the Send Notification Action
              • Configuring Send Notification Actions
              • Duplicating or Copying Send Notification Actions
              • Removing Notifications from Rule Actions
              • Deleting Notifications from Lists of Messages
        • Understanding Quarantine
          • Querying the Quarantine
          • Configuring End User Quarantine Settings
          • Quarantine Digest Settings
            • Adding or Editing a Digest Rule
            • Adding or Editing a Digest Template
        • Logs in Trend Micro Email Security
          • Understanding Mail Tracking
            • Social Engineering Attack Log Details
            • Business Email Compromise Log Details
          • Understanding Policy Events
            • Predictive Machine Learning Log Details
          • Understanding URL Click Tracking
          • Understanding Audit Log
          • Configuring Syslog Settings
            • Syslog Forwarding
            • Syslog Server Profiles
            • Content Mapping Between Log Output and CEF Syslog Type
              • CEF Detection Logs
              • CEF Audit Logs
              • CEF Mail Tracking Logs (Accepted Traffic)
              • CEF URL Click Tracking Logs
          • Querying Log Export
        • Reports
          • My Reports
          • Scheduled Reports
        • Configuring Administration Settings
          • Policy Objects
            • Managing Address Groups
            • Managing the URL Keyword Exception List
            • Managing the Web Reputation Approved List
            • Keyword Expressions
              • About Regular Expressions
                • Characters
                • Bracket Expression and Character Classes
                • Boundary Matches
                • Greedy Quantifiers
                • Logical Operators
                • Shorthand and meta-symbol
              • Using Keyword Expressions
              • Adding Keyword Expressions
              • Editing Keyword Expressions
            • Managing Notifications
            • Managing Stamps
          • Email Continuity
            • Adding an Email Continuity Record
            • Editing an Email Continuity Record
          • Administrator Management
            • Account Management
              • Accessible Features of the Local Accounts
              • Adding and Configuring a Subaccount
              • Adding and Configuring a Superadmin Account
              • Editing a Subaccount
              • Editing a Superadmin Account
              • Deleting Subaccounts or Superadmin Accounts
              • Changing the Password of a Subaccount or Superadmin Account
              • Enabling or Disabling a Subaccount or Superadmin Account
            • Logon Methods
              • Configuring Local Account Logon
                • Setting Up Two-Factor Authentication
              • Configuring Single Sign-On
                • Configuring Active Directory Federation Services
                • Configuring Azure Active Directory
                • Configuring Okta
          • End User Management
            • Local Accounts
            • Managed Accounts
              • Removing End User Managed Accounts
            • Logon Methods
              • Configuring Local Account Logon
              • Configuring Single Sign-On
                • Configuring Active Directory Federation Services
                • Configuring Azure Active Directory
                • Configuring Okta
          • Logon Access Control
            • Configuring Access Control Settings
            • Configuring Approved IP Addresses
          • Directory Management
            • Synchronizing User Directories
            • Importing User Directories
            • Exporting User Directories
            • Installing the Directory Synchronization Tool
          • Co-Branding
          • Service Integration
            • API Access
              • Obtaining an API Key
            • Log Retrieval
            • Apex Central
              • Configuring Suspicious Object Settings
            • Remote Manager
            • Phishing Simulation
          • Email Reporting Add-in for Outlook
            • Deploying the Add-in in the Microsoft 365 Admin Center
            • Deploying the Add-in in the Exchange Admin Center
            • Updating the Add-in in the Microsoft 365 Admin Center
          • License Information
            • Activating Sandbox as a Service
          • Migrating Data from Hosted Email Security
            • Data That Will Be Migrated
            • Data That Will Not Be Migrated
            • Setting Up Trend Micro Email Security After Data Migration
          • Migrating Data from IMSS or IMSVA
            • Data That Will Be Migrated
            • Data That Will Not Be Migrated
            • Prerequisites for Data Migration
            • Migrating Data to Trend Micro Email Security
            • Verifying Data After Migration
        • FAQs and Instructions
          • About MX Records and Trend Micro Email Security
          • Feature Limits and Capability Restrictions
          • Viewing Your Service Level Agreement
          • MTA-STS for Inbound Protection
        • Technical Support
          • Contacting Support
            • Using the Support Portal
            • Speeding Up the Support Call
          • Sending Suspicious Content to Trend Micro
            • Email Reputation Services
            • File Reputation Services
            • Web Reputation Services
          • Troubleshooting Resources
            • Threat Encyclopedia
            • Download Center
            • Documentation Feedback

        Technical Support

        Learn about the following topics:

        • Contacting Support

        • Sending Suspicious Content to Trend Micro

        • Troubleshooting Resources

        • Contacting Support
        • Sending Suspicious Content to Trend Micro
        • Troubleshooting Resources