Threat Protection Profiles

Manage threat protection profiles to scan web traffic for threats and apply them to secure access rules for enhanced protection.

The internet access service provides threat protection profiles to secure your files by protecting them from emerging advanced threats. It also integrates with Trend Micro Web Reputation Services to prevent you from accessing infected websites, and provides Advanced Threat Scanning that leverages Predictive Machine Learning, cloud-based sandbox analysis and Threat Intelligence to detect botnets, unknown threats, and suspicious objects.


Threat protection profiles can be applied to the following:

  • Internet access rules

The following table outlines the actions available on the Threat Protection Profiles tab.



Add a Threat Protection profile

  1. On the Threat Protection Profiles tab, click Add.

  2. Follow the instructions to add a threat protection profile.

    For more information, see Adding a Threat Protection Profile.

Check threat protection profile details

View the basic information about a threat protection profile, including the number of rules that are using the profile.

Configure a threat protection profile

Click in the Action column to change the basic information about a threat protection profile.

Click in the Action column to duplicate a threat protection profile. This provides a convenient way of adding a new threat protection profile with settings similar to an existing profile.

Click in the Action column to delete a threat protection profile from Trend Micro Vision One.

To delete more than one threat protection profile, select the profiles and click Delete in the upper left.


Only the threat protection profile that is not in use by any secure access rule can be deleted.