Threat Protection Rules

Manage threat protection rules to scan web traffic for threats and apply them to secure access rules for enhanced protection.

The internet access service provides threat protection rules to secure your files by protecting them from emerging advanced threats. It also integrates with Trend Micro Web Reputation Services to prevent you from accessing infected websites, and provides Advanced Threat Scanning that leverages Predictive Machine Learning and Threat Intelligence to detect botnets, unknown threats, and suspicious objects.

Note:

Threat protection rules can be applied to the following:

  • Internet access rules

The following table outlines the actions available on the Threat Protection tab.

Action

Description

Add a threat protection rule

  1. On the Threat Protection tab, click Add.

  2. Follow the instructions to add a threat protection rule.

    For more information, see Adding a Threat Protection Rule.

Check threat protection rule details

View the basic information about a threat protection rule, including the number of rules that are using the rule.

Configure a threat protection rule

Click in the Action column to change the basic information about a threat protection rule.

Click in the Action column to duplicate a threat protection rule. This provides a convenient way of adding a new threat protection rule with settings similar to an existing rule.

Click in the Action column to delete a threat protection rule from Trend Micro Vision One.

To delete more than one threat protection rule, select the rules and click Delete in the upper left.

Note:

Only the threat protection rule that is not in use by any secure access rule can be deleted.