Secure Access Rules

The Secure Access Rules screen provides you an overview of the secure access rules that you have created to mitigate different risks across your network environment.

Important:

This is a “Pre-release” feature and is not considered an official release. Please review the Pre-release Disclaimer before using the feature.

Before creating a secure access rule, grant the following permissions or complete the following configurations:

  • Configure your IAM related settings to allow Trend Micro Vision One to access user data, authenticate users, and take access control actions on your IAM system. For more information, see Identity and Access Management.

  • Deploy the private access service to secure access to your organization's internal apps. For more information, see Private Access Configuration.

  • Deploy the internet access service to protect your users against risks and threats when they visit cloud apps and external URLs. For more information, see Internet Access Configuration.

Action

Description

Create a secure access rule

Secure access rules control the way users can access and use your organization's network environment. The rules enable you to respond to risky behavior or suspicious entities and activities in your environment, so that you can perform dynamic control over access to internal and cloud applications by risk, identity, time, and location.

For more information about creating secure access rules, see Creating a Risk Control Rule in Classic View, Creating a Private Access Control Rule and Creating an Internet Access Control Rule.

Check secure access rule details

Click the Risk Control, Private Access Control or Internet Access Control tab to view all the configured rules for your organization.

Click a rule name to edit the rule as needed.

Change the secure access rule status

Click the toggle under Status to enable or disable a rule.

Prioritize secure access rules

Rules are applied in order from the highest priority to lowest priority.

  • Risk control rules: Select a rule template from the drop-down list, and then drag a rule and place it at the desired priority.

  • Private access control and internet access control rules: Drag a rule and place it at the desired priority.

    For the Private Access Control and Internet Access Control rule types, Trend Micro Vision One provides a default rule respectively, which always has the lowest priority.

Filter secure access rules

  1. Click the Risk Control, Private Access Control or Internet Access Control tab.

  2. Use the drop-down lists and the Rule name field to filter rules.