Secure Access Rules

The Secure Access Rules screen provides you an overview of the secure access rules that you have created to mitigate different risks across your network environment.

Important:

This is a “Pre-release” feature and is not considered an official release. Please review the Pre-release Disclaimer before using the feature.

Before creating a secure access rule, grant the following permissions or complete the following configurations:

  • Grant Trend Micro permissions to access user data and enforce user access policies on your IAM software to implement access control over users and user groups.

    Microsoft Azure AD is supported. For more information, see the Azure AD data source in Configuring the Data Source for Risk Analysis.

  • Deploy the private access service to enforce control over your organization's internal apps. For more information, see Private Access Configuration.

Action

Description

Create a secure access rule

Secure access rules control the way users can access and use your organization's network environment. The rules enable you to respond to risky behavior or suspicious entities and activities in your environment, so that you can perform dynamic control over access to internal and cloud applications by risk, identity, time, and location.

For more information about creating secure access rules, see Creating a Risk Control Rule and Creating a Permission Control Rule.

Check secure access rule details

Click the Risk Control or Permission Control tabs to view all your organization's configured rules.

Filter the rules using the Rule template drop-down list to view all rules created from a specific template.

Click a rule name to edit the rule as needed.

Change the secure access rule status

Click the toggle under Status to enable or disable a rule.

Prioritize secure access rules

Rules are applied in order from the highest priority to lowest priority.

  1. Click a rule type tab, and then select a rule template from the drop-down list.

  2. Drag a rule and place it at the desired priority.

For the Permission Control rule type, Trend Micro Vision One provides a default rule and it always has the lowest priority.

Filter secure access rules

Use the Rule template drop-down list and the Rule name field to filter rules by template.