Modify a risk control rule in classic view.
When a user or device matches the criteria in a risk control rule, based on the actions configured, Trend Vision One monitors the user or device's subsequent activity and takes action when the monitored activity occurs. For example, when a user with a persistent high risk score attempts to sign in to a new browser session or access an internal app of your organization the action could be blocked.
Some risk control rules types can be modified in classic view. New risk control rules must be created in playbook view.
Classic view is not available for all risk control rule types.
The available templates appear in the list. For more information about the templates, see Secure Access Rule Templates.
The rule configuration screen appears.
You can choose another rule template from the Rule template drop-down list. The configuration items vary with the template.
You can also enable or disable rules on the Secure Access Rules tab.
Rule Factor |
Description |
Options |
---|---|---|
Risk Events |
The risky behavior or action that triggers the rule |
Select from the list of risky events predefined by Trend Micro. Note:
This rule factor may or may not appear depending on the rule template. |
Risk Score |
The user risk score that triggers the rule |
Select a minimum risk score or a range, and then select the time period. Note:
This rule factor may or may not appear depending on the rule template. |
Source (for user-targeted rules) |
The user/groups that the rule applies to |
User/user groups Specify users and groups from your IAM system. Note:
If you have configured more than one IAM system, the IAM system with SSO enabled applies. |
Source (for device-targeted rules) |
The devices that the rule applies to |
Select all or specific targets, that is, device platforms that the rule applies to. Note:
Currently, only All devices is supported. |
Schedule |
The weekly period that the rule is applied |
To configure the recurrence of the schedule, select Only apply the rule during the specified period, and then select a start date and end date. Note:
The schedule uses the defined time zone of the console. |
Action (for user-targeted rules) |
The action taken on user account when the rule is triggered |
Access control When a user or device matches the rule criteria, Trend Vision One takes configured actions to control the user or device's subsequent sign-in or app access activity. For more information about actions, see Zero Trust Actions.
|
Revoke actions Click the toggle next to Revoke actions to revoke the following actions when certain criteria are matched.
By default, this option is enabled. |
||
Action (for device-targeted rules) |
The action taken on device when the rule is triggered |
Access control
|
Revoke actions Click the toggle next to Revoke actions to revoke the following actions when certain criteria are matched.
|
The rule is successfully created and listed on the Secure Access Rules screen.