Documents Product Categories Trend Micro Worry-Free Business Security Services Standard

Trend Micro Worry-Free Business Security Services Standard

Jun 28, 2024
Trend Micro Email Security Administrator''s GuideTrend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: https://docs.trendmicro.com/en-us/enterprise/email-security.aspx Trend Micro, the Trend Micro t-ball logo, Remote Manager, Apex Central, Cloud App Security, and Hosted Email Security are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2021. Trend Micro Incorporated. All rights reserved. Document Part No.: APEM09182/210104 Release Date: May 31, 2021 Protected by U.S. Patent No.: Patents pending.This documentation introduces the main features of the service and/or provides installation instructions for a production environment. Read through the documentation before installing or using the service. Detailed information about how to use specific features within the service may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at docs@trendmicro.com. Evaluate this documentation on the following site: https://www.trendmicro.com/download/documentation/rating.aspPrivacy and Personal Data Collection Disclosure Certain features available in Trend Micro products collect and send feedback regarding product usage and detection information to Trend Micro. Some of this data is considered personal in certain jurisdictions and under certain regulations. If you do not want Trend Micro to collect personal data, you must ensure that you disable the related features. The following link outlines the types of data that Trend Micro Email Security collects and provides detailed instructions on how to disable the specific features that feedback the information. https://success.trendmicro.com/data-collection-disclosure Data collected by Trend Micro is subject to the conditions stated in the Trend Micro Privacy Notice: https://www.trendmicro.com/privacyTable of Contents About Trend Micro Email Security .......................................... 1 What''s New ..................................................................... 1 Service Requirements .................................................... 14 Features and Benefits ..................................................... 16 Available License Versions ............................................. 19 Inbound Message Protection .......................................... 21 Inbound Message Flow ............................................ 22 Outbound Message Protection ........................................ 23 Integration with Trend Micro Products ........................... 24 Apex Central ........................................................... 24 Trend Micro Remote Manager .................................. 26 Getting Started with Trend Micro Email Security ................... 27 Accessing the Trend Micro Email Security Administrator Console ......................................................................... 27 Provisioning a Trend Micro Business Account ................. 30 Setting Up Trend Micro Email Security ...................... 32 Working with the Dashboard ................................................ 33 Threats Tab ................................................................... 36 Ransomware Details Chart ....................................... 37 Threats Chart .......................................................... 37 Threats Details Chart ............................................... 40 Virtual Analyzer File Analysis Details Chart ............... 42 Virtual Analyzer URL Analysis Details Chart .............. 43 Virtual Analyzer Quota Usage Details ........................ 45 Domain-based Authentication Details Chart .............. 46 Blocked Message Details .......................................... 47 Top Statistics Tab ........................................................... 50 Top BEC Attacks Detected by Antispam Engine Chart ............................................................................... 50 Top BEC Attacks Detected by Writing Style Analysis Chart ...................................................................... 50 Top Targeted High Profile Users ................................ 51 iTrend Micro Email Security Administrator''s Guide Top Analyzed Advanced Threats (Files) Chart ............ 52 Top Analyzed Advanced Threats (URLs) Chart ........... 52 Top Malware Detected by Predictive Machine Learning Chart ...................................................................... 53 Top Malware Detected by Pattern-based Scanning Chart ............................................................................... 53 Top Spam Chart ....................................................... 54 Top Data Loss Prevention (DLP) Incidents Chart ........ 54 Other Statistics Tab ........................................................ 55 Volume Chart .......................................................... 55 Bandwidth Chart ..................................................... 56 Time-of-Click Protection Chart ................................. 57 Managing Domains .............................................................. 58 Adding a Domain ........................................................... 60 Configuring a Domain .................................................... 62 Adding SPF Records ................................................. 68 Adding Office 365 Inbound Connectors ..................... 69 Adding Office 365 Outbound Connectors ................... 72 Editing or Deleting Domains .......................................... 75 Inbound and Outbound Protection ....................................... 76 Managing Recipient Filter .............................................. 76 Managing Sender Filter .................................................. 76 Sender Filter Settings ............................................... 77 Configuring Approved and Blocked Sender Lists ........ 78 Transport Layer Security (TLS) Peers .............................. 84 Adding Domain TLS Peers ........................................ 87 Editing Domain TLS Peers ........................................ 89 Understanding IP Reputation ......................................... 89 About Quick IP List .................................................. 90 About Standard IP Reputation Settings ...................... 92 About Approved and Blocked IP Addresses ................ 93 IP Reputation Order of Evaluation ............................ 94 Troubleshooting Issues ............................................ 95 Domain-based Authentication ........................................ 96 Sender IP Match ...................................................... 97 Sender Policy Framework (SPF) ................................ 99 DomainKeys Identified Mail (DKIM) ........................ 104 iiTable of Contents Domain-based Message Authentication, Reporting & Conformance (DMARC) .......................................... 111 How DMARC Works with SPF and DKIM .................. 117 File Password Analysis ................................................. 117 Configuring File Password Analysis ......................... 119 Adding User-Defined Passwords .............................. 119 Importing User-Defined Passwords ......................... 120 Configuring Scan Exceptions ........................................ 121 Scan Exception List ................................................ 121 Configuring
To view the full page, please visit: Trend Micro Worry-Free Business Security Services Standard Product Userguide

Trend Micro Worry-Free Business Security Services Standard

Award-Winning Protection. Cybersecurity solutions protecting organizations from potential attack.
Buy now