servicecentral.trendmicro.com Open in urlscan Pro
2.18.161.106  Public Scan

URL: https://servicecentral.trendmicro.com/en-US/documentation/article/trend-micro-email-security-online-help-logon-methods
Submission: On October 17 via manual from CH — Scanned from CH

Form analysis 0 forms found in the DOM

Text Content

You’re offline. This is a read only version of the page.




ONLINE HELP CENTER

 * 
   Search
 * 
   Support
   
    * For Home
    * For Business

 * 
   English (US)
   
   Bahasa Indonesia (Indonesian) Dansk (Danish) Deutsch (German) English
   (Australia) English (US) Español (Spanish) Français (French) Français
   Canadien
   (Canadian French) Italiano (Italian) Nederlands (Dutch) Norsk (Norwegian)
   Polski (Polish) Português - Brasil
   (Portuguese - Brazil) Português - Portugal
   (Portuguese - Portugal) Svenska (Swedish) ภาษาไทย (Thai) Tiếng Việt
   (Vietnamese) Türkçe (Turkish) Čeština (Czech) Ελληνικά (Greek) Български
   (Bulgarian) Русский (Russian) עברית (Hebrew) اللغة العربية (Arabic) 日本語
   (Japanese) 简体中文
   (Simplified Chinese) 繁體中文
   (Traditional Chinese) 繁體中文 HK
   (Traditional Chinese) 한국어 (Korean)

   
   


Cancel

   
 * Home
 * Online Help Center
 * trend-micro-email-security-online-help-logon-methods



This website uses cookies for website functionality and traffic analytics. Our
Cookie Notice provides more information and explains how to amend your cookie
settings.

Learn More Yes, I agree
 * Online Help Center
 * Security for Messaging and Collaboration
 * Email Security
 * Trend Micro Email Security Online Help
 * Configuring Administration Settings
 * End User Management
 * Logon Methods

 * Privacy and Personal Data Collection Disclosure
    * Pre-release Disclaimer
    * Pre-release Sub-feature Disclaimer

 * Trend Micro Email Security Data Privacy, Security, and Compliance
 * About Trend Micro Email Security
    * What's New
    * Service Requirements
    * Features and Benefits
    * Available License Versions
    * Data Center Geography
    * Inbound Message Protection
       * Inbound Message Flow
   
    * Outbound Message Protection
    * Integration with Trend Micro Products
       * Apex Central
          * Registering to Apex Central
          * Checking Trend Micro Email Security Server Status
          * Unregistering from Apex Central
      
       * Trend Micro Remote Manager

 * Getting Started with Trend Micro Email Security
    * Accessing the Trend Micro Email Security Administrator Console
       * Resetting Local Account Passwords
   
    * Selecting a Serving Site for First Time Use
    * Provisioning a Trend Micro Business Account
       * Setting Up Trend Micro Email Security

 * Working with the Dashboard
    * Threats Tab
       * Ransomware Details Chart
       * Threats Chart
       * Threats Details Chart
       * Virtual Analyzer File Analysis Details Chart
       * Virtual Analyzer URL Analysis Details Chart
       * Virtual Analyzer Quota Usage Details
       * Domain-based Authentication Details Chart
       * Blocked Message Details
   
    * Top Statistics Tab
       * Top BEC Attacks Detected by Antispam Engine Chart
       * Top BEC Attacks Detected by Writing Style Analysis Chart
       * Top Targeted High Profile Users
       * Top Analyzed Advanced Threats (Files) Chart
       * Top Analyzed Advanced Threats (URLs) Chart
       * Top Malware Detected by Predictive Machine Learning Chart
       * Top Malware Detected by Pattern-based Scanning Chart
       * Top Spam Chart
       * Top Data Loss Prevention (DLP) Incidents Chart
   
    * Other Statistics Tab
       * Volume Chart
       * Bandwidth Chart
       * Time-of-Click Protection Chart

 * Managing Domains
    * Adding a Domain
    * Configuring a Domain
       * Adding SPF Records
       * Adding Office 365 Inbound Connectors
       * Adding Office 365 Outbound Connectors
   
    * Editing or Deleting Domains

 * Inbound and Outbound Protection
    * Managing Recipient Filter
    * Managing Sender Filter
       * Configuring Approved and Blocked Sender Lists
          * Adding Senders
          * Deleting Senders
          * Importing Senders
          * Exporting Senders
      
       * Sender Filter Settings
   
    * Transport Layer Security (TLS) Peers
       * Adding Domain TLS Peers
       * Editing Domain TLS Peers
   
    * Understanding IP Reputation
       * About Quick IP List
       * About Standard IP Reputation Settings
       * About Approved and Blocked IP Addresses
          * Managing Approved and Blocked IP Addresses
      
       * IP Reputation Order of Evaluation
       * Troubleshooting Issues
   
    * Managing Reverse DNS Validation
       * Configuring Reverse DNS Validation Settings
          * Adding Reverse DNS Validation Settings
          * Editing Reverse DNS Validation Settings
      
       * Configuring the Blocked PTR Domain List
          * Adding PTR Domains
          * Editing PTR Domains
   
    * Domain-based Authentication
       * Sender IP Match
          * Adding Sender IP Match Settings
          * Editing Sender IP Match Settings
      
       * Sender Policy Framework (SPF)
          * Adding SPF Settings
          * Editing SPF Settings
      
       * DomainKeys Identified Mail (DKIM)
          * Adding DKIM Verification Settings
          * Editing DKIM Verification Settings
          * Adding DKIM Signing Settings
          * Editing DKIM Signing Settings
      
       * Domain-based Message Authentication, Reporting & Conformance (DMARC)
          * Adding DMARC Settings
          * Editing DMARC Settings
      
       * How DMARC Works with SPF and DKIM
   
    * File Password Analysis
       * Configuring File Password Analysis
       * Adding User-Defined Passwords
       * Importing User-Defined Passwords
   
    * Configuring Scan Exceptions
       * Scan Exception List
       * Configuring "Scan Exceptions" Actions
   
    * High Profile Domains
       * Configuring High Profile Domains
   
    * High Profile Users
       * Configuring High Profile Users
   
    * Configuring Time-of-Click Protection Settings
    * Data Loss Prevention
       * Data Identifier Types
          * Expressions
             * Predefined Expressions
             * Customized Expressions
                * Criteria for Customized Expressions
                * Creating a Customized Expression
                * Importing Customized Expressions
         
          * Keywords
             * Predefined Keyword Lists
             * Customized Keyword Lists
                * Customized Keyword List Criteria
                * Creating a Keyword List
                * Importing a Keyword List
         
          * File Attributes
             * Predefined File Attributes List
             * Creating a File Attribute List
             * Importing a File Attribute List
      
       * DLP Compliance Templates
          * Predefined DLP Templates
          * Customized DLP Templates
             * Condition Statements and Logical Operators
             * Creating a Template
             * Importing Templates

 * Configuring Policies
    * Policy Rule Overview
       * Default Policy Rules
   
    * Managing Policy Rules
    * Reordering Policy Rules
    * Naming and Enabling a Rule
    * Specifying Recipients and Senders
       * Inbound Policy Rules
       * Outbound Policy Rules
   
    * About Rule Scanning Criteria
       * Configuring Virus Scan Criteria
          * About Advanced Threat Scan Engine
          * About Predictive Machine Learning
          * Files Types in File Categories
      
       * Configuring Spam Filtering Criteria
          * Configuring Spam Criteria
          * Configuring Business Email Compromise Criteria
          * Configuring Phishing Criteria
          * Configuring Graymail Criteria
          * Configuring Web Reputation Criteria
          * Configuring Social Engineering Attack Criteria
      
       * Configuring Data Loss Prevention Criteria
       * Configuring Content Filtering Criteria
          * Using Envelope Sender Is Blank Criteria
          * Using Message Header Sender Differs from Envelope Sender Criteria
          * Using Message Header Sender Differs from Header Reply-To Criteria
          * Using Attachment File Name or Extension Criteria
          * Using Attachment MIME Content Type Criteria
          * Using Attachment True File Type Criteria
          * Using Message Size Criteria
          * Using Subject Matches Criteria
          * Using Subject is Blank Criteria
          * Using Body Matches Criteria
          * Using Body Is Blank Criteria
          * Using Specified Header Matches Criteria
          * Using Attachment Content Matches Keyword Criteria
          * Using Attachment Size Criteria
          * Using Attachment Number Criteria
          * Using Attachment is Password Protected Criteria
          * Using Attachment Contains Active Content Criteria
          * Using the Number of Recipients Criteria
   
    * About Rule Actions
       * Specifying Rule Actions
       * "Intercept" Actions
          * Using the Delete Action
          * Using the Deliver Now Action
          * Using the Quarantine Action
          * Using the Change Recipient Action
      
       * "Modify" Actions
          * Cleaning Cleanable Malware
          * Deleting Matching Attachments
          * Sanitizing Attachments
          * Inserting an X-Header
          * Inserting a Stamp
             * Configuring Stamps
         
          * Tagging the Subject Line
          * Tokens
      
       * "Monitor" Actions
          * Using the Bcc Action
      
       * Encrypting Outbound Messages
          * Reading an Encrypted Email Message
      
       * About the Send Notification Action
          * Configuring Send Notification Actions
          * Duplicating or Copying Send Notification Actions
          * Removing Notifications from Rule Actions
          * Deleting Notifications from Lists of Messages

 * Understanding Quarantine
    * Querying the Quarantine
    * Configuring End User Quarantine Settings
    * Quarantine Digest Settings
       * Adding or Editing a Digest Rule
       * Adding or Editing a Digest Template

 * Logs in Trend Micro Email Security
    * Understanding Mail Tracking
       * Social Engineering Attack Log Details
       * Business Email Compromise Log Details
       * Antispam Engine Scan Details
   
    * Understanding Policy Events
       * Predictive Machine Learning Log Details
   
    * Understanding URL Click Tracking
    * Understanding Audit Log
    * Configuring Syslog Settings
       * Syslog Forwarding
       * Syslog Server Profiles
       * Content Mapping Between Log Output and CEF Syslog Type
          * CEF Detection Logs
          * CEF Audit Logs
          * CEF Mail Tracking Logs (Accepted Traffic)
          * CEF URL Click Tracking Logs
   
    * Querying Log Export

 * Reports
    * My Reports
    * Scheduled Reports

 * Configuring Administration Settings
    * Policy Objects
       * Managing Address Groups
       * Managing the URL Keyword Exception List
       * Managing the Web Reputation Approved List
       * Keyword Expressions
          * About Regular Expressions
             * Characters
             * Bracket Expression and Character Classes
             * Boundary Matches
             * Greedy Quantifiers
             * Logical Operators
             * Shorthand and meta-symbol
         
          * Using Keyword Expressions
          * Adding Keyword Expressions
          * Editing Keyword Expressions
      
       * Managing Notifications
       * Managing Stamps
   
    * Email Continuity
       * Adding an Email Continuity Record
       * Editing an Email Continuity Record
   
    * Administrator Management
       * Account Management
          * Accessible Features of the Local Accounts
          * Adding and Configuring a Subaccount
          * Adding and Configuring a Superadmin Account
          * Editing a Subaccount
          * Editing a Superadmin Account
          * Deleting Subaccounts or Superadmin Accounts
          * Changing the Password of a Subaccount or Superadmin Account
          * Enabling or Disabling a Subaccount or Superadmin Account
      
       * Logon Methods
          * Configuring Local Account Logon
             * Setting Up Two-Factor Authentication
         
          * Configuring Single Sign-On
             * Configuring Active Directory Federation Services
             * Configuring Azure Active Directory
             * Configuring Okta
   
    * End User Management
       * Local Accounts
       * Managed Accounts
          * Removing End User Managed Accounts
      
       * Logon Methods
          * Configuring Local Account Logon
          * Configuring Single Sign-On
             * Configuring Active Directory Federation Services
             * Configuring Azure Active Directory
             * Configuring Okta
   
    * Logon Access Control
       * Configuring Access Control Settings
       * Configuring Approved IP Addresses
   
    * Directory Management
       * Synchronizing User Directories
       * Importing User Directories
       * Exporting User Directories
       * Installing the Directory Synchronization Tool
   
    * Co-Branding
    * Service Integration
       * API Access
          * Obtaining an API Key
      
       * Log Retrieval
       * Apex Central
          * Configuring Suspicious Object Settings
      
       * Trend Vision One
          * Configuring Suspicious Object Settings
      
       * Remote Manager
       * Phishing Simulation
   
    * Email Reporting Add-in for Outlook
       * Deploying the Add-in in the Microsoft 365 Admin Center
       * Deploying the Add-in in the Exchange Admin Center
       * Updating the Add-in in the Microsoft 365 Admin Center
   
    * License Information
       * Activating Sandbox as a Service
   
    * Migrating Data from Hosted Email Security
       * Data That Will Be Migrated
       * Data That Will Not Be Migrated
       * Setting Up Trend Micro Email Security After Data Migration
   
    * Migrating Data from IMSS or IMSVA
       * Data That Will Be Migrated
       * Data That Will Not Be Migrated
       * Prerequisites for Data Migration
       * Migrating Data to Trend Micro Email Security
       * Verifying Data After Migration

 * FAQs and Instructions
    * About MX Records and Trend Micro Email Security
    * About MTA-STS Records for Inbound Protection
    * Feature Limits and Capability Restrictions
    * Viewing Your Service Level Agreement

 * Technical Support
    * Contacting Support
       * Using the Support Portal
       * Speeding Up the Support Call
   
    * Sending Suspicious Content to Trend Micro
       * Email Reputation Services
       * File Reputation Services
       * Web Reputation Services
   
    * Troubleshooting Resources
       * Threat Encyclopedia
       * Download Center
       * Documentation Feedback

Table of Contents


Print


LOGON METHODS



Views: 8

Trend Micro Email Security allows you to control the way that end users access
the End User Console.

On the Logon Methods screen, you can enable or disable the following logon
methods:

 * Local Account Logon
   
   If this method is enabled, end users can log on to the End User Console with
   their user name and password of the local managed accounts they have
   registered on the End User Console. Enforcing two-factor authentication adds
   an extra layer of security to the end user accounts.

 * Single Sign-On
   
   Once you enable single sign-on (SSO) and complete required settings, end
   users can log on to the End User Console through SSO with their existing
   identity provider credentials. You can create multiple SSO profiles so that
   different end users can log on to the End User Console from different
   identity provider servers through SSO.
   
   When creating an SSO profile, you need to specify the domains to which the
   profile applies. Assume that subaccount A manages domain A, B and C,
   subaccount B manages domain B and subaccount C manages domain C. The
   relationship between SSO profiles, managed domains and subaccount permissions
   are as follows:
   
   SSO Profile
   
   Managed Domains
   
   Subaccount Permission
   
   Profile 1
   
   Domains A and B
   
    * Subaccount A: read and edit
   
    * Subaccount B: read only
   
    * Subaccount C: cannot read, edit or delete
   
   Profile 2
   
   Domain C
   
    * Subaccount A: read and edit
   
    * Subaccount B: cannot read, edit or delete
   
    * Subaccount C: read and edit
   
   Profile 3
   
   All domains
   
    * Subaccount A: read only
   
    * Subaccount B: read only
   
    * Subaccount C: read only
   
   Trend Micro Email Security currently supports the following identity
   providers for SSO:
   
   * Microsoft Active Directory Federation Services (AD FS)
   
   * Azure Active Directory (Azure AD)
   
   * Okta

 * Configuring Local Account Logon
   
 * Configuring Single Sign-On
   

Parent topic: End User Management
Keywords: Logon Methods




PARENT TOPIC

End User Management

The page you're looking for can't be found or is under maintenance
Try again later or go back to the previous page
Go back



TABLE OF CONTENTS

 * Privacy and Personal Data Collection Disclosure
    * Pre-release Disclaimer
    * Pre-release Sub-feature Disclaimer

 * Trend Micro Email Security Data Privacy, Security, and Compliance
 * About Trend Micro Email Security
    * What's New
    * Service Requirements
    * Features and Benefits
    * Available License Versions
    * Data Center Geography
    * Inbound Message Protection
       * Inbound Message Flow
   
    * Outbound Message Protection
    * Integration with Trend Micro Products
       * Apex Central
          * Registering to Apex Central
          * Checking Trend Micro Email Security Server Status
          * Unregistering from Apex Central
      
       * Trend Micro Remote Manager

 * Getting Started with Trend Micro Email Security
    * Accessing the Trend Micro Email Security Administrator Console
       * Resetting Local Account Passwords
   
    * Selecting a Serving Site for First Time Use
    * Provisioning a Trend Micro Business Account
       * Setting Up Trend Micro Email Security

 * Working with the Dashboard
    * Threats Tab
       * Ransomware Details Chart
       * Threats Chart
       * Threats Details Chart
       * Virtual Analyzer File Analysis Details Chart
       * Virtual Analyzer URL Analysis Details Chart
       * Virtual Analyzer Quota Usage Details
       * Domain-based Authentication Details Chart
       * Blocked Message Details
   
    * Top Statistics Tab
       * Top BEC Attacks Detected by Antispam Engine Chart
       * Top BEC Attacks Detected by Writing Style Analysis Chart
       * Top Targeted High Profile Users
       * Top Analyzed Advanced Threats (Files) Chart
       * Top Analyzed Advanced Threats (URLs) Chart
       * Top Malware Detected by Predictive Machine Learning Chart
       * Top Malware Detected by Pattern-based Scanning Chart
       * Top Spam Chart
       * Top Data Loss Prevention (DLP) Incidents Chart
   
    * Other Statistics Tab
       * Volume Chart
       * Bandwidth Chart
       * Time-of-Click Protection Chart

 * Managing Domains
    * Adding a Domain
    * Configuring a Domain
       * Adding SPF Records
       * Adding Office 365 Inbound Connectors
       * Adding Office 365 Outbound Connectors
   
    * Editing or Deleting Domains

 * Inbound and Outbound Protection
    * Managing Recipient Filter
    * Managing Sender Filter
       * Configuring Approved and Blocked Sender Lists
          * Adding Senders
          * Deleting Senders
          * Importing Senders
          * Exporting Senders
      
       * Sender Filter Settings
   
    * Transport Layer Security (TLS) Peers
       * Adding Domain TLS Peers
       * Editing Domain TLS Peers
   
    * Understanding IP Reputation
       * About Quick IP List
       * About Standard IP Reputation Settings
       * About Approved and Blocked IP Addresses
          * Managing Approved and Blocked IP Addresses
      
       * IP Reputation Order of Evaluation
       * Troubleshooting Issues
   
    * Managing Reverse DNS Validation
       * Configuring Reverse DNS Validation Settings
          * Adding Reverse DNS Validation Settings
          * Editing Reverse DNS Validation Settings
      
       * Configuring the Blocked PTR Domain List
          * Adding PTR Domains
          * Editing PTR Domains
   
    * Domain-based Authentication
       * Sender IP Match
          * Adding Sender IP Match Settings
          * Editing Sender IP Match Settings
      
       * Sender Policy Framework (SPF)
          * Adding SPF Settings
          * Editing SPF Settings
      
       * DomainKeys Identified Mail (DKIM)
          * Adding DKIM Verification Settings
          * Editing DKIM Verification Settings
          * Adding DKIM Signing Settings
          * Editing DKIM Signing Settings
      
       * Domain-based Message Authentication, Reporting & Conformance (DMARC)
          * Adding DMARC Settings
          * Editing DMARC Settings
      
       * How DMARC Works with SPF and DKIM
   
    * File Password Analysis
       * Configuring File Password Analysis
       * Adding User-Defined Passwords
       * Importing User-Defined Passwords
   
    * Configuring Scan Exceptions
       * Scan Exception List
       * Configuring "Scan Exceptions" Actions
   
    * High Profile Domains
       * Configuring High Profile Domains
   
    * High Profile Users
       * Configuring High Profile Users
   
    * Configuring Time-of-Click Protection Settings
    * Data Loss Prevention
       * Data Identifier Types
          * Expressions
             * Predefined Expressions
             * Customized Expressions
                * Criteria for Customized Expressions
                * Creating a Customized Expression
                * Importing Customized Expressions
         
          * Keywords
             * Predefined Keyword Lists
             * Customized Keyword Lists
                * Customized Keyword List Criteria
                * Creating a Keyword List
                * Importing a Keyword List
         
          * File Attributes
             * Predefined File Attributes List
             * Creating a File Attribute List
             * Importing a File Attribute List
      
       * DLP Compliance Templates
          * Predefined DLP Templates
          * Customized DLP Templates
             * Condition Statements and Logical Operators
             * Creating a Template
             * Importing Templates

 * Configuring Policies
    * Policy Rule Overview
       * Default Policy Rules
   
    * Managing Policy Rules
    * Reordering Policy Rules
    * Naming and Enabling a Rule
    * Specifying Recipients and Senders
       * Inbound Policy Rules
       * Outbound Policy Rules
   
    * About Rule Scanning Criteria
       * Configuring Virus Scan Criteria
          * About Advanced Threat Scan Engine
          * About Predictive Machine Learning
          * Files Types in File Categories
      
       * Configuring Spam Filtering Criteria
          * Configuring Spam Criteria
          * Configuring Business Email Compromise Criteria
          * Configuring Phishing Criteria
          * Configuring Graymail Criteria
          * Configuring Web Reputation Criteria
          * Configuring Social Engineering Attack Criteria
      
       * Configuring Data Loss Prevention Criteria
       * Configuring Content Filtering Criteria
          * Using Envelope Sender Is Blank Criteria
          * Using Message Header Sender Differs from Envelope Sender Criteria
          * Using Message Header Sender Differs from Header Reply-To Criteria
          * Using Attachment File Name or Extension Criteria
          * Using Attachment MIME Content Type Criteria
          * Using Attachment True File Type Criteria
          * Using Message Size Criteria
          * Using Subject Matches Criteria
          * Using Subject is Blank Criteria
          * Using Body Matches Criteria
          * Using Body Is Blank Criteria
          * Using Specified Header Matches Criteria
          * Using Attachment Content Matches Keyword Criteria
          * Using Attachment Size Criteria
          * Using Attachment Number Criteria
          * Using Attachment is Password Protected Criteria
          * Using Attachment Contains Active Content Criteria
          * Using the Number of Recipients Criteria
   
    * About Rule Actions
       * Specifying Rule Actions
       * "Intercept" Actions
          * Using the Delete Action
          * Using the Deliver Now Action
          * Using the Quarantine Action
          * Using the Change Recipient Action
      
       * "Modify" Actions
          * Cleaning Cleanable Malware
          * Deleting Matching Attachments
          * Sanitizing Attachments
          * Inserting an X-Header
          * Inserting a Stamp
             * Configuring Stamps
         
          * Tagging the Subject Line
          * Tokens
      
       * "Monitor" Actions
          * Using the Bcc Action
      
       * Encrypting Outbound Messages
          * Reading an Encrypted Email Message
      
       * About the Send Notification Action
          * Configuring Send Notification Actions
          * Duplicating or Copying Send Notification Actions
          * Removing Notifications from Rule Actions
          * Deleting Notifications from Lists of Messages

 * Understanding Quarantine
    * Querying the Quarantine
    * Configuring End User Quarantine Settings
    * Quarantine Digest Settings
       * Adding or Editing a Digest Rule
       * Adding or Editing a Digest Template

 * Logs in Trend Micro Email Security
    * Understanding Mail Tracking
       * Social Engineering Attack Log Details
       * Business Email Compromise Log Details
       * Antispam Engine Scan Details
   
    * Understanding Policy Events
       * Predictive Machine Learning Log Details
   
    * Understanding URL Click Tracking
    * Understanding Audit Log
    * Configuring Syslog Settings
       * Syslog Forwarding
       * Syslog Server Profiles
       * Content Mapping Between Log Output and CEF Syslog Type
          * CEF Detection Logs
          * CEF Audit Logs
          * CEF Mail Tracking Logs (Accepted Traffic)
          * CEF URL Click Tracking Logs
   
    * Querying Log Export

 * Reports
    * My Reports
    * Scheduled Reports

 * Configuring Administration Settings
    * Policy Objects
       * Managing Address Groups
       * Managing the URL Keyword Exception List
       * Managing the Web Reputation Approved List
       * Keyword Expressions
          * About Regular Expressions
             * Characters
             * Bracket Expression and Character Classes
             * Boundary Matches
             * Greedy Quantifiers
             * Logical Operators
             * Shorthand and meta-symbol
         
          * Using Keyword Expressions
          * Adding Keyword Expressions
          * Editing Keyword Expressions
      
       * Managing Notifications
       * Managing Stamps
   
    * Email Continuity
       * Adding an Email Continuity Record
       * Editing an Email Continuity Record
   
    * Administrator Management
       * Account Management
          * Accessible Features of the Local Accounts
          * Adding and Configuring a Subaccount
          * Adding and Configuring a Superadmin Account
          * Editing a Subaccount
          * Editing a Superadmin Account
          * Deleting Subaccounts or Superadmin Accounts
          * Changing the Password of a Subaccount or Superadmin Account
          * Enabling or Disabling a Subaccount or Superadmin Account
      
       * Logon Methods
          * Configuring Local Account Logon
             * Setting Up Two-Factor Authentication
         
          * Configuring Single Sign-On
             * Configuring Active Directory Federation Services
             * Configuring Azure Active Directory
             * Configuring Okta
   
    * End User Management
       * Local Accounts
       * Managed Accounts
          * Removing End User Managed Accounts
      
       * Logon Methods
          * Configuring Local Account Logon
          * Configuring Single Sign-On
             * Configuring Active Directory Federation Services
             * Configuring Azure Active Directory
             * Configuring Okta
   
    * Logon Access Control
       * Configuring Access Control Settings
       * Configuring Approved IP Addresses
   
    * Directory Management
       * Synchronizing User Directories
       * Importing User Directories
       * Exporting User Directories
       * Installing the Directory Synchronization Tool
   
    * Co-Branding
    * Service Integration
       * API Access
          * Obtaining an API Key
      
       * Log Retrieval
       * Apex Central
          * Configuring Suspicious Object Settings
      
       * Trend Vision One
          * Configuring Suspicious Object Settings
      
       * Remote Manager
       * Phishing Simulation
   
    * Email Reporting Add-in for Outlook
       * Deploying the Add-in in the Microsoft 365 Admin Center
       * Deploying the Add-in in the Exchange Admin Center
       * Updating the Add-in in the Microsoft 365 Admin Center
   
    * License Information
       * Activating Sandbox as a Service
   
    * Migrating Data from Hosted Email Security
       * Data That Will Be Migrated
       * Data That Will Not Be Migrated
       * Setting Up Trend Micro Email Security After Data Migration
   
    * Migrating Data from IMSS or IMSVA
       * Data That Will Be Migrated
       * Data That Will Not Be Migrated
       * Prerequisites for Data Migration
       * Migrating Data to Trend Micro Email Security
       * Verifying Data After Migration

 * FAQs and Instructions
    * About MX Records and Trend Micro Email Security
    * About MTA-STS Records for Inbound Protection
    * Feature Limits and Capability Restrictions
    * Viewing Your Service Level Agreement

 * Technical Support
    * Contacting Support
       * Using the Support Portal
       * Speeding Up the Support Call
   
    * Sending Suspicious Content to Trend Micro
       * Email Reputation Services
       * File Reputation Services
       * Web Reputation Services
   
    * Troubleshooting Resources
       * Threat Encyclopedia
       * Download Center
       * Documentation Feedback

Close
Online Help Center

--------------------------------------------------------------------------------

Support

For Home For Business

--------------------------------------------------------------------------------



--------------------------------------------------------------------------------

Privacy Notice
© 2023 Trend Micro Incorporated. All rights reserved.