Editing a customer or partner account in Licensing Management Platform (LMP)
This article shows you how to edit a customer or partner account in Licensing Management Platform (LMP).
Operating System Policy of Trend Micro
Know the support terms for applications and operating systems running Trend Micro products that are no longer supported by their vendor/supplier.
Logging in to the console of Cloud App Security (TMCAS)
This article shows you how to access Cloud App Security (TMCAS).
Ransomware: Solutions, Best Practice Configuration and Prevention using Trend Micro products
Trend Micro has seen a dramatic rise of ransomware-related issues, especially the sophisticated Crypto-Ransomware. The issue concerns both home and commercial users. Like many other cyber threats, ransomware has become more complex and advanced over time. Thus, the prevention and protection become more challenging.Ransomware can enter an organization through many vectors, such as email spam, phishing attacks, or malicious web downloads. For highest level of protection, organizations are encouraged to deploy multiple layers of protection on endpoint, gateway, and mail servers.The image below shows a typical ransomware infection chain. For more details about infection chain, refer to this article: Mitigating the TROJ_CRYPWALL (also known as Cryptowall) v3 using Trend Micro products.This article discusses Trend Micro's recommended configuration on various products and important software updates to better protect against and combat ransomware.Consumer (Home) customers may visit the following site: Consumer (Home) Customers' Guide on Ransomware: Introduction, Prevention and Trend Micro Security Solutions.
Trend Micro Global Technical Support Guide for Business Customers
Download the introductory guide to Trend Micro Global Technical Support for Business Customers.
Compilation of Best Practices while using Trend Micro products for Business
To ensure optimum protection while using Trend Micro products,our experts have compiled easy-to-follow guides on recommended product configuration that users and administrators should follow. This article contains a list of the most recent Best Practice Guides for Trend Micro's major products.
Trend Micro Cloud App Security SIEM API Solution
Cloud App Security provides access to certain product service data through Cloud App Security Representational State Transfer (REST) Integration APIs allowing customers to integrate third-party applications and systems. Using these APIs may potentially expose sensitive information. Therefore, to ensure that only trusted applications can use the APIs, generate an authentication token that the trusted applications send with API requests. Cloud App Security verifies the validity of all API requests from third-party applications and systems using the token information and sends the requested data to them. In this release, Cloud App Security supports only the SIEM API.
SECURITY ALERT: Trend Micro Customer Licensing Portal (CLP) Phishing Attempt
Trend Micro is aware of an email phishing attack that appears to be designed to try and gain access to customers' Trend Micro product login credentials by directing customers to a website mimicking an official Trend Micro Customer Licensing Portal (CLP) login page. As a reminder, please verify all e-mail senders and validate any given URL first before clicking and entering your credentials.
New features of Trend Micro Security Assessment Service
The release of Trend Micro Security Assessment Service was announced on February 2020. This article provides a list of new product features available.
Testing Trend Micro Cloud App Security (CAS) for Microsoft OneDrive
Learn how to evaluate the following modules of Cloud App Security for Microsoft OneDrive:Malware ScanningFile BlockingWeb ReputationVirtual AnalyzerData Loss Prevention