Views:

Risk assessment for User Accounts

In the Risk Overview section of the Executive Dashboard app, click the Accounts tab to view the risk status of your accounts.

Accounts tab

In the Exposure Overview section, click the System Configuration tab to discover which accounts use weak authentication protocols or increase your overall attack surface risk.

System Configuration_A

System Configuration_B

System Configuration_C

System Configuration_D

Click the Activity and Behaviors tab to monitor possible account compromise events and legacy authentication protocol log on activity.

Activity and Behaviors_A

Activity and Behaviors_B

Activity and Behaviors_C

Activity and Behaviors_D

In the Attack Overview section, account-related attack activity has been incorporated into your Attack Index. View how cyber threats affected your users and benefit from extended attack phase designations.

Attack Overview

Attack Surface Discovery User Account Support

Click the User Accounts tab to view and manage your organization’s domain and service accounts.

User Accounts

Enhanced Security Configuration

In the Security Configuration section, view the Apex One (Mac) deployment and key feature adoption rate support.

Security Configuration

For support assistance, please contact Trend Micro Technical Support.