Device Details in Security Configuration
- To view the list of devices without security agents installed, go to:
Executive Dashboard > Security Configuration > Endpoint Security > Endpoint Protection
Click the image to enlarge.
Click the number next to "No Security Agent protection", this will open a new tab with the Attack Surface Discovery app, where you can find the Device List, and you can drill down to view further details about each device.
Click the image to enlarge.
- To view details about devices without enabled key features, go to:
Executive Dashboard > Security Configuration > Endpoint Security > Key Feature Adoption Rates
Look for any features that are not displaying 100%, and then click the number next to "Not Enabled".
Click the image to enlarge.
Clicking the number opens a tip with a link to the Report Management app, which will display a preconfigured report template. You can generate reports and send these reports to your Endpoint administrator to help them identify any policy misconfigurations.
Click the image to enlarge.
Exceptions in Accounts with Weak Authentication Widget
When Risk Insights has been connected to your Azure Activity Directory or Active Directory on-premises, Trend Micro Vision One will look for compliance with Microsoft best practices. Sometimes customer is unable or simply chooses not to follow authentication best practices, in which case you can now add issues to the exception list to exclude related risk event data from Risk Insights apps and from the calculation of your company's risk index.
To add exceptions, go to:
Executive Dashboard > Exposure Overview > System Configuration > Accounts with Weak Authentication
Click View details and then click Exceptions.
Click the image to enlarge.
Then click Add.
Click the image to enlarge.
If you have any feedback about these new features, please reach out to your account team who will ensure your feedback is sent to the product team.
For support assistance, please contact Trend Micro Technical Support.