Cloud Email and Collaboration Protection
Cloud Email and Collaboration Protection includes the following modules which, when enabled, will cause the corresponding data to be transmitted to Trend Micro. Each of these modules can be disabled as shown below.
Exchange Online Protection Enhancement with Microsoft 365 Activity Data
Data will be automatically deleted one month after the grace period of your license expires.
Data collected |
|
---|---|
Console Settings |
Enable: Disable:
|
Correlated Intelligence
Cloud Email and Collaboration Protection collects suspicious emails for backend services, which will gather the emails' metadata (with Personal Identifiable Information removed) for further analysis.
Data collected |
|
---|---|
Console Settings |
Enable:
Disable:
|
Gmail (Inline Mode) - Service Account Provisioning
Cloud Email and Collaboration Protection provisions a service account to obtain an access token to get user/group/domain information and add/update a group used for holding the Cloud Email and Collaboration Protection policy targets.
Data will be automatically deleted one month after the grace period of your license expires.
After data is deleted, Cloud Email and Collaboration Protection does not protect your service any more.
Data collected |
|
---|---|
Console Settings |
Provision: De-provision:
|
Gmail (Inline Mode) - Quarantine
Cloud Email and Collaboration Protection will quarantine email messages in its storage after inbound/outbound messages trigger quarantine actions.
These quarantined items will be kept for 30 days in Cloud Email and Collaboration Protection before they get automatically deleted.
After data is deleted, the administrator cannot restore or download the messages through Cloud Email and Collaboration Protection.
Data collected |
|
---|---|
Console Settings |
Enable:
De-provision:
|
Reports
Data will be automatically deleted one month after the grace period of your license expires.
Data collected |
|
---|---|
Console Settings | Reports: |
Quarantined email preview
Cloud Email and Collaboration Protection will store the previewed part of the quarantine email message body in its storage after the messages trigger quarantine actions.
The previewed part will be kept for 90 days in Cloud Email and Collaboration Protection before they get automatically deleted.
After data is deleted, the administrator cannot preview the quarantined messages through Cloud Email and Collaboration Protection.
Data collected |
|
---|---|
Console settings |
|
Cloud Email and Collaboration Protection Add-in - Manage Quarantine
Cloud Email and Collaboration Protection collects the listed information to enable end users to manage quarantined emails and add trusted senders.
Data collected |
|
---|---|
Console settings |
|
Cloud Email and Collaboration Protection Add-in - Report Email
Cloud Email and Collaboration Protection collects the listed information to enable end users to report emails.
Collected emails will be automatically deleted after 180 days.
Data collected |
|
---|---|
Console settings |
|
Virtual Analyzer for files
Virtual Analyzer is a cloud sandbox designed for analyzing suspicious files. Sandbox images allow observation of file behavior in an environment that simulates endpoints on your network without any risk of compromising the network.
Data collected |
|
---|---|
Console location | ATP policy > Virtual Analyzer |
Console settings |
|
Exchange Online (Inline Mode) Service Account Provisioning
Cloud Email and Collaboration Protection provisions a service account to obtain an access token to get inbound/outbound email messages through Exchange Online connectors and transport rules, and scan the messages before they arrive at the inboxes of protected users or are sent out by protected users.
Data will be automatically deleted one month after the grace period of your license expires.
After data is deleted, Cloud Email and Collaboration Protection does not protect your service any more.
Data collected |
|
---|---|
Console Settings |
Provision: De-provision:
|
Exchange Online (Inline Mode) Quarantine
Cloud Email and Collaboration Protection will quarantine email messages in its storage after inbound/outbound messages trigger quarantine actions.
These quarantined items will be kept for 30 days in Cloud Email and Collaboration Protection before they get automatically deleted.
After data is deleted, the administrator cannot restore or download the messages through Cloud Email and Collaboration Protection.
Data collected |
|
---|---|
Console Settings |
Enable:
Disable:
|
Teams Chat Service Account Provisioning
Cloud Email and Collaboration Protection provisions a service account to integrate with the Microsoft Teams Chat service and obtains an access token to scan contents and files sent in private chats with other users.
Data will be automatically deleted one month after the grace period of your license expires.
After data is deleted, Cloud Email and Collaboration Protection does not protect your service any more.
Data collected |
|
---|---|
Console Settings |
Internal User Risk Analytics
Cloud Email and Collaboration Protection provisions a service account to obtain an access token to get risk detection data from Microsoft Identity Protection. The data is aggregated by Cloud Email and Collaboration Protection to show in the Internal User Risk Analytics widgets.
Data will be automatically deleted one month after the grace period of your license expires.
After data is deleted, Cloud Email and Collaboration Protection doesn’t collect risk detections.
All collected risk detections will be deleted after 60 days.
Data collected |
|
---|---|
Console Settings |
Provision: De-provision:
|
Retro Scan & Auto Remediate in Web Reputation
Time-of-Click Protection in Web Reputation
Retro Scan & Auto Remediate in Advanced Spam Protection
Threat Investigation API
Cloud Email and Collaboration Protection collects metadata of email messages for the Threat Investigation API to sweep for required email information, for Retro Scan & Auto Remediate to detect unidentified risks or restore false positive emails, and for Time-of-Click Protection to obtain information about emails containing the clicked URLs.
Email metadata will not be collected if the authentication token is deleted from the Cloud Email and Collaboration Protection management console and Retro scan & Time-of-Click is disabled from enabled policies.
All collected metadata will be deleted after 90 days.
Data collected |
|
---|---|
Console Settings |
Enable:
Disable:
|
Microsoft Information Protection Service Account Provisioning
Cloud App Security provisions a service account to integrate with the Microsoft Information Protection service and obtains an access token to support the “add sensitivity label” and “remove sensitivity label” actions for detected documents in SharePoint/OneDrive/Teams.
Data will be automatically deleted one month after the grace period of your license expires.
After data is deleted, Cloud App Security does not support the sensitivity label related actions
Data collected |
|
---|---|
Console Settings |
Provision: De-provision:
|
Email and Collaboration Sensor App in Trend Vision One
Cloud Email and Collaboration Protection collects metadata of email messages, user profiles, mailboxes, and account activities for Trend Vision One to discover anomalies for Email and Collaboration Sensor customers.
Data collected |
If the admin grants permissions to collect user profiles, mailboxes, and account activities, the following data will also be collected:
|
---|---|
Console Settings |
|
SharePoint Online / OneDrive for Business Service Account Provisioning with Access Token
Cloud Email and Collaboration Protection provisions a service account to integrate with the Microsoft SharePoint Online and OneDrive for Business services respectively, and obtains an access token to access and protect users’ files stored in SharePoint Online /OneDrive for Business from threats.
Data collected |
|
---|---|
Console Settings |
Provision:
De-provision:
|
Microsoft Teams Service Account Provisioning
Cloud Email and Collaboration Protection provisions a service account to integrate with the Microsoft Teams service and obtains an access token to protect users’ files stored in teams from threats.
Data collected |
|
---|---|
Console Settings |
Provision:
De-provision:
|
Exchange Online Service Account Provisioning with Access Token
Cloud Email and Collaboration Protection provisions a service account to integrate with the Exchange Online service and obtains an access token to protect users’ email messages from threats.
Data collected |
|
---|---|
Console Settings |
Provision:
De-provision:
|
Gmail Service Account Provisioning
Cloud Email and Collaboration Protection provisions a service account to integrate with the Gmail service and obtains an access token to protect users’ email messages from threats.
Data collected |
|
---|---|
Console Settings |
Provision:
De-provision:
|
Writing style analysis for BEC
Cloud Email and Collaboration Protection collects email messages sent by high profile users to train their writing style models if writing style analysis is enabled. All email content is irreversibly hashed.
Email messages will not be collected for continuous model training if writing style analysis is disabled.
Data will be automatically deleted one month after the grace period of your license expires.
Data collected |
|
---|---|
Console Settings |
O365 (Exchange Online, SharePoint Online, OneDrive for Business) Service Account Provisioning
Cloud Email and Collaboration Protection provisions service accounts to integrate with Microsoft Office 365 services, and accesses Office 365 data with the service accounts to protect users’ email messages and files from network threats.
Data collected |
|
---|---|
Console Settings |
Provision: De-provision:
|
Cloud storage service (Box, Dropbox, Google Drive) Service Account Provisioning
Cloud Email and Collaboration Protection provisions service accounts to integrate with cloud storage services and obtains access tokens to protect users’ files from network threats.
Data collected |
|
---|---|
Console settings |
Provision:
De-provision:
|
Logs
Logs cannot be disabled unless you choose to NOT use Cloud Email and Collaboration Protection.
After data is deleted, administrators cannot retrieve history data of user events and policy violations from Cloud Email and Collaboration Protection.
Data collected |
|
---|---|
Console settings |
Cloud App Security automatically deletes logs older than 180 days. |
Quarantine
Quarantine logs cannot be disabled unless you do not set Action to Quarantine in any Advanced Threat Protection or Data Loss Prevention policy or you do not enable Virtual Analyzer in any Advanced Threat Protection policy.
Data will be automatically deleted one month after the grace period of your license expires.
After data is deleted, administrators cannot retrieve history data of user events and policy violations from Cloud Email and Collaboration Protection.
Data collected |
|
---|---|
Console settings |
For Quarantine logs, Cloud App Security provides an option for administrators to choose to automatically delete them older than 30, 60, or 90 days. |
Predictive Machine Learning
Trend Micro Predictive Machine Learning uses advanced machine learning technology to correlate threat information and perform in-depth file analysis to detect emerging unknown security risks through digital DNA fingerprinting, API mapping, and other file features.
Predictive Machine Learning | |
---|---|
Data collected |
|
Console location | ATP policy > Malware Scanning > Rules |
Console settings |
Malware Scanning Feedback
Malware Scanning Feedback enables you to participate, share and leverage Trend Micro’s global database of threat related intelligence to rapidly identify and defend against potential threats within your unique network environment.
Malware Scanning Feedback | |
---|---|
Data collected |
|
Console location | ATP policy > Malware Scanning > Rules > Predictive Machine Learning |
Console settings |
|
Advanced Spam Protection
Cloud Email and Collaboration Protection uses Trend Micro Antispam Engine to provide advanced spam protection, as a complement to the email protection service on your email gateway side, to further protect Exchange Online users from BEC, ransomware, advanced phishing, and other high-profile attacks.
Advanced Spam Protection | |
---|---|
Data collected |
|
Console location | ATP policy > Advanced Spam Protection |
Console settings |
|
Advanced Spam Protection Feedback
Advanced Spam Protection feedback enables you to participate, share and leverage Trend Micro’s global database of threat related intelligence to rapidly identify and defend against potential threats within your unique network environment.
Advanced Spam Protection Feedback | |
---|---|
Data collected |
|
Console location | ATP policy > Advanced Spam Protection |
Console settings |
|
Web Reputation
Cloud Email and Collaboration Protection leverages Trend Micro Web Reputation Services to scan URLs contained in files, email bodies and attachments to detect malicious URLs based on their reputation scores.
Data collected |
|
---|---|
Console location | ATP policy > Web Reputation |
Console settings |
|
Data center location for CAS & XDR Data Lake
Country of Purchase | Data Center Location |
---|---|
USA | West US, California |
EU (Europe) | West Europe, Netherlands |
Japan | Japan East, Tokyo |
Singapore | Southeast Asia, Singapore |
Australia and New Zealand | Australia Central, Canberra |
UK (United Kingdom) | UK South, London |
Canada | Canada Central, Toronto |
India | Central India, Pune |
Middle East (UAE) | Dubai / UAE North |
Cloud Email Gateway Protection
Cloud Email Gateway Protection includes the following modules which may cause the corresponding personal data to be transmitted to Trend Micro. Detailed information and instruction are provided below for opt-out of the personal data collection by disabling specific modules. Modules that cannot be disabled are indicated below.
Domains
Upon registration of a domain in Cloud Email Gateway Protection for protection, the administrator must specify the domain name and the incoming mail server IP address or FQDN responsible for the domain.
Data collected |
|
---|---|
Console location | Domains |
Predictive Machine Learning
Trend Micro Predictive Machine Learning uses advanced machine learning technology to correlate threat information and perform in-depth file analysis to detect emerging unknown security risks through digital fingerprinting, API mapping, and other file features.
Data collected |
|
---|---|
Console location | Inbound Protection > Virus Scan> Virus Policy> Policy Name > Scanning Criteria
|
Predictive Machine Learning Feedback
Predictive Machine Learning feedback enables you to participate, share and leverage Trend Micro’s global database of threat related intelligence to rapidly identify and defend against potential threats within your unique network environment.
Data collected |
|
---|---|
Console location | Inbound Protection > Virus Scan > Virus Policy > Policy Name > Scanning Criteria
|
Virtual Analyzer
Virtual Analyzer is a cloud sandbox designed for analyzing suspicious applications, files, URLs and scripts. Sandbox images allow observation of applications, files, URLs and scripts in an environment that simulates endpoints on your network without any risk of compromising the network.
Data collected |
|
---|---|
Console location | Inbound Protection > Virus Scan> Virus Policy > Policy Name > Scanning Criteria
Inbound Protection > Spam Filtering > Spam Policy > Policy Name > Scanning Criteria
|
Spam Filtering
Cloud Email Gateway Protection uses Trend Micro Antispam Engine to provide advanced spam protection and protect users from spam.
Data collected |
|
---|---|
Console location | Inbound Protection > Spam Filtering > Spam Policy > Policy Name > Scanning Criteria
|
Business Email Compromise (BEC)
Cloud Email Gateway Protection uses Trend Micro Antispam Engine to protect users from BEC attacks.
Data collected |
|
---|---|
Console location | Inbound Protection > Spam Filtering > Spam Policy > Policy Name > Scanning Criteria
|
Phishing
Cloud Email Gateway Protection uses Trend Micro Antispam Engine to protect users from advanced phishing.
Data collected |
|
---|---|
Console location | Inbound Protection > Spam Filtering > Spam Policy > Policy Name > Scanning Criteria
|
Graymail
Cloud Email Gateway Protection uses Trend Micro Antispam Engine to protect users from graymail.
Data collected |
|
---|---|
Console location | Inbound Protection > Spam Filtering > Spam Policy > Policy Name > Scanning Criteria
|
Social engineering attack
Cloud Email Gateway Protection uses Trend Micro Antispam Engine to protect users from social engineering attacks.
Data collected |
|
---|---|
Console location | Inbound Protection > Spam Filtering > Spam Policy > Policy Name > Scanning Criteria
|
Unusual signal
Cloud Email Gateway Protection uses Trend Micro Antispam Engine to protect users from mails with unusual signals.
Data collected |
|
---|---|
Console location | Inbound Protection > Spam Filtering > Spam Policy > Policy Name > Scanning Criteria
|
High Profile Users
Cloud Email Gateway Protection allows administrators to add high profile users that may be frequently forged or spoofed, either by manually adding single users or by synchronizing groups from directories.
Data collected |
|
---|---|
Console location | Inbound Protection > Spam Filtering > Business Email Compromise (BEC)
|
Web Reputation
Cloud Email Gateway Protection leverages Trend Micro Web Reputation Services to scan URLs contained in email subject, body and attachments to detect malicious URLs based on their reputation scores.
Data collected |
|
---|---|
Console location | Inbound Protection > Spam Filtering > Spam Policy > Policy Name > Scanning Criteria
|
Time-of-Click Protection
Cloud Email Gateway Protection leverages Trend Micro’s Time-of-Click Protection service to provide the ability to rewrite URLs in the email message body during scanning, and analyze the URLs at the time when the message recipient clicks on these URLs.
Data collected |
|
---|---|
Console location | Inbound Protection > Spam Filtering > Spam Policy > Policy Name > Scanning Criteria > Web Reputation>
|
Correlated Intelligence Policy
Cloud Email Gateway Protection detects security risks and identify anomalies by correlating signals across different sources. Designed to empower you with enhanced detection capabilities against sophisticated attacks, Correlated Intelligence correlates suspicious signals from various sources to detect phishing security risks and anomalies.
Cloud Email Gateway Protection collects suspicious emails for backend services, which will gather the emails' metadata (with Personal Identifiable Information removed) for further analysis.
Data collected |
|
---|---|
Console location | Inbound Protection > Correlated Intelligence > Correlated Intelligence Policy > Policy Name > Scanning Criteria
|
IP Reputation
Cloud Email Gateway Protection leverages Trend Micro Email Reputation Services to verify IP addresses of incoming email messages using one of the world's largest, most trusted reputation database, along with a dynamic reputation database to identify new spam and phishing sources, stopping even zombies and botnets as they first emerge.
Data collected |
|
---|---|
Console location | Inbound Protection > Connection Filtering > IP Reputation > Settings |
Directory Synchronization
Cloud Email Gateway Protection provides a synchronization tool that enables you to synchronize email aliases, groups and email accounts from Open LDAP, Microsoft Active Directory, Microsoft AD Global Catalog, Microsoft Office 365/Azure Active Directory and IBM Domino servers to the Cloud Email Gateway Protection server.
The mentioned data will be purged after the administrator account is deprovisioned.
Data collected |
|
---|---|
Console location | Administration > Directory Management > Directory Synchronize |
Directory Import
Directory Import allows administrators to import a list of valid recipients’ email addresses and display names from a CSV file.
The mentioned data will be purged after the administrator account is deprovisioned.
Data collected |
|
---|---|
Console location | Administration > Directory Management > Directory Import |
Logs
Audit logs are kept for 12 months, but the administrator can query audit logs of up to 30 days. The number of days kept is not configurable.
After scheduled log deletion, all log data will be purged and cannot be retrieved.
Data collected |
|
---|---|
Console location | Logs |
Syslog
Cloud Email Gateway Protection allows you to forward syslog messages to an external syslog server in a structured format, which allows third-party application integration.
The mentioned data will be purged after the syslog server profiles are deleted or the administrator account is deprovisioned.
Data collected |
|
---|---|
Console location | Logs > Syslog Settings > Syslog Server Profiles |
Quarantine
Email Continuity
Cloud Email Gateway Protection provides protection against email loss if your email server goes down. If your server becomes unavailable due to a crash or network connectivity problem, Cloud Email Gateway Protection automatically transfers inbound traffic to a backup server until your server is back online.
The mentioned data will be purged after the administrator account is deprovisioned.
Data collected |
|
---|---|
Console location | Administration > Email Continuity |
Single Sign-On
If SSO is enabled and required settings are completed in End User Management, Cloud Email Gateway Protection allows end users to access the administrator console with their existing identity provider credentials.
Data collected |
|
---|---|
Console location | Administration > End User Management > Logon Methods Single Sign-On: |
Address Group
Cloud Email Gateway Protection allows administrator to configure email addresses in an address group.
And the groups can be configured in policy’s Recipients and Senders.
The mentioned data will be purged after the administrator account is deprovisioned.
Logon Access Control
Cloud Email Gateway Protection allows administrators to configure the clients that are allowed to access the End User Console and resources within Cloud Email Gateway Protection by specifying a list of approved IP addresses. Administrators can also optionally specify the email addresses to receive alerts on blocked or logged access.
The mentioned data will be purged after the administrator account is deprovisioned.
Email Reporting Add-in for Outlook
The Email Reporting Add-in for Outlook provides an easy way for your users to report false positives and false negatives to Cloud Email Gateway Protection, which uses the reported data to improve threat detection for your Exchange email service.
Reporting an email also sends a copy of the email to Trend Micro. However, this action does not move or delete the email.
Data collected |
|
---|---|
Console location | Administration > Email Reporting Add-in for Outlook |
Email Recovery
Cloud Email Gateway Protection provides Email Recovery to retain emails that were deleted due to policy rule matches. This allows for restoration of emails that were mistakenly deleted before they are permanently purged and become unrecoverable.
When enabled, Cloud Email Gateway Protection retains deleted emails for 14 days and manages the recovery process.
Data collected |
|
---|---|
Console location | Administration > Email Recovery |
Managed XDR
Cloud Email Gateway Protection collects metadata of emails for the accounts with Email Sensor enabled. This allows the intelligent investigation API to discover security risks for Trend Vision One XDR and Managed XDR customers.
All collected metadata logs will be removed after 180 days.
Data collected | Email metadata collected by Email Sensor, including:
|
---|---|
Console location | Email and Collaboration Sensor > Other Email Services |