Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Configuring policies in SecureCloud

    • Updated:
    • 10 Nov 2014
    • Product/Version:
    • SecureCloud as a Service 3.7
    • SecureCloud On-Premise 3.7
    • Platform:
    • N/A N/A
Summary
This article guides you on how to create, edit, and delete policies in SecureCloud.
Details
Public
SecureCloud automatically applies a default policy to all unallocated machines and devices that are in the inventory.
The default policy specifies that encryption key requests must be approved manually. However, administrators can create new rules for the default policy to change how the policy responds to encryption key requests.
Administrators are not allowed to delete the default policy or remove machines and devices from the default policy if no other policy exists.
Note: If administrators create a policy but do not define any rules, all encryption key requests for machines and devices assigned to that policy must be manually approved.
Creating policies:
  1. On the Policies screen, click Add Policy.
  2. Supply a descriptive policy Name. If desired, provide a Description of the policy.
  3. Define rules for encryption key requests.
  4. Define what action SecureCloud takes for encryption key requests based on the rule criteria.
    • If you select the action Manual approve, you have the option to automatically approve key requests after a specified period of time has passed.
    • If desired, select Enable Integrity Check. If you select this option, SecureCloud can perform on-demand or scheduled perform integrity checks.
  5. At this point in the policy creation process you have two options:
    • Click Finish to save the policy.
    • Click Next and assign the policy to machines currently assigned to the default policy.
Editing policies:
  1. On the Policies screen, click the hyperlinked policy name.
  2. On the Policy Information area, modify the policy name, description, policy rules, the key encryption request actions, or the machines assigned to the policy.
The option to enable integrity checking is on the Actions tab.
Deleting policies:
On the Policies screen, select the policy to delete and click Delete.
Premium
Internal
Rating:
Category:
Configure
Solution Id:
1097526
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.