Table of contents
Topics on this page

Configure Cloud One - Endpoint Security

Trend Micro Cloud OneTM - Endpoint Security is optimized for maximum protection on endpoints and provides items such as device control and desktop intrusion prevention rules.

If you haven't registered for a Trend Micro Cloud One account yet, you can sign up for a free 30 day trial account. Once your account is registered, you will need to:

  1. Log into the Trend Micro Cloud One.

  2. Select the Endpoint & Workload Security tile.

  3. Create a policy to protect your computers.

    Do not select or configure any modules from under WORKLOAD REQUIRED as they require a workload license. If you select one, you will incur the higher costs associated with the Workload Security license.

  4. Assign the Intrusion Prevention rules:

    1. Select Intrusion Prevention.

      1. Select Assign/Unassign.
      2. From the Rule Selection drop-down, select Select all Core Endpoint & Workload Rules, and then click OK.

        If any Workload Rules are assigned during this process, the ‘Intrusion Prevention License Type’ tool tip will display the ‘Workload’ tag, denoting that it will require the use of a Workload license.

        To ensure that only Intrusion Prevention rules available with Endpoint Security have been selected, check that the tool tip reads ‘Intrusion Prevention License Type: Endpoint’.

    2. Switch Implement core Endpoint & Workload rules automatically to 'Yes‘.

      Workload Security will assign all core Endpoint & Workload Rules to this computer whenever Rule Updates happens.
      Manually unassigned core Endpoint & Workload Rules will remain unassigned by Workload Security after Rule Updates.

    3. Click Save.
  5. Ensure that Container Protection is not enabled:

    1. Select Settings.
    2. Open the Container Protection tab.
    3. Ensure the all drop-downs are No and select Save.
  6. Deploy agents to your computers.

    We recommend that you use deployment scripts to add and protect computers as it allows you to easily install and activate the agent, and assign a policy. However, you can also manually install the agent. If you decide to manually install the agent, you will also need to activate the agent and assign a policy to a computer manually.