| Cloud App Security | 
Events: Displays system and threat
                                    events
Users: Allows you to create or delete Cloud
                                    App Security users, and reset users' passwords | 
| Cloud Edge | 
For service plans:
                                 
Events: Displays a summary of events
                                          from all Cloud Edge devices in the service plan
Firmware Updates: Displays the current
                                          firmware version of each device and the latest available version; provides
                                          the option to manually update firmware
Devices: Displays the name and serial
                                          number of each registered deviceFor registered devices:
                                 
Events: Displays system and threat
                                          events
Components: Displays the current version
                                          of each component, the latest available version, and the date of the last
                                          update
Network: Displays the user name, remote
                                          IP address, and MAC address of endpoints that connected to the network
                                          through the Cloud Edge device
VPN: Displays the user name, remote IP
                                          address, and virtual IP address of endpoints that connected to the network
                                          through a Virtual Private Network and the Cloud Edge device 
|  | Note
To make more detailed changes, access the Cloud Edge console.  |  | 
| Hosted Email Security  | 
Live Status: Displays the latest Hosted
                                    Email Security information.
Policies: Lists all the available
                                    policies.
Approved Senders: Email messages from
                                    senders added to this list are not subject to IP reputation-based, spam,
                                    phishing, BEC attack, social engineering attack, Web reputation, or graymail
                                    message filtering. Hosted Email Security still performs malware and attachment
                                    scanning on all messages received and takes the action configured in policy
                                    rules after detecting a malware threat or an attachment policy violation.
Blocked Senders: Lists all the addresses or
                                    domains that will blocked from sending messages. 
|  | Note
To make more detailed changes, access the Hosted Email Security
                                             console.  |  | 
| Trend Micro Email Security  | 
Live Status: Displays the latest Trend Micro
                                    Email Security information.
Policies: Lists all the available
                                    policies.
Approved Senders: Email messages from
                                    senders added to this list are not subject to IP reputation-based, spam,
                                    phishing, BEC attack, social engineering attack, Web reputation, or graymail
                                    message filtering. Trend Micro Email Security still performs malware and
                                    attachment scanning on all messages received and takes the action configured in
                                    policy rules after detecting a malware threat or an attachment policy
                                    violation.
Blocked Senders: Lists all the addresses or
                                    domains that will blocked from sending messages. 
|  | Note
To make more detailed changes, access the Trend Micro Email Security
                                             console. |  | 
| Trend Micro Web Security | Displays the latest Trend Micro Web Security threat and system
                              information. 
|  | Note
To make more detailed changes, access the Trend Micro Web Security
                                             console.  |  | 
| Worry-Free Business Security | 
Events: Lists system and threat events that
                                    may or may not need an action.
Groups: Lists the different groups
                                    configured on the server. You can request to start or stop a scan from here.
Domain Settings: Configure settings for the
                                    entire domain.  Refer to the Trend Micro Worry-Free Business Security
                                    documentation for detailed information:
Managed Server: Displays all the details of
                                    the server. You can request to update the server and update agents from
                                    here.
TMRM Agent: Contains general information
                                    about the Trend Micro Remote
                                       Manager agent
                                    including the availability, the Globally Unique Identifier (GUID) or
                                    Authorization Key, and the IP address.
Devices: Lists the name, IP Address,
                                    online/offline status, and details of the scan engine, pattern file, and the
                                    platform. 
|  | Note
You can see Devices and
                                                   Security Settings once you expand the product and
                                                   click Servers or Desktops. | 
Security Settings: Configure the security
                                    settings of a particular group (applicable only for Worry-Free Business Security
                                    6.0 and above). Refer to the Trend Micro Worry-Free Business Security  documentation
                                    for detailed information. | 
| Worry-Free Business Security Services | 
Events: Lists system and threat events that
                                    may or may not need an action.
Groups: Lists the configured groups and the
                                    types.
Devices: Lists the name, IP Address,
                                    online/offline status, and details of the scan engine, pattern file, and the
                                    platform. 
|  | Note
You can see Devices and
                                                   Security Settings once you expand the product and
                                                   click Servers or Desktops. | 
Security Settings: Configure the security
                                    settings of Worry-Free Business Security Services. Refer to the Trend Micro
                                    Worry-Free Business Security Services documentation for detailed
                                    information: 
|  | Note
To make more detailed changes, access the Worry-Free Business
                                             Security Services console. |  |