![]() This can mean that some rules are assigned to computers on which they are not required however, the minimal effect on performance is outweighed by the ease of management that results from using policies. This way, you can make all your rule assignments from a single source (the policy) rather than having to manage individual rules on individual computers. ![]() For large deployments, Trend Micro recommends managing recommendations through policies. You can configure recommendation scans and implement the recommended rules for individual computers or at the policy level. See Implement additional rules for common vulnerabilities. You should implement those rules manually. Recommendation scans provide a good starting point for establishing a list of rules that you should implement, but there are some important additional rules that are not identified by recommendation scans. Workload Security can run recommendation scans on computers to help identify intrusion prevention, integrity monitoring, and log inspection rules that should be applied or removed.
0 Comments
Leave a Reply. |