Recommendation Scans analyze system roles and applications to suggest appropriate Firewall, Intrusion Prevention, and Integrity Monitoring rules, but do not provide recommendations for Log Inspection. Log Inspection rules must be assigned manually.
[Reference:, Trend Micro Deep Security Administrator’s Guide, Recommendation Scan Section, ]
Submit