You’re offline. This is a read only version of the page.
Online Help Center
Search
Support
For Home
For Business
English (US)
Bahasa Indonesia (Indonesian)
Dansk (Danish)
Deutsch (German)
English (Australia)
English (US)
Español (Spanish)
Français (French)
Français Canadien
(Canadian French)
Italiano (Italian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português - Brasil
(Portuguese - Brazil)
Português - Portugal
(Portuguese - Portugal)
Svenska (Swedish)
ภาษาไทย (Thai)
Tiếng Việt (Vietnamese)
Türkçe (Turkish)
Čeština (Czech)
Ελληνικά (Greek)
Български (Bulgarian)
Русский (Russian)
עברית (Hebrew)
اللغة العربية (Arabic)
日本語 (Japanese)
简体中文
(Simplified Chinese)
繁體中文
(Traditional Chinese)
繁體中文 HK
(Traditional Chinese)
한국어 (Korean)
Cancel
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More
Yes, I agree
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
Privacy and Personal Data Collection Disclosure
Getting started with Cloud App Security APIs
Using Cloud App Security APIs
Generating an authentication token
Understanding the URL structure
Understanding the request header
Supported Cloud App Security APIs
Log retrieval API
Get security logs
Content mapping between log output and CEF syslog type
Get Virtual Analyzer report
Get quarantine events
Download quarantined emails
Installing the Trend Micro Cloud App Security Splunk add-on
Splunk dashboard configuration content
Threat investigation API
Sweep for email messages
Threat mitigation APIs
Take actions on user accounts
Assigning the user account administrator role
Take actions on email messages
Query action results
Threat remediation APIs
Update blocked lists
Get blocked lists
API responses
API result codes
Cloud App Security API usage examples
Using the log retrieval API sample script for Windows powershell
Threat mitigation APIs
Related information
Take actions on user accounts
Take actions on email messages
Query action results
Table of Contents
Privacy and Personal Data Collection Disclosure
Getting started with Cloud App Security APIs
Using Cloud App Security APIs
Generating an authentication token
Understanding the URL structure
Understanding the request header
Supported Cloud App Security APIs
Log retrieval API
Get security logs
Content mapping between log output and CEF syslog type
Get Virtual Analyzer report
Get quarantine events
Download quarantined emails
Installing the Trend Micro Cloud App Security Splunk add-on
Splunk dashboard configuration content
Threat investigation API
Sweep for email messages
Threat mitigation APIs
Take actions on user accounts
Assigning the user account administrator role
Take actions on email messages
Query action results
Threat remediation APIs
Update blocked lists
Get blocked lists
API responses
API result codes
Cloud App Security API usage examples
Using the log retrieval API sample script for Windows powershell