We've created this guide to help you get familiar with the most basic functions in
Trend Micro Cloud One™ – Conformity so you can jump-start your journey with us without
any delay.
Once you complete your sign-up, your Organization is already set up for you to start
using Conformity. Please go through the checklist and follow the steps on the linked
help pages.
Contents
Review Organization Details
Review your Organization details like address, contact
email, and name.
Add Cloud Accounts
When you first Sign-in to Conformity, ensure that you have added all the cloud accounts to Conformity
to be able to monitor them and stay on top of your security
posture.
- Add an AWS Account
- Add an Azure Account
- Add a GCP Account
- Group similar accounts (e.g. prod and non-prod)
Get familiar with the Dashboard
Once you have added your cloud accounts to Conformity, you can
navigate your cloud accounts, and access
Administration settings and Profile settings
from the main dashboard.
![]() |
NoteOrganization settings access is dependent on your user role.
|
Enable Real-time Threat monitoring
Set up Real-time monitoring.
Create a Profile
Procedure
- Create a Profile, (e.g. prod and non-prod) and
- Apply the Profile to your cloud accounts.
Configure Rules
Procedure
Set up Communication Channels and configure notifications
Set up communications channels (email etc) for
highest severity alerts. Please remember to click 'copy to
all' to copy these communication settings to other
accounts.
Configure Scheduled Reports
Setup monthly scheduled reports for all security
alerts.
Assess your current Cloud Security
Once you have your initial scan results from the first Conformity
Bot run, you will need to resolve failures by prioritizing
and creating a remediation plan. Read our user scenario for
more info and follow the steps on Assessing your cloud accounts for the first
time.
Invite users
You can invite more users via the UI and also by setting up SSO within Conformity and invite
more people to use it, for example, your DevOps, Compliance,
and Security team members.