Views:

Learn how Trend Vision One™ ingests AWS VPC Flow Logs to detect threats and attacks, provide response actions, and generate a visual representation of the logs.

When connecting or updating an AWS account in Cloud Accounts, you can enable the Cloud Detections for AWS VPC Flow Logs feature to gain insight into your VPC traffic, with detection models to identify and provide alerts on malicious IP traffic, SSH brute force attacks, data exfiltration, and more. Trend Vision One™ ingests AWS VPC Flow Logs and analyzes them for suspicious or malicious traffic activity. You can view the results in the following Trend Vision One™ apps:
  • Agentic SIEM & XDRWorkbench: The Workbench app provides insight into high-priority correlated alerts, which you can investigate to understand the scope of the issue, get a list of highlighted events, and view and act upon each alert.
    Tip
    Tip
    To view a list of Workbench insights for AWS VPC Flow Logs, use the Data source/processor filter to display all Cloud Detections for AWS VPC Flow Logs insights.
    For more information, see Workbench.
  • Agentic SIEM & XDRObserved Attack Techniques: View AWS VPC Flow Log events detected in your AWS environment and drill down into an event to view details.
    Tip
    Tip
    To view a list of events generated by AWS VPC Flow Logs, use the Data source/processor filter to display all Cloud Detections for AWS VPC Flow Logs events.
    For more information, see Observed Attack Techniques.
  • Agentic SIEM & XDRXDR Data Explorer: Use search queries to view AWS VPC Flow Logs.

Getting started

To set up Cloud Detections for AWS VPC Flow Logs:
Tip
Tip
At any time you can review your Cloud Detections for AWS VPC Flow Logs credit usage by clicking Manage usage in Cloud SecurityCloud AccountsAWS. This shows your credit usage for the current month, data ingestion volume, and the latest drawdown calculation date. For more details on credit usage, go to TrendAI™ Flex LicensingPlatform Usage and Credits and view the Usage management tab.