Views:

Connect the data sources required to enable general and advanced search methods.

Search includes both general and advanced search methods. The following table outlines the data sources required to enable each search method.
Search Method
Data Sources
All connected data sources
Observed Attack Techniques
All connected data sources
Note
Note
This search method is used when automatically creating a query from configured filters in the Observed Attack Techniques app.
For more information, see Observed Attack Techniques.
Trend Cloud One - Conformity
To connect this data source, see:
Trend Cloud One - Endpoint & Workload Security
Advanced: Container Activity Data
Trend Vision One Container Security
To connect this data source, see Getting started with Cloud Network Telemetry.
Advanced: Detections
All connected data sources
Trend Vision One Email Sensor
To connect this data source, see Email Asset Inventory.
Trend Vision One Endpoint Sensor
To connect this data source, see Getting started with Endpoint Inventory 2.0.
Trend Micro Apex One as a Service
To connect this data source, see Connecting Trend Micro Apex One as a Service.
Trend Cloud One - Endpoint & Workload Security
Microsoft Entra ID
To connect this data source, see Microsoft Entra ID integration.
Trend Micro Mobile Security as a Service
To connect this data source, see Getting Started with Mobile Security.
Virtual Network Sensor
To connect this data source, see Virtual Network Sensor deployment guides.
Trend Micro Deep Discovery Inspector
To connect this data source, see Deep Discovery Inspector deployment guides.
Zero Trust Secure Access - Private Access
To connect this data source, see Getting started with Zero Trust Secure Access.
Zero Trust Secure Access - Internet Access
To connect this data source, see Getting started with Zero Trust Secure Access.
Zero Trust Secure Access - Private Access
To connect this data source, see Getting started with Zero Trust Secure Access.
Zero Trust Secure Access - Internet Access
To connect this data source, see Getting started with Zero Trust Secure Access.
Trend Micro Web Security
To connect this data source, connect Trend Micro Web Security using Product Connector. For more information, see Connecting a product.