Asset relationship visualizations emphasize risk management
February 26, 2024 — In line with enhancements to the visualization of asset relationships
in
Attack Surface
Discovery, the asset graph feature
in profile screens for devices, accounts, domains, and IP addresses has been renamed to Asset Risk Graph, while the graph view for cloud
assets is now the Cloud Risk Graph. Both of these features continue to provide valuable risk findings,
helping you assess your organization's security posture.
Zero Trust Secure Access enables additional authentication to Private Access
February 26, 2024 — Users may now require additional authentication to Private Access
after
authenticating on endpoints with the Secure Access Module. Enabling the new feature
overrides
the default behavior of authenticating users to Internet Access and Private access
at the same
time, allowing for the use of Private Access only on demand. For more Information,
see Secure Access Module.
Cloud Email and Collaboration Protection supports turning off computer vision
February 23, 2024 — In the Web Reputation filter, Cloud Email and Collaboration Protection
allows you to control whether to use the computer vision techniques for phishing detection.
Computer vision clicks suspicious URLs in emails to access web pages and apply AI-based
image
analysis to detect threats. Previously, computer vision was enabled as long as you
turned on Web
Reputation.
Virtual Network Sensor supports deployment to Microsoft Azure cloud environments
February 19, 2024 — Virtual Network Sensor supports deploying to Microsoft Azure cloud
environments.
Network Inventory now supports Asset Visibility Management
February 19, 2024 — Network Inventory now supports managing user role visibilty of
connected
Deep Discovery Inspector and Virtual Network Sensor devices with the Asset Visibility
Management
app. You can now manage the visibility of users within your organization to view your
connected
network security devices based on individual devices or groups created in Network
Inventory.
Network Inventory now supports creating groups for Deep Discovery Inspector and Virtual Network Sensor
February 19, 2024 — Network Inventory now supports the ability to create groups for
your
connected Deep Discovery Inspector appliances and Virtual Network Sensors, as well
as filter
devices displayed using a tree view quick filter.
Manage risk events by risk factor in Operations Dashboard
February 19, 2024 — You can now change the status of risk events when viewing them
by risk
factor in Operations Dashboard. This applies to all risk
factor types except XDR Detections and Vulnerabilities. Development is ongoing to
support
these two risk factor types.
Enhanced multi-layered asset management and new Asset Visibility Management app available
February 19, 2024 — Besides the management scope for endpoints and containers that
were
introduced in 2023, Trend Vision One enhances
the asset management capability to support more data assets, including mobile devices,
accounts,
cloud assets, network assets, and secure access assets. Large-sized customers that
run multiple
businesses or have the need to segregate asset data visibility for different teams
can leverage
this enhanced capability to achieve multi-tenancy management purposes within a single
Trend Vision One console.
For customers to better organize assets of multiple layers in a centralized location,
Trend Vision One launches a new app Asset Visibility Management for administrators to group data and Trend Vision One app assets into asset visibility
scopes based on the corporate structure. The asset visibility scopes can then be assigned
to user
roles to determine which assets are visible or manageable to these roles in all applicable
Trend Vision One apps that display the data of
the selected assets.
Only customers that have updated to the Foundation Services release have access to
the app. If
customers have configured scopes for endpoints and containers in User
Roles, to achieve seamless migration, asset visibility scopes that include newly
supported assets are automatically created and associated to the corresponding roles.
Trend Vision One continues enhancing the asset
visibility management capability with more asset coverage or granularity.
Gain better visibility into the security configuration of cloud apps
February 19, 2024 — The cloud app profile screen in Attack Surface
Discovery now displays the following additional
information:
-
The encryption ciphers used by the cloud app
-
The latest version of the communications protocol used by the app
-
Whether the cloud app uses a trusted certificate
-
Whether the cloud app allows for IP address access control
Cloud Posture removes support for outdated standards
February 14, 2024 — Cloud Posture no longer
supports the following compliance standards:
-
CIS Amazon Web Services Foundations Benchmark v1.2.0
-
CIS Amazon Web Services Foundations Benchmark v1.3.0
-
CIS Amazon Web Services Foundations Benchmark v1.4.0
-
CIS Microsoft Azure Foundations Benchmark v1.1.0
-
CIS Google Cloud Platform Foundation Benchmark v1.2.0
These five standards are no longer accessible in filters, which prevents the creation
of new
reports and report configurations. You can no longer generate new PDF or CSV reports
using
existing report configurations that include any of the five standards. However, any
PDF or CSV
reports generated before support was ended remain available.
Please update your report configurations to use the latest versions of CIS Benchmarks.
Agentless Vulnerability & Threat Detection supports cost tracking
February 7, 2024 — You can now track the costs of Agentless Vulnerability & Threat Detection by
enabling AWS Cost Explorer. Update the Agentless Vulnerability & Threat Detection stack to enable
this capability. For more information, see Agentless Vulnerability & Threat Detection estimated deployment costs.
Improved agent for machine clone scenario (VDI environment)
February 5, 2024 — Previously, Endpoint Inventory might inaccurately list cloned machines
if
the Online Help Center guidelines weren't followed when
deploying agents in a VDI environment. Consequently, users must redeploy agents. For
a large
number of endpoints, redeployment can be cumbersome.
To address this issue, we enhanced our agents to ensure that Trend Vision One - Endpoint
&
Workload Security can automatically detect endpoints in environments like VDI and
cloned virtual
machines. The backend system handles situations like GUID duplication by ensuring
each endpoint
in the inventory is distinct. However, for customers who prioritize precision and
faster
detection of clone or VDI machines, we strongly recommend using the Image Setup tool.
Enabling VDI requires users to manually activate the VDI system setting. By default,
this
setting is disabled. For detailed instructions on enabling VDI and resolving associated
issues,
see Agent Initiated Activation.