Server & Workload Protection and Endpoint Sensor now support Ubuntu 24.04 64-bit (x86-64) Linux OS
September 30, 2024—The Trend Endpoint Agent now supports deploying Server & Workload
Protection and Endpoint Sensor to Ubuntu 24.04 64-bit (x86-64) endpoints. You can
select the Ubuntu 24.04 distribution when deploying a new agent in the Endpoint Inventory
app. For details on supported Linux platforms, see Endpoint Agent System Requirements.
Server & Workload Protection and Endpoint Sensor now support SUSE Linux Enterprise Server 15 (AWS ARM-based Graviton 2)
September 30, 2024—The Trend Endpoint Agent now supports deploying Server & Workload
Protection and Endpoint Sensor to SUSE Linux Enterprise Server 15 (AWS ARM-based Graviton
2) endpoints. You can select the SUSE Linux Enterprise Server 15 distribution when
deploying a new agent in the Endpoint Inventory app. For details on supported Linux
platforms, see Endpoint Agent System Requirements.
New APIs available for Cloud Posture
September 30, 2024 — The “Checks and Profiles” public APIs for Cloud Posture is now
available on the Trend Vision One Automation Center. For more information, visit the
Automation Center.
Role-based targets in security playbooks
September 30, 2024 — Security playbooks now reflect the asset visibility scope of
the user role that created them, targeting only the assets within that scope. This
helps the organization with different asset visibility scopes to manage their security
playbooks effectively.
If the creator's user role is deleted, the playbook becomes deactivated until another
user reactivates it by editing or enabling the playbook. Upon reactivation, the playbook
applies to targets within the asset visibility scope of the user who reactivated it.
Enhanced endpoint filtering for Automated Response Playbooks
September 30, 2024 — Automated Response Playbooks now provide additional endpoint
conditions, including endpoint name, endpoint type, and operating system, to filter
targeted endpoints for the playbook.
For more information, see Creating Automated Response
Playbooks.
Endpoint security policies now available for preview
September 30, 2024—Endpoint security policies allow you to implement policy-based
management of agent settings from a centralized location. Currently, you can use endpoint
security policies to manage Endpoint Sensor settings, with more features coming soon;
such as the state-of-the-art Deepfake Detector Technology and adjustable monitoring
levels designed to optimize your security posture with advanced inspection tools such
as the Network Content Inspection Engine.
CIS Kubernetes benchmark scanning now available
September 24, 2024 — Trend Vision One – Container Security now supports compliance
scanning with CIS benchmarks in your Kubernetes clusters. Assess and guarantee adherence to industry-leading security
standards effortlessly, enhancing your Kubernetes security posture.
For more information, see Compliance.
New alert type in the Notifications app: Newly discovered assets
September 23, 2024 — The Notifications app has been enhanced with a new alert feature
that notifies customers of new assets detected in their environment, which could pose
significant risks.
For more information, see Configuring notifications for newly
discovered assets.
Manage opt-in and opt-out settings for individual pre-release features from Platform Directory
September 23, 2024 — You can now opt in to and out of individual pre-release features
from Platform Directory, allowing you more granular control over which features you
want to experience before official release. You can manage which users have permission
to opt in to and out of pre-release features from User Roles.
For more information, see Platform Directory.
Platform Directory
Run osquery and YARA rules tasks from the Search app
September 23, 2024 — You can now trigger osquery and YARA rules response tasks from
the context menu in the Search app, providing you flexibility when investigating potential
incidents. You can also upload response scripts, osquery queries, and YARA rules on
the Response Scripts tab in Response Management.
For more information, see Response actions.
Scan select AWS resources for malware
September 23, 2024—Agentless Vulnerability & Threat Detection now supports malware
scanning of AWS EBS, ECR, and Lambda resources. After enabling the feature for your
connected AWS accounts in Cloud Accounts, Agentless Vulnerability & Threat Detection
begins scanning daily for threats like viruses, Trojans, spyware, and more. Get remediation
options and metadata for performing threat hunting queries by examining associated
risk events in Operations Dashboard.
Anti-malware scanning is disabled by default. Enabling anti-malware scanning increases
your AWS operational costs. To learn more, see Agentless Vulnerability & Threat Detection estimated deployment costs.
See time-critical alerts for vulnerabilities in Linux
September 23, 2024—Time-critical vulnerability alerts now support Linux to give you
more visibility into your organization’s security posture. Check alerts In Executive
Dashboard to see which operating systems are affected by the vulnerability. View mitigation
options for all supported operating systems, and if supported, mitigation actions
are automatically detected after you apply them.
Detection signal customization for Correlated Intelligence in Cloud Email and Collaboration Protection
September 20, 2024 – In addition to predefined detection signals for Correlated Intelligence,
Cloud Email and Collaboration Protection allows administrators to define custom signals by using predefined conditions to
meet specific security needs. These custom signals can then be incorporated into correlation
rules, enhancing the detection capabilities of Cloud Email and Collaboration Protection within their unique environment.
Dashboard configuration checks for Correlated Intelligence in Cloud Email and Collaboration Protection
September 20, 2024 – The Configuration Health tab on the Cloud Email and Collaboration Protection Dashboard is updated to include checks related to Correlated Intelligence, providing
administrators with a streamlined overview of their security configurations.
Automatic recovery of false positive emails for Exchange Online and Gmail in Cloud Email and Collaboration Protection
September 20, 2024 – Cloud Email and Collaboration Protection utilizes detection and quarantine logs to identify false positive emails detected
by Advanced Spam Protection, Web Reputation, and Correlated Intelligence. It then
automatically reverses the Quarantine, Move to Junk Email folder, Move to Spam actions,
delivering the emails directly to end users' inboxes. This feature functions without
user intervention and is independent of whether Retro Scan & Auto Remediate is activated
by administrators in Advanced Spam Protection and Web Reputation settings.
Anomaly detection with predefined correlation rules in Correlated Intelligence in Cloud Email Gateway Protection
September 18, 2024 — In addition to detecting security risks, Correlated Intelligence
in Cloud Email Gateway
Protection now supports detecting anomalies that deviate from normal behaviors and may require
your attention. Based on the organization’s security needs, administrators can enable
all or partial predefined correlation rules at three levels of aggressiveness and
apply the rules to detect anomalies in Correlated Intelligence policy.
Email recovery for deleted emails in Cloud Email Gateway Protection
September 18, 2024 — Cloud Email Gateway
Protection provides Email Recovery to retain emails marked for deletion for 14 days. This allows
for restoration of emails that were mistakenly deleted before they are permanently
purged, which helps ensure your business continuity and reduce the risk of data loss.
Standard Endpoint Protection supports Windows 11 ARM64
September 9, 2024—You can now deploy the Trend Endpoint Agent with Standard Endpoint
Protection on endpoints with the Windows 11 ARM64 operating system.
Set parameters for risk event rules
September 9, 2024—You may now set specific parameters for the risk event rules for
certain risk event types in Operations Dashboard. Add IP addresses, apps, rules, or
days of the week as conditions that must be met for the risk event rule to apply.
Setting parameters allows for more granular control over when a risk event rule is
triggered.
Network Sensor for TippingPoint general release
September 2, 2024 — Network Sensor for TippingPoint now enters official release and
comes with
a 30-day free trial to evaluate the functionality and benefits. After the trial period
end,
credits are automatically allocated based on usage.
For more information, see Enabling Network Sensor for TippingPoint.
New alert types: Case update summary and Case update for owners
September 2, 2024 — The Notifications app now includes two new alert types: Case
update summary and Case update for owners. The
Case update summary alert periodically sends notifications to
specified recipients with a summary of case updates, while the Case update for
owners alert notifies owners every time a case update occurs. For
Case update summary, you can specify which case updates you want the
summary to include.
For more information, see Configuring notifications for case update
summary and Configuring notifications for case update for
owners.