Views:

Server & Workload Protection and Endpoint Sensor now support Ubuntu 24.04 64-bit (x86-64) Linux OS

September 30, 2024—The Trend Endpoint Agent now supports deploying Server & Workload Protection and Endpoint Sensor to Ubuntu 24.04 64-bit (x86-64) endpoints. You can select the Ubuntu 24.04 distribution when deploying a new agent in the Endpoint Inventory app. For details on supported Linux platforms, see Endpoint Agent System Requirements.
Endpoint SecurityEndpoint Inventory

Server & Workload Protection and Endpoint Sensor now support SUSE Linux Enterprise Server 15 (AWS ARM-based Graviton 2)

September 30, 2024—The Trend Endpoint Agent now supports deploying Server & Workload Protection and Endpoint Sensor to SUSE Linux Enterprise Server 15 (AWS ARM-based Graviton 2) endpoints. You can select the SUSE Linux Enterprise Server 15 distribution when deploying a new agent in the Endpoint Inventory app. For details on supported Linux platforms, see Endpoint Agent System Requirements.
Endpoint SecurityEndpoint Inventory

New APIs available for Cloud Posture

September 30, 2024 — The “Checks and Profiles” public APIs for Cloud Posture is now available on the Trend Vision One Automation Center. For more information, visit the Automation Center.

Role-based targets in security playbooks

September 30, 2024 — Security playbooks now reflect the asset visibility scope of the user role that created them, targeting only the assets within that scope. This helps the organization with different asset visibility scopes to manage their security playbooks effectively.
If the creator's user role is deleted, the playbook becomes deactivated until another user reactivates it by editing or enabling the playbook. Upon reactivation, the playbook applies to targets within the asset visibility scope of the user who reactivated it.
Workflow and AutomationSecurity Playbooks

Enhanced endpoint filtering for Automated Response Playbooks

September 30, 2024 — Automated Response Playbooks now provide additional endpoint conditions, including endpoint name, endpoint type, and operating system, to filter targeted endpoints for the playbook.
For more information, see Creating Automated Response Playbooks.
Workflow and AutomationSecurity Playbooks

Endpoint security policies now available for preview

September 30, 2024—Endpoint security policies allow you to implement policy-based management of agent settings from a centralized location. Currently, you can use endpoint security policies to manage Endpoint Sensor settings, with more features coming soon; such as the state-of-the-art Deepfake Detector Technology and adjustable monitoring levels designed to optimize your security posture with advanced inspection tools such as the Network Content Inspection Engine.
Endpoint SecurityEndpoint Security ConfigurationEndpoint Security Policies

CIS Kubernetes benchmark scanning now available

September 24, 2024 — Trend Vision One – Container Security now supports compliance scanning with CIS benchmarks in your Kubernetes clusters. Assess and guarantee adherence to industry-leading security standards effortlessly, enhancing your Kubernetes security posture.
For more information, see Compliance.
Cloud SecurityContainer SecurityContainer Protection

New alert type in the Notifications app: Newly discovered assets

September 23, 2024 — The Notifications app has been enhanced with a new alert feature that notifies customers of new assets detected in their environment, which could pose significant risks.
AdministrationNotifications

Manage opt-in and opt-out settings for individual pre-release features from Platform Directory

September 23, 2024 — You can now opt in to and out of individual pre-release features from Platform Directory, allowing you more granular control over which features you want to experience before official release. You can manage which users have permission to opt in to and out of pre-release features from User Roles.
For more information, see Platform Directory.
Platform Directory

Run osquery and YARA rules tasks from the Search app

September 23, 2024 — You can now trigger osquery and YARA rules response tasks from the context menu in the Search app, providing you flexibility when investigating potential incidents. You can also upload response scripts, osquery queries, and YARA rules on the Response Scripts tab in Response Management.
For more information, see Response actions.
Workflow and AutomationResponse Management

Scan select AWS resources for malware

September 23, 2024—Agentless Vulnerability & Threat Detection now supports malware scanning of AWS EBS, ECR, and Lambda resources. After enabling the feature for your connected AWS accounts in Cloud Accounts, Agentless Vulnerability & Threat Detection begins scanning daily for threats like viruses, Trojans, spyware, and more. Get remediation options and metadata for performing threat hunting queries by examining associated risk events in Operations Dashboard.
Anti-malware scanning is disabled by default. Enabling anti-malware scanning increases your AWS operational costs. To learn more, see Agentless Vulnerability & Threat Detection estimated deployment costs.
Attack Surface Risk ManagementOperations Dashboard

See time-critical alerts for vulnerabilities in Linux

September 23, 2024—Time-critical vulnerability alerts now support Linux to give you more visibility into your organization’s security posture. Check alerts In Executive Dashboard to see which operating systems are affected by the vulnerability. View mitigation options for all supported operating systems, and if supported, mitigation actions are automatically detected after you apply them.
Attack Surface Risk ManagementExecutive Dashboard

Detection signal customization for Correlated Intelligence in Cloud Email and Collaboration Protection

September 20, 2024 – In addition to predefined detection signals for Correlated Intelligence, Cloud Email and Collaboration Protection allows administrators to define custom signals by using predefined conditions to meet specific security needs. These custom signals can then be incorporated into correlation rules, enhancing the detection capabilities of Cloud Email and Collaboration Protection within their unique environment.
Email and Collaboration SecurityCloud Email and Collaboration Protection

Dashboard configuration checks for Correlated Intelligence in Cloud Email and Collaboration Protection

September 20, 2024 – The Configuration Health tab on the Cloud Email and Collaboration Protection Dashboard is updated to include checks related to Correlated Intelligence, providing administrators with a streamlined overview of their security configurations.
Email and Collaboration SecurityCloud Email and Collaboration Protection

Automatic recovery of false positive emails for Exchange Online and Gmail in Cloud Email and Collaboration Protection

September 20, 2024 – Cloud Email and Collaboration Protection utilizes detection and quarantine logs to identify false positive emails detected by Advanced Spam Protection, Web Reputation, and Correlated Intelligence. It then automatically reverses the Quarantine, Move to Junk Email folder, Move to Spam actions, delivering the emails directly to end users' inboxes. This feature functions without user intervention and is independent of whether Retro Scan & Auto Remediate is activated by administrators in Advanced Spam Protection and Web Reputation settings.
Email and Collaboration SecurityCloud Email and Collaboration Protection

Anomaly detection with predefined correlation rules in Correlated Intelligence in Cloud Email Gateway Protection

September 18, 2024 — In addition to detecting security risks, Correlated Intelligence in Cloud Email Gateway Protection now supports detecting anomalies that deviate from normal behaviors and may require your attention. Based on the organization’s security needs, administrators can enable all or partial predefined correlation rules at three levels of aggressiveness and apply the rules to detect anomalies in Correlated Intelligence policy.
Email and Collaboration SecurityCloud Email Gateway Protection
September 18, 2024 — Cloud Email Gateway Protection provides Email Recovery to retain emails marked for deletion for 14 days. This allows for restoration of emails that were mistakenly deleted before they are permanently purged, which helps ensure your business continuity and reduce the risk of data loss.
Email and Collaboration SecurityCloud Email Gateway Protection

Standard Endpoint Protection supports Windows 11 ARM64

September 9, 2024—You can now deploy the Trend Endpoint Agent with Standard Endpoint Protection on endpoints with the Windows 11 ARM64 operating system.
Endpoint SecurityEndpoint Inventory

Set parameters for risk event rules

September 9, 2024—You may now set specific parameters for the risk event rules for certain risk event types in Operations Dashboard. Add IP addresses, apps, rules, or days of the week as conditions that must be met for the risk event rule to apply. Setting parameters allows for more granular control over when a risk event rule is triggered.
Attack Surface Risk ManagementOperations Dashboard

Network Sensor for TippingPoint general release

September 2, 2024 — Network Sensor for TippingPoint now enters official release and comes with a 30-day free trial to evaluate the functionality and benefits. After the trial period end, credits are automatically allocated based on usage.
For more information, see Enabling Network Sensor for TippingPoint.
Network SecurityNetwork InventoryTippingPoint

New alert types: Case update summary and Case update for owners

September 2, 2024 — The Notifications app now includes two new alert types: Case update summary and Case update for owners. The Case update summary alert periodically sends notifications to specified recipients with a summary of case updates, while the Case update for owners alert notifies owners every time a case update occurs. For Case update summary, you can specify which case updates you want the summary to include.
AdministrationNotifications