You can specify actions for connected products to take after detecting specific suspicious objects.
TrendAI Vision One™ connects to different products and sends the Suspicious Object List to the connected
products for detection. The connected products then apply the specified action based
on their capability.
Adding IP addresses to the Suspicious Object List does not disrupt the existing connection
to the specified endpoints. TrendAI Vision One™ blocks only new attempts to connect to the specified endpoints.
Refer to the table below to see which actions each product supports.
|
Product/Service
|
Object Type |
Action
|
||
|
TrendAI Vision One™ Endpoint Security agent - XDR for Endpoint (EDR)
(Windows)
|
File SHA-1
|
Log, Block
|
||
|
File SHA-256
|
||||
|
IP address
|
||||
|
URL
|
||||
|
Domain
|
||||
|
||||
|
TrendAI Vision One™ Endpoint Security agent - XDR for Endpoint (EDR)
(Mac)
|
File SHA-1
|
Log, Block
|
||
|
File SHA-256
|
||||
|
IP address
|
||||
|
URL
|
||||
|
Domain
|
||||
|
||||
|
TrendAI Vision One™ Endpoint Security agent - XDR for Endpoint (EDR)
(Linux)
|
File SHA-1
|
Log, Block
|
||
|
File SHA-256
|
||||
|
||||
|
TrendAI Vision One™ Endpoint Security agent with Standard Endpoint Protection
(Windows)
|
IP address
|
Log, Block
|
||
|
URL
|
||||
|
Domain
|
||||
|
File SHA-1
|
||||
|
File SHA-256
|
||||
|
||||
|
Service Gateway
|
IP address
|
Log, Block
|
||
|
URL
|
||||
|
Domain
|
||||
|
File SHA-1
|
||||
|
File SHA-256
|
||||
|
When suspicious objects synchronize through Service Gateway, it acts as a distribution
mechanism only. Service Gateway does not directly enforce actions. Each connected
product enforces actions based on its own supported object types and capabilities.
So any actions that a connected product does not support, Service Gateway does not
enforce.
|
||||
|
Zero Trust Secure Access Internet Access
|
IP address
|
Log, Block
|
||
|
URL
|
||||
|
Domain
|
||||
|
File SHA-1
|
||||
|
Trend Cloud One - Endpoint & Workload Security (Windows)
|
IP address
|
Log | ||
|
Domain
|
||||
|
File SHA-1
|
Log, Block
|
|||
|
File SHA-256
|
||||
|
||||
|
Trend Cloud One - Endpoint & Workload Security (Linux)
|
IP address
|
Log | ||
|
Domain
|
||||
|
File SHA-1
|
Log, Block
|
|||
|
File SHA-256
|
||||
|
||||
|
Trend Cloud One - Endpoint & Workload Security (macOS)
|
IP address
|
Log, Block | ||
|
Domain
|
||||
|
File SHA-1
|
||||
|
File SHA-256
|
||||
|
URL
|
||||
|
||||
|
TrendAI™ Apex One as a Service
|
IP address
|
Log, Block
|
||
|
URL
|
||||
|
Domain
|
||||
|
File SHA-1
|
||||
|
File SHA-256
|
||||
|
||||
|
TrendAI™ Apex One (on-premises)
|
IP address
|
Log, Block
|
||
|
URL
|
||||
|
Domain
|
||||
|
File SHA-1
|
||||
|
File SHA-256
|
||||
|
||||
|
URL
|
Log, Quarantine
|
||
|
File SHA-1
|
||||
|
File SHA-256
|
||||
|
Sender address
|
||||
|
TrendAI™ Deep Discovery Email Inspector 5.1 or later
|
IP address
|
Log
|
||
|
Domain
|
||||
|
URL
|
Log, Quarantine
|
|||
|
File SHA-1
|
||||
|
File SHA-256
|
||||
|
||||
|
TrendAI™ Deep Discovery Inspector version 6.7 SP1 or later
|
IP address
|
Log
|
||
|
URL
|
||||
|
Domain
|
||||
|
File SHA-1
|
||||
|
TrendAI™ Deep Security
|
File SHA-1 from Sandbox
|
Log, Block
|
||
|
URL
|
Log, Quarantine
|
||
|
File SHA-1
|
||||
|
File SHA-256
|
||||
|
Sender address
|
Block | |||
|
TippingPoint Security Management System
|
IP address
|
Log, Block
|
||
|
URL
|
||||
|
Domain
|
||||
|
File SHA-1
|
||||
|
File SHA-256
|
||||
|
||||
