Views:

New user account response actions: Add to Zscaler Restricted User Group and Remove from Zscaler Restricted User Group

July 29, 2024 — You can now add user accounts with a high risk exposure to the Zscaler-defined restricted user group from the context menu in Attack Surface Discovery. This response action can also be taken automatically by the Automated High-Risk Account Response playbook. Adding user accounts to the Zscaler restricted user group allows Zscaler policies to be assigned to the accounts. Additionally, you can remove the accounts from the restricted user group when they maintain a lower risk score.
Workflow and AutomationResponse Management
.

Restrict API access with authorized IP addresses

July 22, 2024 — The API Keys app now enables you to define and manage a list of authorized IP addresses for accessing Trend Vision One APIs. This enhancement adds an extra layer of security, ensuring that only traffic from trusted sources can access the APIs.
For more information, see API Keys (available to both customers that have updated to the Foundation Services release and those that have not).
AdministrationAPI Keys

Custom correlation rules for anomaly detection available in Correlated Intelligence in Cloud Email and Collaboration Protection

July 19, 2024 – Besides the Trend Micro predefined correlation rules, administrators can add custom correlation rules based on predefined detection signals to accommodate anomaly detection requirements in their environment. Administrators can apply custom correlation rules into the Correlated Intelligence security filter of ATP policies for Exchange Online and view details about detected anomalies in the Operations screen.
Email and Collaboration SecurityCloud Email and Collaboration Protection

Access grant enhancement to OneDrive, SharePoint Online, and Microsoft Teams in Cloud Email and Collaboration Protection

July 19, 2024 – For OneDrive, SharePoint Online, and Microsoft Teams, Cloud Email and Collaboration Protection enhances the access grant process to remove dependency on Azure Communication Services, which is scheduled to retire in the future. When granting access to the above-mentioned services, administrators do not need to manually grant Cloud Email and Collaboration Protection permissions to receive notifications from Microsoft upon any change to the files on these services.
This enhancement is not available for the US and EU sites in this release.
Email and Collaboration SecurityCloud Email and Collaboration Protection

Create security awareness training campaigns targeting at-risk users in Cloud Email and Collaboration Protection

July 19, 2024 – Administrators can now initiate security awareness campaigns from the following Dashboard widgets to provide training focused specifically on at-risk users: Top 5 Users with Account Takeover Risks, Top 5 High-Risk Email Recipients, and Top 5 Spam and Graymail Recipients. When viewing these users on the widgets, the available operations now include the Create Training Campaign option.
Email and Collaboration SecurityCloud Email and Collaboration Protection

Add to Block List response action available in Cloud Email and Collaboration Protection

July 19, 2024 – Cloud Email and Collaboration Protection offers the Add to Block List response action to the OperationsUser-Reported Emails screen. It allows administrators to add senders in the end user-reported emails to the Suspicious Object List of Trend Vision One.
Cloud Email and Collaboration Protection also supports the following account-based response actions on the Top 5 Users with Account Takeover Risks Dashboard widget: Disable User Account, Force Sign Out, Force Password Reset, Add to Block List
Email and Collaboration SecurityCloud Email and Collaboration Protection

Search by action available for URL click tracking logs in Cloud Email and Collaboration Protection

July 19, 2024 – Cloud Email and Collaboration Protection adds a new search criterion (Action: Restricted) in URL click tracking logs. Using this criterion, administrators are able to filter out URLs with actions "Blocked", "Warned and accessed", and "Warned and stopped”.
Email and Collaboration SecurityCloud Email and Collaboration Protection

Announcing TMAS v2.0+

July 17, 2024 – Announcing Trend Micro Artifact Scanner (TMAS) v2.0+ with enhanced support for custom scanner combinations including the newly released secrets scanner. Users can run scanners independently or together, ensuring comprehensive security coverage tailored to their specific needs. This version also provides a more intuitive and standardized result output. For all changes, read WHATS-NEW.md included with the binary.
Cloud SecurityContainer SecurityContainer Protection Artifact Scanner

File Security Storage now supports a promote bucket for clean files Parent topic

July 17 - File Security Storage now allows users to automatically upload clean files into a promote bucket after scanning. You set this parameter in the CloudFormation template when creating or updating your account.

File Security Storae introduces by-region quarantine and promote buckets Parent topic

July 17 - You can now create regional quarantine and promote buckets for your AWS cloud accounts. This provides a greater visibility of issues in files uploaded to your account.

Endpoint Security Introduces Agent Installer Proxy Settings

July 17, 2024 — To coincide with the release of Runtime Proxy Policies, the Proxy Settings formerly located in the Endpoint Inventory Global Settings has now been replaced with the Agent Installer Proxy settings screen. Use the Agent Installer Proxy settings to configure proxies for endpoint agents to perform initial deployment, installation, and registration to Trend Vision One.
Endpoint SecurityEndpoint Inventory

Enable AI App Guard to protect your AI apps and files

July 17, 2024 — Standard Endpoint Protection offers AI App Guard, which helps identify suspicious or untrusted programs attempting to modify AI apps and associated files.
For more information, see Event Monitoring.
Endpoint SecurityStandard Endpoint ProtectionPoliciesPolicy Management

Disable Zero Trust Secure Access pop-up notifications in Mac and Windows

July 15, 2024 — Users can now turn off Private Access system alerts for blocked access attempts from Secure Access Module settings. While pop-ups are disabled, a complete log of blocked events remains accessible within the module.
Zero Trust Secure Access Secure access configuration
For more Information, see Secure Access Module deployment.

Zero Trust Secure Access enhanced support for on-premises AD servers

July 15, 2024 — The Zero Trust Internet Access On-Premises Gateway service now supports multiple on-premises AD server integrations for NTLMv2 or Kerberos authentication.
Zero Trust Secure Access Secure Access Configuration Internet Access Configuration

Attack Surface Risk Management extend Vulnerability Assessment support to Oracle Linux

July 15, 2024 — Vulnerability Assessment has been enhanced to support Oracle Linux Server 6, Oracle Linux Server 7, Oracle Linux Server 8, and Oracle Linux Server 9. The newly supported distributions enable more granular analysis and improved CVE prioritization. Use the enhancement to strengthen your endpoint security and more effectively prioritize risks.

Custom Tagging in Attack Surface Discovery

July 15, 2024 — Create and use custom tags for your organization’s assets in Attack Surface Discovery for better asset management.
Attack Surface Risk ManagementAttack Surface Discovery

View and manage IPv6 addresses in Internet-Facing Assets

July 15, 2024 — IPv6 addresses are now supported for Public IPs in the Internet-Facing Assets section of Attack Surface Discovery. View discovered IPv6 addresses and add IPv6 addresses belonging to your organization. IPv6 addresses must be added individually — IPv6 ranges are not supported.
Attack Surface Risk ManagementAttack Surface Discovery

Agentless Vulnerability and Threat Detection Lambda support

July 15, 2024 —
Agentless Vulnerability and Threat Detection supports vulnerability scanning on AWS Lambda functions.
Attack Surface Risk ManagementOperations Dashboard

Nutanix AHV platform now supported for Virtual Network Sensor

July 15, 2024 — Trend Micro Virtual Network Sensor now extends its platform support to include Nutanix AHV.
For more information, see Virtual Network Sensor deployment guides.
Network SecurityNetwork Inventory

Virtual Network Sensor supports deployment to Google Cloud

July 15, 2024 — The Virtual Network Sensor can now be deployed to your Google Cloud environment.
For more information, see Virtual Network Sensor deployment guides.
Network SecurityNetwork Inventory

Add phishing simulations as a data source

July 12, 2024 – You can now add Trend Vision One Phishing Simulations as a data source in the Operations Dashboard, which allows access to breach events from phishing simulations. For more information, see Configurating data sources.
Attack Surface Risk ManagementOperations Dashboard

Endpoint Inventory Enhancements

July 11, 2024 – You can now customize the table in Endpoint Inventory by adjusting column width and the number of items displayed per page. Your settings are saved automatically for the next time you access Endpoint Inventory.
Endpoint SecurityEndpoint Inventory

Get visibility into malicious traffic with XDR for Cloud VPC Flow Log Monitoring

July 8, 2024 – Threat detection for AWS VPC Flow Logs is now available as a feature of XDR for Cloud. Once VPC flow log monitoring is enabled, Trend Vision One automatically analyzes the logs for any traffic activity related to suspicious or malicious IP addresses, and also monitors for malicious activity such as brute force attacks, access to sensitive database ports, data exfiltration, and more. Additionally, you can also use VPC flow logs to seep for indicators of compromise (IOCs) via the Threat Intelligence app, leveraging Trend Micro's threat intelligence feed or imported 3rd-party IOC sources.
  • To enable VPC flow log monitoring, go to Service ManagementCloud Accounts
  • To view VPC flow logs, go to XDR Threat InvestigationSearch
  • To view threat detections from VPC flow logs, go to XDR Threat InvestigationWorkbench

Container Security now provides Terraform support

July 4, 2024 – Container Security now supports asset configuration and management with Terraform. For details, see the Vision One provider in the Terraform registry.
Cloud SecurityContainer Security
July 4, 2024 — The Container Inventory app now features filter and search functions to streamline the process to locate container services within the table view. Additionally, Container Inventory has implemented a page view, making it easier to navigate the list. These features encompass K8S elements such as Clusters, Nodes, Pods, and Containers, as well as ECS components including Clusters, Services, Tasks, and Containers.
For more information, see Container Inventory.
Cloud SecurityContainer Security

Google Cloud Identity integration official release

July 1, 2024 — Google Cloud Identity integration with Trend Vision One is now officially available. Seamlessly integrate with Google Cloud Identity to enhance your security visibility and response with streamlined access, management, and risk. Go to Workflow and AutomationThird-Party Integration to set up the integration.
For more information, see Google Cloud Identity integration.
Workflow and AutomationThird-Party Integration

Custom filters now support AWS Virtual Private Cloud flow logs

July 1, 2024—Custom detection filters now support AWS VPC flow log activity under the CLOUD_ACTIVITY event type and the VPC_ACTIVITY_LOG event ID.
For more information, see Network Activity Data and Cloud Activity Data.
XDR Threat InvestigationDetection Model Management

Identity Inventory available in private preview

July 1, 2024 — As part of the Identity Security app group, Identity Inventory offers comprehensive identity tracking and management features for both human and non-human identities as well as assigned entitlements and privileges. View summaries of groups, roles, and devices registered with your identity provider, and see the current status of passwords and conditional access certificates to ensure your security practices are up to date. To get started, grant read and write permissions to your Microsoft Entra ID tenant in Third-Party Integration.
Identity SecurityIdentity Inventory

Enable runtime security and runtime scanning on multiple ECS clusters

July 1, 2024 – To improve the ECS cluster management in your AWS environment, Trend Vision One Container Inventory now allows you to enable or disable runtime security and runtime scanning on multiple Amazon ECS clusters.
For more information, see Container Inventory.
Cloud SecurityContainer Security