Search Method Data Sources

Connect the data sources required to enable general and advanced search methods.

Search includes both general and advanced search methods. The following table outlines the data sources required to enable each search method.

Search Method

Data Sources

Data Mapping: General Search

All connected data sources

Advanced: Cloud Activity Data

Trend Micro Cloud One - Conformity

To connect this data source, see:

Trend Micro Cloud One - Endpoint & Workload Security

To connect this data source, see Connecting Trend Micro Cloud One - Endpoint & Workload Security and Enabling Activity Monitoring.

Advanced: Detections

All connected data sources

Advanced: Email Activity Data

Trend Micro Vision One Email Sensor

To connect this data source, see Email Account Inventory.

Advanced: Endpoint Activity Data

Trend Micro Vision One Endpoint Sensor

To connect this data source, see Getting Started with Endpoint Inventory 2.0.

Trend Micro Apex One as a Service

To connect this data source, see Connecting Trend Micro Apex One as a Service.

Trend Micro Cloud One - Endpoint & Workload Security

To connect this data source, see Connecting Trend Micro Cloud One - Endpoint & Workload Security and Enabling Activity Monitoring.

Advanced: Secure Access Activity Data

Zero Trust Secure Access - Private Access

To connect this data source, see Getting Started with Zero Trust Secure Access.

Zero Trust Secure Access - Internet Access

To connect this data source, see Getting Started with Zero Trust Secure Access.

Advanced: Mobile Activity Data

Trend Micro Mobile Security as a Service

To connect this data source, see Getting Started with Mobile Security.

Advanced: Network Activity Data

Trend Micro Vision One Network Sensor

To connect this data source, see Getting Started with Network Inventory.

Trend Micro Deep Discovery Inspector

To connect this data source, see Getting Started with Network Inventory.

Advanced: Web Activity Data

Trend Micro Web Security

To connect this data source, connect Trend Micro Web Security using Product Connector. For more information, see xConnecting a Product.