Connect the data sources required to enable general and advanced search methods.
Search includes both general and advanced search methods. The following table outlines
the data
sources required to enable each search method.
Search Method
|
Data Sources
|
||
All connected data sources
|
|||
Observed Attack Techniques
|
All connected data sources
|
||
Advanced: Cloud
Activity Data
|
Trend Cloud One - Endpoint & Workload Security
To connect this data source, see Connecting Trend Cloud One - Endpoint & Workload security and enabling activity monitoring.
|
||
Trend Cloud One - Conformity
To connect this data source, see:
|
|||
Advanced: Container Activity Data |
Trend Vision One Container Security
To connect this data source, see Getting started with Cloud Network
Telemetry.
|
||
Advanced: Detections
|
All connected data sources
|
||
Advanced: Email Activity Data
|
Trend Vision One Email
Sensor
To connect this data source, see Email Asset Inventory.
|
||
Advanced: Endpoint Activity Data
|
Trend Vision One Endpoint Sensor
To connect this data source, see Getting started with Endpoint Inventory
2.0.
|
||
Trend Micro Apex One as a Service
To connect this data source, see Connecting Trend Micro Apex One as a
Service.
|
|||
Trend Cloud One - Endpoint & Workload Security
To connect this data source, see Connecting Trend Cloud One - Endpoint & Workload security and enabling activity monitoring.
|
|||
Advanced: Identity
and Access Activity Data
|
Microsoft Entra ID
To connect this data source, see Microsoft Entra ID
integration.
|
||
Advanced: Mobile Activity Data
|
Trend Micro Mobile Security as a Service
To connect this data source, see Getting started with Mobile Security.
|
||
Advanced: Network
Activity Data
|
Virtual Network Sensor
To connect this data source, see Virtual Network Sensor deployment
guides.
|
||
Trend Micro Deep Discovery Inspector
To connect this data source, see Deep Discovery Inspector deployment
guides.
|
|||
Zero Trust Secure Access - Private Access
To connect this data source, see Getting started with Zero Trust Secure
Access.
|
|||
Zero Trust Secure Access - Internet Access
To connect this data source, see Getting started with Zero Trust Secure
Access.
|
|||
Advanced: Secure Access Activity Data
|
Zero Trust Secure Access - Private Access
To connect this data source, see Getting started with Zero Trust Secure
Access.
|
||
Zero Trust Secure Access - Internet Access
To connect this data source, see Getting started with Zero Trust Secure
Access.
|
|||
Advanced: Web Activity Data
|
Trend Micro Web Security
To connect this data source, connect Trend Micro Web Security using Product
Connector. For more information, see Connecting a product.
|