Application discovery identifies domains and IP addresses accessed over the past 14 days, helping you determine which internal applications are being used in your organization's network. To facilitate the configuration of access rules, this feature also identifies users who have accessed the internal applications and recommends the most likely user groups.
Customers with multiple Azure AD tenants can now have full visibility of accounts on all tenants and perform risk assessment on multiple Azure AD tenants in Risk Insights apps.
You can now specify detection models when configuring trigger settings for Automated Response playbooks. The subsequent nodes in the playbook are only triggered for Workbench alerts related to the specified detection models.
Playbooks also adds support for additional webhook types in user-defined Automated Response playbooks.
For more information, see Creating Automated Response Playbooks.
All Risk Insights capabilities are now officially released and can be purchased alongside XDR as part of the Trend Vision One platform. Contact your sales representative to discuss your license transition period options.
For more details on the licensing and product experience for Risk Insights, see Trend Micro Offerings Supporting Credits.
Report Management is now officially released and can be utilized alongside your Risk Insights and XDR entitlements as part of the Trend Vision One platform.
For details on what types of entitlements are required for each report type, see Reports License Requirements.
Security Playbooks is now officially released and can be utilized alongside your Risk Insights and XDR entitlements as part of the Trend Vision One platform.
For details on what types of entitlements are required for each playbook type, see Security Playbooks Requirements.
Zero Trust Secure Access Internet Access has launched a new PoP site for the Internet Access Cloud Gateway in Bahrain in the AWS Middle East region.
For details on the available PoP sites for the Internet Access Cloud Gateway, see Port and FQDN/IP Address Requirements.
If your organization uses a third-party proxy server to access the internet, you can now configure the proxy server as the upstream proxy to connect your deployed Internet Access On-Premises Gateway to the internet.
For details on configuring upstream proxy for an Internet Access On-Premises Gateway, see Deploying an Internet Access On-Premises Gateway.