Connect the data sources required to enable general and advanced search methods.
Search includes both general and advanced search methods. The following table outlines the data sources required to enable each search method.
Search Method |
Data Sources |
---|---|
All connected data sources |
|
Advanced: Cloud Activity Data |
Trend Cloud One - Conformity To connect this data source, see: |
Trend Cloud One - Endpoint & Workload Security To connect this data source, see Connecting Trend Cloud One - Endpoint & Workload Security and Enabling Activity Monitoring. |
|
Advanced: Detections |
All connected data sources |
Advanced: Email Activity Data |
Trend Vision One Email Sensor To connect this data source, see Email Account Inventory. |
Advanced: Endpoint Activity Data |
Trend Vision One Endpoint Sensor To connect this data source, see Getting Started with Endpoint Inventory 2.0. |
Trend Micro Apex One as a Service To connect this data source, see Connecting Trend Micro Apex One as a Service. |
|
Trend Cloud One - Endpoint & Workload Security To connect this data source, see Connecting Trend Cloud One - Endpoint & Workload Security and Enabling Activity Monitoring. |
|
Advanced: Secure Access Activity Data |
Zero Trust Secure Access - Private Access To connect this data source, see Getting Started with Zero Trust Secure Access. |
Zero Trust Secure Access - Internet Access To connect this data source, see Getting Started with Zero Trust Secure Access. |
|
Advanced: Mobile Activity Data |
Trend Micro Mobile Security as a Service To connect this data source, see Getting Started with Mobile Security. |
Advanced: Network Activity Data |
Network Inspector virtual appliance To connect this data source, see Getting Started with Network Inspector Virtual Appliance. |
Trend Micro Deep Discovery Inspector To connect this data source, see Deep Discovery Inspector Deployment Guides. |
|
Zero Trust Secure Access - Private Access To connect this data source, see Getting Started with Zero Trust Secure Access. |
|
Zero Trust Secure Access - Internet Access To connect this data source, see Getting Started with Zero Trust Secure Access. |
|
Advanced: Web Activity Data |
Trend Micro Web Security To connect this data source, connect Trend Micro Web Security using Product Connector. For more information, see Connecting a Product. |