Skip to main content

Trend Micro Deep Security

trend-micro-deep-security

Version: 1.2
Updated: Jun 22, 2023

Utilize Trend Micro Deep Security to interact with IP lists, firewall and intrusion rules, and gather enrichment data during incident investigations.

Actions

  • List Systems (Enrichment) - List all available systems.
  • List IP Lists (Enrichment) - List all IP lists.
  • List Policies (Enrichment) - List all available policies.
  • List Firewall Rules (Enrichment) - List all firewall rules.
  • List Intrusion Rules (Enrichment) - List all intrusion rules.
  • Get System Info (Enrichment) - Gather system information for a specific system.
  • Get IP List (Enrichment) - Get a specific IP list.
  • Get Policy (Enrichment) - Get a specific policy.
  • Get Firewall Rule (Enrichment) - Get a specific firewall rule.
  • Get Intrusion Rule (Enrichment) - Get a specific intrusion rule.
  • Create IP List (Containment) - Create a new IP list.
  • Create Policy (Containment) - Create a new policy.
  • Add Firewall Rules To Policy (Containment) - Add a firewall rule to an existing policy.
  • Create Intrusion Rule (Containment) - Create a new intrusion rule.
  • Add Intrusion Rules To Policy (Containment) - Add an intrusion rule to an existing policy.
  • Search Systems By Hostname (Enrichment) - Search systems by hostname.
  • Search Systems By IP (Enrichment) - Search systems by IP Address.

Configure Trend Micro Deep Security in Automation Service and Cloud SOAR

Before you can use the integration, you must configure it so that the vendor can communicate with Sumo Logic. For general guidance, see Configure Authentication for Integrations.

  1. Access App Central and install the integration.
  2. Select the installed integration in the Integrations page.
    Classic UI. In the main Sumo Logic menu, select Automation and then select Integrations in the left nav bar.
    New UI. In the main Sumo Logic menu, select Automation > Integrations. You can also click the Go To... menu at the top of the screen and select Integrations.
  3. Select the integration.
  4. Hover over the resource name and click the Edit button that appears.
    Edit a resource
  5. In the Add Resource dialog, enter the authentication needed by the resource. When done, click TEST to test the configuration, and click SAVE to save the configuration.

For information about Trend Micro Deep Security, see Trend Micro Deep Security documentation.

Change Log

  • March 6, 2020 - First upload
  • October 27, 2022 - Action Search Systems By Hostname added.
  • February 17, 2023 (v1.1)
    • New Action: Search Systems By IP
  • June 22, 2023 (v1.1) - Removed unnecessary empty lines
Status
Legal
Privacy Statement
Terms of Use

Copyright © 2025 by Sumo Logic, Inc.