Trend Micro Deep Security

Version: Trend Micro Deep Security

Trend Micro Deep Security delivers a comprehensive security platform optimized for virtual and cloud environments. Its extensive security capabilities include anti-malware with web reputation, host-based firewall, intrusion detection and prevention (IDS/IPS), integrity monitoring, and log inspection.

Netsurion Open XDR manages logs retrieved from Trend Micro Deep Security. The alerts, reports, dashboards, and saved searches in Netsurion Open XDR are enhanced by capturing important and critical activities in Trend Micro Deep Security.

The following are the key assets included with this Data Source Integration.

Alerts

TypeNameDescription
SecurityTrend Micro Deep Security – Action taken on malwareGenerated whenever Trend Micro Deep Security has acted on a potentially malicious file.
SecurityTrend Micro Deep Security – Administrator authentication failedGenerated when Trend Micro user authentication has failed for the user.
SecurityTrend Micro Deep Security – Anti-malware action failedGenerated when Trend Micro Deep Security failed to act on a potentially malicious file.
SecurityTrend Micro Deep Security – Duplicate computer detectedGenerated whenever Trend Micro Deep Security has detected a duplicate computer.
SecurityTrend Micro Deep Security – Intrusion prevention detectedGenerated when an intrusion prevention event has occurred related to Trend Micro Deep Security.
SecurityTrend Micro Deep Security – Malicious URL detectedGenerated when a request related to the device has been marked as suspicious due to some reason.
SecurityTrend Micro Deep Security – No action taken on malwareGenerated when Trend Micro Deep Security acted on a potentially malicious file.

Reports

TypeNameDescription
SecurityTrend Micro Deep Security – User managementProvides all details related to activities concerning User management in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – Active directory activityProvides all details related to active directory activities in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – File integrity monitoringProvides all details related to the file integrity monitoring in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – Antimalware activityProvides all details related to the antimalware activities in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – Firewall activityProvides all details related to activities concerning firewall activities in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – Intrusion preventionProvides all details related to the intrusion prevention in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – User authentication failedProvides all details related to user authentication failed in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – User logon activityProvides all details related to user logon activities in Trend Micro Deep Security.
ComplianceTrend Micro Deep Security – System logsProvides all details related to activities concerning system logs in Trend Micro Deep Security.
ComplianceTrend Micro Deep Security – Computer managementProvides all details related to activities concerning computer management in Trend Micro Deep Security.
ComplianceTrend Micro Deep Security – Policy managementProvides all details related to policy management in Trend Micro Deep Security.
ComplianceTrend Micro Deep Security – Roles managementProvides all details related to roles management in Trend Micro Deep Security.
ComplianceTrend Micro Deep Security – Group managementProvides all details related to group management in Trend Micro Deep Security.

Dashboards

TypeNameDescription
SecurityTrend Micro Deep Security – User authentication failedDisplays all details about user authentication failed activities.
SecurityTrend Micro Deep Security – Successful user login by IP addressDisplays all details about successful user login by IP address.
SecurityTrend Micro Deep Security – Malicious hashes by threat namesDisplays all details about malicious hashes by threat names.
SecurityTrend Micro Deep Security – Suspicious file paths by threat nameDisplays all details about suspicious file paths by threat name.
SecurityTrend Micro Deep Security – Intrusion detected on destination IPDisplays all details about intrusion detected on destination IP.
ComplianceTrend Micro Deep Security – Computer managementDisplays all details about computer management.
ComplianceTrend Micro Deep Security – Policy managementDisplays all details about policy management.

Saved Searches

TypeNameDescription
SecurityTrend Micro Deep Security – User managementProvides all details related to activities concerning User management in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – Active directory activityProvides all details related to active directory activities in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – File integrity monitoringProvides all details related to the file integrity monitoring in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – Antimalware activityProvides all details related to the antimalware activities in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – Firewall activityProvides all details related to activities concerning firewall activities in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – Intrusion preventionProvides all details related to the intrusion prevention in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – User authentication failedProvides all details related to user authentication failed in Trend Micro Deep Security.
SecurityTrend Micro Deep Security – User logon activityProvides all details related to user logon activities in Trend Micro Deep Security.
ComplianceTrend Micro Deep Security – Computer managementProvides all details related to activities concerning computer management in Trend Micro Deep Security.
ComplianceTrend Micro Deep Security – Policy managementProvides all details related to policy management in Trend Micro Deep Security.
ComplianceTrend Micro Deep Security – Roles managementProvides all details related to roles management in Trend Micro Deep Security.
ComplianceTrend Micro Deep Security – Group managementProvides all details related to group management in Trend Micro Deep Security.
ComplianceTrend Micro Deep Security – System logsProvides all details related to activities concerning system logs in Trend Micro Deep Security.

Documentation

The configuration details are consistent with Netsurion Open XDR 9.3 and later, and Trend Micro Deep Security.

Download the Integration Guide for configuration instructions and more information.