Cloud App Security provides programmatic access through Cloud App Security Representational State Transfer (REST) APIs. You
can use the APIs to integrate third-party solutions or Trend Micro products and services
with
Cloud App Security, which allows customers to obtain certain
service data, launch investigations for known and unknown threats, and perform operations
on
email messages and user accounts as necessary. This offers automated capabilities
to help the
security team of your organization improve their efficiency and effectiveness with
which they
can investigate, detect, manage, and respond to security issues.
Cloud App Security supports the following types of APIs:
-
Log retrieval: gets security event logs from Cloud App Security to your Security Information and Event Management (SIEM) or other security analytics platform for further security monitoring and threat detection.
-
Threat investigation: sweeps email messages in protected Exchange Online and Gmail mailboxes for those that match meta information search criteria to investigate and understand the impact of detections.
-
Threat mitigation: performs operations on email messages or user accounts to remediate or prevent your Exchange Online or Gmail service from further security attacks.
Note
For Gmail, you can perform operations only on email messages through this API. -
Threat remediation: specifies lists of blocked senders, URLs, SHA-1 hash values, and SHA-256 hash values for Cloud App Security to quarantine Exchange Online email messages that match the lists.
Using these APIs may potentially expose sensitive information. Therefore, to ensure
that only
trusted applications can use the APIs, generate an authentication token that the trusted
applications send with API requests. Cloud App Security verifies
the validity of all API requests from third-party applications and systems using the
token
information and returns the requested data to them.
On the Cloud App Security management console, you can create
authentication tokens for use by the following products and services:
-
External applications
-
Trend Micro Apex One™ as a Service
Perform the following steps to properly utilize the Cloud App Security REST APIs:
-
Create an authentication token on the Cloud App Security management console and fill the token in the header of the request to the intended API.For more information, see Generating an Authentication Token.
-
Create a valid API request that consists of a method, a URL, a request header, a list of request parameters, and optionally a request body.For more information, see the following topics:
-
Verify whether Cloud App Security accepted the API request.For more information, see API Responses.