Use Agentless Vulnerability & Threat Detection to scan for and detect vulnerabilities and malware in your cloud environment.
ImportantThis is a pre-release sub-feature and is not part of the existing features of an official
commercial or general release. Please review the Pre-release sub-feature disclaimer before using the sub-feature.
|
Agentless Vulnerability & Threat Detection is a serverless function enabled in your connected cloud accounts. The function scans
supported cloud resources for vulnerabilities and malware without impact to other
resources or running applications. The function only activates during a scan and scales
dynamically to meet the needs of the scanning process within a set resource limit.
All collected data is analyzed within the serverless function, and only metadata is
sent to Trend Vision One. Your data does not leave your cloud account.
Agentless Vulnerability & Threat Detection currently supports the following cloud providers:
Vulnerability scanning inspects your cloud resources for known CVEs. Anti-malware
scanning scans your cloud resources to identify potential malware, including viruses,
Trojans, spyware, and more. Scans occur once per day, starting when you first connect
your cloud account and enable the feature. Scan times are not configurable after deployment.
NoteAnti-malware scanning is not enabled for AWS accounts by default. After enabling the
feature, anti-malware scans begin during the next daily scan.
|
Scan results are sent to Trend Vision One for review. If results contain vulnerabilities or malware, suggested remediation
options are displayed for the associated risk event in .
The following table lists the cloud provider resources that Agentless Vulnerability & Threat Detection supports.
Feature
|
Cloud provider
|
Resources supported for scanning
|
Vulnerability scanning
|
AWS
|
|
Google Cloud
|
|
|
Microsoft Azure
|
|
|
Anti-malware scanning
|
AWS
|
|
Google Cloud
|
|
|
Microsoft Azure
|
|
Vulnerability detections are available in the following locations in the Trend Vision One console:
-
-
-
-
-
-
-
Cloud asset profile screens in
When viewing vulnerability detections, expand the associated risk event on the list
to see available remediation or mitigation options and metadata associated with the
detection. Use the provided metadata to execute a query in the Search app and learn more about the detection.
Once remediated or mitigated, risk events associated with most cloud resource vulnerability
detections no longer appear in Attack Surface Risk Management after the next daily scan. Vulnerabilities in container images remain visible in
for seven days after patching.Malware detections are available in the following locations in the Trend Vision One console:
-
-
-
-
-
Cloud asset profile screens in
When viewing malware detections, expand the associated risk event to see metadata
associated with the detection. Use the metadata to execute queries in the Search app and further investigate the threat. To learn about available remediation options,
click View options under the risk event.
TipWhen executing queries in the Search app, you may search for the partition containing
the malware using the file system universal unique identifier (UUID). If the file
system UUID is not available in the detection metadata, you can find the UUID using CLI commands.
|
Once remediated, risk events associated with most cloud resource malware detections
no longer appear in Attack Surface Risk Management after the next daily anti-malware scan. Malware detections in container images remain
in
for seven days after remediation.