Views:

Use Agentless Vulnerability & Threat Detection to scan for and detect vulnerabilities and malware in your cloud environment.

Important
Important
This is a pre-release sub-feature and is not part of the existing features of an official commercial or general release. Please review the Pre-release sub-feature disclaimer before using the sub-feature.
Agentless Vulnerability & Threat Detection is a serverless function enabled in your connected cloud accounts. The function scans supported cloud resources for vulnerabilities and malware without impact to other resources or running applications. The function only activates during a scan and scales dynamically to meet the needs of the scanning process within a set resource limit. All collected data is analyzed within the serverless function, and only metadata is sent to Trend Vision One. Your data does not leave your cloud account.
Agentless Vulnerability & Threat Detection currently supports the following cloud providers:
Vulnerability scanning inspects your cloud resources for known CVEs. Anti-malware scanning scans your cloud resources to identify potential malware, including viruses, Trojans, spyware, and more. Scans occur once per day, starting when you first connect your cloud account and enable the feature. Scan times are not configurable after deployment.
Note
Note
Anti-malware scanning is not enabled for AWS accounts by default. After enabling the feature, anti-malware scans begin during the next daily scan.
Scan results are sent to Trend Vision One for review. If results contain vulnerabilities or malware, suggested remediation options are displayed for the associated risk event in Attack Surface Risk ManagementOperations Dashboard.
The following table lists the cloud provider resources that Agentless Vulnerability & Threat Detection supports.
Feature
Cloud provider
Resources supported for scanning
Vulnerability scanning
AWS
  • EBS volumes attached to EC2 instances
  • ECR images with the "latest" tag
  • Lambda functions and attached Lambda layers
Google Cloud
  • Hyperdisks and Persistent Disks attached to Compute Engine instances
  • Artifact Registry container images
Microsoft Azure
  • Managed disks that support use as an OS disk and are attached to VMs
  • Container Registry container images
Anti-malware scanning
AWS
  • EBS volumes attached to EC2 instances
  • Container images in ECR repositories
  • Serverless Lambda functions
Google Cloud
  • Hyperdisks and Persistent Disks attached to Compute Engine instances
  • Artifact Registry container images
Microsoft Azure
  • Managed disks that support use as an OS disk and are attached to VMs
  • Container Registry container images
Vulnerability detections are available in the following locations in the Trend Vision One console:
  • Cloud PostureCloud Overview
  • Executive DashboardRisk OverviewCloud AssetsRisk Factors
  • Executive DashboardExposure OverviewVulnerabilities
  • Operations DashboardRisk Reduction Measures
  • Operations DashboardAll Risk Events
  • Operations DashboardVulnerabilities
  • Cloud asset profile screens in Attack Surface DiscoveryCloud AssetsCloud Asset List
When viewing vulnerability detections, expand the associated risk event on the list to see available remediation or mitigation options and metadata associated with the detection. Use the provided metadata to execute a query in the Search app and learn more about the detection.
Once remediated or mitigated, risk events associated with most cloud resource vulnerability detections no longer appear in Attack Surface Risk Management after the next daily scan. Vulnerabilities in container images remain visible in Operations DashboardVulnerabilities for seven days after patching.
Malware detections are available in the following locations in the Trend Vision One console:
  • Cloud PostureCloud Overview
  • Operations DashboardAll Risk Events
  • Operations DashboardRisk Reduction Measures
  • Operations DashboardThreat Detection
  • Cloud asset profile screens in Attack Surface DiscoveryCloud AssetsCloud Asset List
When viewing malware detections, expand the associated risk event to see metadata associated with the detection. Use the metadata to execute queries in the Search app and further investigate the threat. To learn about available remediation options, click View options under the risk event.
Tip
Tip
When executing queries in the Search app, you may search for the partition containing the malware using the file system universal unique identifier (UUID). If the file system UUID is not available in the detection metadata, you can find the UUID using CLI commands.
Once remediated, risk events associated with most cloud resource malware detections no longer appear in Attack Surface Risk Management after the next daily anti-malware scan. Malware detections in container images remain in Operations DashboardAll Risk Events for seven days after remediation.