SHA-256 Support Added to Suspicious Object Actions for Endpoint Security
April 11, 2025—Trend Vision One Endpoint Security agents now support "Log" and "Block"
actions for File SHA-256 objects within the Suspicious Object List. This enhances
threat response capabilities by allowing direct action on SHA-256 hashes identified
as suspicious across Windows, Mac, and Linux platforms.
For more information, see Suspicious Object Management .
Tag Management in Container Security
April 9, 2025—Trend Vision One now supports adding custom tags to your clusters in Container Security using Tag
Management. You can assign tags to specific assets to gain visibility across all Trend Vision One applications and keep your assets organized.
For more information, see Tag Management.
Remote shell command drivelist
April 9, 2025—Trend Vision One Endpoint Sensor introduces a new command in the remote
shell,
drivelist
. This command lists detailed drive information across Windows, Linux, and macOS platforms.Project Centric View now available for CREM Cloud Risk Management users
April 8, 2025—You can now view your resources and risk events grouped by Project defined automatically in your Cloud Projects and adjusted manually through cloud
platform accounts, cloud platform tags, and Trend Vision One tags. You can also define
new Projects based on conditions based on Asset name, Asset type, Provider, Region,
Location, Account Name, and Cloud Provider Asset Tags. For more information, see Project Centric
Overview.
Integration of Trend Vision One with Google Security Operations SIEM
April 7, 2025—Trend Vision One now integrates with Google Security Operations (Google SecOps) SIEM. This integration facilitates efficient data sharing, enabling Trend Vision One to send alerts, event data, container vulnerabilities, activity data, and audit logs
to Google SecOps. Configure data feeds in Google SecOps to ingest this data and enhance your security
telemetry analysis.
For more information, see Google Security Operations SIEM integration.
Enhanced data transfer configuration for Splunk HEC connector
April 7, 2025—The Splunk HEC connector introduces granular data selection based on
asset tags. You can now specify which data gets transferred by choosing relevant tags,
providing greater control and flexibility over the data shared with Splunk Cloud.
For more information, see Splunk HEC connector configuration.
Asset tagging for endpoints and container clusters now supported
April 7, 2025—Asset tagging for endpoints and container clusters is now supported.
Trend Vision One can now enrich your custom tags with asset activity and detection
data, allowing you to leverage Search and Detection Model Management.
Security Awareness Training Campaign playbooks now available
April 1, 2025—Security Playbooks is introducing a new playbook template: Security
Awareness Training Campaign. This type of playbook is designed to enhance your organization's
security posture by creating targeted security awareness training campaigns for user
accounts identified in account compromise and XDR detection risk events.
For more information, see Creating Security Awareness Training Campaign playbooks.
Compliance Management official release
April 1, 2025—Compliance Management is now officially released and includes the following
exciting features:
-
New supported frameworks: CMMC Level 1 Version 2.13, CMMC Level 2 Version 2.13, CMMC Level 3 Version 2.13, ISO/IEC 27001:2022, and PCI DSS v4.0.1.
-
Asset group pass rates by framework or standard: Gain visibility on each asset group pass rate based on your selected frameworks to target improvements for better overall compliance performance.
-
Tagged and untagged asset pass rates: View the pass rate for tagged and untagged assets to ensure that all assets meet compliance standards.
-
PDF reports of your organization’s pass rate for each selected framework: View actionable and comprehensive recommendations and analysis generated by AI, and simplify the audit preparation process with easy-to-share reports.
-
Custom frameworks: Tailor frameworks to specific industry requirements and ensure more relevant and effective compliance checks, greatly reducing the need for manual compliance audits.