Views:

SHA-256 Support Added to Suspicious Object Actions for Endpoint Security

April 11, 2025—Trend Vision One Endpoint Security agents now support "Log" and "Block" actions for File SHA-256 objects within the Suspicious Object List. This enhances threat response capabilities by allowing direct action on SHA-256 hashes identified as suspicious across Windows, Mac, and Linux platforms.
For more information, see Suspicious Object Management .
Threat IntelligenceSuspicious Object Management

Tag Management in Container Security

April 9, 2025—Trend Vision One now supports adding custom tags to your clusters in Container Security using Tag Management. You can assign tags to specific assets to gain visibility across all Trend Vision One applications and keep your assets organized.
For more information, see Tag Management.
Cloud SecurityContainer Security

Remote shell command drivelist

April 9, 2025—Trend Vision One Endpoint Sensor introduces a new command in the remote shell, drivelist. This command lists detailed drive information across Windows, Linux, and macOS platforms.
Workflow and AutomationResponse Management

Project Centric View now available for CREM Cloud Risk Management users

April 8, 2025—You can now view your resources and risk events grouped by Project defined automatically in your Cloud Projects and adjusted manually through cloud platform accounts, cloud platform tags, and Trend Vision One tags. You can also define new Projects based on conditions based on Asset name, Asset type, Provider, Region, Location, Account Name, and Cloud Provider Asset Tags. For more information, see Project Centric Overview.
Cloud SecurityCloud Risk ManagementCloud Security Posture

Integration of Trend Vision One with Google Security Operations SIEM

April 7, 2025—Trend Vision One now integrates with Google Security Operations (Google SecOps) SIEM. This integration facilitates efficient data sharing, enabling Trend Vision One to send alerts, event data, container vulnerabilities, activity data, and audit logs to Google SecOps. Configure data feeds in Google SecOps to ingest this data and enhance your security telemetry analysis.
Workflow and AutomationThird-Party Integration

Enhanced data transfer configuration for Splunk HEC connector

April 7, 2025—The Splunk HEC connector introduces granular data selection based on asset tags. You can now specify which data gets transferred by choosing relevant tags, providing greater control and flexibility over the data shared with Splunk Cloud.
For more information, see Splunk HEC connector configuration.
Workflow and AutomationThird-Party Integration

Asset tagging for endpoints and container clusters now supported

April 7, 2025—Asset tagging for endpoints and container clusters is now supported. Trend Vision One can now enrich your custom tags with asset activity and detection data, allowing you to leverage Search and Detection Model Management.
XDR Threat InvestigationSearch
XDR Threat InvestigationDetection Model Management

Security Awareness Training Campaign playbooks now available

April 1, 2025—Security Playbooks is introducing a new playbook template: Security Awareness Training Campaign. This type of playbook is designed to enhance your organization's security posture by creating targeted security awareness training campaigns for user accounts identified in account compromise and XDR detection risk events.
Workflow and AutomationSecurity Playbooks

Compliance Management official release

April 1, 2025—Compliance Management is now officially released and includes the following exciting features:
  • New supported frameworks: CMMC Level 1 Version 2.13, CMMC Level 2 Version 2.13, CMMC Level 3 Version 2.13, ISO/IEC 27001:2022, and PCI DSS v4.0.1.
  • Asset group pass rates by framework or standard: Gain visibility on each asset group pass rate based on your selected frameworks to target improvements for better overall compliance performance.
  • Tagged and untagged asset pass rates: View the pass rate for tagged and untagged assets to ensure that all assets meet compliance standards.
  • PDF reports of your organization’s pass rate for each selected framework: View actionable and comprehensive recommendations and analysis generated by AI, and simplify the audit preparation process with easy-to-share reports.
  • Custom frameworks: Tailor frameworks to specific industry requirements and ensure more relevant and effective compliance checks, greatly reducing the need for manual compliance audits.
Cyber Risk Exposure ManagementCompliance Management