How do I address a stack removal error that is preventing me from redeploying Agentless Vulnerability & Threat Detection?
Correct missing permission issues that could prevent Agentless Vulnerability & Threat Detection redeployment.
-
In AWS CloudFormation, go to.
-
Select the StackSet you want to remove.
-
From the Actions list, select Delete stacks from StackSet.
-
On the Set deployment options page, copy the AWS account number and add the number to Account numbers.
-
In the Specify regions area, click Add all regions.
-
In the Deployment options area, enable Retain stacks.
-
Click Next.
-
On the Review page, click Submit.
-
Clicking Submit deletes the stacks from the StackSet.
-
-
Go back to the Actions list and click Delete StackSet.The StackSet is now deleted.
-
To remove any problematic stacks in CloudFormation that failed to delete, select each stack you want to remove and click Retry Delete.
How do I remove residual AWS log groups and Lambda functions blocking Agentless Vulnerability & Threat Detection redeployment?
Learn to solve a common error that could prevent you from updating or redeploying Agentless Vulnerability & Threat Detection
The following resources failed to create: [GenerateSentryAPITokenLog, ReplicateSentryAPITokenLog,
FilterUnsupportedRegionsLog]
, follow the steps below to resolve the issue.Procedure
- Sign in to the AWS CloudWatch console for the region experiencing the errors.
- Locate and remove the log groups left over from the previous Agentless Vulnerability
& Threat detection deployment.
- Search for log groups using the keywords sentry or v1-common.
- Delete all matching log groups, including but not limited to:
-
GenerateSentryAPITokenLog
-
ReplicateSentryAPITokenLog
-
FilterUnsupportedRegionsLog
-
- Sign in to the AWS Lambda console for the region experiencing the errors.
- Locate and remove the Lambda functions left over from the previous Agentless Vulnerability
& Threat detection deployment.
- Search for Lambda functions using the keywords sentry or v1-common.
- Delete any matching Lambda functions if they exist.
- After all residual resources are removed, retry the update or stack redeployment.
How do I disable Agentless Vulnerability & Threat Detection scanning without deleting the feature stack?
Disable vulnerability and anti-malware scanning by Agentless Vulnerability & Threat Detection for your AWS account without removing the feature stack.
Procedure
- In the Trend Vision One console, go to .
- In the AWS tab, select the AWS account you wish to reconfigure.
- Under Stack update in Cloud account settings, expand Agentless Vulnerability & Threat Detection and click Scanner settings.
- To completely disable scans, deselect all resource types, including EBS, ECR, and Lambda, for both vulnerability scanning and anti-malware.
- Click Save changes.All scans are effectively disabled. You may still incur minimal costs due to Agentless Vulnerability & Threat Detection stack resources running in the background.
How do I remove the Agentless Vulnerability & Threat Detection stack and all deployed resources?
Learn how to fully remove Agentless Vulnerability & Threat Detection resources from your AWS account.
Procedure
- In the Trend Vision One console, go to .
- In the AWS tab, select the AWS account you wish to reconfigure.
- Under Stack update in Cloud account settings, disable Agentless Vulnerability & Threat Detection.
- Update your AWS stack.
How do I remove my AWS account from Trend Vision One and delete all deployed Trend Vision One stacks from the account?
Learn how to completely remove an AWS account from Trend Vision One and delete all deployed Trend Vision One resources.
Procedure
- In the AWS console, search for all stacks deployed by Trend Vision One using the
TrendMicroProduct
tag. For a list of deployed stack resources by feature, see Trend Vision One AWS services. - Delete all deployed stacks, including the Agentless Vulnerability & Threat Detection stack, from your AWS account.
- In the Trend Vision One console, go to .
- Select the AWS account you wish to remove and click Remove.
- Copy any information you wish to save, then confirm removal of the selected account.
How do I ensure my Agentless Vulnerability & Threat Detection stack is compatible with Cyber Risk Exposure Management pricing packages?
Learn what to do to ensure your deployed Agentless Vulnerability & Threat Detection stack is supported by the pricing packages available for Cyber Risk Exposure Management.
-
The stack was deployed prior to June 2024
-
The stack has never been updated
-
The template version uses is earlier than version 1.360.051518050