Views:

Set up an identity access management (IAM) role for an Amazon Elastic Compute Cloud (EC2) instance

Procedure

  1. Go to IAMRoles.
  2. Create a new role.
  3. Select EC2 as the Trusted entity type.
  4. Add the following permission policies to the role:
    • AmazonSSMFullAccess
    • AmazonSSMManagedInstanceCore
    • EC2InstanceProfileForImageBuilder
  5. Name the role.
  6. Finish creating the role.
  7. Edit the role to add the following inline policy:
    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Sid": "VisualEditor0",
                "Effect": "Allow",
                "Action": [
                    "ssm:PutParameter",
                    "ssm:LabelParameterVersion",
                    "ssm:DeleteParameter",
                    "ssm:UnlabelParameterVersion",
                    "ssm:DescribeParameters",
                    "ssm:GetParameterHistory",
                    "ssm:DescribeDocumentParameters",
                    "ssm:GetParametersByPath",
                    "ssm:GetParameters",
                    "ssm:GetParameter",
                    "ssm:DeleteParameters",
                    "s3:get*",
                    "s3:List*",
                    "imagebuilder:GetComponent"
                ],
                "Resource": "*"
            }
        ]
    }

Next steps

Create a recipe with a Trend Vision One Endpoint Security agent component

Procedure

  1. In EC2 Image Builder, go to Images recipes.
  2. Create an image recipe.
  3. Retrieve the Trend Vision One Endpoint Security agent component corresponding to Linux or Windows from AWS Marketplace images.
  4. Select a managed instance from AWS with one of the supported versions of the following operating systems:
    Linux Windows
    Amazon Linux 2
    Microsoft Windows Server 2019
    Amazon Linux 2023
    Microsoft Windows Server 20H2
    Ubuntu 20
    Microsoft Windows Server 2022
    Ubuntu 22
    Microsoft Windows Server 2025
    Ubuntu 24.04
     
    CentOS Linux 8
     
    CentOS Stream 8
     
    Red Hat Enterprise Linux 8
     
    Red Hat Enterprise Linux 9
     
    SUSE Linux Enterprise Server 12
     
    SUSE Linux Enterprise Server 15
     
  5. Ensure the working directory is /tmp for Linux and C:/ for Windows.
  6. Select the component for Trend Vision One Endpoint Security agent that corresponds to either Linux or Windows.
  7. Finish creating the recipe.

Next steps

Create an image pipeline

Procedure

  1. In the EC2 Image Builder, go to Image pipelines.
  2. Create a new pipeline.
  3. Name the pipeline.
  4. Make the build schedule manual.
  5. Select the recipe and infrastructure configuration.
  6. Finish creating the pipeline.

Next steps

Create the infrastructure configuration

Procedure

  1. In EC2 Image Builder, go to Infrastructure configurations.
  2. Create a new configuration.
  3. Select the identity access management (IAM) role.
  4. Ensure the instance type is c3.large or t3.large.
  5. Finish creating the configuration.

Next steps

Launch an Elastic Compute Cloud (EC2) from Amazon Machine Image (AMI)

Procedure

  1. Run the pipeline.
  2. When the pipeline is complete, launch an EC2 from the resulting AMI.
  3. Ensure the instance type is c3.large for Linux or t3.large for Windows.
  4. Under Advanced details, select the identity access management (IAM) role.
  5. Launch the instance.

Next steps

Connect an Amazon Elastic Compute Cloud (EC2) instance to Trend Vision One

Procedure

  1. Go to the instance created using the Amazon Machine Image (AMI).
  2. Connect to the EC2.
  3. Go to /tmp on Linux or C:\tmp on Windows.
  4. Depending on your operating system, run the following commands:
    • On Linux, as the root user:
      sh installVisionOneEndpoint.sh
    • On Windows:
      Invoke-WebRequest -Uri “https://awscli.amazonaws.com/AWSCLIV2.msi” -OutFile “$env:TEMP\AWSCLIV2.msi”
      Start-Process msiexec.exe -Wait -ArgumentList ‘/i’, “$env:TEMP\AWSCLIV2.msi”, ‘/qn’
      .\installVisionOneEndpoint.ps1
The EC2 connects to Trend Vision One and appears under Endpoint SecurityEndpoint Inventory.