Publisher: Trend Micro
Connector Version: 1.1.1
Product Vendor: Trend Micro
Product Name: VisionOne
Product Version Supported (regex): ".*"
Minimum Product Version: 5.5.0
Trend Micro Vision One is a purpose-built threat defense platform that provides added value and new benefits beyond XDR solutions, allowing you to see more and respond faster. Providing deep and broad extended detection and response (XDR) capabilities that collect and automatically correlate data across multiple security layers—email, endpoints, servers, cloud workloads, and networks—Trend Micro Vision One prevents the majority of attacks with automated protection
Welcome to the open-source repository for Splunk> Phantom's trendmicrovisionone App.
Please have a look at our Contributing Guide if you are interested in contributing, raising issues, or learning more about open-source Phantom apps.
This Phantom App is licensed under the Apache 2.0 license. Please see our Contributing Guide for further details.
Support and maintenance for this integration are provided by the author. Please use the following contact details:
- Email : integrations@trendmicro.com
Trend Micro Vision One is a purpose-built threat defense platform that provides added value and new benefits beyond XDR solutions, allowing you to see more and respond faster. Providing deep and broad extended detection and response (XDR) capabilities that collect and automatically correlate data across multiple security layers—email, endpoints, servers, cloud workloads, and networks—Trend Micro Vision One prevents the majority of attacks with automated protection.
The app uses HTTPS protocol for communicating with the VisionOne API server. Below are the default ports used by the Splunk SOAR Connector.
SERVICE NAME | TRANSPORT PROTOCOL | PORT |
---|---|---|
https | tcp | 443 |
The below configuration variables are required for this Connector to operate. These variables are specified when configuring a Trend Micro Vision One asset in SOAR.
VARIABLE | REQUIRED | TYPE | DESCRIPTION |
---|---|---|---|
api_url | required | string | The URL for your ETP instance |
api_key | required | password | API key |
- Navigate to Apps > Unconfigured Apps .
- Search for Trend Micro Vision One.
- Click CONFIGURE NEW ASSET to create and configure a new integration instance.
- ALternatively click on INSTALL APP and drop a tarball of the app
Parameter | Description | Required |
---|---|---|
Asset name | Unique name for this Trend Micro Vision One instance runner asset | True |
Asset description | Short description of the asset's purpose | True |
Product vendor | Trend Micro | True |
Product name | Vision One | True |
Tags | Optional tags to use in Playbooks | False |
API_URL | Vision One API URL | True |
API_TOKEN | Vision One API Token | True |
Polling interval (minutes) | How often should security incident events be updated from Vision One | False |
- Click TEST CONNECTIVITY to validate the URLs, token, and connection.
You can execute these commands from the Splunk SOAR CLI, as part of an automation, or in a playbook.
add to block list
Argument Name | Description | Required |
---|---|---|
value_type | "file_sha1", "ip", "domain", "url" or "mailbox" | Required |
target_value | The object you would like to add that matches the value-type | Required |
product_id | Target product | Optional |
description | Description | Optional |
Path | Type | Description |
---|---|---|
VisionOne.BlockList.actionId | String | The action id |
VisionOne.BlockList.taskStatus | String | Status of existing task |
Note: To get the complete task status run polling command status check
giving
actionId
as input parameter.
remove from block list
Argument Name | Description | Required |
---|---|---|
value_type | "file_sha1", "ip", "domain", "url" or "mailbox" | Required |
target_value | The object you would like to add that matches the value-type | Required |
product_id | Target product | Optional |
description | Description | Optional |
Path | Type | Description |
---|---|---|
VisionOne.BlockList.actionId | String | The action id |
VisionOne.BlockList.taskStatus | String | Status of existing task |
Note: To get the complete task status run polling command status check
giving
actionId
as input parameter.
quarantine email message
Argument Name | Description | Required |
---|---|---|
message_id | Email Message ID from Trend Micro Vision One message activity data | Required |
mail_box | Email mailbox where the message will be quarantied from | Required |
message_delivery_time | Email message's original delivery time | Required |
product_id | Target product | Optional |
description | Description | Optional |
Path | Type | Description |
---|---|---|
VisionOne.Email.actionId | String | The action id |
VisionOne.Email.taskStatus | String | Status of existing task |
Note: To get the complete task status run polling command status check
giving
actionId
as input parameter.
delete email message
Argument Name | Description | Required |
---|---|---|
message_id | Email Message ID from Trend Micro Vision One message activity data | Required |
mail_box | Email mailbox where the message will be deleted from | Required |
message_delivery_time | Email message's original delivery time | Required |
product_id | Target product | Optional |
description | Description | Optional |
Path | Type | Description |
---|---|---|
VisionOne.Email.actionId | String | The action id |
VisionOne.Email.taskStatus | String | Status of existing task |
Note: To get the complete task status run polling command status check
giving
actionId
as input parameter.
quarantine device
Argument Name | Description | Required |
---|---|---|
endpoint | "hostname", "macaddr" or "ip" of the endpoint to isolate | Required |
product_id | Target product: "sao" or "sds". Default: "sao". | Required |
description | Description | Optional |
Path | Type | Description |
---|---|---|
VisionOne.Endpoint_Connection.actionId | String | The action id |
VisionOne.Endpoint_Connection.taskStatus | String | Status of existing task |
Note: To get the complete task status run polling command status check
giving
actionId
as input parameter. Note: The above command should be added with execution
timeout in the advanced field of playbook execution. The recommended timeout be
20 minutes
.
unquarantine device
Argument Name | Description | Required |
---|---|---|
endpoint | "hostname", "macaddr" or "ip" of the endpoint to restore connectivity | Required |
product_id | Target product: "sao" or "sds". Default: "sao". | Required |
description | Description | Optional |
Path | Type | Description |
---|---|---|
VisionOne.Endpoint_Connection.actionId | String | The action id |
VisionOne.Endpoint_Connection.taskStatus | String | Status of existing task |
Note: To get the complete task status run polling command status check
giving
actionId
as input parameter. Note: The above command should be added with execution
timeout in the advanced field of playbook execution. The recommended timeout be
20 minutes
.
add to exception list
Argument Name | Description | Required |
---|---|---|
type | The object type: "domain", "ip", "sha1", or "url" | Required |
value | Full and partial matches supported. Domain partial match, (with a wildcard as the subdomain, example, .example.com) IP partial match, (IP range example, 192.168.35.1-192.168.35.254, cidr example, 192.168.35.1/24) URL partial match, (Supports wildcards 'http://.'', 'https://.'' at beginning, or ''' at the end. Multiple wild cards also supported, such as , https://.example.com/path1/ ) SHA1 only full match" | Required |
description | Description | Optional |
Path | Type | Description |
---|---|---|
VisionOne.Exception_List.message | String | Status message of existing task |
VisionOne.Exception_List.status_code | String | Response code of existing task |
VisionOne.Exception_List.total_items | String | Number of items present in the exception list. |
delete from exception list
Argument Name | Description | Required |
---|---|---|
type | The object type: "domain", "ip", "sha1", or "url" | Required |
value | The object value | Required |
description | Description | Optional |
Path | Type | Description |
---|---|---|
VisionOne.Exception_List.message | String | Status message of existing task |
VisionOne.Exception_List.status_code | String | Response code of existing task |
VisionOne.Exception_List.total_items | String | Number of items present in the exception list. |
add to suspicious list
Argument Name | Description | Required |
---|---|---|
type | The object type: "domain", "ip", "sha1", or "url" | Required |
value | The object value | Required |
description | Description | Optional |
scan_action | The action to take if object is found. If you don't use this parameter, the scan action specified in default_settings.riskLevel.type will be used instead. "block" or "log" | Optional |
risk_level | The Suspicious Object risk level. If you don't use this parameter, high will be used instead. "high", "medium", or "low" | Optional |
expiry (days) | The number of days to keep the object in the Suspicious Object List. If you don't use this parameter, the default_settings.expiredDay scan action will be used instead. | Optional |
Path | Type | Description |
---|---|---|
VisionOne.Suspicious_List.message | String | Status message of existing task |
VisionOne.Suspicious_List.status_code | String | Response code of existing task |
VisionOne.Suspicious_List.total_items | String | Number of items present in the exception list. |
delete from suspicious list
Argument Name | Description | Required |
---|---|---|
type | The object type: "domain", "ip", "sha1", or "url" | Required |
value | The object value | Required |
Path | Type | Description |
---|---|---|
VisionOne.Suspicious_List.message | String | Status message of existing task |
VisionOne.Suspicious_List.status_code | String | Response code of existing task |
VisionOne.Suspicious_List.total_items | String | Number of items present in the exception list. |
terminate process
Argument Name | Description | Required |
---|---|---|
endpoint | "hostname", "macaddr" or "ip" of the endpoint to terminate process on | Required |
file_sha1 | SHA1 hash of the process to terminate | Required |
product_id | Target product. Default: "sao" | Optional |
description | Description | Optional |
filename | Optional file name list for log | Optional |
Path | Type | Description |
---|---|---|
VisionOne.Terminate_Process.actionId | String | The action id |
VisionOne.Terminate_Process.taskStatus | String | Status of existing task |
Note: To get the complete task status run polling command status check
giving
actionId
as input parameter. Note: The above command should be added with execution
timeout in the advanced field of playbook execution. The recommended timeout is
20 minutes
.
get file analysis status
Argument Name | Description | Required |
---|---|---|
task_id | task_id from the trendmicro-visionone-submit-file-to-sandbox command output | Required |
Path | Type | Description |
---|---|---|
VisionOne.File_Analysis_Status.message | String | Message status |
VisionOne.File_Analysis_Status.code | String | Code status of the task |
VisionOne.File_Analysis_Status.task_id | String | Task id |
VisionOne.File_Analysis_Status.taskStatus | String | Task status |
VisionOne.File_Analysis_Status.digest | String | Hash value of task |
VisionOne.File_Analysis_Status.analysis_completion_time | String | Task completion time |
VisionOne.File_Analysis_Status.risk_level | String | Risk level of task |
VisionOne.File_Analysis_Status.description | String | Description of task |
VisionOne.File_Analysis_Status.detection_name_list | String | List of task detected |
VisionOne.File_Analysis_Status.threat_type_list | String | Threat type list |
VisionOne.File_Analysis_Status.file_type | String | Type of file |
VisionOne.File_Analysis_Status.report_id | String | Report ID of task. |
get file analysis report
Argument Name | Description | Required |
---|---|---|
report_id | report_id of the sandbox submission retrieved from the trendmicro-visionone-get-file-analysis-status command | Required |
type | Type of report to retrieve: "vaReport", "investigationPackage", or "suspiciousObject" | Required |
Path | Type | Description |
---|---|---|
VisionOne.File_Analysis_Report.message | String | Message status |
VisionOne.File_Analysis_Report.code | String | Code status of task |
VisionOne.File_Analysis_Report.type | String | type of report |
VisionOne.File_Analysis_Report.value | String | value of the above type |
VisionOne.File_Analysis_Report.risk_level | String | risk level of the file |
VisionOne.File_Analysis_Report.analysis_completion_time | String | Final analysed time of report |
VisionOne.File_Analysis_Report.expired_time | String | Expiry time of report |
VisionOne.File_Analysis_Report.root_file_sha1 | String | sha value of the root file |
collect file
Argument Name | Description | Required |
---|---|---|
endpoint | "hostname", "macaddr" or "ip" of the endpoint to collect file from | Required |
product_id | Product: "sao" "xes" "sds" | Required |
file_path | Path of the forensic file to collect | Required |
os | "windows", "mac" or "linux" | Required |
description | Description of file collected | Optional |
Path | Type | Description |
---|---|---|
VisionOne.Collect_Forensic_File.actionId | String | Action id of the running task |
VisionOne.Collect_Forensic_File.taskStatus | String | Status of the running task |
Note: To get the complete task status run polling command status check
giving
actionId
as input parameter. Note: The above command should be added with execution
timeout in the advanced field of playbook execution. The recommended timeout be
20 minutes
.
download information collected file
Argument Name | Description | Required |
---|---|---|
actionId | actionId output from the collect command used to collect the file | Required |
Path | Type | Description |
---|---|---|
VisionOne.Download_Information_For_Collected_Forensic_File.url | String | URL of the collected file |
VisionOne.Download_Information_For_Collected_Forensic_File.expires | String | URL expiration date |
VisionOne.Download_Information_For_Collected_Forensic_File.password | String | Archive password for the protected forensic file |
VisionOne.Download_Information_For_Collected_Forensic_File.filename | String | Name of the collected file |
Note: The URL received from the
'trendmicro-visionone-download-information-for-collected-forensic-file' will be valid for only
60 seconds
submit file to sandbox
Argument Name | Description | Required |
---|---|---|
file_url | URL pointing to the location of the file to be submitted. | Required |
filename | Name of the file to be analyzed. | Required |
document_password | The password for decrypting the submitted document. The value must be Base64-encoded. The maximum password length is 128 bytes prior to encoding. | Optional |
archive_password | The password for decrypting the submitted archive. The value must be Base64-encoded. The maximum password length is 128 bytes prior to encoding. | Optional |
Path | Type | Description |
---|---|---|
VisionOne.Submit_File_to_Sandbox.message | String | Message status of the sandbox file |
VisionOne.Submit_File_to_Sandbox.code | String | Code status of the sandbox file |
VisionOne.Submit_File_to_Sandbox.task_id | String | Task ID of the running task |
VisionOne.Submit_File_to_Sandbox.digest | Object | Sha value of the file |
status check
Argument Name | Description | Required |
---|---|---|
actionId | Action ID of the task you would like to get the status of. | Required |
Path | Type | Description |
---|---|---|
VisionOne.Endpoint_Connection.actionId | String | The action id |
VisionOne.Endpoint_Connection.taskStatus | String | Status of existing task |
get endpoint info
Argument Name | Description | Required |
---|---|---|
endpoint | "hostname", "macaddr" or "ip" of the endpoint to query | Required |
Path | Type | Description |
---|---|---|
VisionOne.Endpoint_Info.message | String | Message information from the request. |
VisionOne.Endpoint_Info.errorCode | Integer | Error code. |
VisionOne.Endpoint_Info.status | String | Status of the request. |
VisionOne.Endpoint_Info.logonAccount | String | Account currently logged on to the endpoint. |
VisionOne.Endpoint_Info.hostname | String | Hostname. |
VisionOne.Endpoint_Info.macAddr | String | MAC address. |
VisionOne.Endpoint_Info.ip | String | IP address. |
VisionOne.Endpoint_Info.osName | String | Operating System name. |
VisionOne.Endpoint_Info.osVersion | String | Operating System version. |
VisionOne.Endpoint_Info.osDescription | String | Description of the Operating System. |
VisionOne.Endpoint_Info.productCode | String | Product code of the Trend Micro product running on the endpoint. |
add note
Argument Name | Description | Required |
---|---|---|
source data identifier (workbench id) | Workbench id of security incident in Vision One | Required |
content | note to be added to the workbench event | Required |
Path | Type | Description |
---|---|---|
VisionOne.Add_Note.Workbench_Id | String | Workbench ID that the action was executed on. |
VisionOne.Add_Note.noteId | String | Note ID. |
VisionOne.Add_Note.response_code | String | Response code for the request. |
VisionOne.Add_Note.response_msg | String | Response message for the request. |
update status
Argument Name | Description | Required |
---|---|---|
source data identifier (workbench_id) | The ID of the workbench alert that you would like to update the status for. | Required |
status | The status to assign to the workbench alert: new, in_progress, resolved_false_positive, resolved_true_positive | Required |
Path | Type | Description |
---|---|---|
VisionOne.Update_Status.Workbench_Id | String | Workbench ID that the action was executed on. |
VisionOne.Update_Status.response_code | String | Response code for the request. |
VisionOne.Update_Status.response_msg | String | Response message for the request. |
This version of the Trend Micro app is compatible with Splunk SOAR version 5.1.0 and above.
The app uses HTTPS protocol for communicating with the Trend Micro Vision One server. For authentication a Vision One API Token is used by the Splunk SOAR Connector.
View Integration Documentation
The below configuration variables are required for this Connector to operate. These variables are specified when configuring a VisionOne asset in SOAR.
VARIABLE | REQUIRED | TYPE | DESCRIPTION |
---|---|---|---|
api_url | required | string | Vision One API URL (e.g. https://api.xdr.trendmicro.com) |
api_key | required | password | Vision One API Token |
test connectivity - Validate the asset configuration for connectivity using supplied configuration
get endpoint info - Gather information about an endpoint
quarantine device - Quarantine the endpoint
unquarantine device - Unquarantine the endpoint
on poll - Callback action for the on_poll ingest functionality
status check - Checks the status of a task
add to blocklist - Adds an item to the Suspicious Objects list in Vision One
remove from blocklist - Removes an item from the Suspicious Objects list
quarantine email message - Quarantine the email message
delete email message - Delete the email message
terminate process - Terminate the process running on the endpoint
add to exception - Add object to exception list
delete from exception - Delete object from exception list
add to suspicious - Add suspicious object to suspicious list
delete from suspicious - Delete the suspicious object from suspicious list
check analysis status - Get the status of file analysis based on task id
download analysis report - Get the analysis report of a file based on report id
collect forensic file - Collect forensic file
forensic file info - Get the download information for collected forensic file
start analysis - Submit file to sandbox for analysis
add note - Adds a note to an existing workbench alert
update status - Updates the status of an existing workbench alert
Validate the asset configuration for connectivity using supplied configuration
Type: test
Read only: True
Validate the asset configuration for connectivity using supplied configuration.
No parameters are required for this action
No Output
Gather information about an endpoint
Type: generic
Read only: False
Gather information about an endpoint.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip_hostname_mac | required | Hostname/IP/MAC of the endpoint to query (Required) | string | ip mac address host name |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.status | string | ||
action_result.data.*.errorCode | string | ||
action_result.data.*.result.logonAccount.value | string | ||
action_result.data.*.result.hostname.value | string | ||
action_result.data.*.result.macAddr.value | string | mac address |
|
action_result.data.*.result.ip.value | string | ip |
|
action_result.data.*.result.osName | string | ||
action_result.data.*.result.osVersion | string | ||
action_result.data.*.result.osDescription | string | ||
action_result.data.*.result.productCode | string | ||
action_result.parameter.ip_hostname_mac | string | ip mac address host name |
|
action_result.status | string | success failed | |
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Quarantine the endpoint
Type: contain
Read only: False
Quarantine the endpoint.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip_hostname_mac | required | Hostname/IP/MAC of endpoint to quarantine/isolate (Required) | string | ip mac address host name |
productid | required | Trend Micro product ID for quarantine task. 'sao' or 'sds'. Default: 'sao' (Required) | string | |
description | optional | Description for this activity (Optional) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.actionId | string | action id |
|
action_result.data.*.taskStatus | string | ||
action_result.status | string | success failed | |
action_result.parameter.ip_hostname_mac | string | ip mac address host name |
|
action_result.parameter.productid | string | ||
action_result.parameter.description | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Unquarantine the endpoint
Type: correct
Read only: False
Unquarantine the endpoint.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip_hostname_mac | required | Hostname/IP/MAC of endpoint to unquarantine/restore connectivity for (Required) | string | ip mac address host name |
productid | required | Trend Micro product ID for unquarantine task. 'sao' or 'sds'. Default: 'sao' (Required) | string | |
description | optional | Description for this activity (Optional) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.actionId | string | action id |
|
action_result.data.*.taskStatus | string | ||
action_result.status | string | success failed | |
action_result.parameter.ip_hostname_mac | string | ip mac address host name |
|
action_result.parameter.productid | string | ||
action_result.parameter.description | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Callback action for the on_poll ingest functionality
Type: ingest
Read only: True
Callback action for the on_poll ingest functionality.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
starttime | optional | Make sure time format matches following example (2020-06-15T10:00:00.000Z) | string | |
endtime | optional | Make sure time format matches following example (2020-06-15T12:00:00.000Z) | string | |
limit | optional | Limit of polling results. Default: limit=100 | numeric |
No Output
Checks the status of a task
Type: investigate
Read only: False
Checks the status of a particular task.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
action_id | required | Action ID of the task you would like to get the status of (Required) | string | action id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.action_id | string | action id |
|
action_result.data.*.taskStatus | string | ||
action_result.status | string | success failed | |
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Adds an item to the Suspicious Objects list in Vision One
Type: contain
Read only: False
Adds an item from the Trend Micro Vision One Suspicious Objects list.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
value_type | required | Type of object to be added ('domain', 'ip', 'sha1', or 'url') (Required) | string | |
target_value | required | The object you would like to add to the block list that matches the value-type (Required) | string | |
product_id | optional | Trend Micro ID of product (Optional) | string | |
description | optional | Description for this activity (Optional) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.actionId | string | action id |
|
action_result.data.*.taskStatus | string | ||
action_result.status | string | success failed | |
action_result.parameter.description | string | ||
action_result.parameter.product_id | string | ||
action_result.parameter.target_value | string | ||
action_result.parameter.value_type | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Removes an item from the Suspicious Objects list
Type: correct
Read only: False
Removes an item from the Trend Micro Vision One Suspicious Objects list.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
value_type | required | Type of object to be removed ('domain', 'ip', 'sha1', or 'url') (Required) | string | |
target_value | required | The object you would like to remove from block list that matches the value-type (Required) | string | |
product_id | optional | Trend Micro ID of product (Optional) | string | |
description | optional | Description for this activity (Optional) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.actionId | string | action id |
|
action_result.data.*.taskStatus | string | ||
action_result.status | string | success failed | |
action_result.parameter.description | string | ||
action_result.parameter.product_id | string | ||
action_result.parameter.target_value | string | ||
action_result.parameter.value_type | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Quarantine the email message
Type: contain
Read only: False
Retrieve data from the quarantine email message and send the result to dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
message_id | required | Email Message ID from Trend Micro Vision One message activity data (Required) | string | |
mailbox | required | Email mailbox where the message will be quarantied from (Required) | string | |
message_delivery_time | optional | Email message's original delivery time (format=YYYY-MM-DDTHH:MM:SS.000Z) (Required) | string | |
product_id | optional | Target product ID (Optional) | string | |
description | optional | Description for this activity (Optional) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.actionId | string | action id |
|
action_result.data.*.taskStatus | string | ||
action_result.status | string | success failed | |
action_result.parameter.message_id | string | ||
action_result.parameter.mailbox | string | ||
action_result.parameter.message_delivery_time | string | ||
action_result.parameter.product_id | string | ||
action_result.parameter.description | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Delete the email message
Type: correct
Read only: False
Retrieve data from the delete email message and relay result to Splunk.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
message_id | required | Email Message ID from Trend Micro Vision One message activity data (Required) | string | |
mailbox | required | Email mailbox where the message will be deleted from (Required) | string | |
message_delivery_time | optional | Email message's original delivery time (format=YYYY-MM-DDTHH:MM:SS.000Z) (Required) | string | |
product_id | optional | Target product ID (Optional) | string | |
description | optional | Description for this activity (Optional) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.actionId | string | action id |
|
action_result.data.*.taskStatus | string | ||
action_result.status | string | success failed | |
action_result.parameter.message_id | string | ||
action_result.parameter.mailbox | string | ||
action_result.parameter.message_delivery_time | string | ||
action_result.parameter.product_id | string | ||
action_result.parameter.description | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Terminate the process running on the endpoint
Type: contain
Read only: False
Terminate the process running on the endpoint and send results to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip_hostname_mac | required | Hostname, macaddr or ip of the endpoint to terminate process on (Required) | string | |
product_id | optional | Target product. Default: 'sao' (Optional) | string | |
description | optional | Description for this activity (Optional) | string | |
file_sha1 | required | SHA1 hash of the process to terminate (Required) | string | |
filename | optional | File name for log (Optional) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.actionId | string | action id |
|
action_result.data.*.taskStatus | string | ||
action_result.status | string | success failed | |
action_result.parameter.ip_hostname_mac | string | ||
action_result.parameter.product_id | string | ||
action_result.parameter.description | string | ||
action_result.parameter.file_sha1 | string | ||
action_result.parameter.filename | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Add object to exception list
Type: correct
Read only: False
Add the exception object to the exception list and send the result to Splunk.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
type | required | The object type: 'domain', 'ip', 'sha1', or 'url' (Required) | string | |
value | required | Full and partial matches supported. Domain partial match, (with a wildcard as the subdomain, example, .example.com) IP partial match, (IP range example, 192.168.35.1-192.168.35.254, cidr example, 192.168.35.1/24) URL partial match, (Supports wildcards 'http://.'', 'https://.'' at beginning, or ''' at the end. Multiple wild cards also supported, such as , https://.example.com/path1/) SHA1 only full match (Required) | string | |
description | optional | Description for this activity (Optional) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.message | string | ||
action_result.data.*.status_code | string | ||
action_result.data.*.total_items | numeric | ||
action_result.status | string | success failed | |
action_result.parameter.description | string | ||
action_result.parameter.type | string | ||
action_result.parameter.value | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Delete object from exception list
Type: correct
Read only: False
Delete the exception object from the exception list and relay data to Splunk.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
type | required | The object type: 'domain', 'ip', 'sha1', or 'url' (Required) | string | |
value | required | The object value (Required) | string | |
description | optional | Description for this activity (Optional) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.message | string | ||
action_result.data.*.status_code | string | ||
action_result.data.*.total_items | numeric | ||
action_result.status | string | success failed | |
action_result.parameter.description | string | ||
action_result.parameter.type | string | ||
action_result.parameter.value | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Add suspicious object to suspicious list
Type: contain
Read only: False
Add suspicious object to suspicious list and send the result to dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
type | required | The object type: 'domain', 'ip', 'sha1', or 'url' (Required) | string | |
value | required | The object value (Required) | string | |
description | optional | Description for this activity (Optional) | string | |
scan_action | optional | The action to take if object is found. If you don't use this parameter, the scan action specified in default_settings.riskLevel.type will be used instead. 'block' or 'log' (Optional) | string | |
risk_level | optional | The Suspicious Object risk level. If you don't use this parameter, high will be used instead. risk level (either 'high', 'medium' or 'low') (Optional) | string | |
expiry | optional | The number of days to keep the object in the Suspicious Object List. If you don't use this parameter, the default_settings.expiredDay scan action will be used instead (Optional) | numeric |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.message | string | ||
action_result.data.*.status_code | string | ||
action_result.data.*.total_items | numeric | ||
action_result.status | string | success failed | |
action_result.parameter.description | string | ||
action_result.parameter.type | string | ||
action_result.parameter.value | string | ||
action_result.parameter.scan_action | string | ||
action_result.parameter.risk_level | string | ||
action_result.parameter.expiry | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Delete the suspicious object from suspicious list
Type: correct
Read only: False
Delete the suspicious object from suspicious list and send the result to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
type | required | The object type: 'domain', 'ip', 'sha1', or 'url' (Required) | string | |
value | required | The object value (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.message | string | ||
action_result.data.*.status_code | string | ||
action_result.data.*.total_items | numeric | ||
action_result.status | string | success failed | |
action_result.parameter.type | string | ||
action_result.parameter.value | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Get the status of file analysis based on task id
Type: investigate
Read only: False
Get the status of file analysis based on task id and send result to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
task_id | required | Task_id from the trendmicro-visionone-start-analysis command output. Submission ID in Vision One (Required) | string | task id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.message | string | ||
action_result.data.*.code | string | ||
action_result.data.*.data.taskId | string | task id |
|
action_result.data.*.data.taskStatus | string | ||
action_result.data.*.data.digest | string | ||
action_result.data.*.data.analysisSummary.analysisCompletionTime | string | ||
action_result.data.*.data.analysisSummary.riskLevel | string | ||
action_result.data.*.data.analysisSummary.description | string | ||
action_result.data.*.data.analysisSummary.detectionNameList | string | ||
action_result.data.*.data.analysisSummary.threatTypeList | string | ||
action_result.data.*.data.analysisSummary.trueFileType | string | ||
action_result.data.*.data.reportId | numeric | report id |
|
action_result.status | string | success failed | |
action_result.parameter.task_id | string | task id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Get the analysis report of a file based on report id
Type: investigate
Read only: False
Get the analysis report of a file based on report id and send the results to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
report_id | required | Report_id of the sandbox submission retrieved from the trendmicro-visionone-check-analysis-status command (Required) | string | |
type | required | Type of report to retrieve: 'vaReport', 'nvestigationPackage', or 'suspiciousObject' (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.report_id | string | ||
action_result.parameter.type | string | ||
action_result.status | string | success failed | |
action_result.data | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Collect forensic file
Type: investigate
Read only: False
Collect forensic file and send result to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip_hostname_mac | required | IP/Hostname/MAC address of the endpoint to collect file from (Required) | string | |
product_id | required | Product: 'sao' 'xes' 'sds' (Required) | string | |
description | optional | Description of file collected (Optional) | string | |
file_path | required | Path of the forensic file to collect (Required) | string | |
os | optional | OS type (mac, windows or linux without version numbers) (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.actionId | string | action id |
|
action_result.data.*.taskStatus | string | ||
action_result.status | string | success failed | |
action_result.parameter.ip_hostname_mac | string | ||
action_result.parameter.product_id | string | ||
action_result.parameter.description | string | ||
action_result.parameter.file_path | string | ||
action_result.parameter.os | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Get the download information for collected forensic file
Type: investigate
Read only: False
Get the download information for collected forensic file and send the result to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
action_id | required | ActionId output from the collect command used to collect the file (Required) | string | action id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.data.url | string | file url url |
|
action_result.data.*.data.expires | string | ||
action_result.data.*.data.password | string | document pass archive pass |
|
action_result.data.*.data.filename | string | file name |
|
action_result.parameter.action_id | string | action id |
|
action_result.status | string | success failed | |
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Submit file to sandbox for analysis
Type: investigate
Read only: False
Submit file to sandbox for analysis and send the result to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
file_url | required | URL pointing to the location of the file to be submitted (Required) | string | |
file_name | required | Name of the file to be analyzed (Required) | string | |
document_pass | optional | The password for decrypting the submitted document. The value must be Base64-encoded. The maximum password length is 128 bytes prior to encoding (Optional) | string | |
archive_pass | optional | The password for decrypting the submitted archive. The value must be Base64-encoded. The maximum password length is 128 bytes prior to encoding (Optional) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.code | string | ||
action_result.data.*.message | string | ||
action_result.data.*.data.taskId | string | task id |
|
action_result.data.*.data.digest | string | ||
action_result.status | string | success failed | |
action_result.parameter.file_url | string | ||
action_result.parameter.file_name | string | ||
action_result.parameter.document_pass | string | ||
action_result.parameter.archive_pass | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Adds a note to an existing workbench alert
Type: generic
Read only: False
Adds a note to an existing workbench alert in Trend Micro Vision One.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
workbench_id | required | Workbench id of security incident in Vision One (Required) | string | source data identifier |
content | required | Note to be added to workbench event (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.info.code | string | ||
action_result.data.*.info.msg | string | ||
action_result.data.*.data.id | string | ||
action_result.status | string | success failed | |
action_result.parameter.workbench_id | string | source data identifier |
|
action_result.parameter.content | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Updates the status of an existing workbench alert
Type: correct
Read only: False
Updates the status of an existing workbench alert in Trend Micro Vision One.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
workbench_id | required | The ID of the workbench alert that you would like to update the status for (Required) | string | source data identifier |
status | required | The status to assign to the workbench alert: new, in_progress, resolved_false_positive, resolved_true_positive (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.data.*.info.code | string | ||
action_result.data.*.info.msg | string | ||
action_result.data.*.data | string | ||
action_result.status | string | success failed | |
action_result.parameter.workbench_id | string | source data identifier |
|
action_result.parameter.status | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |