Publisher: Trend Micro
Connector Version: 2.2.1
Product Vendor: Trend Micro
Product Name: VisionOne
Product Version Supported (regex): ".*"
Minimum Product Version: 6.1.1
Trend Vision One is a purpose-built threat defense platform that provides added value and new benefits beyond XDR solutions, allowing you to see more and respond faster. Providing deep and broad extended detection and response (XDR) capabilities that collect and automatically correlate data across multiple security layers—email, endpoints, servers, cloud workloads, and networks—Trend Vision One prevents the majority of attacks with automated protection
Trend Vision One is a purpose-built threat defense platform that provides added value and new benefits beyond XDR solutions, allowing you to see more and respond faster. Providing deep and broad extended detection and response (XDR) capabilities that collect and automatically correlate data across multiple security layers—email, endpoints, servers, cloud workloads, and networks—Trend Vision One prevents the majority of attacks with automated protection
Welcome to the open-source repository for Splunk> Phantom’s trendmicrovisionone App.
Please have a look at our Contributing Guide if you are interested in contributing, raising issues, or learning more about open-source Phantom apps.
This Phantom App is licensed under the Apache 2.0 license. Please see our Contributing Guide for further details.
Support and maintenance for this integration are provided by the author. Please use the following contact details:
- Email : [email protected]
The app uses HTTPS protocol for communicating with the VisionOne API server. Below are the default ports used by the Splunk SOAR Connector.
SERVICE NAME | TRANSPORT PROTOCOL | PORT |
---|---|---|
https | tcp | 443 |
The below configuration variables are required for this Connector to operate. These variables are specified when configuring a Trend Vision One asset in SOAR.
VARIABLE | REQUIRED | TYPE | DESCRIPTION |
---|---|---|---|
api_url | required | string | The URL for your ETP instance |
api_key | required | password | API key |
- Navigate to Apps > Unconfigured Apps .
- Search for Trend Vision One.
- Click CONFIGURE NEW ASSET to create and configure a new integration instance.
- ALternatively click on INSTALL APP and drop a tarball of the app
Parameter | Description | Required |
---|---|---|
Asset name | Unique name for this Trend Vision One instance runner asset | True |
Asset description | Short description of the asset’s purpose | True |
Product vendor | Trend Micro | True |
Product name | Vision One | True |
Tags | Optional tags to use in Playbooks | False |
API_URL | Vision One API URL | True |
API_TOKEN | Vision One API Token | True |
Polling interval (minutes) | How often should security incident events be updated from Vision One | False |
- Click TEST CONNECTIVITY to validate the URLs, token, and connection.
Test Connectivity - Validate the asset configuration for connectivity using supplied configuration
Get Endpoint Info - Gather information about an endpoint
Quarantine Device - Quarantine the endpoint
Unquarantine Device - Unquarantine the endpoint
On Poll - Callback action for the on_poll ingest functionality
Status Check - Checks the status of a task
Add To Blocklist - Adds an item to the Suspicious Objects list in Vision One
Remove From Blocklist - Removes an item from the Suspicious Objects list
Quarantine Email Message - Quarantine the email message
Delete Email Message - Delete the email message
Terminate Process - Terminate the process running on the endpoint
Add To Exception - Add object to exception list
Delete From Exception - Delete object from exception list
Add To Suspicious - Add suspicious object to suspicious list
Delete From Suspicious - Delete the suspicious object from suspicious list
Check Analysis Status - Get the status of file analysis based on task id
Download Analysis Report - Get the analysis report of a file based on report id
Collect Forensic File - Collect forensic file
Forensic File Info - Get the download information for collected forensic file
Start Analysis - Submit file to sandbox for analysis. For supported file types, check here
Add Note - Adds a note to an existing workbench alert
Update Status - Updates the status of an existing workbench alert
Get Alert Details - Displays information about the specified alert
Urls To Sandbox - Submits URLs to the sandbox for analysis
Enable Account - Allows the user to sign in to new application and browser sessions
Disable Account - Signs the user out of all active application and browser sessions, and prevents the user from signing in any new session
Restore Email Message - Restore quarantined email messages
Sign Out Account - Signs the user out of all active application and browser sessions
Force Password Reset - Signs the user out of all active application and browser sessions, and forces the user to create a new password during the next sign-in attempt
Sandbox Suspicious List - Downloads the suspicious object list associated to the specified object
Sandbox Analysis Result - Displays the analysis results of the specified object
Sandbox Investigation Package - Downloads the Investigation Package of the specified object
Get Suspicious List - Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, email addresses, or URLs in the Suspicious Object List and displays the information in a paginated list
Get Exception List - Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, sender addresses, or URLs in the Exception List and displays it in a paginated list
You can execute these commands from the Splunk SOAR CLI, as part of an automation, or in a playbook.
Validate the asset configuration for connectivity using supplied configuration variables.
Type: test
Read only: True
Argument Name | Description | Required |
---|---|---|
N/A |
Path | Type | Description |
---|---|---|
N/A |
Add object(s) to blocklist.
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Add to block list
Suspicious Object Management
- View, filter, and search
- Manage lists and configure settings
Type: contain
Read only: False
Argument Name | Description | Required |
---|---|---|
block_objects | Object made up of object_type , object_value and description |
Required |
Example input:
Block Objects
[{
"object_type": "ip",
"object_value": "6.6.6.6",
"description": "Block IP"
},{
"object_type": "domain",
"object_value": "hello.com",
}]
Note: description
is optional and a default value is automatically provided.
Path | Type | Description |
---|---|---|
action_result.data.*.status | Numeric | HTTP status code for the action |
action_result.data.*.task_id | String | Task ID generated for the action |
Note: To get the complete task status run polling command status check
giving taskId
as input parameter.
Remove object(s) from blocklist.
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Add to block list
Suspicious Object Management
- View, filter, and search
- Manage lists and configure settings
Type: correct
Read only: False
Argument Name | Description | Required |
---|---|---|
block_objects | Object made up of object_type , object_value and description |
Required |
Example input:
Block Objects
[{
"description": "Remove from blocklist",
"object_type": "ip",
"object_value": "6.6.6.3"
}, {
"object_type": "domain",
"object_value": "hello.com",
}]
Note: description
is optional and a default value is automatically provided.
Path | Type | Description |
---|---|---|
action_result.data.*.status | Numeric | HTTP status code for the action |
action_result.data.*.task_id | String | Task ID generated for the action |
Note: To get the complete task status run polling command status check
giving taskId
as input parameter.
Quarantine email message(s).
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Quarantine/Restore messages
Type: contain
Read only: False
Argument Name | Description | Required |
---|---|---|
email_identifiers | Object containing message_id , mailbox and description or unique_id and description |
Required |
Example input:
Email Identifiers
Call using Message ID.
[{
"message_id": "<AAkALgAAAAAAHYQDEapmEc2byACqAC-EWg0AAhCCNvg5sEua0nNjgfLS2AABNpgTSQAA>",
"mailbox": "[email protected]",
"description": "Quarantine email message"
}]
Call using unique ID.
[{
"unique_id": "AAAAAAHYQDEapmEc2byACqAC-EWg0AAhCCNvg5sEua0",
"description": "Quarantine email message"
}]
Note: description
is optional and a default value is automatically provided. If Unique ID
is being passed then the mailbox ID
is not needed.
Path | Type | Description |
---|---|---|
action_result.data.*.status | Numeric | HTTP status code for the action |
action_result.data.*.task_id | String | Task ID generated for quarantining email message |
Note: To get the complete task status run polling command status check
giving taskId
as input parameter.
Delete email message(s).
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Delete messages
Type: correct
Read only: False
Argument Name | Description | Required |
---|---|---|
email_identifiers | Object containing message_id , mailbox and description or unique_id and description |
Required |
Example input:
Email Identifiers
Call using message ID.
[{
"message_id": "<AAkALgAAAAAAHYQDEapmEc2byACqAC-EWg0AAhCCNvg5sEua0nNjgfLS2AABNpgTSQAA>",
"mailbox": "[email protected]",
"description": "Delete email message"
}]
Call using unique ID.
[{
"unique_id": "AAAAAAHYQDEapmEc2byACqAC-EWg0AAhCCNvg5sEua0",
"description": "Delete email message"
}]
Note: description
is optional and a default value is automatically provided. If Unique ID
is being passed then the mailbox ID
is not needed.
Path | Type | Description |
---|---|---|
action_result.data.*status | Numeric | HTTP status code for the action |
action_result.data.*task_id | String | Task ID generated for deleting email message |
Note: To get the complete task status run polling command status check
giving taskId
as input parameter.
Quarantine endpoint(s).
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Isolate endpoint
Type: contain
Read only: False
Argument Name | Description | Required |
---|---|---|
endpoint_identifiers | Object containing of endpoint (hostname) and description or agent_guid and description |
Required |
Example input:
Endpoint Identifiers
[{
"endpoint": "endpoint123",
"description": "quarantine device"
}, {
"agent_guid": "94632-7d79-451d-9ef8-2a2129e2",
"description": "quarantine device"
}]
Note: endpoint
accepts agentGuid or hostname. description
is optional and a default value is automatically provided.
Path | Type | Description |
---|---|---|
action_result.data.*status | Numeric | HTTP status code for the action |
action_result.data.*task_id | String | Task ID generated for quarantining endpoint |
Note: To get the complete task status run polling command status check
giving taskId
as input parameter. Note: The above command should be added with execution timeout in the advanced field of playbook execution. The recommended timeout be 20 minutes
.
Restore endpoint(s) connectivity.
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Isolate endpoint
Type: correct
Read only: False
Argument Name | Description | Required |
---|---|---|
endpoint_identifiers | Object containing of endpoint (hostname) and description or agent_guid and description |
Required |
Example input:
Endpoint Identifiers
[{
"endpoint": "endpoint123",
"description": "Restore endpoint"
}, {
"agent_guid": "94632-7d79-451d-9ef8-2a2129e2",
"description": "Restore endpoint"
}]
Note: endpoint
accepts either agent_guid or hostname. description
is optional and a default value is automatically provided.
Path | Type | Description |
---|---|---|
action_result.data.*.status | Numeric | HTTP status code for the action |
action_result.data.*.task_id | String | Task ID generated for restoring endpoint |
Note: To get the complete task status run polling command status check
giving taskId
as input parameter. Note: The above command should be added with execution timeout in the advanced field of playbook execution. The recommended timeout be 20 minutes
.
This polls information about workbench alerts that match the specified criteria in a paginated list.
API key role permissions required: Workbench
- View, filter, and search
Type: ingest
Read only: False
Argument Name | Description | Required |
---|---|---|
starttime | Datetime in ISO 8601 format (yyyy-MM-ddThh:mm:ssZ in UTC) that indicates the start of the data retrieval time range. The available oldest value is “1970-01-01T00:00:00Z” | False |
endtime | Datetime in ISO 8601 format (yyyy-MM-ddThh:mm:ssZ in UTC) that indicates the end of the data retrieval time range. Ensure that “endDateTime” is not earlier than “startDateTime” | False |
Example input:
Start Time
2020-01-01T10:00:00Z
End Time
2023-01-01T10:00:00Z
Path | Type | Description |
---|---|---|
action_result.data.*.serialized_alerts | [] List of SAE or TI Alerts | Array of alerts retrieved (awb-workbenchAlertV3) |
Add object(s) to exception list.
API key role permissions required: Suspicious Object Management
- View, filter, and search
- Manage lists and configure settings
Type: correct
Read only: False
Argument Name | Description | Required |
---|---|---|
block_objects | Object consisting of object_type , object_value and description |
Required |
Example input:
Block Objects
[{"object_type": "ip","object_value": "1.2.6.9", "description": "Add to exception list"},
{"object_type": "ip","object_value": "1.1.1.1"}]
Note: description
is optional and a default value is automatically provided.
Path | Type | Description |
---|---|---|
action_result.data.multi_response.*.status | Numeric | HTTP status code for the action |
action_result.data.multi_response.*.task_id | N/A | Null |
action_result.data.multi_response.*.total_count | Numeric | Total count of items in exception list |
Delete object(s) from exception list.
API key role permissions required: Suspicious Object Management
- View, filter, and search
- Manage lists and configure settings
Type: correct
Read only: False
Argument Name | Description | Required |
---|---|---|
block_objects | Object consisting of object_type , object_value |
Required |
Example input:
Block Objects
[{
"object_type": "ip",
"object_value": "1.6.6.3"
}]
Path | Type | Description |
---|---|---|
action_result.data.multi_response.*.status | Numeric | HTTP status code for the action |
action_result.data.multi_response.*.task_id | N/A | Null |
action_result.data.multi_response.*.total_count | Numeric | Total count of objects in exception list |
Add object(s) to suspicious list.
API key role permissions required: Suspicious Object Management
- View, filter, and search
- Manage lists and configure settings
Type: contain
Read only: False
Argument Name | Description | Required |
---|---|---|
block_objects | Object consisting of object_type , object_value and scan_action , risk_level , expiry_days and description |
Required |
Example input:
Block Objects
[{
"object_type": "ip",
"risk_level": "high",
"object_value": "6.6.6.3"
"expiry_days": "30",
"scan_action": "block",
"description": "Add to suspicious list"
}]
Note: scan_action
, risk_level
, expiry_days
and description
are optional and default values are provided for each.
Path | Type | Description |
---|---|---|
action_result.data.multi_response.*.status | Numeric | HTTP status code for the action |
action_result.data.multi_response.*.task_id | N/A | Null |
action_result.data.multi_response.*.total_count | Numeric | Total count of objects in suspicious list |
Delete object(s) from suspicious list.
API key role permissions required: Suspicious Object Management
- View, filter, and search
- Manage lists and configure settings
Type: correct
Read only: False
Argument Name | Description | Required |
---|---|---|
block_objects | Object consisting of object_type and object_value |
Required |
Example input:
Block Objects
[{
"object_type": "ip",
"object_value": "6.6.6.4"
}]
Path | Type | Description |
---|---|---|
action_result.data.multi_response.*.status | Numeric | HTTP status code for the action |
action_result.data.multi_response.*.task_id | N/A | Null |
action_result.data.multi_response.*.total_count | Numeric | Total count of objects in suspicious list |
Terminate process(es) running on endpoint(s).
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Terminate process
Type: contain
Read only: False
Argument Name | Description | Required |
---|---|---|
process_identifiers | Object consisting of endpoint (hostname) or agent_guid , file_sha1 , filename and description |
Required |
Example input:
Process Identifiers
[{
"endpoint": "endpoint123",
"file_sha1": "984afc7.......95b519a081321"
"description": "terminate process",
"filename": "exmaplename.txt"
}]
Note: description
and filename
are optional and a default value is provided.
Path | Type | Description |
---|---|---|
action_result.data.*.status | Numeric | HTTP status code for the action |
action_result.data.*.task_id | String | Task ID generated after terminating a process |
Note: To get the complete task status run polling command status check
giving taskId
as input parameter. Note: The above command should be added with execution timeout in the advanced field of playbook execution. The recommended timeout is 20 minutes
.
Get the status of a sandbox submission based on task_id.
API key role permissions required: Sandbox Analysis
- View, filter, and search
- Submit objects
Type: investigate
Read only: False
Argument Name | Description | Required |
---|---|---|
task_id | Unique alphanumeric string that identifies the analysis results of a submission | Required |
Example input:
Task ID
8559a7ce-2b85-451b-8742-4b943ad76a22
Path | Type | Description |
---|---|---|
action_result.data.*.id | String | Unique alphanumeric string that identifies a submission |
action_result.data.*.status | String | Action applied to a submitted object. Possible values: succeeded, running, failed |
action_result.data.*.created_date_time | String | Timestamp in ISO 8601 that indicates the object was submitted to the sandbox |
action_result.data.*.last_action_date_time | String | Timestamp in ISO 8601 format that indicates when the information about a submission was last updated |
action_result.data.*.action | String | Action applied to a submitted object |
action_result.data.*.resource_location | String | Location of the submitted file |
action_result.data.*.is_cached | String | Parameter that indicates if an object has been analyzed before by the Sandbox Analysis App. Submissions marked as cached do not count toward the daily reserve |
action_result.data.*.digest | String | object (sandbox-digest) |
action_result.data.*.arguments | String | Arguments for the file submitted |
action_result.data.*.error | String | Error code and message for the submission |
Get the analysis report of a file based on report id.
API key role permissions required: Sandbox Analysis
- View, filter, and search
- Submit objects
Type: investigate
Read only: False
Argument Name | Description | Required |
---|---|---|
submit_id | Unique alphanumeric string that identifies the analysis results of a submission | Required |
poll | If script should wait until the task is finished before returning the result (enabled by default) | Optional |
poll_time_sec | Maximum time to wait for the result to be available | Optional |
Example input:
Submit ID
8559a7ce-2b85-451b-8742-4b943ad76a22
Poll
true
Poll Time Sec
30
Path | Type | Description |
---|---|---|
action_result.data.*.file_added | String | Name of the PDF file added to Vault |
Collect forensic file.
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Collect file
Type: investigate
Read only: False
Argument Name | Description | Required |
---|---|---|
collect_files | Object containing endpoint (hostname) or agent_guid , file_path and description |
Required |
Example input:
Collect Files
[{
"endpoint": "endpoint123",
"file_path": "C:/virus.exe",
"description": "collect malicious file"
}, {
"agent_guid": "94632-7d79-451d-9ef8-2a2129e2",
"file_path": "C:/some_file.exe"
}]
Note: description
is optional and a default value is provided.
Path | Type | Description |
---|---|---|
action_result.data.*.status | Numeric | HTTP status code for the action |
action_result.data.*.task_id | String | Task ID generated after collecting a file |
Note: To get the complete task status run polling command status check
giving taskId
as input parameter. Note: The above command should be added with execution timeout in the advanced field of playbook execution. The recommended timeout be 20 minutes
.
Get the download information for collected forensic file.
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Download task result
Type: investigate
Read only: False
Argument Name | Description | Required |
---|---|---|
task_id | task_id output from the collect forensic file command used to collect the file | Required |
poll | If script should wait until the task is finished before returning the result (enabled by default) | Optional |
poll_time_sec | Maximum time to wait for the result to be available | Optional |
Example input:
Task ID
00000012
Poll
True
Poll Time Sec
30
Path | Type | Description |
---|---|---|
action_result.data.*.id | String | Unique numeric string that identifies a response task |
action_result.data.*.status | String | The status of the command sent to the managing server. Possible task statuses: queued, running,succeeded, failed |
action_result.data.*.created_date_time | String | Task completion time |
action_result.data.*.last_action_date_time | String | Timestamp in ISO 8601 format that indicates when the information about a submission was last updated |
action_result.data.*.action | String | Action applied to a submitted object |
action_result.data.*.description | String | Description of a response task |
action_result.data.*.account | String | User that triggered the response |
action_result.data.*.agent_guid | String | Unique alphanumeric string that identifies an installed agent |
action_result.data.*.endpoint_name | String | Endpoint name of the target endpoint |
action_result.data.*.file_path | String | File path of the file to be collected from the target |
action_result.data.*.file_sha1 | String | string (arp-sha1) |
action_result.data.*.file_sha256 | String | string (arp-sha256) |
action_result.data.*.file_size | String | Size of the collected file in bytes |
action_result.data.*.resource_location | String | URL to download the collected file |
action_result.data.*.expired_date_time | String | Timestamp in ISO 8601 format |
action_result.data.*.password | String | Password to get the resource |
action_result.data.*.error | String | Object that contains information about the unsuccessful task. response |
Note: The URL received from the ‘trendmicro-visionone-download-information-for-collected-forensic-file’ will be valid for only 60 seconds
Submit file to sandbox for analysis.
API key role permissions required: Sandbox Analysis
- View, filter, and search
- Submit objects
Type: investigate
Read only: False
Argument Name | Description | Required |
---|---|---|
file_url | URL pointing to the location of the file to be submitted | Required |
file_name | Name of the file to be analyzed | Required |
document_pass | The password for decrypting the submitted document. The value must be Base64-encoded. The maximum password length is 128 bytes prior to encoding | Optional |
archive_pass | The password for decrypting the submitted archive. The value must be Base64-encoded. The maximum password length is 128 bytes prior to encoding | Optional |
arguments | Parameter that allows you to specify Base64-encoded command line arguments to run the submitted file. The maximum argument length before encoding is 1024 bytes. Arguments are only available for Portable Executable (PE) files and script files | Optional |
Example input:
File Url
https://someurl.com/file=somefile.bat
File Name
some_file.bat
Document Password
cGFzc3dvcmQK
Archive Password
cGFzc3dvcmQK
Arguments
IFMlYztbQA==
Path | Type | Description |
---|---|---|
action_result.data.*.id | String | Unique alphanumeric string that identifies a submission |
action_result.data.*.digest | String | object (sandbox-digest) |
action_result.data.*.arguments | String | Command line arguments encoded in Base64 of the submitted file |
Check the status of a task.
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Download task result
Type: investigate
Read only: False
Argument Name | Description | Required |
---|---|---|
task_id | Unique numeric string that identifies a response task | Required |
poll | If script should wait until the task is finished before returning the result (enabled by default) | Optional |
poll_time_sec | Maximum time to wait for the result to be available | Optional |
Example input:
Task ID
00000012
Poll
True
Poll Time Sec
30
Path | Type | Description |
---|---|---|
action_result.data.*..id | String | Unique numeric string that identifies a response task |
action_result.data.*..status | String | The status of the command sent to the managing server. Possible task statuses: queued, running,succeeded, failed |
action_result.data.*..created_date_time | String | Task completion time |
action_result.data.*..last_action_date_time | String | Timestamp in ISO 8601 format that indicates when the information about a submission was last updated |
action_result.data.*..action | String | Action applied to a submitted object |
action_result.data.*..description | String | Description of a response task |
action_result.data.*..account | String | User that triggered the response |
Gather information about an endpoint.
API key role permissions required: Endpoint Inventory
- View
Type: investigate
Read only: False
Argument Name | Description | Required |
---|---|---|
endpoint | List of hostname , macAddress , agentGuid or IP of the endpoint to query |
Required |
query_op | Logical operator to employ in the query. (AND/OR) | Required |
Example input:
Endpoint
127.127.127.127,endpoint2,endpoint4
Query Op
or
Path | Type | Description |
---|---|---|
action_result.data.*.agent_guid | String | AgentGuid for the endpoint |
action_result.data.*.login_account | String | Login Account for the endpoint |
action_result.data.*.endpoint_name | String | Hostname of the endpoint |
action_result.data.*.mac_address | String | MacAddress for the endpoint |
action_result.data.*.ip | String | IP address for the endpoint |
action_result.data.*.os_name | String | Operating system installed on an endpoint |
action_result.data.*.os_version | String | Version of the operating system installed on an endpoint |
action_result.data.*.os_description | String | Description of the operating system installed on an endpoint |
action_result.data.*.product_code | String | 3-character code that identifies Trend Micro products |
action_result.data.*.installed_product_codes | String | 3-character code that identifies the installed Trend Micro products on an endpoint |
Adds a note to an existing workbench alert.
API key role permissions required: Workbench
- Modify alert details
Type: generic
Read only: False
Argument Name | Description | Required |
---|---|---|
workbench_id | Workbench id of security incident in Vision One | Required |
content | note to be added to the workbench event | Required |
Example input:
Alert ID
WB-14-20190709-00003
Content
Suspected False Positive, please verify
Path | Type | Description |
---|---|---|
action_result.data.*.note_id | String | ID of the newly created note |
action_result.data.*.message | String | Response message for the action taken |
Updates the status of an existing workbench alert.
API key role permissions required: Workbench
- Modify alert details
Type: correct
Read only: False
Argument Name | Description | Required |
---|---|---|
workbench_id | The ID of the workbench alert that you would like to update the status for | Required |
status | The status to assign to the workbench alert: new , in_progress , true_positive , false_positive , benign_true_positive , closed |
Required |
if_match | The target resource will be updated only if it matches ETag of the target |
Required |
Example input:
Workbench ID
WB-14-20190709-00003
If Match
33a64df551425fcc55e4d42a148795d9f25f89d4
Status
New
Note: if_match
is the etag
value provided by the get-alert-details action.
Path | Type | Description |
---|---|---|
action_result.data.*.message | String | Message notifying of success or failure |
Displays information about a specified alert.
API key role permissions required: Workbench
- View, filter, and search
Type: investigate
Read only: False
Argument Name | Description | Required |
---|---|---|
workbench_id | ID of the workbench alert you would like to get the details for | Required |
Example input:
Workbench ID
WB-20837-20221111-0000
Path | Type | Description |
---|---|---|
action_result.data.*.alert | String | Information associated to the workbenchID provided |
action_result.data.*.etag | String | An identifier for a specific version of a Workbench alert resource |
Submits URLs to the sandbox for analysis.
API key role permissions required: Sandbox Analysis
- View, filter, and search
- Submit objects
Type: investigate
Read only: False
Argument Name | Description | Required |
---|---|---|
urls | List of URLs to be sent to sandbox for analysis. Note: You can submit a maximum of 10 URLs per request | Required |
Example input:
URLS
["www.urlurl.com","www.zurlzurl.com", "https://testurl.com"]
Path | Type | Description |
---|---|---|
action_result.data.*.status | Numeric | HTTP status code for the action |
action_result.data.*.task_id | String | Unique alphanumeric string that identifies a submission |
action_result.data.*.url | String | The URL submitted to sandbox for analysis |
action_result.data.*.id | String | Unique alphanumeric string that identifies a submission |
action_result.data.*.digest | String | object (sandbox-digest) |
Allow the user(s) to sign in to new application and browser sessions.
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Enable/Disable user account, force sign out, force password reset
Type: correct
Read only: False
Argument Name | Description | Required |
---|---|---|
account_identifiers | Object containing account_name and description |
Required |
Example input:
Account Identifiers
[{
"account_name": "[email protected]",
"description": "Enable user account"
}]
Note: description
is optional and a default value is provided.
Path | Type | Description |
---|---|---|
action_result.data.*.status | Numeric | HTTP status code for the action |
action_result.data.*.task_id | String | Task ID generated after enabling a user account |
Sign out user(s) of all active application and browser sessions, and prevent the user(s) from signing in any new session.
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Enable/Disable user account, force sign out, force password reset
Type: correct
Read only: False
Argument Name | Description | Required |
---|---|---|
account_identifiers | Object containing account_name and description |
Required |
Example input:
Account Identifiers
[{
"account_name": "[email protected]",
"description": "Disable user account"},
{
"account_name": "[email protected]"
}]
Note: description
is optional and a default value is provided.
Path | Type | Description |
---|---|---|
action_result.data.*.status | Numeric | HTTP status code for the action |
action_result.data.*.task_id | String | Task ID generated after disabling a user account |
Restore quarantined email message(s).
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Quarantine/Restore messages
Type: correct
Read only: False
Argument Name | Description | Required |
---|---|---|
email_identifiers | Object containing message_id , mailbox and description or unique_id and description |
Required |
Example input:
Email Identifiers
Call with Message ID
[{
"message_id": "<AAkALgAAAAAAHYQDEapmEc2byACqAC-EWg0AAhCCNvg5sEua0nNjgfLS2AABNpgTSQAA>",
"mailbox": "[email protected]",
"description": "Restore email message"
}]
Call with Unique ID
[{
"unique_id": "DEapmEc2byACqAC-EWg0AAhCCNvg5sEua0n",
"description": "Restore email message"
}]
Note: description
is optional and a default value is provided. When providing Unique ID, mailbox is not required. Additionally messages can only be restored if they have not been deleted.
Path | Type | Description |
---|---|---|
action_result.data.*.status | Numeric | HTTP status code for the action |
action_result.data.*.task_id | String | Task ID generated after restoring an email |
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Enable/Disable user account, force sign out, force password reset
Sign out user(s) out of all active application and browser sessions.
Type: contain
Read only: False
Argument Name | Description | Required |
---|---|---|
account_identifiers | Object containing account_name and description |
Required |
Example input:
Account Identifiers
[{
"account_name": "[email protected]",
"description": "Sign out account"
}]
Note: description
is optional and a default value is provided.
Path | Type | Description |
---|---|---|
action_result.data.*.status | Numeric | HTTP status code for the action |
action_result.data.*.task_id | String | Task ID generated after signing out user account |
Signs the user out of all active application and browser sessions, and forces the user to create a new password during the next sign-in attempt.
API key role permissions required: Response Management
- View, filter, and search (Task List tab)
- Enable/Disable user account, force sign out, force password reset
Type: contain
Read only: False
Argument Name | Description | Required |
---|---|---|
account_identifiers | Object containing account_name and description |
Required |
Example input:
Account Identifiers
[{
"account_name": "[email protected]",
"description": "Force password reset"
}]
Note: description
is optional and a default value is provided.
Path | Type | Description |
---|---|---|
action_result.data.*.status | Numeric | HTTP status code for the action. |
action_result.data.*.task_id | String | Task ID generated after forcing a password reset |
Downloads the suspicious object list associated to the specified object.
API key role permissions required: Sandbox Analysis
- View, filter, and search
- Submit objects
Type: investigate
Read only: False
Argument Name | Description | Required |
---|---|---|
submit_id | Unique alphanumeric string that identifies a submission. | Required |
poll | If script should wait until the task is finished before returning the result (enabled by default) | Optional |
poll_time_sec | Maximum time to wait for the result to be available | Optional |
Example input:
Submit ID
90406723-2b29-4e85-b0b2-ba58af8f63df
Poll
false
Poll Time Sec
0
Note: Suspicious Object Lists are only available for objects with a high risk level.
Path | Type | Description |
---|---|---|
action_result.data.*.risk_level | String | Risk Level of suspicious object |
action_result.data.*.analysis_completion_date_time | String | Analyze time of suspicious object |
action_result.data.*.expired_date_time | String | Expire time of suspicious object |
action_result.data.*.root_sha1 | String | Sample sha1 generate this suspicious object |
action_result.data.*.type | String | Type of item submitted to sandbox for analysis |
action_result.data.*.value | String | Value of item submitted to sandbox for analysis |
Displays the analysis results of the specified object.
API key role permissions required: Sandbox Analysis
- View, filter, and search
- Submit objects
Type: investigate
Read only: False
Argument Name | Description | Required |
---|---|---|
report_id | Unique alphanumeric string that identifies a submission | Required |
poll | If script should wait until the task is finished before returning the result (enabled by default) | Optional |
poll_time_sec | Maximum time to wait for the result to be available | Optional |
Example input:
Report ID
90406723-2b29-4e85-b0b2-ba58af8f63df
Poll
False
Poll Time Sec
0
Path | Type | Description |
---|---|---|
action_result.data.*.id | String | Unique alphanumeric string that identifies the analysis results of a submitted object |
action_result.data.*.type | String | Object type |
action_result.data.*.digest | String | object (sandbox-digest) |
action_result.data.*.risk_level | String | The risk level assigned to the object by the sandbox |
action_result.data.*.analysis_completion_date_time | String | Timestamp in ISO 8601 format that indicates when the analysis was completed |
action_result.data.*.arguments | String | Command line arguments encoded in Base64 of the submitted file |
action_result.data.*.detection_names | String | The name of the threat as detected by the sandbox |
action_result.data.*.threat_types | String | The threat type as detected by the sandbox |
action_result.data.*.true_file_type | String | File Type of the Object |
Downloads the Investigation Package of the specified object.
API key role permissions required: Sandbox Analysis
- View, filter, and search
- Submit objects
Type: investigate
Read only: False
Argument Name | Description | Required |
---|---|---|
submit_id | Unique alphanumeric string that identifies a submission | Required |
poll | If script should wait until the task is finished before returning the result (enabled by default) | Optional |
poll_time_sec | Maximum time to wait for the result to be available | Optional |
Example input:
Submit ID
00000012
Poll
true
Poll Time Sec
30
Path | Type | Description |
---|---|---|
action_result.data.*.file_added | String | Name of the .zip file added to Vault |
Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, email addresses, or URLs in the Suspicious Object List and displays the information in a paginated list.
API key role permissions required: Suspicious Object Management
- View, filter, and search
Type: investigate
Read only: True
Argument Name | Description | Required |
---|---|---|
N/A |
Path | Type | Description |
---|---|---|
action_result.data.*.value | String | Value that was submitted to suspicious list |
action_result.data.*.type | String | Type of object that was added to suspicious list |
action_result.data.*.last_modified_date_time | String | Timestamp in ISO 8601 format that indicates the last time the information about a suspicious object was modified |
action_result.data.*.description | String | Description of an object |
action_result.data.*.scan_action | String | Action that connected products apply after detecting a suspicious object |
action_result.data.*.risk_level | String | Risk level of a suspicious object |
action_result.data.*.in_exception_list | String | Value that indicates if a suspicious object is in the exception list |
action_result.data.*.expired_date_time | String | Timestamp in ISO 8601 format that indicates when the suspicious object expires |
Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, sender addresses, or URLs in the Exception List and displays it in a paginated list.
API key role permissions required: Suspicious Object Management
- View, filter, and search
Type: investigate
Read only: True
Argument Name | Description | Required |
---|---|---|
N/A |
Path | Type | Description |
---|---|---|
action_result.data.*.value | String | Value that was submitted to exception list |
action_result.data.*.type | String | Type of object that was added to exception list |
action_result.data.*.last_modified_date_time | String | The time the object was created |
action_result.data.*.description | String | Description of an object |
This version of the Trend Micro app is compatible with Splunk SOAR version 5.1.0 and above.
The app uses HTTPS protocol for communicating with the Trend Vision One server. For authentication a Vision One API Token is used by the Splunk SOAR Connector.
The below configuration variables are required for this Connector to operate. These variables are specified when configuring a VisionOne asset in SOAR.
VARIABLE | REQUIRED | TYPE | DESCRIPTION |
---|---|---|---|
api_url | required | string | Vision One API URL (e.g. https://api.xdr.trendmicro.com) |
api_key | required | password | Vision One API Token |
test connectivity - Validate the asset configuration for connectivity using supplied configuration
get endpoint info - Gather information about an endpoint
quarantine device - Quarantine the endpoint
unquarantine device - Unquarantine the endpoint
on poll - Callback action for the on_poll ingest functionality
status check - Checks the status of a task
add to blocklist - Adds an item to the Suspicious Objects list in Vision One
remove from blocklist - Removes an item from the Suspicious Objects list
quarantine email message - Quarantine the email message
delete email message - Delete the email message
terminate process - Terminate the process running on the endpoint
add to exception - Add object to exception list
delete from exception - Delete object from exception list
add to suspicious - Add suspicious object to suspicious list
delete from suspicious - Delete the suspicious object from suspicious list
check analysis status - Get the status of file analysis based on task id
download analysis report - Get the analysis report of a file based on report id
collect forensic file - Collect forensic file
forensic file info - Get the download information for collected forensic file
start analysis - Submit file to sandbox for analysis
add note - Adds a note to an existing workbench alert
update status - Updates the status of an existing workbench alert
get alert details - Displays information about the specified alert
urls to sandbox - Submits URLs to the sandbox for analysis
enable account - Allows the user to sign in to new application and browser sessions
disable account - Signs the user out of all active application and browser sessions, and prevents the user from signing in any new session
restore email message - Restore quarantined email messages
sign out account - Signs the user out of all active application and browser sessions
force password reset - Signs the user out of all active application and browser sessions, and forces the user to create a new password during the next sign-in attempt
sandbox suspicious list - Downloads the suspicious object list associated to the specified object
sandbox analysis result - Displays the analysis results of the specified object
sandbox investigation package - Downloads the Investigation Package of the specified object
get suspicious list - Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, email addresses, or URLs in the Suspicious Object List and displays the information in a paginated list
get exception list - Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, sender addresses, or URLs in the Exception List and displays it in a paginated list
Validate the asset configuration for connectivity using supplied configuration
Type: test
Read only: True
Validate the asset configuration for connectivity using supplied configuration.
No parameters are required for this action
No Output
Gather information about an endpoint
Type: generic
Read only: False
Gather information about an endpoint.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip_hostname_mac | required | Hostname/IP/MAC/AgentGuid of the endpoint(s) to query. (Required) | string | ip mac address host name agent guid |
query_op | required | Query Operator. (Required) | string | query op |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.ip_hostname_mac | string | ip mac address host name agent guid |
|
action_result.parameter.query_op | string | query op |
|
action_result.data.*.agent_guid | string | agent guid |
|
action_result.data.*.endpoint_name.value | string | host name |
|
action_result.data.*.installed_product_codes | string | ||
action_result.data.*.ip.value | string | ip |
|
action_result.data.*.login_account.value | string | ||
action_result.data.*.mac_address.value | string | mac address |
|
action_result.data.*.os_description | string | ||
action_result.data.*.os_name | string | ||
action_result.data.*.os_version | string | ||
action_result.data.*.product_code | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Quarantine the endpoint
Type: contain
Read only: False
Quarantine the endpoint.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
endpoint_identifiers | required | Object containing endpoint (hostname) and description or agent_guid and description. (Required) | string | ip mac address host name agent guid |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.endpoint_identifiers | string | ip mac address host name agent guid |
|
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | task status id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Unquarantine the endpoint
Type: correct
Read only: False
Unquarantine the endpoint.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
endpoint_identifiers | required | Object containing endpoint (hostname) and description or agent_guid and description. (Required) | string | ip mac address host name agent guid |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.endpoint_identifiers | string | ip mac address host name agent guid |
|
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | task status id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Callback action for the on_poll ingest functionality
Type: ingest
Read only: True
Callback action for the on_poll ingest functionality.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
starttime | optional | Make sure time format matches following example. 2020-06-15T10:00:00Z | string | |
endtime | optional | Make sure time format matches following example. 2020-06-15T12:00:00Z | string |
No Output
Checks the status of a task
Type: investigate
Read only: False
Checks the status of a particular task.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
task_id | required | ID of the task you would like to get the status of. (Required) | string | task status id |
poll | required | If script should wait until the task is finished before returning the result, enabled by default | string | |
poll_time_sec | optional | Maximum time to wait for the result to be available | numeric |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.poll | string | ||
action_result.parameter.poll_time_sec | numeric | ||
action_result.parameter.task_id | string | task status id |
|
action_result.data.*.account | string | ||
action_result.data.*.action | string | ||
action_result.data.*.created_date_time | string | ||
action_result.data.*.description | string | ||
action_result.data.*.id | string | ||
action_result.data.*.last_action_date_time= | string | ||
action_result.data.*.status | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Adds an item to the Suspicious Objects list in Vision One
Type: contain
Read only: False
Adds an item from the Trend Vision One Suspicious Objects list.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
block_objects | required | Object made up of object_type (domain,ip,file_sha1,url,sender_mail_address), object_value and description. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.block_objects | string | ||
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | task status id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Removes an item from the Suspicious Objects list
Type: correct
Read only: False
Removes an item from the Trend Vision One Suspicious Objects list.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
block_objects | required | Object made up of object_type (domain,ip,file_sha1,url,sender_mail_address), object_value and description. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.block_objects | string | ||
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | task status id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Quarantine the email message
Type: contain
Read only: False
Retrieve data from the quarantine email message and send the result to dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
email_identifiers | required | Email Message ID (), Mailbox ID and description or Unique Message ID (msgUuid) and description from Trend Vision One message activity data. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.email_identifiers | string | ||
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | task status id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Delete the email message
Type: correct
Read only: False
Retrieve data from the delete email message and relay result to Splunk.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
email_identifiers | required | Email Message ID (), Mailbox ID and description or Unique Message ID (msgUuid) and description from Trend Vision One message activity data. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.email_identifiers | string | ||
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | task status id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Terminate the process running on the endpoint
Type: contain
Read only: False
Terminate the process running on the endpoint and send results to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
process_identifiers | required | Object consisting of endpoint (hostname) or agent_guid, file_sha1, filename and description. (Required) | string | host name file sha1 file name |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.process_identifiers | string | host name file sha1 file name |
|
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | task status id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Add object to exception list
Type: correct
Read only: False
Add the exception object to the exception list and send the result to Splunk.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
block_objects | required | Object consisting of object_type (domain,ip,url,file_sha1,file_sha256,sender_mail_address), object_value and description. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.block_objects | string | ||
action_result.data.*.multi_response.*.status | numeric | ||
action_result.data.*.multi_response.*.task_id | string | ||
action_result.data.*.total_count | numeric | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Delete object from exception list
Type: correct
Read only: False
Delete the exception object from the exception list and relay data to Splunk.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
block_objects | required | Object consisting of object_type (domain,ip,url,file_sha1,file_sha256,sender_mail_address) and object_value. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.block_objects | string | ||
action_result.data.*.multi_response.*.status | numeric | ||
action_result.data.*.multi_response.*.task_id | string | ||
action_result.data.*.total_count | numeric | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Add suspicious object to suspicious list
Type: contain
Read only: False
Add suspicious object to suspicious list and send the result to dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
block_objects | required | Object consisting of object_type (domain,ip,url,file_sha1,file_sha256,sender_mail_address), object_value and scan_action, risk_level, expiry_days and description. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.block_objects | string | ||
action_result.data.*.multi_response.*.status | numeric | ||
action_result.data.*.multi_response.*.task_id | string | task status id |
|
action_result.data.*.total_count | numeric | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Delete the suspicious object from suspicious list
Type: correct
Read only: False
Delete the suspicious object from suspicious list and send the result to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
block_objects | required | Object consisting of object_type (domain,ip,url,file_sha1,file_sha256,sender_mail_address) and object_value. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.block_objects | string | ||
action_result.data.*.multi_response.*.status | numeric | ||
action_result.data.*.multi_response.*.task_id | string | task status id |
|
action_result.data.*.total_count | numeric | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Get the status of file analysis based on task id
Type: investigate
Read only: False
Get the status of file analysis based on task id and send result to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
task_id | required | ID generated from the start_analysis action. Submission ID in Vision One. (Required) | string | submit id report id task id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.task_id | string | submit id report id task id |
|
action_result.data.*.action | string | ||
action_result.data.*.arguments | string | ||
action_result.data.*.created_date_time | string | ||
action_result.data.*.digest | string | ||
action_result.data.*.is_cached | string | ||
action_result.data.*.last_action_date_time | string | ||
action_result.data.*.resource_location | string | ||
action_result.data.*.status | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Get the analysis report of a file based on report id
Type: investigate
Read only: False
Get the analysis report of a file based on report id and send the results to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
submit_id | required | ID of the sandbox submission retrieved from check_analysis_status action. (Required) | string | submit id |
poll | optional | If script should wait until the task is finished before returning the result, enabled by default | string | |
poll_time_sec | optional | Maximum time to wait for the result to be available | numeric |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.poll | string | ||
action_result.parameter.poll_time_sec | numeric | ||
action_result.parameter.submit_id | string | submit id |
|
action_result.data.*.file_added | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Collect forensic file
Type: investigate
Read only: False
Collect forensic file and send result to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
collect_files | required | Object containing endpoint (hostname) or agent_guid, file_path and description. (Required) | string | host name agent guid file path description |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.collect_files | string | host name agent guid file path description |
|
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | forensic id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Get the download information for collected forensic file
Type: investigate
Read only: False
Get the download information for collected forensic file and send the result to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
task_id | required | Task ID output from collect_forensic_file action. (Required) | string | forensic id |
poll | optional | If script should wait until the task is finished before returning the result, enabled by default | string | |
poll_time_sec | optional | Maximum time to wait for the result to be available | numeric |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.poll | string | ||
action_result.parameter.poll_time_sec | numeric | ||
action_result.parameter.task_id | string | forensic id |
|
action_result.data.*.account | string | ||
action_result.data.*.action | string | ||
action_result.data.*.agent_guid | string | ||
action_result.data.*.created_date_time | string | ||
action_result.data.*.description | string | ||
action_result.data.*.endpoint_name | string | ||
action_result.data.*.error | string | ||
action_result.data.*.expired_date_time | string | ||
action_result.data.*.file_path | string | ||
action_result.data.*.file_sha1 | string | ||
action_result.data.*.file_sha256 | string | ||
action_result.data.*.file_size | string | ||
action_result.data.*.id | string | ||
action_result.data.*.last_action_date_time | string | ||
action_result.data.*.password | string | ||
action_result.data.*.resource_location | string | ||
action_result.data.*.status | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Submit file to sandbox for analysis
Type: investigate
Read only: False
Submit file to sandbox for analysis and send the result to the dashboard.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
file_url | required | URL pointing to the location of the file to be submitted. (Required) | string | file url |
file_name | required | Name of the file to be analyzed. (Required) | string | |
document_pass | optional | The password for decrypting the submitted document. The value must be Base64-encoded. The maximum password length is 128 bytes prior to encoding. (Optional) | string | |
archive_pass | optional | The password for decrypting the submitted archive. The value must be Base64-encoded. The maximum password length is 128 bytes prior to encoding. (Optional) | string | |
arguments | optional | Parameter that allows you to specify Base64-encoded command line arguments to run the submitted file. The maximum argument length before encoding is 1024 bytes. Arguments are only available for Portable Executable (PE) files and script files. (Optional) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.archive_pass | string | ||
action_result.parameter.arguments | string | ||
action_result.parameter.document_pass | string | ||
action_result.parameter.file_name | string | ||
action_result.parameter.file_url | string | file url |
|
action_result.data.*.arguments | string | ||
action_result.data.*.digest | string | ||
action_result.data.*.id | string | task id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Adds a note to an existing workbench alert
Type: generic
Read only: False
Adds a note to an existing workbench alert in Trend Vision One.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
workbench_id | required | Workbench id of security incident in Vision One. (Required) | string | workbench id |
content | required | Note to be added to workbench event. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.content | string | ||
action_result.parameter.workbench_id | string | workbench id |
|
action_result.data.*.message | string | ||
action_result.data.*.note_id | string | note id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Updates the status of an existing workbench alert
Type: correct
Read only: False
Updates the status of an existing workbench alert in Trend Vision One.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
workbench_id | required | The ID of the workbench alert that you would like to update the status for. (Required) | string | workbench id |
status | required | The status to assign to the workbench alert: new, in_progress, true_positive, false_positive, benign_true_positive, closed. (Required) | string | |
if_match | required | Target resource will be updated only if it matches ETag of the target one. Etag is one of the outputs from get_alert_details. (Required) | string | etag |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.if_match | string | etag |
|
action_result.parameter.status | string | ||
action_result.parameter.workbench_id | string | workbench id |
|
action_result.data.*.message | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Displays information about the specified alert
Type: investigate
Read only: False
Displays information about the specified alert.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
workbench_id | required | ID of the workbench alert you would like to get the details for. (Required) | string | workbench id |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.workbench_id | string | workbench id |
|
action_result.data.*.alert | string | ||
action_result.data.*.etag | string | etag |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Submits URLs to the sandbox for analysis
Type: investigate
Read only: False
Submits URLs to the sandbox for analysis. You can submit a maximum of 10 URLs per request. For more information about the supported URL format, see https://docs.trendmicro.com/en-us/enterprise/trend-micro-xdr-help/SandboxAnalysis. Note: Using Sandbox Analysis requires credits.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
urls | required | List of URLs to be sent to sandbox for analysis. Note: You can submit a maximum of 10 URLs per request. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.urls | string | ||
action_result.data.*.digest | string | ||
action_result.data.*.id | string | ||
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | submit id report id task id |
|
action_result.data.*.url | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Allows the user to sign in to new application and browser sessions
Type: correct
Read only: False
Allows the user to sign in to new application and browser sessions. Supported IAM systems: Azure AD Active Directory (on-premises).
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
account_identifiers | required | Object containing account_name and description. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.account_identifiers | string | ||
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | task status id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Signs the user out of all active application and browser sessions, and prevents the user from signing in any new session
Type: contain
Read only: False
Signs the user out of all active application and browser sessions, and prevents the user from signing in any new session. Supported IAM systems: Azure AD Active Directory (on-premises).
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
account_identifiers | required | Object containing account_name and description. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.account_identifiers | string | ||
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | task status id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Restore quarantined email messages
Type: correct
Read only: False
Restore quarantined email messages
Account role permissions required: Response Management View, filter, and search (Task List tab) Quarantine/Restore messages.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
email_identifiers | required | Email Message ID (), Mailbox ID and description or Unique Message ID (msgUuid) and description from Trend Vision One message activity data. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.email_identifiers | string | ||
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | task status id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Signs the user out of all active application and browser sessions
Type: contain
Read only: False
Signs the user out of all active application and browser sessions. Supported IAM systems: Azure AD.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
account_identifiers | required | Object containing account_name and description. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.account_identifiers | string | ||
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | task status id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Signs the user out of all active application and browser sessions, and forces the user to create a new password during the next sign-in attempt
Type: contain
Read only: False
Signs the user out of all active application and browser sessions, and forces the user to create a new password during the next sign-in attempt. Supported IAM systems: Azure AD Active Directory (on-premises).
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
account_identifiers | required | Object containing account_name and description. (Required) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.account_identifiers | string | ||
action_result.data.*.status | numeric | ||
action_result.data.*.task_id | string | task status id |
|
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Downloads the suspicious object list associated to the specified object
Type: investigate
Read only: False
Downloads the suspicious object list associated to the specified object. Note: Suspicious Object Lists are only available for objects with a high risk level.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
submit_id | required | Unique alphanumeric string that identifies the analysis results of a submission. (Required) | string | submit id |
poll | optional | If script should wait until the task is finished before returning the result, enabled by default | string | |
poll_time_sec | optional | Maximum time to wait for the result to be available | numeric |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.poll | string | ||
action_result.parameter.poll_time_sec | numeric | ||
action_result.parameter.submit_id | string | submit id |
|
action_result.data.*.analysis_completion_date_time | string | ||
action_result.data.*.expired_date_time | string | ||
action_result.data.*.risk_level | string | ||
action_result.data.*.root_sha1 | string | file sha1 |
|
action_result.data.*.type | string | ||
action_result.data.*.value | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Displays the analysis results of the specified object
Type: investigate
Read only: False
Displays the analysis results of the specified object.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
report_id | required | Unique alphanumeric string that identifies the analysis results of a submission. (Required) | string | report id |
poll | optional | If script should wait until the task is finished before returning the result, enabled by default | string | |
poll_time_sec | optional | Maximum time to wait for the result to be available | numeric |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.poll | string | ||
action_result.parameter.poll_time_sec | numeric | ||
action_result.parameter.report_id | string | report id |
|
action_result.data.*.analysis_completion_date_time | string | ||
action_result.data.*.arguments | string | ||
action_result.data.*.digest | string | ||
action_result.data.*.id | string | report id submit id |
|
action_result.data.*.risk_level | string | ||
action_result.data.*.true_file_type | string | ||
action_result.data.*.type | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Downloads the Investigation Package of the specified object
Type: investigate
Read only: False
Downloads the Investigation Package of the specified object using the unique alphanumeric string that identifies the analysis results of a submission.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
submit_id | required | Unique alphanumeric string that identifies the analysis results of a submission. (Required) | string | submit id |
poll | optional | If script should wait until the task is finished before returning the result, enabled by default | string | |
poll_time_sec | optional | Maximum time to wait for the result to be available | numeric |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.poll | string | ||
action_result.parameter.poll_time_sec | numeric | ||
action_result.parameter.submit_id | string | submit id |
|
action_result.data.*.file_added | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, email addresses, or URLs in the Suspicious Object List and displays the information in a paginated list
Type: investigate
Read only: True
Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, email addresses, or URLs in the Suspicious Object List and displays the information in a paginated list.
No parameters are required for this action
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.data.*.description | string | ||
action_result.data.*.expired_date_time | string | ||
action_result.data.*.in_exception_list | string | ||
action_result.data.*.last_modified_date_time | string | ||
action_result.data.*.risk_level | string | ||
action_result.data.*.scan_action | string | ||
action_result.data.*.type | string | ||
action_result.data.*.value | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |
Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, sender addresses, or URLs in the Exception List and displays it in a paginated list
Type: investigate
Read only: True
Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, sender addresses, or URLs in the Exception List and displays it in a paginated list.
No parameters are required for this action
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.data.*.description | string | ||
action_result.data.*.last_modified_date_time | string | ||
action_result.data.*.type | string | ||
action_result.data.*.value | string | ||
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | ||
summary.total_objects_successful | numeric |