...
Trend Micro Cloud App Security provides protection against ransomware, phishing, Business Email Compromise (BEC), zero-day and hidden malware, and unauthorized transmission of sensitive data. It it integrates cloud-to-cloud with the protected applications and services to maintain high availability and administrative functionality.Here are the steps to follow for the ingestion of events to Seceon SIEM to have a Comprehensive visibility and Proactive Threat Detection in your Environment.
...
Enter the name of the device.
Enter the CCE IP.
Access ID/username: Not required.
To generate the Secret Key/Authentication Token, please follow the steps provided in the link below.refer the below link:
Link- Generating an Authentication Token
...