Overview

Trend Micro Cloud App Security it integrates cloud-to-cloud with the protected applications and services to maintain high availability and administrative functionality.Here are the steps to follow for the ingestion of events to Seceon SIEM to have a Comprehensive visibility and Proactive Threat Detection in your Environment.

Steps Of Configuration

Step 1. Navigate to Provisioning by clicking on the Provisioning tab located in the top menu bar of the application.

Step 2. Drop down Add on devices by clicking on the downward-facing arrow next to the 'Add on devices' option in the menu.

To add Trend Micro Cloud App Security, follow the steps below:

Link- Generating an Authentication Token

{"events_list": ["securityrisk", "virtualanalyzer", "ransomware", "dlp"], "host": "<api-host>"}

Varification

STEP 1:Log in to UI >> SYSTEM

STEP 2: >> Logs and flows collection status

STEP 3: >>To verify the source device IP from the UI:

This will allow you to ensure that the system is properly identifying the source device IP and that it matches the expected IP address..