Trend Micro Deep Security Action
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.0.0 |
Compatible with ThreatQ Versions | >= 6.5.0 |
ThreatQ TQO License Required | Yes |
Support Tier | ThreatQ Supported |
Introduction
The Trend Micro Deep Security Action integration is designed to export a ThreatQ data collection comprised of IP Addresses, CIDR Blocks, IPv6 Addresses from ThreatQ to a Trend Micro Deep Security on-premise or cloud instance. These data collections are accepted as IP Lists within Trend Micro and are typically used for policies.
The integration provides the following action:
- Trend Micro Deep Security - Export Indicators - uploads indicators to an IP List in Trend Micro.
The action is compatible with Asset and Indicator type system objects.
This action is intended for use with ThreatQ TDR Orchestrator (TQO). An active TQO license is required for this feature.
Prerequisites
- An active ThreatQ TDR Orchestrator (TQO) license.
- A data collection containing at least one of the following object types:
- Asset
- Indicator
- A Trend Micro Deep Security Instance.
- A Trend Micro Deep Security API Key. See the following links, based your environment type, for additional information:
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the action zip file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the action zip file using one of the following methods:
- Drag and drop the zip file into the dialog box
- Select Click to Browse to locate the zip file on your local machine
ThreatQ will inform you if the action already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the action contains changes to the user configuration. The new user configurations will overwrite the existing ones for the action and will require user confirmation before proceeding.
You will still need to configure the action.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Actions option from the Category dropdown (optional).
- Click on the action entry to open its details page.
- Enter the following parameters under the Configuration tab:
The configurations set on this page will be used as the default settings when inserting this action into a new workflow. Updating the configurations on this page will not update any instances of this action that have already been deployed to a workflow. In that scenario, you must update the action’s configurations within the workflow itself.
Parameter Description Trend Micro Deep Security Instance The URL to the Trend Micro Deep Security instance.
The pattern for cloud instance is as follows:workload.<region>.cloudone.trendmicro.com
.On-Premise instances should specify the port.
API Key The API Key generated within your Trend Micro Deep Security Manager instance. Authentication Header Parameter Name Select the name of the header used for authentication. Options include: - Authorization
- api-secret-key
Users should select api-secret-key for an on-premise instance.
For cloud instances, the selection depends on the API Key type. Select Authorization for a Trend Micro Cloud One API Key or api-secret-key for a Legacy API Key.Enable SSL Certificate Verification Enable this parameter if the action should validate the host-provided SSL certificate. Disable Proxies Enable this parameter if the action should not honor proxies set in the ThreatQ UI. IP List Name Specify the name of the IP List where the input collection is uploaded to in Trend Micro. Clear IP List on Manual Run Enabling this will automatically clear the IP List on manual runs before exporting new objects to it. This is done to ensure that the category is always up-to-date with the ThreatQ data collection. Objects per run Maximum number of objects to process per-run.
- Review any additional settings, make any changes if needed, and click on Save.
Actions
The following action is available:
Action | Description | Object Type | Object Subtype |
---|---|---|---|
Trend Micro Deep Security - Export Indicators | Uploads indicators to an IP List in Trend Micro | Indicator, Asset | IP Address, CIDR Block, IPv6 Address |
Trend Micro Deep Security - Export Indicators
The Trend Micro Deep Security - Export Indicators action submits a ThreatQ data collection of indicators and/or assets that have the value equal to a valid private IP Address or private CIDR Block.
Trend Micro allows IP Lists to have a maximum of 32,000 characters. Due to this limitation, the data from the collection is split in multiples parts. The name of each part is built by appending to the value of the user field IP List Name
the number of the part from the ThreatQ collection that is uploaded (e.g list_0, list_1 and so on). Even if the ThreatQ collection does not exceed the Trend Micro limit the name of the list will have _0
appended.
POST https://workload.us-1.cloudone.trendmicro.com
Sample Body:
{
"name": "threatq_collection_0",
"description": "Data Collection sent from ThreatQ at 2025-02-10 10:00:00",
"items": [
"1.2.3.4",
"5.15.134.0/24",
"2606:4700:4700:0000:0000:0000:0000:1111"
]
}
Sample Response:
{
"ip_list": {
"ID": 65,
"description": "Data Collection sent from ThreatQ at 2025-02-10 10:00:00",
"items": [
"1.2.3.4",
"5.15.134.0/24",
"2606:4700:4700:0000:0000:0000:0000:1111"
]
}
}
Use Case Example
- A Threat Analyst identifies a collection of IP Address he would like to upload to Trend Micro.
- The Threat Analyst adds the Trend Micro Deep Security action to a Workflow.
- The Threat Analyst configures the action with the desired parameters and enables the Workflow.
- The Workflow executes all actions in the graph, including Trend Micro Deep Security.
- The uploads the input collection to an IP List in Trend Micro.
Known Issues / Limitations
- Trend Micro allows IP Lists to have a maximum of 32,000 characters. Due to this limitation, the data from the collection is split in multiples parts. The name of each part is built by appending to the value of the user field
IP List Name
the number of the part from the ThreatQ collection that is uploaded (e.g list_0, list_1 and so on). Even if the ThreatQ collection does not exceed the Trend Micro limit the name of the list will have_0
appended. - Trend Micro allows a maximum of 5000 IP Lists in their platform.
- The entire batch (100 items) will fail to upload if the input collection contains Assets that are not valid private IP Addresses or CIDR Blocks.
Change Log
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Trend Micro Deep Security Action Guide v1.0.0 | 6.5.0 or Greater |