Welcome to Trend Micro
This website uses cookies for website functionality, traffic analytics, personalization, social media functionality and advertising. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn more
Resource Types

Resource Types

This topic lists the types of resources available to Apex Central APIs.

The APIs give you access to information on the following resources:

Table 1. Resource Types

Resource

Associated API Groups

Description

ProductServers

Servers

Target servers that are registered with Apex Central

ProductAgents

  • Security Agents

  • Update Agents

Target Security Agents that are managed by Apex Central

UserDefinedSO

UDSO

Files, SHA-1 hash values, IP addresses, domains, and URLs that were added to the User-Defined Suspicious Objects list

STIXResource

STIX

Files in the Structured Threat Information eXpression (STIX) format that were uploaded to the Apex Central server

These files contain SHA-1 hash values, IP addresses, domains, and URLs that you can add to the User-Defined Suspicious Objects list or Exceptions list.

OpenIOCResource

OpenIOC

Files in the Open Indicators of Compromise (OpenIOC) format that were uploaded to the Apex Central server

These files contain suspicious SHA-1 hash values, IP addresses, domains, and URLs that you can add to the User-Defined Suspicious Objects list.

YARAResource

YARA

YARA files that were uploaded to the Apex Central server

YARA files contain rules that describe malware in textual or binary patterns. You can customize these rules to identify security threats that are specific to your environment.

OsceIes

  • Endpoint Sensor

  • Assessment

  • Investigation

  • Investigation Results

  • Root Cause Analysis

Information on investigation tasks, including assessment results and root cause analysis reports