Resource types

Trend Vision One APIs support retrieving, creating, updating, and deleting resources using the standard HTTP request methods.

The following table lists the available resource types.

Resource

Description

Accounts

  • Local and SAML accounts, including role and access level

  • Passwords and two-factor authentication settings of local accounts

  • Authentication tokens of accounts with API access

  • Roles and their corresponding permissions for all Trend Vision One features

Alerts / Workbench

  • Alerts from all available data sources, including investigation status, notes, and other details

  • Detection models, including status (enabled or disabled), risk level, and required products

  • Security intelligence reports written by threat defense experts, including associated threat campaigns, target regions or countries, and target operating systems

Audit Logs

  • Summaries about user access, app-related actions, setting changes, and other configuration modifications that occurred using the Trend Vision One console or APIs

Connected Products

  • Supported and/or connected on-premises and SaaS products, including connection status and registration details from the Customer Licensing Platform

  • Enrollment tokens of on-premises products

Notifications

  • Settings for Splunk alerts and email notifications

  • Test notifications

Observed Attack Techniques

  • Events in the Observed Attack Techniques app that match specified criteria

Response Actions

  • Response actions that you can take on endpoints, email messages, and other objects in your environment

  • Information about response tasks that you have created

Single Sign-On

  • SAML 2.0 single sign-on settings

  • Trend Vision One service provider (SP) metadata XML file

  • IdP metadata file

Search

  • Agent and endpoint information

  • Detection data that matches query criteria

  • Sweeping tasks and their corresponding results

SIEM

  • Information to configure the Trend Vision One for Splunk (XDR) Add-On.

Threat Intelligence

  • Intelligence Reports

  • Sandbox Analysis

  • Suspicious Object Management

Risk Insights

  • Quickly assess the cloud access activities and vulnerabilities related to users and devices and determine how to mitigate the risks found in your network.