Trend Micro Deep Security

Integration version: 5.0

Configure Trend Micro Deep Security to work with Google Security Operations

To create a new API key:

  1. Navigate toAdministration >User Management >API Keys.
  2. ClickNew.
  3. In theProperties window, enter aName andDescription for the APIkey.
  4. Click on theRole list and select a role.
  5. Next, select aLanguage and aTime Zone. You can also selectExpires on, which is optional, for expiry date for the API key.
  6. ClickOK.
  7. Copy theSecret key value. Make sure to copy the secret key value now,because this is the only time it will be shown.

Configure Trend Micro Deep Security integration in Google SecOps

For detailed instructions on how to configure an integration inGoogle SecOps, seeConfigureintegrations.

Integration parameters

Use the following parameters to configure the integration:

Parameter Display NameTypeDefault ValueIs MandatoryDescription
API RootStringhttps://{host or IP}:{port}YesAPI root of the Trend Micro Deep Security instance.
API Secret KeyPasswordN/AYesAPI Secret Key of the Trend Micro Deep Security instance.
API VersionStringv1YesAPI Version of the Trend Micro Deep Security instance.
Verify SSLCheckboxCheckedYesIf enabled, verify the SSL certificate for the connection to the Trend Micro Deep Security server is valid.
Note: You can make changes at a later stage if needed. Once configured, theInstances can be used in Playbooks. For detailed information on configuring andsupporting multiple instances, please seeSupporting multiple instances.

Actions

Assign Security Profile to Host

Description

Assign the specified policy to computers.

Parameters

ParameterTypeDefault ValueDescription
Security Profile NameStringN/APolicy Name.

Use cases

N/A

Run On

This action runs on the Hostname entity.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result NameValue OptionsExample
is_assignedTrue/Falseis_assigned:False
JSON Result
N/A

Get Host Info

Description

Describe a computer.

Parameters

N/A

Use cases

N/A

Run On

This action runs on the Hostname entity.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
N/A

Get Security Profiles

Description

Get all of the policies from Deep Security.

Parameters

N/A

Use cases

N/A

Run On

This action runs on all entities.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
N/A

Ping

Description

Verifies that the user has a connection to Trend Micro Deep Security via theuser's device.

Parameters

Use cases

N/A

Run On

This action runs on all entities.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result NameValue OptionsExample
is_ connectedTrue/Falseis_connected:False
JSON Result
N/A

Scan Host

Description

Request a malware scan.

Parameters

Use cases

N/A

Run On

This action runs on the Hostname entity.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result NameValue OptionsExample
is_ successTrue/Falseis_success:False
JSON Result
N/A

Need more help?Get answers from Community members and Google SecOps professionals.

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-18 UTC.