Trend Micro Deep Security
Integration version: 5.0
Configure Trend Micro Deep Security to work with Google Security Operations
To create a new API key:
- Navigate toAdministration >User Management >API Keys.
- ClickNew.
- In theProperties window, enter aName andDescription for the APIkey.
- Click on theRole list and select a role.
- Next, select aLanguage and aTime Zone. You can also selectExpires on, which is optional, for expiry date for the API key.
- ClickOK.
- Copy theSecret key value. Make sure to copy the secret key value now,because this is the only time it will be shown.
Configure Trend Micro Deep Security integration in Google SecOps
For detailed instructions on how to configure an integration inGoogle SecOps, seeConfigureintegrations.
Integration parameters
Use the following parameters to configure the integration:
| Parameter Display Name | Type | Default Value | Is Mandatory | Description |
|---|---|---|---|---|
| API Root | String | https://{host or IP}:{port} | Yes | API root of the Trend Micro Deep Security instance. |
| API Secret Key | Password | N/A | Yes | API Secret Key of the Trend Micro Deep Security instance. |
| API Version | String | v1 | Yes | API Version of the Trend Micro Deep Security instance. |
| Verify SSL | Checkbox | Checked | Yes | If enabled, verify the SSL certificate for the connection to the Trend Micro Deep Security server is valid. |
Actions
Assign Security Profile to Host
Description
Assign the specified policy to computers.
Parameters
| Parameter | Type | Default Value | Description |
|---|---|---|---|
| Security Profile Name | String | N/A | Policy Name. |
Use cases
N/A
Run On
This action runs on the Hostname entity.
Action Results
Entity Enrichment
N/A
Insights
N/A
Script Result
| Script Result Name | Value Options | Example |
|---|---|---|
| is_assigned | True/False | is_assigned:False |
JSON Result
N/AGet Host Info
Description
Describe a computer.
Parameters
N/A
Use cases
N/A
Run On
This action runs on the Hostname entity.
Action Results
Entity Enrichment
N/A
Insights
N/A
Script Result
| Script Result Name | Value Options | Example |
|---|---|---|
| is_success | True/False | is_success:False |
JSON Result
N/AGet Security Profiles
Description
Get all of the policies from Deep Security.
Parameters
N/A
Use cases
N/A
Run On
This action runs on all entities.
Action Results
Entity Enrichment
N/A
Insights
N/A
Script Result
| Script Result Name | Value Options | Example |
|---|---|---|
| is_success | True/False | is_success:False |
JSON Result
N/APing
Description
Verifies that the user has a connection to Trend Micro Deep Security via theuser's device.
Parameters
Use cases
N/A
Run On
This action runs on all entities.
Action Results
Entity Enrichment
N/A
Insights
N/A
Script Result
| Script Result Name | Value Options | Example |
|---|---|---|
| is_ connected | True/False | is_connected:False |
JSON Result
N/AScan Host
Description
Request a malware scan.
Parameters
Use cases
N/A
Run On
This action runs on the Hostname entity.
Action Results
Entity Enrichment
N/A
Insights
N/A
Script Result
| Script Result Name | Value Options | Example |
|---|---|---|
| is_ success | True/False | is_success:False |
JSON Result
N/ANeed more help?Get answers from Community members and Google SecOps professionals.
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2026-02-18 UTC.