Stack Management: AWS
File Storage Security is deployed using AWS CloudFormation stacks. One to three stacks will be deployed depending on the solution selected. The collected information is stored in File Storage Security and is used for managing stacks.
Data collected |
|
---|---|
Console location | File Storage Security > Stacks > Deploy Stacks |
Stack Management: Azure
File Storage Security is deployed using Azure Resource Manager templates. One to two deployments will be run depending on the solution selected. The collected information is stored in File Storage Security and is used for managing stacks.
Data collected |
|
---|---|
Console location | File Storage Security > Stacks > Deploy Stacks |
Stack Management: GCP
File Storage Security is deployed using GCP Deployment Manager templates. One to two deployments will be run depending on the solution selected. The collected information is stored in File Storage Security and is used for managing stacks.
Data collected |
|
---|---|
Console location | File Storage Security > Stacks > GCP > Deploy Stacks |
Logging and Monitoring: AWS
This information is stored in File Storage Security and is used for troubleshooting and monitoring. Collection of this information cannot be configured or disabled.
Data collected | Data from resources under a protection unit
|
---|---|
Console location | This information is stored in the File Storage Security and is used for troubleshooting and monitoring. It cannot be configured or disabled by customer. |
Logging and Monitoring: Azure
This information is stored in File Storage Security and is used for troubleshooting and monitoring. Collection of this information cannot be configured or disabled.
Data collected | Data from resources under a protection unit
|
---|---|
Console location | This information is stored in the File Storage Security and is used for troubleshooting and monitoring. It cannot be configured or disabled by customer. |
Logging and Monitoring: GCP
This information is stored in File Storage Security and is used for troubleshooting and monitoring. Collection of this information cannot be configured or disabled.
Data collected | Data from resources under a protection unit
|
---|---|
Console location | This information is stored in the File Storage Security and is used for troubleshooting and monitoring. It cannot be configured or disabled by customer |
Scan History: AWS
This information is stored in File Storage Security and is used for displaying the scanned file name on Scan History console. Collection of this information can be disabled by setting “ReportObjectKey” field to “false” when deploying Storage Stacks.
Data collected | Data from resources under a protection unit
|
---|---|
Console location | File Storage Security > Stacks > AWS > Deploy Stacks > Scanner and Storage Stack > Launch Stack > (AWS console) CloudFormation, or File Storage Security > Stacks > AWS > Add Storage > Launch Stack > (AWS console) CloudFormation Console Setting: ReportObjectKey |
Scan History: Azure
This information is stored in File Storage Security and is used for displaying the scanned file name on Scan History console. Collection of this information can be disabled by setting “Report Object Key” field to “No” when deploying Storage Stacks.
Data collected | Data from resources under a protection unit
|
---|---|
Console location | File Storage Security > Stacks > Azure > Deploy Stacks > Scanner and Storage Stack > Launch Stack > (Azure portal) Custom deployment, or File Storage Security > Stacks > Azure > Add Storage > Launch Stack > (Azure portal) Custom deployment Console Setting: ReportObjectKey |
File Scanning
This information is sent to Trend Micro Global Smart Scan Server when a file scan occurs and enables File Storage Security to identifies malicious file hashes.
In the smart scan solution, clients send file hashes determined by Trend Micro technology to Smart Scan Servers. Clients never send the entire file and the risk of the file is determined using the file hashes.
Data collected |
|
---|---|
Console Settings | Collection of this information cannot be configured or disabled. |