- AI Application Security
- Endpoint Sensor
- Standard Endpoint Protection
- Server & Workload Protection
- Email and Collaboration Security
- Container Security
- Zero Trust Secure Access
- Code Security
- Mobile Security
- XDR Portal
- Security Assessment Service
- Cyber Risk Exposure Management
- Sandbox Analysis App
- Common Directory
- Network
- Service Gateway Management
- SecOps for Cloud
- Data Security
- IR Platform
To see where this data is processed, refer to our list of data centers and authorized data subprocessors and their locations.
General TrendAI Vision One™ Service
| Data Collected |
|
|---|---|
| Console Location | Data provided to Trend Micro during on-boarding process and during normal service delivery. |
| Console Settings | Account Management - Name and email required if additional accounts are created. |
Configurable Additional Data Collection Using the TrendAI Vision One™ Console
| Description fields | |
|---|---|
| Data Collected | Customer provided text |
| Console Location | Various locations throughout the TrendAI Vision One™ product console
Optional: Free-Form Text field for customer user to provide additional information at their discretion. Please do not enter any personal or sensitive information. |
| Share your Feedback | |
|---|---|
| Data Collected | Customer provided text
Optional- Customers may submit feature requests and ideas to the TrendAI Vision One™ Product team. Please do not input any personal or sensitive information into the feedback form. |
| Console Location | [SecOps Resource Center menu icon] > Share Your Feedback > Make a Suggestion |
| Console Settings |
|
| Search App | |
|---|---|
| Data Collected | Saved queries of search history, including:
Optional: User can save the search parameters for future queries. |
| Console Location |
|
| Response App | |
|---|---|
| Description | Response app collect Endpoint information when customer take response actions. It stores these data to record the task history. It collects file when customer take collect file action. It stores these data for customer downloading and threat investigate app like sandbox. It can take the following actions on account name:
The task histories contain the account name. |
| Data Collected |
|
| Console Location | |
| Security Playbooks | |
|---|---|
| Description | Security Playbooks collects data when customers configure security playbooks and when security playbooks execute. |
| Data Collected |
|
| Console Location |
|
| TrendAI Vision One™ Terms of Service (Endpoint Basecamp) | |
|---|---|
| Data Collected |
After customers agree to the Terms of Service, Privacy Notice and Data Collection Notice, the data collection can’t be disabled |
| Console Location |
To enable: Trend Micro SecOps Terms of Service > I agree to the Terms of Service, Privacy Notice, and Data Collection Notice > Get Started To disable: Open Task Scheduler on each endpoint and disable the "Trend Micro Endpoint Basecamp" scheduled task. Run Windows Task Scheduler > Click Task Scheduler Library > right-click Trend Micro Endpoint Basecamp > Disable |
| Email Inventory | |
|---|---|
| Data Collected |
The data collection can't be disabled when customers use Email Inventory. |
| Console Location |
|
| Endpoint Inventory - Enable TrendAI Vision One™ capabilities | |
|---|---|
| Data Collected |
|
| Console Location |
|
The user ID and user account are used for user behavior tracking and auditing. The company ID identifies which company this customer belongs to.
| Endpoint Security Policies | |
|---|---|
| Data Collected |
|
| Console Location | Security Policies > Endpoint |
| Console Settings |
|
SecOps Portal
SecOps Portal automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these features. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.
To see where this data is processed, refer to our list of data centers and authorized data subprocessors and their locations.
| SecOps Portal Log On (First Time) | |
|---|---|
| Description | SecOps Portal use these information for customer log on and data display on portal. |
| Data Transmitted to Trend Micro |
|
| Feature Configuration Location | |
| SecOps Portal Alert Notification | |
|---|---|
| Description | SecOps Portal UI use this information to let customer can receive alert notification by email |
| Data Transmitted to Trend Micro |
|
| Feature Configuration Location | |
| SecOps Portal Product Connector | |
|---|---|
| Description | SecOps Portal use this information to detect product connection status and display on portal |
| Data Transmitted to Trend Micro |
|
| Feature Configuration Location | |
| SecOps Portal UI Pendo | |
|---|---|
| Description | SecOps Portal UI analysis customer behavior for product usage and product enhancements |
| Data Transmitted to Trend Micro |
|
| Feature Configuration Location | |
| SecOps Portal UI Pendo Feedback | |
|---|---|
| Description |
When customers submit feedback through the Pendo Feedback tool, their email address is sent to product managers so the product managers can respond to and acknowledge the customer's submission. When feedback is actioned, the product manager will update the customer using the email associated with the feature / enhancement request in the Pendo feedback tool. |
| Data Transmitted to Trend Micro |
|
Security Assessment Service
Security Assessment Service includes the following modules which may cause the corresponding personal data to be transmitted to Trend Micro. Detailed information and instruction are provided below for opt-out of the personal data collection by disabling specific modules. Modules that cannot be disabled are indicated below.
| TrendAI Vision One™ Security Assessment Service | |
|---|---|
| Data Collected & Console Location |
TrendAI Vision One™ Security Assessment Service includes some modules which may cause the corresponding personal data to be transmitted to Trend Micro. Detailed information, instructions to opt-out of the personal data collection, as well as modules that cannot be disabled are provided in this article: TrendAI Vision One™ Security Assessment Service Data Collection Notice. |
Cyber Risk Exposure Management
Cyber Risk Exposure Management includes the following modules which may cause the corresponding personal data to be transmitted to Trend Micro. Detailed information and instruction are provided below for opt-out of the personal data collection by disabling specific modules. Modules that cannot be disabled are indicated below.
TrendAI Vision One™ SecOps Sensors
| Endpoint Sensor | |
|---|---|
| Description | Data from Endpoint Sensors installed and enabled throughout your network give you visibility into endpoint user activities, public cloud app access, and endpoint vulnerabilities. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Endpoint Sensor > Endpoint Inventory |
| Email Sensor | |
|---|---|
| Description | Data from Email Sensor gives you insight into email activities in monitored Microsoft 365 Exchange Online and Gmail mailboxes. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > TrendAI Vision One™ Email Sensor > Email Inventory |
| Network Sensor | |
|---|---|
| Description | Data from Virtual Network Sensors / TippingPoint Network Sensors deployed in your network environment gives you visibility into detailed network activity as well as unmanaged or unknown assets connected to your network. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Network Sensor > Network Inventory |
TrendAI Security Services
| Security Agents | |
|---|---|
| Description | Data from security agents installed throughout your network give you visibility into endpoint user activities, web activities, public cloud app access, security settings, and threat detections. |
| Data Collected |
|
| Console Location |
|
| Cloud Email and Collaboration Protection | |
|---|---|
| Description | Data from Cloud Email and Collaboration Protection provides information on detected threats and security settings on monitored Google Gmail and Office 365 apps. |
| Data Collected |
Please refer to: TrendAI Vision One™™ - Email and Collaboration Security Data Collection Notice |
| Console Location | Cyber Risk Overview App > Data source configuration > Cloud Email and Collaboration Protection > Product Instance |
| Cloud Email Gateway Protection | |
|---|---|
| Description | Data from Cloud Email Gateway Protection gives you information on email activities, email security settings, and detected threats on monitored email gateways. |
| Data Collected |
Please refer to: TrendAI Vision One™™ - Email and Collaboration Security Data Collection Notice |
| Console Location | Cyber Risk Overview App > Data source configuration > Cloud Email Gateway Protection > Product Instance |
| Cloud One - Conformity | |
|---|---|
| Description | Data from Cloud One - Conformity gives you instant visibility into compliance and security best practice violations on your public cloud infrastructure. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Cloud One - Conformity > Data upload permission > Off |
| Deep Discovery Inspector | |
|---|---|
| Description | Data from Deep Discovery Inspector and Network Sensor on Deep Discovery Inspector gives you visibility into targeted attacks, advanced threats, unmanaged devices on your network, and network configuration information as well as detailed network activity. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Deep Discovery Inspector > Network Inventory |
| Web Security | |
|---|---|
| Description | Data from Web Security Web Sensors installed in your environment gives you visibility into web activities, threat detections, and web applications and websites accessed by managed users and devices inside and outside of your corporate network. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Web Security > Product Instance |
| Mobile Security | |
|---|---|
| Description | Data from Mobile Security gives you insight into user activities, threat detections, risky mobile app use, and public cloud apps being accessed by managed devices. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Mobile Security > Mobile Inventory |
| Container Security | |
|---|---|
| Description | Data from Container Security gives you visibility into vulnerabilities, detected threats, and system configuration risks in your containers and images. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Container Security > Container Inventory |
| Security Awareness | |
|---|---|
| Description | Data from Phishing Simulations in Security Awareness gives you insight into breach events on risky user accounts reported in phishing simulations. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Security Awareness > Enable Phishing Simulations |
| Network Vulnerability Scanner | |
|---|---|
| Description | Using a deployed Network Sensor or a Service Gateway with the Network Vulnerability Scanner service installed, Network Vulnerability Scanner discovers network infrastructure devices and scans for vulnerabilities in the discovered devices, accessible services, and specified assets. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Network Vulnerability Scanner > Configure scans in Network Vulnerability Scanner |
| TippingPoint Security Management System | |
|---|---|
| Description | Data from TippingPoint Security Management System (SMS) gives you visibility into network activity, network-related detections, and filter rule status. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > TippingPoint Security Management System > Network Inventory |
| Zero Trust Secure Access - Private Access | |
|---|---|
| Description | Data from Zero Trust Secure Access - Private Access allows for actionable analysis of user and device risk to detect threats and limit internal applications access to authorized personnel. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Zero Trust Secure Access - Private Access > Zero Trust Secure Access |
| Zero Trust Secure Access - Internet Access | |
|---|---|
| Description | Data from Zero Trust Secure Access - Internet Access and AI Service Access allows for actionable analysis of user access to web applications outside your corporate network to detect potential threats. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Zero Trust Secure Access - Internet Access > Zero Trust Secure Access |
THIRD-PARTY DATA SOURCES
| Microsoft Entra ID | |
|---|---|
| Description | Data from Microsoft Entra ID data gives you visibility into user and device profiles, user and device behaviors, user public cloud app access, and potential account compromise events or misconfigurations. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Microsoft Entra ID > Manage permissions and integration settings in Third-Party Integration |
| Active Directory (on-premises) | |
|---|---|
| Description | Data from Active Directory (on-premises) gives you visibility into your internal user accounts and devices. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Active Directory (on-premises) > Configure Active Directory in Third Party Integration |
| Nessus Pro Tenable Security Center |
|
|---|---|
| Description | Data from Nessus Pro or Tenable Security Center (formerly Tenable.sc) gives you insight into on-premises device information and CVE detections in operating systems and applications. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Nessus Pro > Configure Nessus Pro in Third Party Integration
Cyber Risk Overview App > Data source configuration > Tenable Security Center > Configure integration settings in Third-Party Integration |
| Microsoft 365 | |
|---|---|
| Description | Data from Microsoft 365 gives you access to app metadata, system configuration information, usage data, and activity data. Collected data contributes to system misconfiguration and compliance checks, Microsoft 365 app usage reports, and reports on behavior that contributes to user risk analyses. Accessed apps include:
|
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Microsoft 365 > Manage Entra ID permissions and integration settings in Third-Party Integration |
| OKTA | |
|---|---|
| Description | Data from Okta gives you visibility into user profiles and behavior, and user public cloud app and device usage. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Okta > Configure Okta integration settings in Third-Party Integration |
| Open LDAP | |
|---|---|
| Description | Active Directory data from your OpenLDAP server gives you visibility into your internal user accounts. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > OpenLDAP > Configure OpenLDAP integration settings in Third-Party Integration |
| Qualys | |
|---|---|
| Description | Data from Qualys gives you visibility into additional CVE detections on managed devices along with detailed asset profile information. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Qualys > Data upload permission > Off |
| Rapid 7 - InsightVM / Nexpose | |
|---|---|
| Description | Data from Rapid7 gives you visibility into additional CVE detections on managed devices, along with detailed asset profile information. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Rapid7 - InsightVM > Data upload permission > Off
Cyber Risk Overview App > Data source configuration > Rapid7 - Nexpose > Configure integration settings in Third-Party Integration |
| Splunk - Network Firewall / Web Gateway Logs | |
|---|---|
| Description | The Cyber Risk Exposure Management for Splunk app provides website access log data to TrendAI Vision One™, giving you insight into user public cloud application access based on firewall and web gateway activity. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Splunk - Network Firewall / Web Gateway Logs > Configuration Guide |
| Tenable Vulnerability Management | |
|---|---|
| Description | Data from Tenable Vulnerability Management gives you visibility into additional CVE detections on managed devices, along with detailed asset profile information. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Tenable Vulnerability Management > Data upload permission > Off |
| Tanium Comply | |
|---|---|
| Description | Data from Tanium Comply gives you visibility into additional CVE detections on managed devices along with detailed asset profile information. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Tanium Comply > Data upload permission > Off |
| Internet Facing Assets Rescana |
|
|---|---|
| Description | Data gives you visibility into your organization’s internet-facing assets, including application vulnerabilities and system misconfigurations, allowing you to manage your external attack surface. |
| Data Collected |
|
| Cyber Risk Overview |
|
| Claroty xDome | |
|---|---|
| Description | Data from Claroty xDome gives you visibility into additional CVE detections on managed devices along with detailed asset profile information. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Claroty xDome > Data upload permission > Off |
| Salesforce | |
|---|---|
| Description | Data from Salesforce gives you access to metadata and information on system misconfigurations for use in compliance and risk assessments. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Salesforce > Configure integration settings in Third-Party Integration |
| Github | |
|---|---|
| Description | By installing and enabling TrendAI Vision One™ SSPM, you grant Trend Micro permission to access your GitHub organization metadata and information on system misconfigurations for use in compliance and risk assessments. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > GitHub > Configure GitHub integration settings in Third-Party Integration |
| Greenbone | |
|---|---|
| Description | Data from Greenbone gives you insight into on-premises device information and CVE detections in operating systems and applications. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Greenbone > Configure integration settings in Third-Party Integration |
| Google Cloud Identity | |
|---|---|
| Description | Data from Google Cloud Identity gives you visibility into user profiles, user and group behaviors, and account misconfigurations. |
| Data Collected | Please refer to https://success.trendmicro.com/en-us/solution/ka-0015569 |
| Console Location | Cyber Risk Overview App > Data source configuration > Google Cloud Identity > Configuration guide |
| CyberArk | |
|---|---|
| Description | Data from CyberArk gives you visibility into user details, user behaviors, and potential user account misconfiguration. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > CyberArk > Configure CyberArk and grant the required permissions in Third-Party Integration |
| Nazomi Vantage | |
|---|---|
| Description | Data from Nozomi Vantage gives you visibility into OT and IoT network asset information, CVE detections, and alerts that contribute to risk analysis. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > Nozomi Vantage > Configure integration settings in Third-Party Integration |
| SentinelOne Singularity | |
|---|---|
| Description | Data from SentinelOne Singularity gives you visibility into data from your SentinelOne Singularity-managed endpoints, including device context, misconfigurations, and CVE detections. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > SentinelOne Singularity > Configure integration settings in Third-Party Integration |
| ServiceNow CMDB | |
|---|---|
| Description | Data from ServiceNow Configuration Management Database (CMDB) gives you increased visibility into the relationships between and attributes of devices within your organization's infrastructure. |
| Data Collected |
|
| Console Location | Cyber Risk Overview App > Data source configuration > ServiceNow CMDB > Configure integration settings in Third-Party Integration |
Sandbox Analysis App
Users can disable data collection by disabling submissions.
| Data Collected | Data transmitted relates to user submitted object.
|
|---|---|
| Console Location | THREAT INTELLIGENCE > Sandbox Analysis > Submission Settings
Click the image to enlarge. |
Network
Network includes the following modules which may cause the corresponding personal data to be transmitted to Trend Micro. Detailed information and instruction are provided below for opt-out of the personal data collection by disabling specific modules. Modules that cannot be disabled are indicated below.
| TrendAI Vision One™ Virtual Network Sensor | |
|---|---|
| Data Collected & Console Location |
TrendAI Vision One™ Virtual Network Sensor includes some modules which may cause the corresponding personal data to be transmitted to Trend Micro. Detailed information, instructions to opt-out of the personal data collection, as well as modules that cannot be disabled are provided in this article: TrendAI Vision One™ Virtual Network Sensor Data Collection Notice. |
Service Gateway
| Service Gateway Management | |
|---|---|
| Description | When the Service Gateway appliance is registered to TrendAI Vision One™/Service Gateway Management, it will provide the appliance related information back to TrendAI Vision One™. Customers can disconnect/delete this appliance to disable it via TrendAI Vision One™ Service Gateway Management. |
| Data Collected |
|
| Console Location | Workflow and Automation > Service Gateway Management |
| Console Settings | |
Service Configuration
| Service Configuration In Service Gateway | |
|---|---|
| Description | Service Gateway Management opens the service configuration API to service owner, and the detailed configurations are different from service to service. |
| Data Collected |
|
| Console Location | Workflow and Automation > Service Gateway Management > Appliance > Manage Services |
| Console Settings | |
Local Active Update Service
| Service Gateway Management | |
|---|---|
| Description | When the Service Gateway appliance is registered to TrendAI Vision One™/Service Gateway Management, and enables Active Update service, SG will provide connected product status. |
| Data Collected |
|
| Console Location | Workflow and Automation > Service Gateway Management > Appliance, in the Installed Services table, choose ActiveUpdate Service, and then click the "Settings" button |
Forward Proxy Service
| Service Gateway Management | |
|---|---|
| Description | When the Service Gateway appliance is registered to TrendAI Vision One™/Service Gateway Management, and enables forward proxy service, SG will provide connected product status |
| Data Collected |
|
| Console Location | Workflow and Automation > Service Gateway Management > Connected Products/Servers |
Smart Protection Service
| Service Gateway Management | |
|---|---|
| Description | When the Service Gateway appliance is registered to TrendAI Vision One™/Service Gateway Management, and enables Smart Protection Service, SG will provide connected product status. |
| Data Collected |
|
| Console Location | Workflow and Automation > Service Gateway Management > Connected Products/Servers |
SecOps for Cloud
SecOps for Cloud - Cloud Detections for AWS CloudTrail automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these features. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.
| Cloud Detections for AWS CloudTrail | |
|---|---|
| Description | This information is used to analyze threats to customers' AWS account activity. |
| Data Collected |
|
| Console Location | This feature cannot be disabled. |
Data Security
Data Posture
Data Posture allows customer to bind their cloud accounts to TrendAI Vision One™, which may cause the corresponding personal data to be transmitted to Trend Micro. Detailed information and instruction are provided below for opt-out of the personal data collection by unbinding cloud accounts.
| Data Collected |
|
|---|---|
| Console Location | Login to TrendAI Vision One™ Portal > Service Management > Cloud Accounts
Click the image to enlarge. |
Data Policy
Define the data policy for network location where the sensitive files are, and Data Detection and Response sensor will base on the policy to track all sensitive files on the endpoint.
| Data Collected |
|
|---|---|
| Console Location | TrendAI Vision One™ > Data Security > Data Policy |
| Console Settings |
Turn on or off by switching the toggle. |
Data Inventory
Display what sensitive files resided in the endpoint and offer the ability of filter what user interested by asset type, matched policy, file extensions etc.
| Data Collected |
|
|---|---|
| Console Location |
|
| Console Settings |
In TrendAI Vision One™ > Endpoint Security > Endpoint Security Policy:
|
IR Platform
IR Platform includes the following modules which may cause the corresponding personal data to be transmitted to Trend Micro. Detailed information and instruction are provided below for opt-out of the personal data collection by disabling specific modules. Modules that cannot be disabled are indicated below.
| IR Toolkit | |
|---|---|
| Description | Forensics App will deploy the IR Toolkit which has Command Line Interface for data collection, encryption and upload to cloud through Internet. |
| Data Transmitted to Trend Micro |
|
| Feature Configuration Location | TrendAI Vision One™ Menu > XDR > Forensics |
TrendAI Vision One™ Data Center Locations
| Region/Country of Purchase | Data Center Location for Microsoft Azure *Future Site for new Customers |
Data Center Location for AWS *Future Site for new Customers |
|---|---|---|
| USA | East US - N. Virginia | East US - N. Virginia |
| Canada | Canada Central | Canada Central |
| EU | West Europe - Netherlands | Frankfurt, Germany |
| Japan | Tokyo, Japan | Tokyo, Japan |
| SG | Singapore | Singapore |
| ANZ | Australia Central *Canberra, Australia |
Sydney, Australia |
| India | Mumbai | Mumbai |
| Middle East and Africa | UAE | UAE |
| UK | UK South | London |
