Trend Micro Deep Security
Trend Micro Deep Security Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.0.0 and later.
Trend Micro Deep Security This integration was integrated and tested with version 20.0 of Trend Micro Deep Security, and v1 of the API.
#
Changes compared to TrendMicroDsm#
Changes in commands- trendmicro-create-computer - New command.
- trendmicro-search-computers - New command.
- trendmicro-get-computer - New command.
- trendmicro-list-computers - New command.
- trendmicro-modify-computer - New command.
- trendmicro-delete-computer - New command.
- trendmicro-get-computer-setting - New command.
- trendmicro-modify-computer-setting - New command.
- trendmicro-reset-computer-setting - New command.
- trendmicro-list-computer-groups - New command.
- trendmicro-create-computer-group - New command.
- trendmicro-search-computer-groups - New command.
- trendmicro-get-computer-group - New command.
- trendmicro-modify-computer-group - New command.
- trendmicro-delete-computer-group - New command.
- trendmicro-search-firewall-rules - New command.
- trendmicro-list-firewall-rules - New command.
- trendmicro-create-firewall-rule - New command.
- trendmicro-get-firewall-rule - New command.
- trendmicro-modify-firewall-rule - New command.
- trendmicro-delete-firewall-rule - New command.
- trendmicro-list-firewall-rule-ids-of-computer - New command.
- trendmicro-add-firewall-rule-ids-to-computer - New command.
- trendmicro-set-firewall-rule-ids-to-computer - New command.
- trendmicro-get-policy - New command.
- trendmicro-modify-policy - New command.
- trendmicro-delete-policy - New command.
- trendmicro-get-policy-setting - New command.
- trendmicro-modify-policy-setting - New command.
- trendmicro-reset-policy-setting - New command.
- trendmicro-list-policies - New command.
- trendmicro-search-policies - New command.
- trendmicro-create-policy - New command.
- trendmicro-remove-firewall-rule-id-from-computer - New command.
- trendmicro-list-default-policy-settings - New command.
- trendmicro-get-default-policy-setting - New command.
- trendmicro-modify-default-policy-setting - New command.
- trendmicro-reset-default-policy-setting - New command.
#
Configure Trend Micro Deep Security on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for Trend Micro Deep Security.
Click Add instance to create and configure a new integration instance.
Parameter Description Required Server URL Server URL for TrendMicro console. e.g: https://ip:port/ True API Secret The API secret key True API Version The API version used False Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
trendmicro-create-computerCreate a new computer
#
Base Commandtrendmicro-create-computer
#
InputArgument Name | Description | Required |
---|---|---|
expand | Determines the computer information to include in the response. Notice that the information is appended to the context data only. Possible values are: none, all, computerStatus, tasks, securityUpdates, computerSettings, allSecurityModules, antiMalware, webReputation, activityMonitoring, firewall, intrusionPrevention, integrityMonitoring, logInspection, applicationControl, SAP, interfaces, ESXSummary, allVirtualMachineSummaries, azureARMVirtualMachineSummary, azureVMVirtualMachineSummary, ec2VirtualMachineSummary, noConnectorVirtualMachineSummary, vmwareVMVirtualMachineSummary, vcloudVMVirtualMachineSummary, workspaceVirtualMachineSummary, gcpVirtualMachineSummary. Default is none. | Optional |
overrides | Show only overrides defined for the current computer. Possible values are: true, false. Default is false. | Optional |
host_name | Hostname of the computer. | Optional |
display_name | Display name of the computer. | Optional |
description | Description of the computer. | Optional |
group_id | ID of the computer group to which the computer belongs. | Optional |
policy_id | ID of the policy assigned to the computer. | Optional |
asset_importance_id | ID of the asset importance assigned to the computer. | Optional |
relay_list_id | ID of the relay list that is assigned to the computer. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.Computers.hostName | string | Hostname of the computer |
TrendMicro.Computers.displayName | string | Display name of the computer |
TrendMicro.Computers.description | string | Description of the computer |
TrendMicro.Computers.groupID | integer | ID of the computer group to which the computer belongs |
TrendMicro.Computers.policyID | integer | ID of the policy assigned to the computer |
TrendMicro.Computers.assetImportanceID | integer | ID of the asset importance assigned to the computer |
TrendMicro.Computers.relayListID | integer | ID of the relay list that is assigned to the computer |
#
Command Example!trendmicro-create-computer host_name="example_computer"
#
Context Example#
Human Readable Output#
Details for the new computer example_computer
ID Host Name Group ID 217 example_computer 0
#
trendmicro-search-computersSearch for specific computers by some field name with a certain type. Every field has a specific type. It can be a simple type like a string, a numeric or a boolean. However, it can also be a choice, which is a string with specific options (enumeration). To search, you must provide the field_name & field_type, the operation to perform, and the value to search.
#
Base Commandtrendmicro-search-computers
#
InputArgument Name | Description | Required |
---|---|---|
max_items | Limits the number of objects returned. | Optional |
field_name | The field name to search for. Possible values are: hostName, displayName, description, groupID, policyID, assetImportanceID, relayListID. | Required |
field_type | The type of the field. Possible values are: boolean, numeric, choice, id, string. | Required |
operation | The search conditional to test on the field name. Possible values are: less-than, less-than-or-equal, equal, greater-than-or-equal, greater-than, not-equal. | Required |
value | The value to compare. | Required |
sort_by_object_id | If true, forces the response objects to be sorted by ID, overriding the default sort order. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.Computers.hostName | string | Hostname of the computer |
TrendMicro.Computers.displayName | string | Display name of the computer |
TrendMicro.Computers.description | string | Description of the computer |
TrendMicro.Computers.groupID | integer | ID of the computer group to which the computer belongs |
TrendMicro.Computers.policyID | integer | ID of the policy assigned to the computer |
TrendMicro.Computers.assetImportanceID | integer | ID of the asset importance assigned to the computer |
TrendMicro.Computers.relayListID | integer | ID of the relay list that is assigned to the computer |
#
Command Example!trendmicro-search-computers field_name=groupID field_type=numeric operation=equal value=0
#
Context Example#
Human Readable Output#
Matched Computers
ID Host Name Description Group ID 1 q1 Modified Test 0 2 q2 Modified Test 0 3 poc Modified Test 0 34 aaaaa Modified Test 0 166 poc1 Modified Test 0 216 example_computer 0
#
trendmicro-get-computerGet information about a certain computer
#
Base Commandtrendmicro-get-computer
#
InputArgument Name | Description | Required |
---|---|---|
computer_id | The ID number of the computer to get. | Required |
expand | Determines the computer information to include in the response. Notice that the information is appended to the context data only. Possible values are: none, all, computerStatus, tasks, securityUpdates, computerSettings, allSecurityModules, antiMalware, webReputation, activityMonitoring, firewall, intrusionPrevention, integrityMonitoring, logInspection, applicationControl, SAP, interfaces, ESXSummary, allVirtualMachineSummaries, azureARMVirtualMachineSummary, azureVMVirtualMachineSummary, ec2VirtualMachineSummary, noConnectorVirtualMachineSummary, vmwareVMVirtualMachineSummary, vcloudVMVirtualMachineSummary, workspaceVirtualMachineSummary, gcpVirtualMachineSummary. Default is none. | Optional |
overrides | Show only overrides defined for the current computer. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.Computers.hostName | string | Hostname of the computer |
TrendMicro.Computers.displayName | string | Display name of the computer |
TrendMicro.Computers.description | string | Description of the computer |
TrendMicro.Computers.groupID | integer | ID of the computer group to which the computer belongs |
TrendMicro.Computers.policyID | integer | ID of the policy assigned to the computer |
TrendMicro.Computers.assetImportanceID | integer | ID of the asset importance assigned to the computer |
TrendMicro.Computers.relayListID | integer | ID of the relay list that is assigned to the computer |
#
Command Example!trendmicro-get-computer computer_id=216
#
Context Example#
Human Readable Output#
Details for the computer example_computer
ID Host Name Group ID 216 example_computer 0
#
trendmicro-list-computersGet information of all existing computers
#
Base Commandtrendmicro-list-computers
#
InputArgument Name | Description | Required |
---|---|---|
expand | Determines the computer information to include in the response. Notice that the information is appended to the context data only. Possible values are: none, all, computerStatus, tasks, securityUpdates, computerSettings, allSecurityModules, antiMalware, webReputation, activityMonitoring, firewall, intrusionPrevention, integrityMonitoring, logInspection, applicationControl, SAP, interfaces, ESXSummary, allVirtualMachineSummaries, azureARMVirtualMachineSummary, azureVMVirtualMachineSummary, ec2VirtualMachineSummary, noConnectorVirtualMachineSummary, vmwareVMVirtualMachineSummary, vcloudVMVirtualMachineSummary, workspaceVirtualMachineSummary, gcpVirtualMachineSummary. Default is none. | Optional |
overrides | Show only overrides defined for the current computer. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.Computers.hostName | string | Hostname of the computer |
TrendMicro.Computers.displayName | string | Display name of the computer |
TrendMicro.Computers.description | string | Description of the computer |
TrendMicro.Computers.groupID | integer | ID of the computer group to which the computer belongs |
TrendMicro.Computers.policyID | integer | ID of the policy assigned to the computer |
TrendMicro.Computers.assetImportanceID | integer | ID of the asset importance assigned to the computer |
TrendMicro.Computers.relayListID | integer | ID of the relay list that is assigned to the computer |
#
Command Example!trendmicro-list-computers expand="firewall"
#
Context Example#
Human Readable Output#
All computers list
ID Host Name Description Group ID 1 q1 Modified Test 0 2 q2 Modified Test 0 3 poc Modified Test 0 34 aaaaa Modified Test 0 166 poc1 Modified Test 0 216 example_computer 0
#
trendmicro-modify-computerModify properties of a certain computer
#
Base Commandtrendmicro-modify-computer
#
InputArgument Name | Description | Required |
---|---|---|
computer_id | The ID number of the computer to modify. | Required |
expand | Determines the computer information to include in the response. Notice that the information is appended to the context data only. Possible values are: none, all, computerStatus, tasks, securityUpdates, computerSettings, allSecurityModules, antiMalware, webReputation, activityMonitoring, firewall, intrusionPrevention, integrityMonitoring, logInspection, applicationControl, SAP, interfaces, ESXSummary, allVirtualMachineSummaries, azureARMVirtualMachineSummary, azureVMVirtualMachineSummary, ec2VirtualMachineSummary, noConnectorVirtualMachineSummary, vmwareVMVirtualMachineSummary, vcloudVMVirtualMachineSummary, workspaceVirtualMachineSummary, gcpVirtualMachineSummary. Default is none. | Optional |
host_name | Hostname of the computer. | Optional |
display_name | Display name of the computer. | Optional |
description | Description of the computer. | Optional |
group_id | ID of the computer group to which the computer belongs. | Optional |
policy_id | ID of the policy assigned to the computer. | Optional |
asset_importance_id | ID of the asset importance assigned to the computer. | Optional |
relay_list_id | ID of the relay list that is assigned to the computer. | Optional |
overrides | Show the value only if defined for the current computer. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.Computers.hostName | string | Hostname of the computer |
TrendMicro.Computers.displayName | string | Display name of the computer |
TrendMicro.Computers.description | string | Description of the computer |
TrendMicro.Computers.groupID | integer | ID of the computer group to which the computer belongs |
TrendMicro.Computers.policyID | integer | ID of the policy assigned to the computer |
TrendMicro.Computers.assetImportanceID | integer | ID of the asset importance assigned to the computer |
TrendMicro.Computers.relayListID | integer | ID of the relay list that is assigned to the computer |
#
Command Example!trendmicro-modify-computer computer_id=216 description="Example computer description"
#
Context Example#
Human Readable Output#
Details for the computer example_computer
ID Host Name Description Group ID 216 example_computer Example computer description 0
#
trendmicro-delete-computerDelete a certain computer
#
Base Commandtrendmicro-delete-computer
#
InputArgument Name | Description | Required |
---|---|---|
computer_id | The ID number of the computer to delete. | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!trendmicro-delete-computer computer_id=216
#
Human Readable OutputThe computer was successfully deleted!
#
trendmicro-get-computer-settingGet information about a setting of a certain computer
#
Base Commandtrendmicro-get-computer-setting
#
InputArgument Name | Description | Required |
---|---|---|
computer_id | The ID number of the computer. | Required |
name | The name of the setting. Possible values are: logInspectionSettingSeverityClippingAgentEventSendSyslogLevelMin, firewallSettingEngineOptionConnectionsCleanupMax, firewallSettingEngineOptionVerifyTcpChecksumEnabled, antiMalwareSettingScanCacheOnDemandConfigId, applicationControlSettingSharedRulesetId, webReputationSettingSmartProtectionServerConnectionLostWarningEnabled, applicationControlSettingExecutionEnforcementLevel, webReputationSettingBlockedUrlDomains, firewallSettingEngineOptionSynSentTimeout, platformSettingAgentSelfProtectionPassword, firewallSettingReconnaissanceBlockTcpXmasAttackDuration, intrusionPreventionSettingVirtualAndContainerNetworkScanEnabled, logInspectionSettingSyslogConfigId, firewallSettingEngineOptionDebugModeEnabled, firewallSettingVirtualAndContainerNetworkScanEnabled, antiMalwareSettingFileHashSha256Enabled, firewallSettingReconnaissanceNotifyFingerprintProbeEnabled, firewallSettingEventLogFileRetainNum, firewallSettingAntiEvasionCheckTcpPawsZero, antiMalwareSettingConnectedThreatDefenseUseControlManagerSuspiciousObjectListEnabled, intrusionPreventionSettingEngineOptionFragmentedIpKeepMax, firewallSettingEngineOptionDrop6To4BogonsAddressesEnabled, logInspectionSettingSeverityClippingAgentEventStoreLevelMin, platformSettingScanCacheConcurrencyMax, antiMalwareSettingSyslogConfigId, firewallSettingAntiEvasionTcpPawsWindowPolicy, firewallSettingReconnaissanceDetectTcpXmasAttackEnabled, applicationControlSettingRulesetMode, antiMalwareSettingSmartProtectionGlobalServerUseProxyEnabled, webReputationSettingSmartProtectionLocalServerAllowOffDomainGlobal, integrityMonitoringSettingCombinedModeProtectionSource, firewallSettingEngineOptionCloseWaitTimeout, platformSettingScanOpenPortListId, platformSettingAgentSelfProtectionPasswordEnabled, firewallSettingEngineOptionAckTimeout, firewallSettingEventLogFileCachedEntriesStaleTime, firewallSettingCombinedModeProtectionSource, platformSettingAgentEventsSendInterval, platformSettingInactiveAgentCleanupOverrideEnabled, firewallSettingFailureResponseEngineSystem, platformSettingRelayState, firewallSettingEngineOptionDropEvasiveRetransmitEnabled, activityMonitoringSettingIndicatorEnabled, intrusionPreventionSettingEngineOptionFragmentedIpTimeout, firewallSettingAntiEvasionCheckTcpZeroFlags, webReputationSettingSmartProtectionGlobalServerUseProxyEnabled, intrusionPreventionSettingNsxSecurityTaggingPreventModeLevel, firewallSettingReconnaissanceNotifyTcpXmasAttackEnabled, firewallSettingEngineOptionUdpTimeout, webReputationSettingSmartProtectionLocalServerEnabled, firewallSettingEngineOptionTcpMssLimit, firewallSettingEngineOptionColdStartTimeout, firewallSettingEngineOptionEstablishedTimeout, antiMalwareSettingIdentifiedFilesSpaceMaxMbytes, firewallSettingEngineOptionAllowNullIpEnabled, platformSettingNotificationsSuppressPopupsEnabled, firewallSettingAntiEvasionCheckTcpRstFinFlags, firewallSettingEngineOptionDisconnectTimeout, firewallSettingEngineOptionCloseTimeout, firewallSettingEngineOptionTunnelDepthMaxExceededAction, firewallSettingReconnaissanceDetectTcpNullScanEnabled, platformSettingSmartProtectionAntiMalwareGlobalServerProxyId, firewallSettingEngineOptionFilterIpv4Tunnels, webReputationSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionLogOnePacketPeriod, firewallSettingEngineOptionFilterIpv6Tunnels, firewallSettingAntiEvasionCheckTcpCongestionFlags, platformSettingHeartbeatMissedAlertThreshold, intrusionPreventionSettingEngineOptionsEnabled, firewallSettingEngineOptionConnectionsNumUdpMax, integrityMonitoringSettingAutoApplyRecommendationsEnabled, firewallSettingEngineOptionTunnelDepthMax, firewallSettingEngineOptionDropUnknownSslProtocolEnabled, antiMalwareSettingNsxSecurityTaggingValue, intrusionPreventionSettingLogDataRuleFirstMatchEnabled, firewallSettingEngineOptionLoggingPolicy, platformSettingTroubleshootingLoggingLevel, antiMalwareSettingVirtualApplianceOnDemandScanCacheEntriesMax, webReputationSettingCombinedModeProtectionSource, firewallSettingEngineOptionClosingTimeout, firewallSettingAntiEvasionCheckPaws, intrusionPreventionSettingAutoApplyRecommendationsEnabled, firewallSettingReconnaissanceDetectFingerprintProbeEnabled, antiMalwareSettingNsxSecurityTaggingRemoveOnCleanScanEnabled, firewallSettingEngineOptionLogPacketLengthMax, firewallSettingEngineOptionDropTeredoAnomaliesEnabled, webReputationSettingSecurityLevel, firewallSettingEngineOptionDropIpv6SiteLocalAddressesEnabled, activityMonitoringSettingActivityEnabled, firewallSettingEngineOptionStrictTerodoPortCheckEnabled, webReputationSettingBlockedUrlKeywords, webReputationSettingSyslogConfigId, firewallSettingFailureResponsePacketSanityCheck, firewallSettingNetworkEngineMode, firewallSettingEventLogFileSizeMax, antiMalwareSettingMalwareScanMultithreadedProcessingEnabled, firewallSettingReconnaissanceDetectTcpSynFinScanEnabled, firewallSettingEngineOptionDropIpZeroPayloadEnabled, firewallSettingEngineOptionBlockIpv6Agent8AndEarlierEnabled, intrusionPreventionSettingEngineOptionFragmentedIpPacketSendIcmpEnabled, antiMalwareSettingPredictiveMachineLearningExceptions, firewallSettingEngineOptionLogEventsPerSecondMax, firewallSettingEngineOptionSslSessionTime, antiMalwareSettingBehaviorMonitoringScanExclusionList, antiMalwareSettingSmartProtectionGlobalServerEnabled, firewallSettingEngineOptionLogOnePacketWithinPeriodEnabled, firewallSettingEngineOptionGenerateConnectionEventsIcmpEnabled, platformSettingHeartbeatInactiveVmOfflineAlertEnabled, webReputationSettingSmartProtectionWebReputationGlobalServerProxyId, antiMalwareSettingNsxSecurityTaggingEnabled, firewallSettingAntiEvasionCheckFragmentedPackets, firewallSettingEngineOptionConnectionsNumIcmpMax, firewallSettingAntiEvasionCheckTcpSplitHandshake, antiMalwareSettingCombinedModeProtectionSource, firewallSettingEngineOptionEventNodesMax, webReputationSettingMonitorPortListId, applicationControlSettingSyslogConfigId, firewallSettingAntiEvasionCheckOutNoConnection, firewallSettingEngineOptionBlockIpv6Agent9AndLaterEnabled, integrityMonitoringSettingVirtualApplianceOptimizationScanCacheEntriesMax, firewallSettingReconnaissanceNotifyTcpNullScanEnabled, firewallSettingEngineOptionIgnoreStatusCode1, firewallSettingEngineOptionIgnoreStatusCode0, firewallSettingEngineOptionIgnoreStatusCode2, firewallSettingEngineOptionSslSessionSize, antiMalwareSettingScanCacheRealTimeConfigId, platformSettingRecommendationOngoingScansInterval, platformSettingSmartProtectionGlobalServerUseProxyEnabled, firewallSettingInterfaceLimitOneActiveEnabled, firewallSettingAntiEvasionCheckTcpChecksum, firewallSettingEngineOptionDropIpv6ExtType0Enabled, antiMalwareSettingScanFileSizeMaxMbytes, firewallSettingEngineOptionGenerateConnectionEventsTcpEnabled, antiMalwareSettingFileHashSizeMaxMbytes, firewallSettingEventLogFileCachedEntriesLifeTime, platformSettingSmartProtectionGlobalServerProxyId, logInspectionSettingAutoApplyRecommendationsEnabled, antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled, webReputationSettingBlockingPageLink, firewallSettingSyslogConfigId, platformSettingAgentCommunicationsDirection, integrityMonitoringSettingScanCacheConfigId, antiMalwareSettingDocumentExploitProtectionRuleExceptions, firewallSettingAntiEvasionCheckTcpSynWithData, antiMalwareSettingFileHashEnabled, firewallSettingReconnaissanceBlockFingerprintProbeDuration, firewallSettingEngineOptionDropIpv6BogonsAddressesEnabled, firewallSettingEngineOptionBootStartTimeout, firewallSettingEngineOptionConnectionsNumTcpMax, firewallSettingAntiEvasionSecurityPosture, firewallSettingInterfacePatterns, firewallSettingInterfaceIsolationEnabled, antiMalwareSettingVirtualApplianceRealTimeScanCacheEntriesMax, firewallSettingEventsOutOfAllowedPolicyEnabled, firewallSettingAntiEvasionCheckEvasiveRetransmit, firewallSettingEngineOptionIcmpTimeout, integrityMonitoringSettingSyslogConfigId, firewallSettingEngineOptionConnectionCleanupTimeout, antiMalwareSettingSmartProtectionLocalServerAllowOffDomainGlobal, firewallSettingReconnaissanceNotifyTcpSynFinScanEnabled, firewallSettingEngineOptionErrorTimeout, webReputationSettingAllowedUrls, firewallSettingReconnaissanceNotifyNetworkOrPortScanEnabled, firewallSettingEngineOptionFinWait1Timeout, firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled, activityMonitoringSettingSyslogConfigId, firewallSettingAntiEvasionCheckTcpSynRstFlags, antiMalwareSettingSpywareApprovedList, firewallSettingAntiEvasionCheckTcpUrgentFlags, intrusionPreventionSettingNsxSecurityTaggingDetectModeLevel, intrusionPreventionSettingEngineOptionFragmentedIpUnconcernedMacAddressBypassEnabled, firewallSettingEngineOptionLogAllPacketDataEnabled, firewallSettingAntiEvasionCheckTcpSynFinFlags, platformSettingHeartbeatInterval, firewallSettingEngineOptionFragmentSizeMin, antiMalwareSettingSmartProtectionServerConnectionLostWarningEnabled, firewallSettingReconnaissanceBlockNetworkOrPortScanDuration, integrityMonitoringSettingContentHashAlgorithm, antiMalwareSettingSmartScanState, firewallSettingConfigPackageExceedsAlertMaxEnabled, platformSettingEnvironmentVariableOverrides, firewallSettingEngineOptionFragmentOffsetMin, antiMalwareSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionSynRcvdTimeout, firewallSettingEventLogFileCachedEntriesNum, firewallSettingEngineOptionForceAllowIcmpType3Code4, firewallSettingReconnaissanceBlockTcpNullScanDuration, platformSettingSmartProtectionGlobalServerEnabled, integrityMonitoringSettingRealtimeEnabled, firewallSettingEngineOptionLastAckTimeout, firewallSettingReconnaissanceExcludeIpListId, platformSettingAgentSelfProtectionEnabled, firewallSettingEngineOptionDropIpv6ReservedAddressesEnabled, firewallSettingAntiEvasionCheckFinNoConnection, firewallSettingEngineOptionDebugPacketNumMax, firewallSettingEngineOptionBypassCiscoWaasConnectionsEnabled, firewallSettingReconnaissanceEnabled, platformSettingHeartbeatLocalTimeShiftAlertThreshold, antiMalwareSettingFileHashMd5Enabled, firewallSettingReconnaissanceDetectNetworkOrPortScanEnabled, firewallSettingEngineOptionSilentTcpConnectionDropEnabled, firewallSettingEngineOptionBlockSameSrcDstIpEnabled, firewallSettingEngineOptionForceAllowDhcpDns, firewallSettingReconnaissanceIncludeIpListId, firewallSettingEngineOptionsEnabled, firewallSettingReconnaissanceBlockTcpSynFinScanDuration, webReputationSettingSecurityBlockUntestedPagesEnabled, webReputationSettingAllowedUrlDomains, firewallSettingEventLogFileIgnoreSourceIpListId, firewallSettingEngineOptionDropIpv6FragmentsLowerThanMinMtuEnabled, platformSettingAutoAssignNewIntrusionPreventionRulesEnabled, firewallSettingAntiEvasionCheckRstNoConnection, webReputationSettingBlockedUrls, platformSettingCombinedModeNetworkGroupProtectionSource, webReputationSettingAlertingEnabled, antiMalwareSettingNsxSecurityTaggingOnRemediationFailureEnabled, integrityMonitoringSettingCpuUsageLevel, platformSettingAutoUpdateAntiMalwareEngineEnabled, intrusionPreventionSettingCombinedModeProtectionSource. | Required |
overrides | Show the value only if defined for the current computer. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.ComputersSettings.computerId | integer | The computer id that owns the computer |
TrendMicro.ComputersSettings.name | string | The name of the setting |
TrendMicro.ComputersSettings.value | string | The value of a setting |
#
Command Example!trendmicro-get-computer-setting computer_id=216 name=activityMonitoringSettingActivityEnabled
#
Context Example#
Human Readable Output#
Settings for computer 216
Computer ID Name Value activityMonitoringSettingActivityEnabled Off
#
trendmicro-modify-computer-settingModify a setting of a certain computer
#
Base Commandtrendmicro-modify-computer-setting
#
InputArgument Name | Description | Required |
---|---|---|
computer_id | The ID number of the computer. | Required |
name | The name of the setting. Possible values are: logInspectionSettingSeverityClippingAgentEventSendSyslogLevelMin, firewallSettingEngineOptionConnectionsCleanupMax, firewallSettingEngineOptionVerifyTcpChecksumEnabled, antiMalwareSettingScanCacheOnDemandConfigId, applicationControlSettingSharedRulesetId, webReputationSettingSmartProtectionServerConnectionLostWarningEnabled, applicationControlSettingExecutionEnforcementLevel, webReputationSettingBlockedUrlDomains, firewallSettingEngineOptionSynSentTimeout, platformSettingAgentSelfProtectionPassword, firewallSettingReconnaissanceBlockTcpXmasAttackDuration, intrusionPreventionSettingVirtualAndContainerNetworkScanEnabled, logInspectionSettingSyslogConfigId, firewallSettingEngineOptionDebugModeEnabled, firewallSettingVirtualAndContainerNetworkScanEnabled, antiMalwareSettingFileHashSha256Enabled, firewallSettingReconnaissanceNotifyFingerprintProbeEnabled, firewallSettingEventLogFileRetainNum, firewallSettingAntiEvasionCheckTcpPawsZero, antiMalwareSettingConnectedThreatDefenseUseControlManagerSuspiciousObjectListEnabled, intrusionPreventionSettingEngineOptionFragmentedIpKeepMax, firewallSettingEngineOptionDrop6To4BogonsAddressesEnabled, logInspectionSettingSeverityClippingAgentEventStoreLevelMin, platformSettingScanCacheConcurrencyMax, antiMalwareSettingSyslogConfigId, firewallSettingAntiEvasionTcpPawsWindowPolicy, firewallSettingReconnaissanceDetectTcpXmasAttackEnabled, applicationControlSettingRulesetMode, antiMalwareSettingSmartProtectionGlobalServerUseProxyEnabled, webReputationSettingSmartProtectionLocalServerAllowOffDomainGlobal, integrityMonitoringSettingCombinedModeProtectionSource, firewallSettingEngineOptionCloseWaitTimeout, platformSettingScanOpenPortListId, platformSettingAgentSelfProtectionPasswordEnabled, firewallSettingEngineOptionAckTimeout, firewallSettingEventLogFileCachedEntriesStaleTime, firewallSettingCombinedModeProtectionSource, platformSettingAgentEventsSendInterval, platformSettingInactiveAgentCleanupOverrideEnabled, firewallSettingFailureResponseEngineSystem, platformSettingRelayState, firewallSettingEngineOptionDropEvasiveRetransmitEnabled, activityMonitoringSettingIndicatorEnabled, intrusionPreventionSettingEngineOptionFragmentedIpTimeout, firewallSettingAntiEvasionCheckTcpZeroFlags, webReputationSettingSmartProtectionGlobalServerUseProxyEnabled, intrusionPreventionSettingNsxSecurityTaggingPreventModeLevel, firewallSettingReconnaissanceNotifyTcpXmasAttackEnabled, firewallSettingEngineOptionUdpTimeout, webReputationSettingSmartProtectionLocalServerEnabled, firewallSettingEngineOptionTcpMssLimit, firewallSettingEngineOptionColdStartTimeout, firewallSettingEngineOptionEstablishedTimeout, antiMalwareSettingIdentifiedFilesSpaceMaxMbytes, firewallSettingEngineOptionAllowNullIpEnabled, platformSettingNotificationsSuppressPopupsEnabled, firewallSettingAntiEvasionCheckTcpRstFinFlags, firewallSettingEngineOptionDisconnectTimeout, firewallSettingEngineOptionCloseTimeout, firewallSettingEngineOptionTunnelDepthMaxExceededAction, firewallSettingReconnaissanceDetectTcpNullScanEnabled, platformSettingSmartProtectionAntiMalwareGlobalServerProxyId, firewallSettingEngineOptionFilterIpv4Tunnels, webReputationSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionLogOnePacketPeriod, firewallSettingEngineOptionFilterIpv6Tunnels, firewallSettingAntiEvasionCheckTcpCongestionFlags, platformSettingHeartbeatMissedAlertThreshold, intrusionPreventionSettingEngineOptionsEnabled, firewallSettingEngineOptionConnectionsNumUdpMax, integrityMonitoringSettingAutoApplyRecommendationsEnabled, firewallSettingEngineOptionTunnelDepthMax, firewallSettingEngineOptionDropUnknownSslProtocolEnabled, antiMalwareSettingNsxSecurityTaggingValue, intrusionPreventionSettingLogDataRuleFirstMatchEnabled, firewallSettingEngineOptionLoggingPolicy, platformSettingTroubleshootingLoggingLevel, antiMalwareSettingVirtualApplianceOnDemandScanCacheEntriesMax, webReputationSettingCombinedModeProtectionSource, firewallSettingEngineOptionClosingTimeout, firewallSettingAntiEvasionCheckPaws, intrusionPreventionSettingAutoApplyRecommendationsEnabled, firewallSettingReconnaissanceDetectFingerprintProbeEnabled, antiMalwareSettingNsxSecurityTaggingRemoveOnCleanScanEnabled, firewallSettingEngineOptionLogPacketLengthMax, firewallSettingEngineOptionDropTeredoAnomaliesEnabled, webReputationSettingSecurityLevel, firewallSettingEngineOptionDropIpv6SiteLocalAddressesEnabled, activityMonitoringSettingActivityEnabled, firewallSettingEngineOptionStrictTerodoPortCheckEnabled, webReputationSettingBlockedUrlKeywords, webReputationSettingSyslogConfigId, firewallSettingFailureResponsePacketSanityCheck, firewallSettingNetworkEngineMode, firewallSettingEventLogFileSizeMax, antiMalwareSettingMalwareScanMultithreadedProcessingEnabled, firewallSettingReconnaissanceDetectTcpSynFinScanEnabled, firewallSettingEngineOptionDropIpZeroPayloadEnabled, firewallSettingEngineOptionBlockIpv6Agent8AndEarlierEnabled, intrusionPreventionSettingEngineOptionFragmentedIpPacketSendIcmpEnabled, antiMalwareSettingPredictiveMachineLearningExceptions, firewallSettingEngineOptionLogEventsPerSecondMax, firewallSettingEngineOptionSslSessionTime, antiMalwareSettingBehaviorMonitoringScanExclusionList, antiMalwareSettingSmartProtectionGlobalServerEnabled, firewallSettingEngineOptionLogOnePacketWithinPeriodEnabled, firewallSettingEngineOptionGenerateConnectionEventsIcmpEnabled, platformSettingHeartbeatInactiveVmOfflineAlertEnabled, webReputationSettingSmartProtectionWebReputationGlobalServerProxyId, antiMalwareSettingNsxSecurityTaggingEnabled, firewallSettingAntiEvasionCheckFragmentedPackets, firewallSettingEngineOptionConnectionsNumIcmpMax, firewallSettingAntiEvasionCheckTcpSplitHandshake, antiMalwareSettingCombinedModeProtectionSource, firewallSettingEngineOptionEventNodesMax, webReputationSettingMonitorPortListId, applicationControlSettingSyslogConfigId, firewallSettingAntiEvasionCheckOutNoConnection, firewallSettingEngineOptionBlockIpv6Agent9AndLaterEnabled, integrityMonitoringSettingVirtualApplianceOptimizationScanCacheEntriesMax, firewallSettingReconnaissanceNotifyTcpNullScanEnabled, firewallSettingEngineOptionIgnoreStatusCode1, firewallSettingEngineOptionIgnoreStatusCode0, firewallSettingEngineOptionIgnoreStatusCode2, firewallSettingEngineOptionSslSessionSize, antiMalwareSettingScanCacheRealTimeConfigId, platformSettingRecommendationOngoingScansInterval, platformSettingSmartProtectionGlobalServerUseProxyEnabled, firewallSettingInterfaceLimitOneActiveEnabled, firewallSettingAntiEvasionCheckTcpChecksum, firewallSettingEngineOptionDropIpv6ExtType0Enabled, antiMalwareSettingScanFileSizeMaxMbytes, firewallSettingEngineOptionGenerateConnectionEventsTcpEnabled, antiMalwareSettingFileHashSizeMaxMbytes, firewallSettingEventLogFileCachedEntriesLifeTime, platformSettingSmartProtectionGlobalServerProxyId, logInspectionSettingAutoApplyRecommendationsEnabled, antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled, webReputationSettingBlockingPageLink, firewallSettingSyslogConfigId, platformSettingAgentCommunicationsDirection, integrityMonitoringSettingScanCacheConfigId, antiMalwareSettingDocumentExploitProtectionRuleExceptions, firewallSettingAntiEvasionCheckTcpSynWithData, antiMalwareSettingFileHashEnabled, firewallSettingReconnaissanceBlockFingerprintProbeDuration, firewallSettingEngineOptionDropIpv6BogonsAddressesEnabled, firewallSettingEngineOptionBootStartTimeout, firewallSettingEngineOptionConnectionsNumTcpMax, firewallSettingAntiEvasionSecurityPosture, firewallSettingInterfacePatterns, firewallSettingInterfaceIsolationEnabled, antiMalwareSettingVirtualApplianceRealTimeScanCacheEntriesMax, firewallSettingEventsOutOfAllowedPolicyEnabled, firewallSettingAntiEvasionCheckEvasiveRetransmit, firewallSettingEngineOptionIcmpTimeout, integrityMonitoringSettingSyslogConfigId, firewallSettingEngineOptionConnectionCleanupTimeout, antiMalwareSettingSmartProtectionLocalServerAllowOffDomainGlobal, firewallSettingReconnaissanceNotifyTcpSynFinScanEnabled, firewallSettingEngineOptionErrorTimeout, webReputationSettingAllowedUrls, firewallSettingReconnaissanceNotifyNetworkOrPortScanEnabled, firewallSettingEngineOptionFinWait1Timeout, firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled, activityMonitoringSettingSyslogConfigId, firewallSettingAntiEvasionCheckTcpSynRstFlags, antiMalwareSettingSpywareApprovedList, firewallSettingAntiEvasionCheckTcpUrgentFlags, intrusionPreventionSettingNsxSecurityTaggingDetectModeLevel, intrusionPreventionSettingEngineOptionFragmentedIpUnconcernedMacAddressBypassEnabled, firewallSettingEngineOptionLogAllPacketDataEnabled, firewallSettingAntiEvasionCheckTcpSynFinFlags, platformSettingHeartbeatInterval, firewallSettingEngineOptionFragmentSizeMin, antiMalwareSettingSmartProtectionServerConnectionLostWarningEnabled, firewallSettingReconnaissanceBlockNetworkOrPortScanDuration, integrityMonitoringSettingContentHashAlgorithm, antiMalwareSettingSmartScanState, firewallSettingConfigPackageExceedsAlertMaxEnabled, platformSettingEnvironmentVariableOverrides, firewallSettingEngineOptionFragmentOffsetMin, antiMalwareSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionSynRcvdTimeout, firewallSettingEventLogFileCachedEntriesNum, firewallSettingEngineOptionForceAllowIcmpType3Code4, firewallSettingReconnaissanceBlockTcpNullScanDuration, platformSettingSmartProtectionGlobalServerEnabled, integrityMonitoringSettingRealtimeEnabled, firewallSettingEngineOptionLastAckTimeout, firewallSettingReconnaissanceExcludeIpListId, platformSettingAgentSelfProtectionEnabled, firewallSettingEngineOptionDropIpv6ReservedAddressesEnabled, firewallSettingAntiEvasionCheckFinNoConnection, firewallSettingEngineOptionDebugPacketNumMax, firewallSettingEngineOptionBypassCiscoWaasConnectionsEnabled, firewallSettingReconnaissanceEnabled, platformSettingHeartbeatLocalTimeShiftAlertThreshold, antiMalwareSettingFileHashMd5Enabled, firewallSettingReconnaissanceDetectNetworkOrPortScanEnabled, firewallSettingEngineOptionSilentTcpConnectionDropEnabled, firewallSettingEngineOptionBlockSameSrcDstIpEnabled, firewallSettingEngineOptionForceAllowDhcpDns, firewallSettingReconnaissanceIncludeIpListId, firewallSettingEngineOptionsEnabled, firewallSettingReconnaissanceBlockTcpSynFinScanDuration, webReputationSettingSecurityBlockUntestedPagesEnabled, webReputationSettingAllowedUrlDomains, firewallSettingEventLogFileIgnoreSourceIpListId, firewallSettingEngineOptionDropIpv6FragmentsLowerThanMinMtuEnabled, platformSettingAutoAssignNewIntrusionPreventionRulesEnabled, firewallSettingAntiEvasionCheckRstNoConnection, webReputationSettingBlockedUrls, platformSettingCombinedModeNetworkGroupProtectionSource, webReputationSettingAlertingEnabled, antiMalwareSettingNsxSecurityTaggingOnRemediationFailureEnabled, integrityMonitoringSettingCpuUsageLevel, platformSettingAutoUpdateAntiMalwareEngineEnabled, intrusionPreventionSettingCombinedModeProtectionSource. | Required |
overrides | Show the value only if defined for the current computer. Possible values are: true, false. Default is false. | Optional |
value | Value of a Setting. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.ComputersSettings.computerId | integer | The ID of the computer that owns the setting |
TrendMicro.ComputersSettings.name | string | The name of the setting |
TrendMicro.ComputersSettings.value | string | Value of a Setting |
#
Command Example!trendmicro-modify-computer-setting computer_id=216 name=activityMonitoringSettingActivityEnabled value=on
#
Context Example#
Human Readable Output#
Settings for computer 216
Computer ID Name Value activityMonitoringSettingActivityEnabled On
#
trendmicro-reset-computer-settingReset a setting of certain computer to its default value.
#
Base Commandtrendmicro-reset-computer-setting
#
InputArgument Name | Description | Required |
---|---|---|
computer_id | The ID number of the computer. | Required |
name | The name of the setting. Possible values are: logInspectionSettingSeverityClippingAgentEventSendSyslogLevelMin, firewallSettingEngineOptionConnectionsCleanupMax, firewallSettingEngineOptionVerifyTcpChecksumEnabled, antiMalwareSettingScanCacheOnDemandConfigId, applicationControlSettingSharedRulesetId, webReputationSettingSmartProtectionServerConnectionLostWarningEnabled, applicationControlSettingExecutionEnforcementLevel, webReputationSettingBlockedUrlDomains, firewallSettingEngineOptionSynSentTimeout, platformSettingAgentSelfProtectionPassword, firewallSettingReconnaissanceBlockTcpXmasAttackDuration, intrusionPreventionSettingVirtualAndContainerNetworkScanEnabled, logInspectionSettingSyslogConfigId, firewallSettingEngineOptionDebugModeEnabled, firewallSettingVirtualAndContainerNetworkScanEnabled, antiMalwareSettingFileHashSha256Enabled, firewallSettingReconnaissanceNotifyFingerprintProbeEnabled, firewallSettingEventLogFileRetainNum, firewallSettingAntiEvasionCheckTcpPawsZero, antiMalwareSettingConnectedThreatDefenseUseControlManagerSuspiciousObjectListEnabled, intrusionPreventionSettingEngineOptionFragmentedIpKeepMax, firewallSettingEngineOptionDrop6To4BogonsAddressesEnabled, logInspectionSettingSeverityClippingAgentEventStoreLevelMin, platformSettingScanCacheConcurrencyMax, antiMalwareSettingSyslogConfigId, firewallSettingAntiEvasionTcpPawsWindowPolicy, firewallSettingReconnaissanceDetectTcpXmasAttackEnabled, applicationControlSettingRulesetMode, antiMalwareSettingSmartProtectionGlobalServerUseProxyEnabled, webReputationSettingSmartProtectionLocalServerAllowOffDomainGlobal, integrityMonitoringSettingCombinedModeProtectionSource, firewallSettingEngineOptionCloseWaitTimeout, platformSettingScanOpenPortListId, platformSettingAgentSelfProtectionPasswordEnabled, firewallSettingEngineOptionAckTimeout, firewallSettingEventLogFileCachedEntriesStaleTime, firewallSettingCombinedModeProtectionSource, platformSettingAgentEventsSendInterval, platformSettingInactiveAgentCleanupOverrideEnabled, firewallSettingFailureResponseEngineSystem, platformSettingRelayState, firewallSettingEngineOptionDropEvasiveRetransmitEnabled, activityMonitoringSettingIndicatorEnabled, intrusionPreventionSettingEngineOptionFragmentedIpTimeout, firewallSettingAntiEvasionCheckTcpZeroFlags, webReputationSettingSmartProtectionGlobalServerUseProxyEnabled, intrusionPreventionSettingNsxSecurityTaggingPreventModeLevel, firewallSettingReconnaissanceNotifyTcpXmasAttackEnabled, firewallSettingEngineOptionUdpTimeout, webReputationSettingSmartProtectionLocalServerEnabled, firewallSettingEngineOptionTcpMssLimit, firewallSettingEngineOptionColdStartTimeout, firewallSettingEngineOptionEstablishedTimeout, antiMalwareSettingIdentifiedFilesSpaceMaxMbytes, firewallSettingEngineOptionAllowNullIpEnabled, platformSettingNotificationsSuppressPopupsEnabled, firewallSettingAntiEvasionCheckTcpRstFinFlags, firewallSettingEngineOptionDisconnectTimeout, firewallSettingEngineOptionCloseTimeout, firewallSettingEngineOptionTunnelDepthMaxExceededAction, firewallSettingReconnaissanceDetectTcpNullScanEnabled, platformSettingSmartProtectionAntiMalwareGlobalServerProxyId, firewallSettingEngineOptionFilterIpv4Tunnels, webReputationSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionLogOnePacketPeriod, firewallSettingEngineOptionFilterIpv6Tunnels, firewallSettingAntiEvasionCheckTcpCongestionFlags, platformSettingHeartbeatMissedAlertThreshold, intrusionPreventionSettingEngineOptionsEnabled, firewallSettingEngineOptionConnectionsNumUdpMax, integrityMonitoringSettingAutoApplyRecommendationsEnabled, firewallSettingEngineOptionTunnelDepthMax, firewallSettingEngineOptionDropUnknownSslProtocolEnabled, antiMalwareSettingNsxSecurityTaggingValue, intrusionPreventionSettingLogDataRuleFirstMatchEnabled, firewallSettingEngineOptionLoggingPolicy, platformSettingTroubleshootingLoggingLevel, antiMalwareSettingVirtualApplianceOnDemandScanCacheEntriesMax, webReputationSettingCombinedModeProtectionSource, firewallSettingEngineOptionClosingTimeout, firewallSettingAntiEvasionCheckPaws, intrusionPreventionSettingAutoApplyRecommendationsEnabled, firewallSettingReconnaissanceDetectFingerprintProbeEnabled, antiMalwareSettingNsxSecurityTaggingRemoveOnCleanScanEnabled, firewallSettingEngineOptionLogPacketLengthMax, firewallSettingEngineOptionDropTeredoAnomaliesEnabled, webReputationSettingSecurityLevel, firewallSettingEngineOptionDropIpv6SiteLocalAddressesEnabled, activityMonitoringSettingActivityEnabled, firewallSettingEngineOptionStrictTerodoPortCheckEnabled, webReputationSettingBlockedUrlKeywords, webReputationSettingSyslogConfigId, firewallSettingFailureResponsePacketSanityCheck, firewallSettingNetworkEngineMode, firewallSettingEventLogFileSizeMax, antiMalwareSettingMalwareScanMultithreadedProcessingEnabled, firewallSettingReconnaissanceDetectTcpSynFinScanEnabled, firewallSettingEngineOptionDropIpZeroPayloadEnabled, firewallSettingEngineOptionBlockIpv6Agent8AndEarlierEnabled, intrusionPreventionSettingEngineOptionFragmentedIpPacketSendIcmpEnabled, antiMalwareSettingPredictiveMachineLearningExceptions, firewallSettingEngineOptionLogEventsPerSecondMax, firewallSettingEngineOptionSslSessionTime, antiMalwareSettingBehaviorMonitoringScanExclusionList, antiMalwareSettingSmartProtectionGlobalServerEnabled, firewallSettingEngineOptionLogOnePacketWithinPeriodEnabled, firewallSettingEngineOptionGenerateConnectionEventsIcmpEnabled, platformSettingHeartbeatInactiveVmOfflineAlertEnabled, webReputationSettingSmartProtectionWebReputationGlobalServerProxyId, antiMalwareSettingNsxSecurityTaggingEnabled, firewallSettingAntiEvasionCheckFragmentedPackets, firewallSettingEngineOptionConnectionsNumIcmpMax, firewallSettingAntiEvasionCheckTcpSplitHandshake, antiMalwareSettingCombinedModeProtectionSource, firewallSettingEngineOptionEventNodesMax, webReputationSettingMonitorPortListId, applicationControlSettingSyslogConfigId, firewallSettingAntiEvasionCheckOutNoConnection, firewallSettingEngineOptionBlockIpv6Agent9AndLaterEnabled, integrityMonitoringSettingVirtualApplianceOptimizationScanCacheEntriesMax, firewallSettingReconnaissanceNotifyTcpNullScanEnabled, firewallSettingEngineOptionIgnoreStatusCode1, firewallSettingEngineOptionIgnoreStatusCode0, firewallSettingEngineOptionIgnoreStatusCode2, firewallSettingEngineOptionSslSessionSize, antiMalwareSettingScanCacheRealTimeConfigId, platformSettingRecommendationOngoingScansInterval, platformSettingSmartProtectionGlobalServerUseProxyEnabled, firewallSettingInterfaceLimitOneActiveEnabled, firewallSettingAntiEvasionCheckTcpChecksum, firewallSettingEngineOptionDropIpv6ExtType0Enabled, antiMalwareSettingScanFileSizeMaxMbytes, firewallSettingEngineOptionGenerateConnectionEventsTcpEnabled, antiMalwareSettingFileHashSizeMaxMbytes, firewallSettingEventLogFileCachedEntriesLifeTime, platformSettingSmartProtectionGlobalServerProxyId, logInspectionSettingAutoApplyRecommendationsEnabled, antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled, webReputationSettingBlockingPageLink, firewallSettingSyslogConfigId, platformSettingAgentCommunicationsDirection, integrityMonitoringSettingScanCacheConfigId, antiMalwareSettingDocumentExploitProtectionRuleExceptions, firewallSettingAntiEvasionCheckTcpSynWithData, antiMalwareSettingFileHashEnabled, firewallSettingReconnaissanceBlockFingerprintProbeDuration, firewallSettingEngineOptionDropIpv6BogonsAddressesEnabled, firewallSettingEngineOptionBootStartTimeout, firewallSettingEngineOptionConnectionsNumTcpMax, firewallSettingAntiEvasionSecurityPosture, firewallSettingInterfacePatterns, firewallSettingInterfaceIsolationEnabled, antiMalwareSettingVirtualApplianceRealTimeScanCacheEntriesMax, firewallSettingEventsOutOfAllowedPolicyEnabled, firewallSettingAntiEvasionCheckEvasiveRetransmit, firewallSettingEngineOptionIcmpTimeout, integrityMonitoringSettingSyslogConfigId, firewallSettingEngineOptionConnectionCleanupTimeout, antiMalwareSettingSmartProtectionLocalServerAllowOffDomainGlobal, firewallSettingReconnaissanceNotifyTcpSynFinScanEnabled, firewallSettingEngineOptionErrorTimeout, webReputationSettingAllowedUrls, firewallSettingReconnaissanceNotifyNetworkOrPortScanEnabled, firewallSettingEngineOptionFinWait1Timeout, firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled, activityMonitoringSettingSyslogConfigId, firewallSettingAntiEvasionCheckTcpSynRstFlags, antiMalwareSettingSpywareApprovedList, firewallSettingAntiEvasionCheckTcpUrgentFlags, intrusionPreventionSettingNsxSecurityTaggingDetectModeLevel, intrusionPreventionSettingEngineOptionFragmentedIpUnconcernedMacAddressBypassEnabled, firewallSettingEngineOptionLogAllPacketDataEnabled, firewallSettingAntiEvasionCheckTcpSynFinFlags, platformSettingHeartbeatInterval, firewallSettingEngineOptionFragmentSizeMin, antiMalwareSettingSmartProtectionServerConnectionLostWarningEnabled, firewallSettingReconnaissanceBlockNetworkOrPortScanDuration, integrityMonitoringSettingContentHashAlgorithm, antiMalwareSettingSmartScanState, firewallSettingConfigPackageExceedsAlertMaxEnabled, platformSettingEnvironmentVariableOverrides, firewallSettingEngineOptionFragmentOffsetMin, antiMalwareSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionSynRcvdTimeout, firewallSettingEventLogFileCachedEntriesNum, firewallSettingEngineOptionForceAllowIcmpType3Code4, firewallSettingReconnaissanceBlockTcpNullScanDuration, platformSettingSmartProtectionGlobalServerEnabled, integrityMonitoringSettingRealtimeEnabled, firewallSettingEngineOptionLastAckTimeout, firewallSettingReconnaissanceExcludeIpListId, platformSettingAgentSelfProtectionEnabled, firewallSettingEngineOptionDropIpv6ReservedAddressesEnabled, firewallSettingAntiEvasionCheckFinNoConnection, firewallSettingEngineOptionDebugPacketNumMax, firewallSettingEngineOptionBypassCiscoWaasConnectionsEnabled, firewallSettingReconnaissanceEnabled, platformSettingHeartbeatLocalTimeShiftAlertThreshold, antiMalwareSettingFileHashMd5Enabled, firewallSettingReconnaissanceDetectNetworkOrPortScanEnabled, firewallSettingEngineOptionSilentTcpConnectionDropEnabled, firewallSettingEngineOptionBlockSameSrcDstIpEnabled, firewallSettingEngineOptionForceAllowDhcpDns, firewallSettingReconnaissanceIncludeIpListId, firewallSettingEngineOptionsEnabled, firewallSettingReconnaissanceBlockTcpSynFinScanDuration, webReputationSettingSecurityBlockUntestedPagesEnabled, webReputationSettingAllowedUrlDomains, firewallSettingEventLogFileIgnoreSourceIpListId, firewallSettingEngineOptionDropIpv6FragmentsLowerThanMinMtuEnabled, platformSettingAutoAssignNewIntrusionPreventionRulesEnabled, firewallSettingAntiEvasionCheckRstNoConnection, webReputationSettingBlockedUrls, platformSettingCombinedModeNetworkGroupProtectionSource, webReputationSettingAlertingEnabled, antiMalwareSettingNsxSecurityTaggingOnRemediationFailureEnabled, integrityMonitoringSettingCpuUsageLevel, platformSettingAutoUpdateAntiMalwareEngineEnabled, intrusionPreventionSettingCombinedModeProtectionSource. | Required |
overrides | Show the value only if defined for the current computer. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.ComputersSettings.computerId | integer | The ID of the computer that owns the setting |
TrendMicro.ComputersSettings.name | string | The name of the setting |
TrendMicro.ComputersSettings.value | string | The value of the setting |
#
Command Example!trendmicro-reset-computer-setting computer_id=216 name=activityMonitoringSettingActivityEnabled
#
Context Example#
Human Readable Output#
Settings for computer 216
Computer ID Name Value activityMonitoringSettingActivityEnabled Off
#
trendmicro-list-computer-groupsGet information about all existing computer groups
#
Base Commandtrendmicro-list-computer-groups
#
InputArgument Name | Description | Required |
---|
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.ComputerGroups.name | string | Name of the computer group |
TrendMicro.ComputerGroups.description | string | Description of the computer group |
TrendMicro.ComputerGroups.parentGroupID | integer | ID of the computer group's parent group |
#
Command Example!trendmicro-list-computer-groups
#
Context Example#
Human Readable Output#
Computer Groups
ID Name Description Parent Group ID 1 PoC Group Testing Group 100 Test Test Group 1 110 Example Computer Group 1
#
trendmicro-create-computer-groupCreate a new computer group
#
Base Commandtrendmicro-create-computer-group
#
InputArgument Name | Description | Required |
---|---|---|
name | Name of the computer group. | Required |
description | Description of the computer group. | Optional |
parent_group_id | ID of the computer group's parent group. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.ComputerGroups.name | string | Name of the computer group |
TrendMicro.ComputerGroups.description | string | Description of the computer group |
TrendMicro.ComputerGroups.parentGroupID | integer | ID of the computer group's parent group |
#
Command Example!trendmicro-create-computer-group name="Example Computer Group" description="Example computer group description" parent_group_id=1
#
Context Example#
Human Readable Output#
Computer Groups
ID Name Description Parent Group ID 111 Example Computer Group Example computer group description 1
#
trendmicro-search-computer-groupsSearch for specific computer groups by some field name with a certain type. Every field has a specific type. It can be a simple type like a string, a numeric or a boolean. However, it can also be a choice, which is a string with specific options (enumeration). To search, you must provide the field_name & field_type, the operation to perform, and the value to search.
#
Base Commandtrendmicro-search-computer-groups
#
InputArgument Name | Description | Required |
---|---|---|
max_items | Limits the number of objects returned. | Optional |
field_name | The name of the field. Possible values are: ID, type, name, description, parentGroupID. | Required |
field_type | The type of the field. Possible values are: boolean, numeric, choice, id, string. | Required |
operation | The operation to compare with. Possible values are: less-than, less-than-or-equal, equal, greater-than-or-equal, greater-than, not-equal. | Required |
value | The value compare against the field name. | Required |
sort_by_object_id | If true, forces the response objects to be sorted by ID, overriding the default sort order. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.ComputerGroups.name | string | Name of the computer group |
TrendMicro.ComputerGroups.description | string | Description of the computer group |
TrendMicro.ComputerGroups.parentGroupID | integer | ID of the computer group's parent group |
#
Command Example!trendmicro-search-computer-groups field_name=ID operation=equal field_type=id value=110
#
Context Example#
Human Readable Output#
Matched Computer Groups
ID Name Parent Group ID 110 Example Computer Group 1
#
trendmicro-get-computer-groupGet information of a certain computer group
#
Base Commandtrendmicro-get-computer-group
#
InputArgument Name | Description | Required |
---|---|---|
computer_group_id | The ID number of the computer group to get. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.ComputerGroups.name | string | Name of the computer group |
TrendMicro.ComputerGroups.description | string | Description of the computer group |
TrendMicro.ComputerGroups.parentGroupID | integer | ID of the computer group's parent group |
#
Command Example!trendmicro-get-computer-group computer_group_id=110
#
Context Example#
Human Readable Output#
Computer Group 110 Details
ID Name Parent Group ID 110 Example Computer Group 1
#
trendmicro-modify-computer-groupModify the properties of a certain computer group
#
Base Commandtrendmicro-modify-computer-group
#
InputArgument Name | Description | Required |
---|---|---|
computer_group_id | The ID number of the computer group to modify. | Required |
name | Name of the computer group. | Optional |
description | Description of the computer group. | Optional |
parent_group_id | ID of the computer group's parent group. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.ComputerGroups.name | string | Name of the computer group |
TrendMicro.ComputerGroups.description | string | Description of the computer group |
TrendMicro.ComputerGroups.parentGroupID | integer | ID of the computer group's parent group |
#
Command Example!trendmicro-modify-computer-group computer_group_id=110 description="Example computer group description"
#
Context Example#
Human Readable Output#
Computer Group
ID Name Description Parent Group ID 110 Example Computer Group Example computer group description 1
#
trendmicro-delete-computer-groupDelete a certain computer group
#
Base Commandtrendmicro-delete-computer-group
#
InputArgument Name | Description | Required |
---|---|---|
computer_group_id | The ID number of the computer group to delete. | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!trendmicro-delete-computer-group computer_group_id=110
#
Human Readable OutputThe computer group was successfully deleted!
#
trendmicro-search-firewall-rulesSearch for specific firewall rules by some field name with a certain type. Every field has a specific type. It can be a simple type like a string, a numeric or a boolean. However, it can also be a choice, which is a string with specific options (enumeration). To search, you must provide the field_name & field_type, the operation to perform, and the value to search.
#
Base Commandtrendmicro-search-firewall-rules
#
InputArgument Name | Description | Required |
---|---|---|
max_items | Limits the number of objects returned. | Optional |
field_name | The field name to search. Possible values are: ID, name, description, action, priority, direction, frameType, frameNumber, frameNot, protocol, protocolNumber, protocolNot, sourceIPType, sourceIPValue, sourceIPMask, sourceIPRangeFrom, sourceIPRangeTo, sourceIPMultiple, sourceIPListID, sourceIPNot, sourceMACType, sourceMACValue, sourceMACMultiple, sourceMACListID, sourceMACNot, sourcePortType, sourcePortMultiple, sourcePortListID, sourcePortNot, destinationIPType, destinationIPValue, destinationIPMask, destinationIPRangeFrom, destinationIPRangeTo, destinationIPMultiple, destinationIPListID, destinationIPNot, destinationMACType, destinationMACValue, destinationMACMultiple, destinationMACListID, destinationMACNot, destinationPortType, destinationPortMultiple, destinationPortListID, destinationPortNot, anyFlags, logDisabled, includePacketData, alertEnabled, scheduleID, contextID. | Required |
field_type | The field type. Possible values are: boolean, numeric, choice, id, string. Default is string. | Optional |
operation | The operation to test against the field. Possible values are: less-than, less-than-or-equal, equal, greater-than-or-equal, greater-than, not-equal. | Required |
value | The value to compare against the field. | Required |
sort_by_object_id | If true, forces the response objects to be sorted by ID, overriding the default sort order. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.FirewallRules.name | string | Name of the firewall rule |
TrendMicro.FirewallRules.description | string | Description of the firewall rule |
TrendMicro.FirewallRules.action | string | Action of the packet filter |
TrendMicro.FirewallRules.priority | string | Priority of the packet filter |
TrendMicro.FirewallRules.direction | string | Packet direction |
TrendMicro.FirewallRules.frameType | string | Supported frame types |
TrendMicro.FirewallRules.frameNumber | integer | Ethernet frame number |
TrendMicro.FirewallRules.frameNot | boolean | Controls if the frame setting should be inverted |
TrendMicro.FirewallRules.protocol | string | Protocol |
TrendMicro.FirewallRules.protocolNumber | integer | Two-byte protocol number |
TrendMicro.FirewallRules.protocolNot | boolean | Controls if the protocol setting should be inverted |
TrendMicro.FirewallRules.sourceIPType | string | Source IP type |
TrendMicro.FirewallRules.sourceIPValue | string | Source IP |
TrendMicro.FirewallRules.sourceIPMask | string | Source IP mask |
TrendMicro.FirewallRules.sourceIPRangeFrom | string | The first value for a range of source IP addresses |
TrendMicro.FirewallRules.sourceIPRangeTo | string | The last value for a range of source IP addresses |
TrendMicro.FirewallRules.sourceIPMultiple | array | List of source IP addresses |
TrendMicro.FirewallRules.sourceIPListID | integer | ID of source IP list |
TrendMicro.FirewallRules.sourceIPNot | boolean | Controls if the source IP setting should be inverted |
TrendMicro.FirewallRules.sourceMACType | string | Source MAC type |
TrendMicro.FirewallRules.sourceMACValue | string | Source MAC address |
TrendMicro.FirewallRules.sourceMACMultiple | array | List of MAC addresses |
TrendMicro.FirewallRules.sourceMACListID | integer | ID of MAC address list |
TrendMicro.FirewallRules.sourceMACNot | boolean | Controls if the source MAC setting should be inverted |
TrendMicro.FirewallRules.sourcePortType | string | The type of source port |
TrendMicro.FirewallRules.sourcePortMultiple | array | List of comma-delimited source ports |
TrendMicro.FirewallRules.sourcePortListID | integer | ID of source port list |
TrendMicro.FirewallRules.sourcePortNot | boolean | Controls if the source port setting should be inverted |
TrendMicro.FirewallRules.destinationIPType | string | Destination IP type |
TrendMicro.FirewallRules.destinationIPValue | string | Destination IP |
TrendMicro.FirewallRules.destinationIPMask | string | Destination IP mask |
TrendMicro.FirewallRules.destinationIPRangeFrom | string | The first value for a range of destination IP addresses |
TrendMicro.FirewallRules.destinationIPRangeTo | string | The last value for a range of destination IP addresses |
TrendMicro.FirewallRules.destinationIPMultiple | array | List of comma-delimited destination IP addresses |
TrendMicro.FirewallRules.destinationIPListID | integer | ID of destination IP list |
TrendMicro.FirewallRules.destinationIPNot | boolean | Controls if the destination IP setting should be inverted |
TrendMicro.FirewallRules.destinationMACType | string | Destination MAC type |
TrendMicro.FirewallRules.destinationMACValue | string | Destination MAC address |
TrendMicro.FirewallRules.destinationMACMultiple | array | List of comma-delimited MAC addresses |
TrendMicro.FirewallRules.destinationMACListID | integer | ID of MAC address list |
TrendMicro.FirewallRules.destinationMACNot | boolean | Controls if the destination MAC setting should be inverted |
TrendMicro.FirewallRules.destinationPortType | string | The type of destination port |
TrendMicro.FirewallRules.destinationPortMultiple | array | List of comma-delimited destination ports |
TrendMicro.FirewallRules.destinationPortListID | integer | ID of destination port list |
TrendMicro.FirewallRules.destinationPortNot | boolean | Controls if the destination port setting should be inverted |
TrendMicro.FirewallRules.anyFlags | boolean | True if any flags are used |
TrendMicro.FirewallRules.logDisabled | boolean | Controls if logging for this filter is disabled |
TrendMicro.FirewallRules.includePacketData | boolean | Controls if this filter should capture data for every log |
TrendMicro.FirewallRules.alertEnabled | boolean | Controls if this filter should be alerted on |
TrendMicro.FirewallRules.scheduleID | integer | ID of the schedule to control when this filter is "on" |
TrendMicro.FirewallRules.contextID | integer | RuleContext that is applied to this filter |
TrendMicro.FirewallRules.tcpflags | array | TCP flags |
TrendMicro.FirewallRules.TCPNot | boolean | Whther the TCP settings are inverted or not |
TrendMicro.FirewallRules.ICMPType | integer | ICMP type |
TrendMicro.FirewallRules.ICMPCode | integer | ICMP code |
TrendMicro.FirewallRules.ICMPNot | boolean | Whther the ICMP settings are inverted or not |
#
Command Example!trendmicro-search-firewall-rules field_name="action" field_type="choice" operation="equal" value="allow"
#
Context Example#
Human Readable Output#
Matched Firewall Rules
ID Name Description Direction Action 20 Deep Security Agent Allow incoming traffic to Deep Security Agent incoming allow 21 VMware vCenter Server Allow incoming traffic to VMware vCenter Server incoming allow 22 Allow Deep Security as a Service inbound communications incoming allow 24 Allow solicited TCP/UDP replies UDP stateful and TCP stateful must be enabled incoming allow 25 Allow solicited ICMP replies ICMP stateful must be enabled incoming allow 32 FTP Server Allow incoming traffic to an FTP Server incoming allow 35 Deep Security Manager Allow incoming traffic to Deep Security Manager incoming allow 36 Microsoft Exchange Server Allow incoming traffic to an Microsoft Exchange Server incoming allow 37 IPSec IKE incoming allow 38 IPSec Encryption incoming allow 39 IPSec Authentication incoming allow 40 Domain Controller (TCP) Allow incoming traffic to a Domain Controller incoming allow 42 Web Server Allow incoming TCP traffic to a Web Server incoming allow 43 Remote Access SSH Allow remote access to machines incoming allow 44 Domain Client (TCP) Allow incoming traffic from the domain controller incoming allow 46 SMTP Server Allow incoming TCP traffic to an SMTP Server incoming allow 47 IDENT incoming allow 52 Remote Access RDP Allow remote access to machines incoming allow 53 POP3 Server incoming allow 54 IMAP Server incoming allow 55 Computer Associates Unicenter incoming allow 56 Veritas incoming allow 70 Allow PPPOE Discovery incoming allow 71 Allow PPPOE Session incoming allow 72 Generic Routing Encapsulation incoming allow 75 poc_rule incoming allow 76 poc_rule1 incoming allow 77 poc_rule2 incoming allow 133 None incoming allow 166 UDP incoming allow 174 Example Rule incoming allow
#
trendmicro-list-firewall-rulesList all existing firewall rules
#
Base Commandtrendmicro-list-firewall-rules
#
InputArgument Name | Description | Required |
---|
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.FirewallRules.name | string | Name of the firewall rule |
TrendMicro.FirewallRules.description | string | Description of the firewall rule |
TrendMicro.FirewallRules.action | string | Action of the packet filter |
TrendMicro.FirewallRules.priority | string | Priority of the packet filter |
TrendMicro.FirewallRules.direction | string | Packet direction |
TrendMicro.FirewallRules.frameType | string | Supported frame types |
TrendMicro.FirewallRules.frameNumber | integer | Ethernet frame number |
TrendMicro.FirewallRules.frameNot | boolean | Controls if the frame setting should be inverted |
TrendMicro.FirewallRules.protocol | string | Protocol |
TrendMicro.FirewallRules.protocolNumber | integer | Two-byte protocol number |
TrendMicro.FirewallRules.protocolNot | boolean | Controls if the protocol setting should be inverted |
TrendMicro.FirewallRules.sourceIPType | string | Source IP type |
TrendMicro.FirewallRules.sourceIPValue | string | Source IP |
TrendMicro.FirewallRules.sourceIPMask | string | Source IP mask |
TrendMicro.FirewallRules.sourceIPRangeFrom | string | The first value for a range of source IP addresses |
TrendMicro.FirewallRules.sourceIPRangeTo | string | The last value for a range of source IP addresses |
TrendMicro.FirewallRules.sourceIPMultiple | array | List of source IP addresses |
TrendMicro.FirewallRules.sourceIPListID | integer | ID of source IP list |
TrendMicro.FirewallRules.sourceIPNot | boolean | Controls if the source IP setting should be inverted |
TrendMicro.FirewallRules.sourceMACType | string | Source MAC type |
TrendMicro.FirewallRules.sourceMACValue | string | Source MAC address |
TrendMicro.FirewallRules.sourceMACMultiple | array | List of MAC addresses |
TrendMicro.FirewallRules.sourceMACListID | integer | ID of MAC address list |
TrendMicro.FirewallRules.sourceMACNot | boolean | Controls if the source MAC setting should be inverted |
TrendMicro.FirewallRules.sourcePortType | string | The type of source port |
TrendMicro.FirewallRules.sourcePortMultiple | array | List of comma-delimited source ports |
TrendMicro.FirewallRules.sourcePortListID | integer | ID of source port list |
TrendMicro.FirewallRules.sourcePortNot | boolean | Controls if the source port setting should be inverted |
TrendMicro.FirewallRules.destinationIPType | string | Destination IP type |
TrendMicro.FirewallRules.destinationIPValue | string | Destination IP |
TrendMicro.FirewallRules.destinationIPMask | string | Destination IP mask |
TrendMicro.FirewallRules.destinationIPRangeFrom | string | The first value for a range of destination IP addresses |
TrendMicro.FirewallRules.destinationIPRangeTo | string | The last value for a range of destination IP addresses |
TrendMicro.FirewallRules.destinationIPMultiple | array | List of comma-delimited destination IP addresses |
TrendMicro.FirewallRules.destinationIPListID | integer | ID of destination IP list |
TrendMicro.FirewallRules.destinationIPNot | boolean | Controls if the destination IP setting should be inverted |
TrendMicro.FirewallRules.destinationMACType | string | Destination MAC type |
TrendMicro.FirewallRules.destinationMACValue | string | Destination MAC address |
TrendMicro.FirewallRules.destinationMACMultiple | array | List of comma-delimited MAC addresses |
TrendMicro.FirewallRules.destinationMACListID | integer | ID of MAC address list |
TrendMicro.FirewallRules.destinationMACNot | boolean | Controls if the destination MAC setting should be inverted |
TrendMicro.FirewallRules.destinationPortType | string | The type of destination port |
TrendMicro.FirewallRules.destinationPortMultiple | array | List of comma-delimited destination ports |
TrendMicro.FirewallRules.destinationPortListID | integer | ID of destination port list |
TrendMicro.FirewallRules.destinationPortNot | boolean | Controls if the destination port setting should be inverted |
TrendMicro.FirewallRules.anyFlags | boolean | True if any flags are used |
TrendMicro.FirewallRules.logDisabled | boolean | Controls if logging for this filter is disabled |
TrendMicro.FirewallRules.includePacketData | boolean | Controls if this filter should capture data for every log |
TrendMicro.FirewallRules.alertEnabled | boolean | Controls if this filter should be alerted on |
TrendMicro.FirewallRules.scheduleID | integer | ID of the schedule to control when this filter is "on" |
TrendMicro.FirewallRules.contextID | integer | RuleContext that is applied to this filter |
TrendMicro.FirewallRules.tcpflags | array | TCP flags |
TrendMicro.FirewallRules.TCPNot | boolean | Whther the TCP settings are inverted or not |
TrendMicro.FirewallRules.ICMPType | integer | ICMP type |
TrendMicro.FirewallRules.ICMPCode | integer | ICMP code |
TrendMicro.FirewallRules.ICMPNot | boolean | Whther the ICMP settings are inverted or not |
#
Command Example!trendmicro-list-firewall-rules
#
Context Example#
Human Readable Output#
Firewall Rules
ID Name Description Direction Action 1 Off Domain Exceptions - Domain Client (UDP) outgoing force-allow 2 Off Domain Exceptions - GRE outgoing force-allow 3 Off Domain Exceptions - HTTP(S) outgoing force-allow 4 Off Domain Exceptions - ICMP Echo Request outgoing force-allow 5 Off Domain Exceptions - IPSec Encryption outgoing force-allow 6 Off Domain Exceptions - VPN Tunnel outgoing force-allow 7 Off Domain Exceptions - Wireless Authentication outgoing force-allow 8 Remote Domain Exceptions - ARP outgoing force-allow 9 Remote Domain Exceptions - DNS outgoing force-allow 10 Remote Domain Exceptions - GRE outgoing force-allow 11 Remote Domain Exceptions - ICMP Echo Request outgoing force-allow 12 Remote Domain Exceptions - IPSec Encryption outgoing force-allow 13 Remote Domain Exceptions - VPN Tunnel outgoing force-allow 14 Restricted Interface Exceptions - ARP Outgoing outgoing force-allow 15 Restricted Interface Exceptions - DHCP Client Incoming incoming force-allow 16 Restricted Interface Exceptions - DHCP Client Outgoing outgoing force-allow 17 Restricted Interface Exceptions - Wireless Authentication Incoming incoming force-allow 18 Restricted Interface Exceptions - Wireless Authentication Outgoing outgoing force-allow 19 Restricted Interface Exceptions - Netbios Name Service Outgoing outgoing force-allow 20 Deep Security Agent Allow incoming traffic to Deep Security Agent incoming allow 21 VMware vCenter Server Allow incoming traffic to VMware vCenter Server incoming allow 22 Allow Deep Security as a Service inbound communications incoming allow 23 Allow ICMP type 3 code 4 This ICMP packet is used for MTU path negotiation incoming force-allow 24 Allow solicited TCP/UDP replies UDP stateful and TCP stateful must be enabled incoming allow 25 Allow solicited ICMP replies ICMP stateful must be enabled incoming allow 26 DHCP Client Allow DHCP Offer traffic to a DHCP Client incoming force-allow 27 Deny Internal IP Ranges Ingress filter to deny incoming spoofed packets incoming deny 28 ARP Allow incoming ARP traffic incoming force-allow 29 NetBios Name Service For hosts that rely on NetBios for name resolution incoming force-allow 30 DHCP Server Allow incoming DHCP requests to a DHCP server incoming force-allow 31 Wireless Authentication Allow wireless authentication traffic incoming force-allow 32 FTP Server Allow incoming traffic to an FTP Server incoming allow 33 Microsoft SQL Server Allow incoming TCP traffic to a Microsoft SQL server incoming force-allow 34 Oracle SQL Server Allow incoming traffic to an Oracle SQL server incoming force-allow 35 Deep Security Manager Allow incoming traffic to Deep Security Manager incoming allow 36 Microsoft Exchange Server Allow incoming traffic to an Microsoft Exchange Server incoming allow 37 IPSec IKE incoming allow 38 IPSec Encryption incoming allow 39 IPSec Authentication incoming allow 40 Domain Controller (TCP) Allow incoming traffic to a Domain Controller incoming allow 41 Domain Controller (UDP) Allow incoming traffic to a Domain Controller incoming force-allow 42 Web Server Allow incoming TCP traffic to a Web Server incoming allow 43 Remote Access SSH Allow remote access to machines incoming allow 44 Domain Client (TCP) Allow incoming traffic from the domain controller incoming allow 45 Domain Client (UDP) Allow incoming traffic from the domain controller incoming force-allow 46 SMTP Server Allow incoming TCP traffic to an SMTP Server incoming allow 47 IDENT incoming allow 48 DNS Server Allow incoming DNS requests to a DNS server incoming force-allow 49 ICMP Echo Request Allow incoming Ping requests incoming force-allow 50 Network Time Protocol Allow Network Time Protocol traffic incoming force-allow 51 Windows File Sharing Allow file sharing traffic incoming force-allow 52 Remote Access RDP Allow remote access to machines incoming allow 53 POP3 Server incoming allow 54 IMAP Server incoming allow 55 Computer Associates Unicenter incoming allow 56 Veritas incoming allow 57 MySQL Server incoming force-allow 58 WINS incoming force-allow 59 WINS Registration incoming force-allow 60 WINS Replication incoming force-allow 61 Restricted Interface Exceptions - Netbios Name Service Incoming incoming force-allow 62 Restricted Interface Exceptions - ARP Incoming incoming force-allow 63 Restricted Interface Enforcement Log packets blocked due to Restricted Interface Enforcement policy outgoing deny 64 Off Domain Exceptions - Domain Client (TCP) outgoing force-allow 65 Off Domain Exceptions - ARP outgoing force-allow 66 Off Domain Exceptions - DNS outgoing force-allow 67 Remote Domain Exceptions When remotely connected to domain only corporate traffic is allowed outgoing force-allow 68 Remote Domain Enforcement (Split Tunnel) Log packets blocked due to Remote Domain Enforcement policy outgoing deny 69 Off Domain Enforcement Log packets blocked due to Off Domain Enforcement policy outgoing deny 70 Allow PPPOE Discovery incoming allow 71 Allow PPPOE Session incoming allow 72 Generic Routing Encapsulation incoming allow 73 Off Domain Exceptions - DHCP Client outgoing force-allow 75 poc_rule incoming allow 76 poc_rule1 incoming allow 77 poc_rule2 incoming allow 133 None incoming allow 166 UDP incoming allow 174 Example Rule incoming allow
#
trendmicro-create-firewall-ruleCreate a new firewall rule
#
Base Commandtrendmicro-create-firewall-rule
#
InputArgument Name | Description | Required |
---|---|---|
name | Name of the firewall rule. | Required |
description | Description of the firewall rule. | Optional |
action | Action of the packet filter. Possible values are: log-only, allow, deny, force-allow, bypass. | Required |
priority | Priority of the packet filter. Possible values are: 0, 1, 2, 3, 4. | Optional |
direction | Packet direction. Possible values are: incoming, outgoing. | Required |
frame_type | Supported frame types. Possible values are: any, ip, arp, revarp, ipv4, ipv6, other. | Optional |
frame_number | Ethernet frame number. | Optional |
frame_not | Controls if the frame setting should be inverted. | Optional |
protocol | Protocol. Possible values are: any, icmp, igmp, ggp, tcp, udp, pup, idp, nd, raw, tcp-udp, icmpv6, other. | Optional |
protocol_number | Two-byte protocol number. | Optional |
protocol_not | Controls if the protocol setting should be inverted. | Optional |
source_ip_type | Source IP type. Possible values are: any, single, multiple, masked-ip, range, ip-list. | Optional |
source_ip_value | Source IP. | Optional |
source_ip_mask | Source IP mask. | Optional |
source_ip_range_from | The first value for a range of source IP addresses. | Optional |
source_ip_range_to | The last value for a range of source IP addresses. | Optional |
source_ip_multiple | List of source IP addresses. | Optional |
source_ip_list_id | ID of source IP list. | Optional |
source_ip_not | Controls if the source IP setting should be inverted. | Optional |
source_mac_type | Source MAC type. Possible values are: any, single, multiple, mac-list. | Optional |
source_mac_value | Source MAC address. | Optional |
source_mac_multiple | List of MAC addresses. | Optional |
source_mac_list_id | ID of MAC address list. | Optional |
source_mac_not | Controls if the source MAC setting should be inverted. | Optional |
source_port_type | The type of source port. Possible values are: any, multiple, port-list. | Optional |
source_port_multiple | List of comma-delimited source ports. | Optional |
source_port_list_id | ID of source port list. | Optional |
source_port_not | Controls if the source port setting should be inverted. | Optional |
destination_ip_type | Destination IP type. Possible values are: any, single, multiple, range, masked-ip, ip-list. | Optional |
destination_ip_value | Destination IP. | Optional |
destination_ip_mask | Destination IP mask. | Optional |
destination_ip_range_from | The first value for a range of destination IP addresses. | Optional |
destination_ip_range_to | The last value for a range of destination IP addresses. | Optional |
destination_ip_multiple | List of comma-delimited destination IP addresses. | Optional |
destination_ip_list_id | ID of destination IP list. | Optional |
destination_ip_not | Controls if the destination IP setting should be inverted. | Optional |
destination_mac_type | Destination MAC type. Possible values are: any, single, multiple, mac-list. | Optional |
destination_mac_value | Destination MAC address. | Optional |
destination_mac_multiple | List of comma-delimited MAC addresses. | Optional |
destination_mac_list_id | ID of MAC address list. | Optional |
destination_mac_not | Controls if the destination MAC setting should be inverted. | Optional |
destination_port_type | The type of destination port. Possible values are: any, multiple, port-list. | Optional |
destination_port_multiple | List of comma-delimited destination ports. | Optional |
destination_port_list_id | ID of destination port list. | Optional |
destination_port_not | Controls if the destination port setting should be inverted. | Optional |
any_flags | True if any flags are used. | Optional |
log_disabled | Controls if logging for this filter is disabled. | Optional |
include_packet_data | Controls if this filter should capture data for every log. | Optional |
alert_enabled | Controls if this filter should be alerted on. | Optional |
schedule_id | ID of the schedule to control when this filter is "on". | Optional |
context_id | RuleContext that is applied to this filter. | Optional |
tcpflags | The TCP flags the rule should filter by. Possible values are: syn, ack, psh, urg, fin, rst. | Optional |
tcp_not | Controls if the TCP settings should be inverted. | Optional |
icmp_type | The ICMP type the rule should filter by. | Optional |
icmp_code | The ICMP code the rule should filter by. | Optional |
icmp_not | Controls if the ICMP settings should be inverted. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.FirewallRules.name | string | Name of the firewall rule |
TrendMicro.FirewallRules.description | string | Description of the firewall rule |
TrendMicro.FirewallRules.action | string | Action of the packet filter |
TrendMicro.FirewallRules.priority | string | Priority of the packet filter |
TrendMicro.FirewallRules.direction | string | Packet direction |
TrendMicro.FirewallRules.frameType | string | Supported frame types |
TrendMicro.FirewallRules.frameNumber | integer | Ethernet frame number |
TrendMicro.FirewallRules.frameNot | boolean | Controls if the frame setting should be inverted |
TrendMicro.FirewallRules.protocol | string | Protocol |
TrendMicro.FirewallRules.protocolNumber | integer | Two-byte protocol number |
TrendMicro.FirewallRules.protocolNot | boolean | Controls if the protocol setting should be inverted |
TrendMicro.FirewallRules.sourceIPType | string | Source IP type |
TrendMicro.FirewallRules.sourceIPValue | string | Source IP |
TrendMicro.FirewallRules.sourceIPMask | string | Source IP mask |
TrendMicro.FirewallRules.sourceIPRangeFrom | string | The first value for a range of source IP addresses |
TrendMicro.FirewallRules.sourceIPRangeTo | string | The last value for a range of source IP addresses |
TrendMicro.FirewallRules.sourceIPMultiple | array | List of source IP addresses |
TrendMicro.FirewallRules.sourceIPListID | integer | ID of source IP list |
TrendMicro.FirewallRules.sourceIPNot | boolean | Controls if the source IP setting should be inverted |
TrendMicro.FirewallRules.sourceMACType | string | Source MAC type |
TrendMicro.FirewallRules.sourceMACValue | string | Source MAC address |
TrendMicro.FirewallRules.sourceMACMultiple | array | List of MAC addresses |
TrendMicro.FirewallRules.sourceMACListID | integer | ID of MAC address list |
TrendMicro.FirewallRules.sourceMACNot | boolean | Controls if the source MAC setting should be inverted |
TrendMicro.FirewallRules.sourcePortType | string | The type of source port |
TrendMicro.FirewallRules.sourcePortMultiple | array | List of comma-delimited source ports |
TrendMicro.FirewallRules.sourcePortListID | integer | ID of source port list |
TrendMicro.FirewallRules.sourcePortNot | boolean | Controls if the source port setting should be inverted |
TrendMicro.FirewallRules.destinationIPType | string | Destination IP type |
TrendMicro.FirewallRules.destinationIPValue | string | Destination IP |
TrendMicro.FirewallRules.destinationIPMask | string | Destination IP mask |
TrendMicro.FirewallRules.destinationIPRangeFrom | string | The first value for a range of destination IP addresses |
TrendMicro.FirewallRules.destinationIPRangeTo | string | The last value for a range of destination IP addresses |
TrendMicro.FirewallRules.destinationIPMultiple | array | List of comma-delimited destination IP addresses |
TrendMicro.FirewallRules.destinationIPListID | integer | ID of destination IP list |
TrendMicro.FirewallRules.destinationIPNot | boolean | Controls if the destination IP setting should be inverted |
TrendMicro.FirewallRules.destinationMACType | string | Destination MAC type |
TrendMicro.FirewallRules.destinationMACValue | string | Destination MAC address |
TrendMicro.FirewallRules.destinationMACMultiple | array | List of comma-delimited MAC addresses |
TrendMicro.FirewallRules.destinationMACListID | integer | ID of MAC address list |
TrendMicro.FirewallRules.destinationMACNot | boolean | Controls if the destination MAC setting should be inverted |
TrendMicro.FirewallRules.destinationPortType | string | The type of destination port |
TrendMicro.FirewallRules.destinationPortMultiple | array | List of comma-delimited destination ports |
TrendMicro.FirewallRules.destinationPortListID | integer | ID of destination port list |
TrendMicro.FirewallRules.destinationPortNot | boolean | Controls if the destination port setting should be inverted |
TrendMicro.FirewallRules.anyFlags | boolean | True if any flags are used |
TrendMicro.FirewallRules.logDisabled | boolean | Controls if logging for this filter is disabled |
TrendMicro.FirewallRules.includePacketData | boolean | Controls if this filter should capture data for every log |
TrendMicro.FirewallRules.alertEnabled | boolean | Controls if this filter should be alerted on |
TrendMicro.FirewallRules.scheduleID | integer | ID of the schedule to control when this filter is "on" |
TrendMicro.FirewallRules.contextID | integer | RuleContext that is applied to this filter |
TrendMicro.FirewallRules.tcpflags | array | TCP flags |
TrendMicro.FirewallRules.TCPNot | boolean | Whether the TCP settings are inverted |
TrendMicro.FirewallRules.ICMPType | integer | ICMP type |
TrendMicro.FirewallRules.ICMPCode | integer | ICMP code |
TrendMicro.FirewallRules.ICMPNot | boolean | Whether the ICMP settings are inverted |
#
Command Example!trendmicro-create-firewall-rule name="Example Rule" action=allow protocol=udp direction=incoming
#
Context Example#
Human Readable Output#
Firewall Rules
ID Name Direction Action 175 Example Rule incoming allow
#
trendmicro-get-firewall-ruleGet information about a certain firewall rule
#
Base Commandtrendmicro-get-firewall-rule
#
InputArgument Name | Description | Required |
---|---|---|
firewall_rule_id | The ID number of the firewall rule to get. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.FirewallRules.name | string | Name of the firewall rule |
TrendMicro.FirewallRules.description | string | Description of the firewall rule |
TrendMicro.FirewallRules.action | string | Action of the packet filter |
TrendMicro.FirewallRules.priority | string | Priority of the packet filter |
TrendMicro.FirewallRules.direction | string | Packet direction |
TrendMicro.FirewallRules.frameType | string | Supported frame types |
TrendMicro.FirewallRules.frameNumber | integer | Ethernet frame number |
TrendMicro.FirewallRules.frameNot | boolean | Controls if the frame setting should be inverted |
TrendMicro.FirewallRules.protocol | string | Protocol |
TrendMicro.FirewallRules.protocolNumber | integer | Two-byte protocol number |
TrendMicro.FirewallRules.protocolNot | boolean | Controls if the protocol setting should be inverted |
TrendMicro.FirewallRules.sourceIPType | string | Source IP type |
TrendMicro.FirewallRules.sourceIPValue | string | Source IP |
TrendMicro.FirewallRules.sourceIPMask | string | Source IP mask |
TrendMicro.FirewallRules.sourceIPRangeFrom | string | The first value for a range of source IP addresses |
TrendMicro.FirewallRules.sourceIPRangeTo | string | The last value for a range of source IP addresses |
TrendMicro.FirewallRules.sourceIPMultiple | array | List of source IP addresses |
TrendMicro.FirewallRules.sourceIPListID | integer | ID of source IP list |
TrendMicro.FirewallRules.sourceIPNot | boolean | Controls if the source IP setting should be inverted |
TrendMicro.FirewallRules.sourceMACType | string | Source MAC type |
TrendMicro.FirewallRules.sourceMACValue | string | Source MAC address |
TrendMicro.FirewallRules.sourceMACMultiple | array | List of MAC addresses |
TrendMicro.FirewallRules.sourceMACListID | integer | ID of MAC address list |
TrendMicro.FirewallRules.sourceMACNot | boolean | Controls if the source MAC setting should be inverted |
TrendMicro.FirewallRules.sourcePortType | string | The type of source port |
TrendMicro.FirewallRules.sourcePortMultiple | array | List of comma-delimited source ports |
TrendMicro.FirewallRules.sourcePortListID | integer | ID of source port list |
TrendMicro.FirewallRules.sourcePortNot | boolean | Controls if the source port setting should be inverted |
TrendMicro.FirewallRules.destinationIPType | string | Destination IP type |
TrendMicro.FirewallRules.destinationIPValue | string | Destination IP |
TrendMicro.FirewallRules.destinationIPMask | string | Destination IP mask |
TrendMicro.FirewallRules.destinationIPRangeFrom | string | The first value for a range of destination IP addresses |
TrendMicro.FirewallRules.destinationIPRangeTo | string | The last value for a range of destination IP addresses |
TrendMicro.FirewallRules.destinationIPMultiple | array | List of comma-delimited destination IP addresses |
TrendMicro.FirewallRules.destinationIPListID | integer | ID of destination IP list |
TrendMicro.FirewallRules.destinationIPNot | boolean | Controls if the destination IP setting should be inverted |
TrendMicro.FirewallRules.destinationMACType | string | Destination MAC type |
TrendMicro.FirewallRules.destinationMACValue | string | Destination MAC address |
TrendMicro.FirewallRules.destinationMACMultiple | array | List of comma-delimited MAC addresses |
TrendMicro.FirewallRules.destinationMACListID | integer | ID of MAC address list |
TrendMicro.FirewallRules.destinationMACNot | boolean | Controls if the destination MAC setting should be inverted |
TrendMicro.FirewallRules.destinationPortType | string | The type of destination port |
TrendMicro.FirewallRules.destinationPortMultiple | array | List of comma-delimited destination ports |
TrendMicro.FirewallRules.destinationPortListID | integer | ID of destination port list |
TrendMicro.FirewallRules.destinationPortNot | boolean | Controls if the destination port setting should be inverted |
TrendMicro.FirewallRules.anyFlags | boolean | True if any flags are used |
TrendMicro.FirewallRules.logDisabled | boolean | Controls if logging for this filter is disabled |
TrendMicro.FirewallRules.includePacketData | boolean | Controls if this filter should capture data for every log |
TrendMicro.FirewallRules.alertEnabled | boolean | Controls if this filter should be alerted on |
TrendMicro.FirewallRules.scheduleID | integer | ID of the schedule to control when this filter is "on" |
TrendMicro.FirewallRules.contextID | integer | RuleContext that is applied to this filter |
TrendMicro.FirewallRules.tcpflags | array | TCP flags |
TrendMicro.FirewallRules.TCPNot | boolean | Whether the TCP settings are inverted or not |
TrendMicro.FirewallRules.ICMPType | integer | ICMP type |
TrendMicro.FirewallRules.ICMPCode | integer | ICMP code |
TrendMicro.FirewallRules.ICMPNot | boolean | Whether the ICMP settings are inverted or not |
#
Command Example!trendmicro-get-firewall-rule firewall_rule_id=174
#
Context Example#
Human Readable Output#
Details of The Firewall Rule 174
ID Name Direction Action 174 Example Rule incoming allow
#
trendmicro-modify-firewall-ruleModify the properties of a certain firewall rule
#
Base Commandtrendmicro-modify-firewall-rule
#
InputArgument Name | Description | Required |
---|---|---|
firewall_rule_id | The ID number of the firewall rule to modify. | Required |
name | Name of the firewall rule. | Optional |
description | Description of the firewall rule. | Optional |
action | Action of the packet filter. Possible values are: log-only, allow, deny, force-allow, bypass. | Optional |
priority | Priority of the packet filter. Possible values are: 0, 1, 2, 3, 4. | Optional |
direction | Packet direction. Possible values are: incoming, outgoing. | Optional |
frame_type | Supported frame types. Possible values are: any, ip, arp, revarp, ipv4, ipv6, other. | Optional |
frame_number | Ethernet frame number. | Optional |
frame_not | Controls if the frame setting should be inverted. | Optional |
protocol | Protocol. Possible values are: any, icmp, igmp, ggp, tcp, pup, udp, idp, nd, raw, tcp-udp, icmpv6, other. | Optional |
protocol_number | Two-byte protocol number. | Optional |
protocol_not | Controls if the protocol setting should be inverted. | Optional |
source_ip_type | Source IP type. Possible values are: any, masked-ip, range, ip-list, single, multiple. | Optional |
source_ip_value | Source IP. | Optional |
source_ip_mask | Source IP mask. | Optional |
source_ip_range_from | The first value for a range of source IP addresses. | Optional |
source_ip_range_to | The last value for a range of source IP addresses. | Optional |
source_ip_multiple | List of source IP addresses. | Optional |
source_ip_list_id | ID of source IP list. | Optional |
source_ip_not | Controls if the source IP setting should be inverted. | Optional |
source_mac_type | Source MAC type. Possible values are: any, single, mac-list, multiple. | Optional |
source_mac_value | Source MAC address. | Optional |
source_mac_multiple | List of MAC addresses. | Optional |
source_mac_list_id | ID of MAC address list. | Optional |
source_mac_not | Controls if the source MAC setting should be inverted. | Optional |
source_port_type | The type of source port. Possible values are: any, multiple, port-list. | Optional |
source_port_multiple | List of comma-delimited source ports. | Optional |
source_port_list_id | ID of source port list. | Optional |
source_port_not | Controls if the source port setting should be inverted. | Optional |
destination_ip_type | Destination IP type. Possible values are: any, single, multiple, range, masked-ip, ip-list. | Optional |
destination_ip_value | Destination IP. | Optional |
destination_ip_mask | Destination IP mask. | Optional |
destination_ip_range_from | The first value for a range of destination IP addresses. | Optional |
destination_ip_range_to | The last value for a range of destination IP addresses. | Optional |
destination_ip_multiple | List of comma-delimited destination IP addresses. | Optional |
destination_ip_list_id | ID of destination IP list. | Optional |
destination_ip_not | Controls if the destination IP setting should be inverted. | Optional |
destination_mac_type | Destination MAC type. Possible values are: any, single, multiple, mac-list. | Optional |
destination_mac_value | Destination MAC address. | Optional |
destination_mac_multiple | List of comma-delimited MAC addresses. | Optional |
destination_mac_list_id | ID of MAC address list. | Optional |
destination_mac_not | Controls if the destination MAC setting should be inverted. | Optional |
destination_port_type | The type of destination port. Possible values are: any, port-list, multiple. | Optional |
destination_port_multiple | List of comma-delimited destination ports. | Optional |
destination_port_list_id | ID of destination port list. | Optional |
destination_port_not | Controls if the destination port setting should be inverted. | Optional |
any_flags | True if any flags are used. | Optional |
log_disabled | Controls if logging for this filter is disabled. | Optional |
include_packet_data | Controls if this filter should capture data for every log. | Optional |
alert_enabled | Controls if this filter should be alerted on. | Optional |
schedule_id | ID of the schedule to control when this filter is "on". | Optional |
context_id | RuleContext that is applied to this filter. | Optional |
tcpflags | The TCP flags the rule should filter by. Possible values are: syn, ack, psh, urg, fin, rst. | Optional |
tcp_not | Controls if the TCP settings should be inverted. | Optional |
icmp_type | The ICMP type the rule should filter by. | Optional |
icmp_code | The ICMP code the rule should filter by. | Optional |
icmp_not | Controls if the ICMP settings should be inverted. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.FirewallRules.name | string | Name of the firewall rule |
TrendMicro.FirewallRules.description | string | Description of the firewall rule |
TrendMicro.FirewallRules.action | string | Action of the packet filter |
TrendMicro.FirewallRules.priority | string | Priority of the packet filter |
TrendMicro.FirewallRules.direction | string | Packet direction |
TrendMicro.FirewallRules.frameType | string | Supported frame types |
TrendMicro.FirewallRules.frameNumber | integer | Ethernet frame number |
TrendMicro.FirewallRules.frameNot | boolean | Controls if the frame setting should be inverted |
TrendMicro.FirewallRules.protocol | string | Protocol |
TrendMicro.FirewallRules.protocolNumber | integer | Two-byte protocol number |
TrendMicro.FirewallRules.protocolNot | boolean | Controls if the protocol setting should be inverted |
TrendMicro.FirewallRules.sourceIPType | string | Source IP type |
TrendMicro.FirewallRules.sourceIPValue | string | Source IP |
TrendMicro.FirewallRules.sourceIPMask | string | Source IP mask |
TrendMicro.FirewallRules.sourceIPRangeFrom | string | The first value for a range of source IP addresses |
TrendMicro.FirewallRules.sourceIPRangeTo | string | The last value for a range of source IP addresses |
TrendMicro.FirewallRules.sourceIPMultiple | array | List of source IP addresses |
TrendMicro.FirewallRules.sourceIPListID | integer | ID of source IP list |
TrendMicro.FirewallRules.sourceIPNot | boolean | Controls if the source IP setting should be inverted |
TrendMicro.FirewallRules.sourceMACType | string | Source MAC type |
TrendMicro.FirewallRules.sourceMACValue | string | Source MAC address |
TrendMicro.FirewallRules.sourceMACMultiple | array | List of MAC addresses |
TrendMicro.FirewallRules.sourceMACListID | integer | ID of MAC address list |
TrendMicro.FirewallRules.sourceMACNot | boolean | Controls if the source MAC setting should be inverted |
TrendMicro.FirewallRules.sourcePortType | string | The type of source port |
TrendMicro.FirewallRules.sourcePortMultiple | array | List of comma-delimited source ports |
TrendMicro.FirewallRules.sourcePortListID | integer | ID of source port list |
TrendMicro.FirewallRules.sourcePortNot | boolean | Controls if the source port setting should be inverted |
TrendMicro.FirewallRules.destinationIPType | string | Destination IP type |
TrendMicro.FirewallRules.destinationIPValue | string | Destination IP |
TrendMicro.FirewallRules.destinationIPMask | string | Destination IP mask |
TrendMicro.FirewallRules.destinationIPRangeFrom | string | The first value for a range of destination IP addresses |
TrendMicro.FirewallRules.destinationIPRangeTo | string | The last value for a range of destination IP addresses |
TrendMicro.FirewallRules.destinationIPMultiple | array | List of comma-delimited destination IP addresses |
TrendMicro.FirewallRules.destinationIPListID | integer | ID of destination IP list |
TrendMicro.FirewallRules.destinationIPNot | boolean | Controls if the destination IP setting should be inverted |
TrendMicro.FirewallRules.destinationMACType | string | Destination MAC type |
TrendMicro.FirewallRules.destinationMACValue | string | Destination MAC address |
TrendMicro.FirewallRules.destinationMACMultiple | array | List of comma-delimited MAC addresses |
TrendMicro.FirewallRules.destinationMACListID | integer | ID of MAC address list |
TrendMicro.FirewallRules.destinationMACNot | boolean | Controls if the destination MAC setting should be inverted |
TrendMicro.FirewallRules.destinationPortType | string | The type of destination port |
TrendMicro.FirewallRules.destinationPortMultiple | array | List of comma-delimited destination ports |
TrendMicro.FirewallRules.destinationPortListID | integer | ID of destination port list |
TrendMicro.FirewallRules.destinationPortNot | boolean | Controls if the destination port setting should be inverted |
TrendMicro.FirewallRules.anyFlags | boolean | True if any flags are used |
TrendMicro.FirewallRules.logDisabled | boolean | Controls if logging for this filter is disabled |
TrendMicro.FirewallRules.includePacketData | boolean | Controls if this filter should capture data for every log |
TrendMicro.FirewallRules.alertEnabled | boolean | Controls if this filter should be alerted on |
TrendMicro.FirewallRules.scheduleID | integer | ID of the schedule to control when this filter is "on" |
TrendMicro.FirewallRules.contextID | integer | RuleContext that is applied to this filter |
TrendMicro.FirewallRules.tcpflags | array | TCP flags |
TrendMicro.FirewallRules.TCPNot | boolean | Whether the TCP settings are inverted or not |
TrendMicro.FirewallRules.ICMPType | integer | ICMP type |
TrendMicro.FirewallRules.ICMPCode | integer | ICMP code |
TrendMicro.FirewallRules.ICMPNot | boolean | Whether the ICMP settings are inverted or not |
#
Command Example!trendmicro-modify-firewall-rule firewall_rule_id=174 action=deny
#
Context Example#
Human Readable Output#
Details About The Modified Firewall Rule 174
ID Name Direction Action 174 Example Rule incoming deny
#
trendmicro-delete-firewall-ruleDelete a certain firewall rule
#
Base Commandtrendmicro-delete-firewall-rule
#
InputArgument Name | Description | Required |
---|---|---|
firewall_rule_id | The ID number of the firewall rule to delete. | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!trendmicro-delete-firewall-rule firewall_rule_id=174
#
Human Readable OutputThe firewall rule was successfully deleted!
#
trendmicro-list-firewall-rule-ids-of-computerList all IDs of the firewall rules that are assigned to a certain computer
#
Base Commandtrendmicro-list-firewall-rule-ids-of-computer
#
InputArgument Name | Description | Required |
---|---|---|
computer_id | The ID number of the computer. | Required |
overrides | Return only rule IDs assigned directly to the current computer. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.FirewallAssignments.assignedRuleIDs | array | List of assigned firewall rule IDs |
#
Command Example!trendmicro-list-firewall-rule-ids-of-computer computer_id=216
#
Context Example#
Human Readable OutputThe firewall rules IDs that are assigned to 216:
#
trendmicro-add-firewall-rule-ids-to-computerAdd firewall rule IDs to a certain computer
#
Base Commandtrendmicro-add-firewall-rule-ids-to-computer
#
InputArgument Name | Description | Required |
---|---|---|
computer_id | The ID number of the computer. | Required |
overrides | Return only rule IDs assigned directly to the current computer. Possible values are: true, false. Default is false. | Optional |
rule_ids | The rule IDs to add to the computer. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.FirewallAssignments.assignedRuleIDs | array | List of assigned firewall rule IDs |
#
Command Example!trendmicro-add-firewall-rule-ids-to-computer computer_id=216 rule_ids=31
#
Context Example#
Human Readable OutputThe firewall rules IDs that are assigned to computer 216: 21, 22, 31
#
trendmicro-set-firewall-rule-ids-to-computerAssign firewall rule IDs to a certain computer
#
Base Commandtrendmicro-set-firewall-rule-ids-to-computer
#
InputArgument Name | Description | Required |
---|---|---|
computer_id | The ID number of the computer. | Required |
overrides | Return only rule IDs assigned directly to the current computer. Possible values are: true, false. Default is false. | Optional |
rule_ids | The rule IDs to assign to the computer. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.FirewallAssignments.assignedRuleIDs | array | List of assigned firewall rule IDs |
#
Command Example!trendmicro-set-firewall-rule-ids-to-computer computer_id=216 rule_ids=21,22
#
Context Example#
Human Readable OutputThe firewall rules IDs that are assigned to computer 216: 21, 22
#
trendmicro-get-policyGet information about a certain policy
#
Base Commandtrendmicro-get-policy
#
InputArgument Name | Description | Required |
---|---|---|
policy_id | The ID number of the policy to get. | Required |
overrides | Show only overrides defined for the current policy. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.Policies.parentID | integer | ID of the parent policy |
TrendMicro.Policies.name | string | Name of the policy |
TrendMicro.Policies.description | string | Description of the policy |
TrendMicro.Policies.recommendationScanMode | string | Enable or disable ongoing recommendation scans for computers assigned this policy |
TrendMicro.Policies.autoRequiresUpdate | string | Automatically update computers assigned this policy when the configuration changes |
#
Command Example!trendmicro-get-policy policy_id=105
#
Context Example#
Human Readable Output#
Details About The Policy 105
ID Name Description 105 Example Policy Example policy description
#
trendmicro-modify-policyModify a certain policy
#
Base Commandtrendmicro-modify-policy
#
InputArgument Name | Description | Required |
---|---|---|
policy_id | The ID number of the policy to modify. | Required |
overrides | Show only overrides defined for the current policy. Possible values are: true, false. Default is false. | Optional |
parent_id | ID of the parent policy. | Optional |
name | Name of the policy. | Optional |
description | Description of the policy. | Optional |
recommendation_scan_mode | Enable or disable ongoing recommendation scans for computers assigned this policy. | Optional |
auto_requires_update | Automatically update computers assigned this policy when the configuration changes. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.Policies.parentID | integer | ID of the parent policy |
TrendMicro.Policies.name | string | Name of the policy |
TrendMicro.Policies.description | string | Description of the policy |
TrendMicro.Policies.recommendationScanMode | string | Enable or disable ongoing recommendation scans for computers assigned this policy |
TrendMicro.Policies.autoRequiresUpdate | string | Automatically update computers assigned this policy when the configuration changes |
#
Command Example!trendmicro-modify-policy policy_id=105 description="Example policy description"
#
Context Example#
Human Readable Output#
Details About The Policy 105
ID Name Description 105 Example Policy Example policy description
#
trendmicro-delete-policyDelete a certain policy
#
Base Commandtrendmicro-delete-policy
#
InputArgument Name | Description | Required |
---|---|---|
policy_id | The ID number of the policy to delete. | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!trendmicro-delete-policy policy_id=105
#
Human Readable OutputThe policy was successfully deleted!
#
trendmicro-get-policy-settingGet information about a setting of a certain policy
#
Base Commandtrendmicro-get-policy-setting
#
InputArgument Name | Description | Required |
---|---|---|
policy_id | The ID number of the policy. | Required |
name | The name of the policy setting. Possible values are: logInspectionSettingSeverityClippingAgentEventSendSyslogLevelMin, firewallSettingEngineOptionConnectionsCleanupMax, firewallSettingEngineOptionVerifyTcpChecksumEnabled, antiMalwareSettingScanCacheOnDemandConfigId, applicationControlSettingSharedRulesetId, webReputationSettingSmartProtectionServerConnectionLostWarningEnabled, applicationControlSettingExecutionEnforcementLevel, webReputationSettingBlockedUrlDomains, firewallSettingEngineOptionSynSentTimeout, platformSettingAgentSelfProtectionPassword, firewallSettingReconnaissanceBlockTcpXmasAttackDuration, intrusionPreventionSettingVirtualAndContainerNetworkScanEnabled, logInspectionSettingSyslogConfigId, firewallSettingEngineOptionDebugModeEnabled, firewallSettingVirtualAndContainerNetworkScanEnabled, antiMalwareSettingFileHashSha256Enabled, firewallSettingReconnaissanceNotifyFingerprintProbeEnabled, firewallSettingEventLogFileRetainNum, firewallSettingAntiEvasionCheckTcpPawsZero, antiMalwareSettingConnectedThreatDefenseUseControlManagerSuspiciousObjectListEnabled, intrusionPreventionSettingEngineOptionFragmentedIpKeepMax, firewallSettingEngineOptionDrop6To4BogonsAddressesEnabled, logInspectionSettingSeverityClippingAgentEventStoreLevelMin, platformSettingScanCacheConcurrencyMax, antiMalwareSettingSyslogConfigId, firewallSettingAntiEvasionTcpPawsWindowPolicy, firewallSettingReconnaissanceDetectTcpXmasAttackEnabled, applicationControlSettingRulesetMode, antiMalwareSettingSmartProtectionGlobalServerUseProxyEnabled, webReputationSettingSmartProtectionLocalServerAllowOffDomainGlobal, integrityMonitoringSettingCombinedModeProtectionSource, firewallSettingEngineOptionCloseWaitTimeout, platformSettingScanOpenPortListId, platformSettingAgentSelfProtectionPasswordEnabled, firewallSettingEngineOptionAckTimeout, firewallSettingEventLogFileCachedEntriesStaleTime, firewallSettingCombinedModeProtectionSource, platformSettingAgentEventsSendInterval, platformSettingInactiveAgentCleanupOverrideEnabled, firewallSettingFailureResponseEngineSystem, platformSettingRelayState, firewallSettingEngineOptionDropEvasiveRetransmitEnabled, activityMonitoringSettingIndicatorEnabled, intrusionPreventionSettingEngineOptionFragmentedIpTimeout, firewallSettingAntiEvasionCheckTcpZeroFlags, webReputationSettingSmartProtectionGlobalServerUseProxyEnabled, intrusionPreventionSettingNsxSecurityTaggingPreventModeLevel, firewallSettingReconnaissanceNotifyTcpXmasAttackEnabled, firewallSettingEngineOptionUdpTimeout, webReputationSettingSmartProtectionLocalServerEnabled, firewallSettingEngineOptionTcpMssLimit, firewallSettingEngineOptionColdStartTimeout, firewallSettingEngineOptionEstablishedTimeout, antiMalwareSettingIdentifiedFilesSpaceMaxMbytes, firewallSettingEngineOptionAllowNullIpEnabled, platformSettingNotificationsSuppressPopupsEnabled, firewallSettingAntiEvasionCheckTcpRstFinFlags, firewallSettingEngineOptionDisconnectTimeout, firewallSettingEngineOptionCloseTimeout, firewallSettingEngineOptionTunnelDepthMaxExceededAction, firewallSettingReconnaissanceDetectTcpNullScanEnabled, platformSettingSmartProtectionAntiMalwareGlobalServerProxyId, firewallSettingEngineOptionFilterIpv4Tunnels, webReputationSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionLogOnePacketPeriod, firewallSettingEngineOptionFilterIpv6Tunnels, firewallSettingAntiEvasionCheckTcpCongestionFlags, platformSettingHeartbeatMissedAlertThreshold, intrusionPreventionSettingEngineOptionsEnabled, firewallSettingEngineOptionConnectionsNumUdpMax, integrityMonitoringSettingAutoApplyRecommendationsEnabled, firewallSettingEngineOptionTunnelDepthMax, firewallSettingEngineOptionDropUnknownSslProtocolEnabled, antiMalwareSettingNsxSecurityTaggingValue, intrusionPreventionSettingLogDataRuleFirstMatchEnabled, firewallSettingEngineOptionLoggingPolicy, platformSettingTroubleshootingLoggingLevel, antiMalwareSettingVirtualApplianceOnDemandScanCacheEntriesMax, webReputationSettingCombinedModeProtectionSource, firewallSettingEngineOptionClosingTimeout, firewallSettingAntiEvasionCheckPaws, intrusionPreventionSettingAutoApplyRecommendationsEnabled, firewallSettingReconnaissanceDetectFingerprintProbeEnabled, antiMalwareSettingNsxSecurityTaggingRemoveOnCleanScanEnabled, firewallSettingEngineOptionLogPacketLengthMax, firewallSettingEngineOptionDropTeredoAnomaliesEnabled, webReputationSettingSecurityLevel, firewallSettingEngineOptionDropIpv6SiteLocalAddressesEnabled, activityMonitoringSettingActivityEnabled, firewallSettingEngineOptionStrictTerodoPortCheckEnabled, webReputationSettingBlockedUrlKeywords, webReputationSettingSyslogConfigId, firewallSettingFailureResponsePacketSanityCheck, firewallSettingNetworkEngineMode, firewallSettingEventLogFileSizeMax, antiMalwareSettingMalwareScanMultithreadedProcessingEnabled, firewallSettingReconnaissanceDetectTcpSynFinScanEnabled, firewallSettingEngineOptionDropIpZeroPayloadEnabled, firewallSettingEngineOptionBlockIpv6Agent8AndEarlierEnabled, intrusionPreventionSettingEngineOptionFragmentedIpPacketSendIcmpEnabled, antiMalwareSettingPredictiveMachineLearningExceptions, firewallSettingEngineOptionLogEventsPerSecondMax, firewallSettingEngineOptionSslSessionTime, antiMalwareSettingBehaviorMonitoringScanExclusionList, antiMalwareSettingSmartProtectionGlobalServerEnabled, firewallSettingEngineOptionLogOnePacketWithinPeriodEnabled, firewallSettingEngineOptionGenerateConnectionEventsIcmpEnabled, platformSettingHeartbeatInactiveVmOfflineAlertEnabled, webReputationSettingSmartProtectionWebReputationGlobalServerProxyId, antiMalwareSettingNsxSecurityTaggingEnabled, firewallSettingAntiEvasionCheckFragmentedPackets, firewallSettingEngineOptionConnectionsNumIcmpMax, firewallSettingAntiEvasionCheckTcpSplitHandshake, antiMalwareSettingCombinedModeProtectionSource, firewallSettingEngineOptionEventNodesMax, webReputationSettingMonitorPortListId, applicationControlSettingSyslogConfigId, firewallSettingAntiEvasionCheckOutNoConnection, firewallSettingEngineOptionBlockIpv6Agent9AndLaterEnabled, integrityMonitoringSettingVirtualApplianceOptimizationScanCacheEntriesMax, firewallSettingReconnaissanceNotifyTcpNullScanEnabled, firewallSettingEngineOptionIgnoreStatusCode1, firewallSettingEngineOptionIgnoreStatusCode0, firewallSettingEngineOptionIgnoreStatusCode2, firewallSettingEngineOptionSslSessionSize, antiMalwareSettingScanCacheRealTimeConfigId, platformSettingRecommendationOngoingScansInterval, platformSettingSmartProtectionGlobalServerUseProxyEnabled, firewallSettingInterfaceLimitOneActiveEnabled, firewallSettingAntiEvasionCheckTcpChecksum, firewallSettingEngineOptionDropIpv6ExtType0Enabled, antiMalwareSettingScanFileSizeMaxMbytes, firewallSettingEngineOptionGenerateConnectionEventsTcpEnabled, antiMalwareSettingFileHashSizeMaxMbytes, firewallSettingEventLogFileCachedEntriesLifeTime, platformSettingSmartProtectionGlobalServerProxyId, logInspectionSettingAutoApplyRecommendationsEnabled, antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled, webReputationSettingBlockingPageLink, firewallSettingSyslogConfigId, platformSettingAgentCommunicationsDirection, integrityMonitoringSettingScanCacheConfigId, antiMalwareSettingDocumentExploitProtectionRuleExceptions, firewallSettingAntiEvasionCheckTcpSynWithData, antiMalwareSettingFileHashEnabled, firewallSettingReconnaissanceBlockFingerprintProbeDuration, firewallSettingEngineOptionDropIpv6BogonsAddressesEnabled, firewallSettingEngineOptionBootStartTimeout, firewallSettingEngineOptionConnectionsNumTcpMax, firewallSettingAntiEvasionSecurityPosture, firewallSettingInterfacePatterns, firewallSettingInterfaceIsolationEnabled, antiMalwareSettingVirtualApplianceRealTimeScanCacheEntriesMax, firewallSettingEventsOutOfAllowedPolicyEnabled, firewallSettingAntiEvasionCheckEvasiveRetransmit, firewallSettingEngineOptionIcmpTimeout, integrityMonitoringSettingSyslogConfigId, firewallSettingEngineOptionConnectionCleanupTimeout, antiMalwareSettingSmartProtectionLocalServerAllowOffDomainGlobal, firewallSettingReconnaissanceNotifyTcpSynFinScanEnabled, firewallSettingEngineOptionErrorTimeout, webReputationSettingAllowedUrls, firewallSettingReconnaissanceNotifyNetworkOrPortScanEnabled, firewallSettingEngineOptionFinWait1Timeout, firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled, activityMonitoringSettingSyslogConfigId, firewallSettingAntiEvasionCheckTcpSynRstFlags, antiMalwareSettingSpywareApprovedList, firewallSettingAntiEvasionCheckTcpUrgentFlags, intrusionPreventionSettingNsxSecurityTaggingDetectModeLevel, intrusionPreventionSettingEngineOptionFragmentedIpUnconcernedMacAddressBypassEnabled, firewallSettingEngineOptionLogAllPacketDataEnabled, firewallSettingAntiEvasionCheckTcpSynFinFlags, platformSettingHeartbeatInterval, firewallSettingEngineOptionFragmentSizeMin, antiMalwareSettingSmartProtectionServerConnectionLostWarningEnabled, firewallSettingReconnaissanceBlockNetworkOrPortScanDuration, integrityMonitoringSettingContentHashAlgorithm, antiMalwareSettingSmartScanState, firewallSettingConfigPackageExceedsAlertMaxEnabled, platformSettingEnvironmentVariableOverrides, firewallSettingEngineOptionFragmentOffsetMin, antiMalwareSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionSynRcvdTimeout, firewallSettingEventLogFileCachedEntriesNum, firewallSettingEngineOptionForceAllowIcmpType3Code4, firewallSettingReconnaissanceBlockTcpNullScanDuration, platformSettingSmartProtectionGlobalServerEnabled, integrityMonitoringSettingRealtimeEnabled, firewallSettingEngineOptionLastAckTimeout, firewallSettingReconnaissanceExcludeIpListId, platformSettingAgentSelfProtectionEnabled, firewallSettingEngineOptionDropIpv6ReservedAddressesEnabled, firewallSettingAntiEvasionCheckFinNoConnection, firewallSettingEngineOptionDebugPacketNumMax, firewallSettingEngineOptionBypassCiscoWaasConnectionsEnabled, firewallSettingReconnaissanceEnabled, platformSettingHeartbeatLocalTimeShiftAlertThreshold, antiMalwareSettingFileHashMd5Enabled, firewallSettingReconnaissanceDetectNetworkOrPortScanEnabled, firewallSettingEngineOptionSilentTcpConnectionDropEnabled, firewallSettingEngineOptionBlockSameSrcDstIpEnabled, firewallSettingEngineOptionForceAllowDhcpDns, firewallSettingReconnaissanceIncludeIpListId, firewallSettingEngineOptionsEnabled, firewallSettingReconnaissanceBlockTcpSynFinScanDuration, webReputationSettingSecurityBlockUntestedPagesEnabled, webReputationSettingAllowedUrlDomains, firewallSettingEventLogFileIgnoreSourceIpListId, firewallSettingEngineOptionDropIpv6FragmentsLowerThanMinMtuEnabled, platformSettingAutoAssignNewIntrusionPreventionRulesEnabled, firewallSettingAntiEvasionCheckRstNoConnection, webReputationSettingBlockedUrls, platformSettingCombinedModeNetworkGroupProtectionSource, webReputationSettingAlertingEnabled, antiMalwareSettingNsxSecurityTaggingOnRemediationFailureEnabled, integrityMonitoringSettingCpuUsageLevel, platformSettingAutoUpdateAntiMalwareEngineEnabled, intrusionPreventionSettingCombinedModeProtectionSource. | Required |
overrides | Show the value only if defined for the current policy. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.PolicySettings.policyId | integer | Policy ID of a Setting |
TrendMicro.PolicySettings.name | string | Name of a Setting |
TrendMicro.PolicySettings.value | string | Value of a Setting |
#
Command Example!trendmicro-get-policy-setting policy_id=105 name=firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled
#
Context Example#
Human Readable Output#
The Policy Setting
Policy Id Name Value 105 firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled false
#
trendmicro-modify-policy-settingModify the value of a setting of a certain policy
#
Base Commandtrendmicro-modify-policy-setting
#
InputArgument Name | Description | Required |
---|---|---|
policy_id | The ID number of the policy. | Required |
name | The name of the setting. Possible values are: logInspectionSettingSeverityClippingAgentEventSendSyslogLevelMin, firewallSettingEngineOptionConnectionsCleanupMax, firewallSettingEngineOptionVerifyTcpChecksumEnabled, antiMalwareSettingScanCacheOnDemandConfigId, applicationControlSettingSharedRulesetId, webReputationSettingSmartProtectionServerConnectionLostWarningEnabled, applicationControlSettingExecutionEnforcementLevel, webReputationSettingBlockedUrlDomains, firewallSettingEngineOptionSynSentTimeout, platformSettingAgentSelfProtectionPassword, firewallSettingReconnaissanceBlockTcpXmasAttackDuration, intrusionPreventionSettingVirtualAndContainerNetworkScanEnabled, logInspectionSettingSyslogConfigId, firewallSettingEngineOptionDebugModeEnabled, firewallSettingVirtualAndContainerNetworkScanEnabled, antiMalwareSettingFileHashSha256Enabled, firewallSettingReconnaissanceNotifyFingerprintProbeEnabled, firewallSettingEventLogFileRetainNum, firewallSettingAntiEvasionCheckTcpPawsZero, antiMalwareSettingConnectedThreatDefenseUseControlManagerSuspiciousObjectListEnabled, intrusionPreventionSettingEngineOptionFragmentedIpKeepMax, firewallSettingEngineOptionDrop6To4BogonsAddressesEnabled, logInspectionSettingSeverityClippingAgentEventStoreLevelMin, platformSettingScanCacheConcurrencyMax, antiMalwareSettingSyslogConfigId, firewallSettingAntiEvasionTcpPawsWindowPolicy, firewallSettingReconnaissanceDetectTcpXmasAttackEnabled, applicationControlSettingRulesetMode, antiMalwareSettingSmartProtectionGlobalServerUseProxyEnabled, webReputationSettingSmartProtectionLocalServerAllowOffDomainGlobal, integrityMonitoringSettingCombinedModeProtectionSource, firewallSettingEngineOptionCloseWaitTimeout, platformSettingScanOpenPortListId, platformSettingAgentSelfProtectionPasswordEnabled, firewallSettingEngineOptionAckTimeout, firewallSettingEventLogFileCachedEntriesStaleTime, firewallSettingCombinedModeProtectionSource, platformSettingAgentEventsSendInterval, platformSettingInactiveAgentCleanupOverrideEnabled, firewallSettingFailureResponseEngineSystem, platformSettingRelayState, firewallSettingEngineOptionDropEvasiveRetransmitEnabled, activityMonitoringSettingIndicatorEnabled, intrusionPreventionSettingEngineOptionFragmentedIpTimeout, firewallSettingAntiEvasionCheckTcpZeroFlags, webReputationSettingSmartProtectionGlobalServerUseProxyEnabled, intrusionPreventionSettingNsxSecurityTaggingPreventModeLevel, firewallSettingReconnaissanceNotifyTcpXmasAttackEnabled, firewallSettingEngineOptionUdpTimeout, webReputationSettingSmartProtectionLocalServerEnabled, firewallSettingEngineOptionTcpMssLimit, firewallSettingEngineOptionColdStartTimeout, firewallSettingEngineOptionEstablishedTimeout, antiMalwareSettingIdentifiedFilesSpaceMaxMbytes, firewallSettingEngineOptionAllowNullIpEnabled, platformSettingNotificationsSuppressPopupsEnabled, firewallSettingAntiEvasionCheckTcpRstFinFlags, firewallSettingEngineOptionDisconnectTimeout, firewallSettingEngineOptionCloseTimeout, firewallSettingEngineOptionTunnelDepthMaxExceededAction, firewallSettingReconnaissanceDetectTcpNullScanEnabled, platformSettingSmartProtectionAntiMalwareGlobalServerProxyId, firewallSettingEngineOptionFilterIpv4Tunnels, webReputationSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionLogOnePacketPeriod, firewallSettingEngineOptionFilterIpv6Tunnels, firewallSettingAntiEvasionCheckTcpCongestionFlags, platformSettingHeartbeatMissedAlertThreshold, intrusionPreventionSettingEngineOptionsEnabled, firewallSettingEngineOptionConnectionsNumUdpMax, integrityMonitoringSettingAutoApplyRecommendationsEnabled, firewallSettingEngineOptionTunnelDepthMax, firewallSettingEngineOptionDropUnknownSslProtocolEnabled, antiMalwareSettingNsxSecurityTaggingValue, intrusionPreventionSettingLogDataRuleFirstMatchEnabled, firewallSettingEngineOptionLoggingPolicy, platformSettingTroubleshootingLoggingLevel, antiMalwareSettingVirtualApplianceOnDemandScanCacheEntriesMax, webReputationSettingCombinedModeProtectionSource, firewallSettingEngineOptionClosingTimeout, firewallSettingAntiEvasionCheckPaws, intrusionPreventionSettingAutoApplyRecommendationsEnabled, firewallSettingReconnaissanceDetectFingerprintProbeEnabled, antiMalwareSettingNsxSecurityTaggingRemoveOnCleanScanEnabled, firewallSettingEngineOptionLogPacketLengthMax, firewallSettingEngineOptionDropTeredoAnomaliesEnabled, webReputationSettingSecurityLevel, firewallSettingEngineOptionDropIpv6SiteLocalAddressesEnabled, activityMonitoringSettingActivityEnabled, firewallSettingEngineOptionStrictTerodoPortCheckEnabled, webReputationSettingBlockedUrlKeywords, webReputationSettingSyslogConfigId, firewallSettingFailureResponsePacketSanityCheck, firewallSettingNetworkEngineMode, firewallSettingEventLogFileSizeMax, antiMalwareSettingMalwareScanMultithreadedProcessingEnabled, firewallSettingReconnaissanceDetectTcpSynFinScanEnabled, firewallSettingEngineOptionDropIpZeroPayloadEnabled, firewallSettingEngineOptionBlockIpv6Agent8AndEarlierEnabled, intrusionPreventionSettingEngineOptionFragmentedIpPacketSendIcmpEnabled, antiMalwareSettingPredictiveMachineLearningExceptions, firewallSettingEngineOptionLogEventsPerSecondMax, firewallSettingEngineOptionSslSessionTime, antiMalwareSettingBehaviorMonitoringScanExclusionList, antiMalwareSettingSmartProtectionGlobalServerEnabled, firewallSettingEngineOptionLogOnePacketWithinPeriodEnabled, firewallSettingEngineOptionGenerateConnectionEventsIcmpEnabled, platformSettingHeartbeatInactiveVmOfflineAlertEnabled, webReputationSettingSmartProtectionWebReputationGlobalServerProxyId, antiMalwareSettingNsxSecurityTaggingEnabled, firewallSettingAntiEvasionCheckFragmentedPackets, firewallSettingEngineOptionConnectionsNumIcmpMax, firewallSettingAntiEvasionCheckTcpSplitHandshake, antiMalwareSettingCombinedModeProtectionSource, firewallSettingEngineOptionEventNodesMax, webReputationSettingMonitorPortListId, applicationControlSettingSyslogConfigId, firewallSettingAntiEvasionCheckOutNoConnection, firewallSettingEngineOptionBlockIpv6Agent9AndLaterEnabled, integrityMonitoringSettingVirtualApplianceOptimizationScanCacheEntriesMax, firewallSettingReconnaissanceNotifyTcpNullScanEnabled, firewallSettingEngineOptionIgnoreStatusCode1, firewallSettingEngineOptionIgnoreStatusCode0, firewallSettingEngineOptionIgnoreStatusCode2, firewallSettingEngineOptionSslSessionSize, antiMalwareSettingScanCacheRealTimeConfigId, platformSettingRecommendationOngoingScansInterval, platformSettingSmartProtectionGlobalServerUseProxyEnabled, firewallSettingInterfaceLimitOneActiveEnabled, firewallSettingAntiEvasionCheckTcpChecksum, firewallSettingEngineOptionDropIpv6ExtType0Enabled, antiMalwareSettingScanFileSizeMaxMbytes, firewallSettingEngineOptionGenerateConnectionEventsTcpEnabled, antiMalwareSettingFileHashSizeMaxMbytes, firewallSettingEventLogFileCachedEntriesLifeTime, platformSettingSmartProtectionGlobalServerProxyId, logInspectionSettingAutoApplyRecommendationsEnabled, antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled, webReputationSettingBlockingPageLink, firewallSettingSyslogConfigId, platformSettingAgentCommunicationsDirection, integrityMonitoringSettingScanCacheConfigId, antiMalwareSettingDocumentExploitProtectionRuleExceptions, firewallSettingAntiEvasionCheckTcpSynWithData, antiMalwareSettingFileHashEnabled, firewallSettingReconnaissanceBlockFingerprintProbeDuration, firewallSettingEngineOptionDropIpv6BogonsAddressesEnabled, firewallSettingEngineOptionBootStartTimeout, firewallSettingEngineOptionConnectionsNumTcpMax, firewallSettingAntiEvasionSecurityPosture, firewallSettingInterfacePatterns, firewallSettingInterfaceIsolationEnabled, antiMalwareSettingVirtualApplianceRealTimeScanCacheEntriesMax, firewallSettingEventsOutOfAllowedPolicyEnabled, firewallSettingAntiEvasionCheckEvasiveRetransmit, firewallSettingEngineOptionIcmpTimeout, integrityMonitoringSettingSyslogConfigId, firewallSettingEngineOptionConnectionCleanupTimeout, antiMalwareSettingSmartProtectionLocalServerAllowOffDomainGlobal, firewallSettingReconnaissanceNotifyTcpSynFinScanEnabled, firewallSettingEngineOptionErrorTimeout, webReputationSettingAllowedUrls, firewallSettingReconnaissanceNotifyNetworkOrPortScanEnabled, firewallSettingEngineOptionFinWait1Timeout, firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled, activityMonitoringSettingSyslogConfigId, firewallSettingAntiEvasionCheckTcpSynRstFlags, antiMalwareSettingSpywareApprovedList, firewallSettingAntiEvasionCheckTcpUrgentFlags, intrusionPreventionSettingNsxSecurityTaggingDetectModeLevel, intrusionPreventionSettingEngineOptionFragmentedIpUnconcernedMacAddressBypassEnabled, firewallSettingEngineOptionLogAllPacketDataEnabled, firewallSettingAntiEvasionCheckTcpSynFinFlags, platformSettingHeartbeatInterval, firewallSettingEngineOptionFragmentSizeMin, antiMalwareSettingSmartProtectionServerConnectionLostWarningEnabled, firewallSettingReconnaissanceBlockNetworkOrPortScanDuration, integrityMonitoringSettingContentHashAlgorithm, antiMalwareSettingSmartScanState, firewallSettingConfigPackageExceedsAlertMaxEnabled, platformSettingEnvironmentVariableOverrides, firewallSettingEngineOptionFragmentOffsetMin, antiMalwareSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionSynRcvdTimeout, firewallSettingEventLogFileCachedEntriesNum, firewallSettingEngineOptionForceAllowIcmpType3Code4, firewallSettingReconnaissanceBlockTcpNullScanDuration, platformSettingSmartProtectionGlobalServerEnabled, integrityMonitoringSettingRealtimeEnabled, firewallSettingEngineOptionLastAckTimeout, firewallSettingReconnaissanceExcludeIpListId, platformSettingAgentSelfProtectionEnabled, firewallSettingEngineOptionDropIpv6ReservedAddressesEnabled, firewallSettingAntiEvasionCheckFinNoConnection, firewallSettingEngineOptionDebugPacketNumMax, firewallSettingEngineOptionBypassCiscoWaasConnectionsEnabled, firewallSettingReconnaissanceEnabled, platformSettingHeartbeatLocalTimeShiftAlertThreshold, antiMalwareSettingFileHashMd5Enabled, firewallSettingReconnaissanceDetectNetworkOrPortScanEnabled, firewallSettingEngineOptionSilentTcpConnectionDropEnabled, firewallSettingEngineOptionBlockSameSrcDstIpEnabled, firewallSettingEngineOptionForceAllowDhcpDns, firewallSettingReconnaissanceIncludeIpListId, firewallSettingEngineOptionsEnabled, firewallSettingReconnaissanceBlockTcpSynFinScanDuration, webReputationSettingSecurityBlockUntestedPagesEnabled, webReputationSettingAllowedUrlDomains, firewallSettingEventLogFileIgnoreSourceIpListId, firewallSettingEngineOptionDropIpv6FragmentsLowerThanMinMtuEnabled, platformSettingAutoAssignNewIntrusionPreventionRulesEnabled, firewallSettingAntiEvasionCheckRstNoConnection, webReputationSettingBlockedUrls, platformSettingCombinedModeNetworkGroupProtectionSource, webReputationSettingAlertingEnabled, antiMalwareSettingNsxSecurityTaggingOnRemediationFailureEnabled, integrityMonitoringSettingCpuUsageLevel, platformSettingAutoUpdateAntiMalwareEngineEnabled, intrusionPreventionSettingCombinedModeProtectionSource. | Required |
overrides | Show the value only if defined for the current computer. Possible values are: true, false. Default is false. | Optional |
value | Value of a Setting. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.PolicySettings.policyId | integer | Policy Id of a Setting |
TrendMicro.PolicySettings.name | string | Name of a Setting |
TrendMicro.PolicySettings.value | string | Value of a Setting |
#
Command Example!trendmicro-modify-policy-setting name=firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled policy_id=105 value=true
#
Context Example#
Human Readable Output#
The Policy Setting:
Policy Id Name Value 105 firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled true
#
trendmicro-reset-policy-settingReset the value of a setting of a certain policy
#
Base Commandtrendmicro-reset-policy-setting
#
InputArgument Name | Description | Required |
---|---|---|
policy_id | The ID number of the policy. | Required |
name | The name of the policy setting. Possible values are: logInspectionSettingSeverityClippingAgentEventSendSyslogLevelMin, firewallSettingEngineOptionConnectionsCleanupMax, firewallSettingEngineOptionVerifyTcpChecksumEnabled, antiMalwareSettingScanCacheOnDemandConfigId, applicationControlSettingSharedRulesetId, webReputationSettingSmartProtectionServerConnectionLostWarningEnabled, applicationControlSettingExecutionEnforcementLevel, webReputationSettingBlockedUrlDomains, firewallSettingEngineOptionSynSentTimeout, platformSettingAgentSelfProtectionPassword, firewallSettingReconnaissanceBlockTcpXmasAttackDuration, intrusionPreventionSettingVirtualAndContainerNetworkScanEnabled, logInspectionSettingSyslogConfigId, firewallSettingEngineOptionDebugModeEnabled, firewallSettingVirtualAndContainerNetworkScanEnabled, antiMalwareSettingFileHashSha256Enabled, firewallSettingReconnaissanceNotifyFingerprintProbeEnabled, firewallSettingEventLogFileRetainNum, firewallSettingAntiEvasionCheckTcpPawsZero, antiMalwareSettingConnectedThreatDefenseUseControlManagerSuspiciousObjectListEnabled, intrusionPreventionSettingEngineOptionFragmentedIpKeepMax, firewallSettingEngineOptionDrop6To4BogonsAddressesEnabled, logInspectionSettingSeverityClippingAgentEventStoreLevelMin, platformSettingScanCacheConcurrencyMax, antiMalwareSettingSyslogConfigId, firewallSettingAntiEvasionTcpPawsWindowPolicy, firewallSettingReconnaissanceDetectTcpXmasAttackEnabled, applicationControlSettingRulesetMode, antiMalwareSettingSmartProtectionGlobalServerUseProxyEnabled, webReputationSettingSmartProtectionLocalServerAllowOffDomainGlobal, integrityMonitoringSettingCombinedModeProtectionSource, firewallSettingEngineOptionCloseWaitTimeout, platformSettingScanOpenPortListId, platformSettingAgentSelfProtectionPasswordEnabled, firewallSettingEngineOptionAckTimeout, firewallSettingEventLogFileCachedEntriesStaleTime, firewallSettingCombinedModeProtectionSource, platformSettingAgentEventsSendInterval, platformSettingInactiveAgentCleanupOverrideEnabled, firewallSettingFailureResponseEngineSystem, platformSettingRelayState, firewallSettingEngineOptionDropEvasiveRetransmitEnabled, activityMonitoringSettingIndicatorEnabled, intrusionPreventionSettingEngineOptionFragmentedIpTimeout, firewallSettingAntiEvasionCheckTcpZeroFlags, webReputationSettingSmartProtectionGlobalServerUseProxyEnabled, intrusionPreventionSettingNsxSecurityTaggingPreventModeLevel, firewallSettingReconnaissanceNotifyTcpXmasAttackEnabled, firewallSettingEngineOptionUdpTimeout, webReputationSettingSmartProtectionLocalServerEnabled, firewallSettingEngineOptionTcpMssLimit, firewallSettingEngineOptionColdStartTimeout, firewallSettingEngineOptionEstablishedTimeout, antiMalwareSettingIdentifiedFilesSpaceMaxMbytes, firewallSettingEngineOptionAllowNullIpEnabled, platformSettingNotificationsSuppressPopupsEnabled, firewallSettingAntiEvasionCheckTcpRstFinFlags, firewallSettingEngineOptionDisconnectTimeout, firewallSettingEngineOptionCloseTimeout, firewallSettingEngineOptionTunnelDepthMaxExceededAction, firewallSettingReconnaissanceDetectTcpNullScanEnabled, platformSettingSmartProtectionAntiMalwareGlobalServerProxyId, firewallSettingEngineOptionFilterIpv4Tunnels, webReputationSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionLogOnePacketPeriod, firewallSettingEngineOptionFilterIpv6Tunnels, firewallSettingAntiEvasionCheckTcpCongestionFlags, platformSettingHeartbeatMissedAlertThreshold, intrusionPreventionSettingEngineOptionsEnabled, firewallSettingEngineOptionConnectionsNumUdpMax, integrityMonitoringSettingAutoApplyRecommendationsEnabled, firewallSettingEngineOptionTunnelDepthMax, firewallSettingEngineOptionDropUnknownSslProtocolEnabled, antiMalwareSettingNsxSecurityTaggingValue, intrusionPreventionSettingLogDataRuleFirstMatchEnabled, firewallSettingEngineOptionLoggingPolicy, platformSettingTroubleshootingLoggingLevel, antiMalwareSettingVirtualApplianceOnDemandScanCacheEntriesMax, webReputationSettingCombinedModeProtectionSource, firewallSettingEngineOptionClosingTimeout, firewallSettingAntiEvasionCheckPaws, intrusionPreventionSettingAutoApplyRecommendationsEnabled, firewallSettingReconnaissanceDetectFingerprintProbeEnabled, antiMalwareSettingNsxSecurityTaggingRemoveOnCleanScanEnabled, firewallSettingEngineOptionLogPacketLengthMax, firewallSettingEngineOptionDropTeredoAnomaliesEnabled, webReputationSettingSecurityLevel, firewallSettingEngineOptionDropIpv6SiteLocalAddressesEnabled, activityMonitoringSettingActivityEnabled, firewallSettingEngineOptionStrictTerodoPortCheckEnabled, webReputationSettingBlockedUrlKeywords, webReputationSettingSyslogConfigId, firewallSettingFailureResponsePacketSanityCheck, firewallSettingNetworkEngineMode, firewallSettingEventLogFileSizeMax, antiMalwareSettingMalwareScanMultithreadedProcessingEnabled, firewallSettingReconnaissanceDetectTcpSynFinScanEnabled, firewallSettingEngineOptionDropIpZeroPayloadEnabled, firewallSettingEngineOptionBlockIpv6Agent8AndEarlierEnabled, intrusionPreventionSettingEngineOptionFragmentedIpPacketSendIcmpEnabled, antiMalwareSettingPredictiveMachineLearningExceptions, firewallSettingEngineOptionLogEventsPerSecondMax, firewallSettingEngineOptionSslSessionTime, antiMalwareSettingBehaviorMonitoringScanExclusionList, antiMalwareSettingSmartProtectionGlobalServerEnabled, firewallSettingEngineOptionLogOnePacketWithinPeriodEnabled, firewallSettingEngineOptionGenerateConnectionEventsIcmpEnabled, platformSettingHeartbeatInactiveVmOfflineAlertEnabled, webReputationSettingSmartProtectionWebReputationGlobalServerProxyId, antiMalwareSettingNsxSecurityTaggingEnabled, firewallSettingAntiEvasionCheckFragmentedPackets, firewallSettingEngineOptionConnectionsNumIcmpMax, firewallSettingAntiEvasionCheckTcpSplitHandshake, antiMalwareSettingCombinedModeProtectionSource, firewallSettingEngineOptionEventNodesMax, webReputationSettingMonitorPortListId, applicationControlSettingSyslogConfigId, firewallSettingAntiEvasionCheckOutNoConnection, firewallSettingEngineOptionBlockIpv6Agent9AndLaterEnabled, integrityMonitoringSettingVirtualApplianceOptimizationScanCacheEntriesMax, firewallSettingReconnaissanceNotifyTcpNullScanEnabled, firewallSettingEngineOptionIgnoreStatusCode1, firewallSettingEngineOptionIgnoreStatusCode0, firewallSettingEngineOptionIgnoreStatusCode2, firewallSettingEngineOptionSslSessionSize, antiMalwareSettingScanCacheRealTimeConfigId, platformSettingRecommendationOngoingScansInterval, platformSettingSmartProtectionGlobalServerUseProxyEnabled, firewallSettingInterfaceLimitOneActiveEnabled, firewallSettingAntiEvasionCheckTcpChecksum, firewallSettingEngineOptionDropIpv6ExtType0Enabled, antiMalwareSettingScanFileSizeMaxMbytes, firewallSettingEngineOptionGenerateConnectionEventsTcpEnabled, antiMalwareSettingFileHashSizeMaxMbytes, firewallSettingEventLogFileCachedEntriesLifeTime, platformSettingSmartProtectionGlobalServerProxyId, logInspectionSettingAutoApplyRecommendationsEnabled, antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled, webReputationSettingBlockingPageLink, firewallSettingSyslogConfigId, platformSettingAgentCommunicationsDirection, integrityMonitoringSettingScanCacheConfigId, antiMalwareSettingDocumentExploitProtectionRuleExceptions, firewallSettingAntiEvasionCheckTcpSynWithData, antiMalwareSettingFileHashEnabled, firewallSettingReconnaissanceBlockFingerprintProbeDuration, firewallSettingEngineOptionDropIpv6BogonsAddressesEnabled, firewallSettingEngineOptionBootStartTimeout, firewallSettingEngineOptionConnectionsNumTcpMax, firewallSettingAntiEvasionSecurityPosture, firewallSettingInterfacePatterns, firewallSettingInterfaceIsolationEnabled, antiMalwareSettingVirtualApplianceRealTimeScanCacheEntriesMax, firewallSettingEventsOutOfAllowedPolicyEnabled, firewallSettingAntiEvasionCheckEvasiveRetransmit, firewallSettingEngineOptionIcmpTimeout, integrityMonitoringSettingSyslogConfigId, firewallSettingEngineOptionConnectionCleanupTimeout, antiMalwareSettingSmartProtectionLocalServerAllowOffDomainGlobal, firewallSettingReconnaissanceNotifyTcpSynFinScanEnabled, firewallSettingEngineOptionErrorTimeout, webReputationSettingAllowedUrls, firewallSettingReconnaissanceNotifyNetworkOrPortScanEnabled, firewallSettingEngineOptionFinWait1Timeout, firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled, activityMonitoringSettingSyslogConfigId, firewallSettingAntiEvasionCheckTcpSynRstFlags, antiMalwareSettingSpywareApprovedList, firewallSettingAntiEvasionCheckTcpUrgentFlags, intrusionPreventionSettingNsxSecurityTaggingDetectModeLevel, intrusionPreventionSettingEngineOptionFragmentedIpUnconcernedMacAddressBypassEnabled, firewallSettingEngineOptionLogAllPacketDataEnabled, firewallSettingAntiEvasionCheckTcpSynFinFlags, platformSettingHeartbeatInterval, firewallSettingEngineOptionFragmentSizeMin, antiMalwareSettingSmartProtectionServerConnectionLostWarningEnabled, firewallSettingReconnaissanceBlockNetworkOrPortScanDuration, integrityMonitoringSettingContentHashAlgorithm, antiMalwareSettingSmartScanState, firewallSettingConfigPackageExceedsAlertMaxEnabled, platformSettingEnvironmentVariableOverrides, firewallSettingEngineOptionFragmentOffsetMin, antiMalwareSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionSynRcvdTimeout, firewallSettingEventLogFileCachedEntriesNum, firewallSettingEngineOptionForceAllowIcmpType3Code4, firewallSettingReconnaissanceBlockTcpNullScanDuration, platformSettingSmartProtectionGlobalServerEnabled, integrityMonitoringSettingRealtimeEnabled, firewallSettingEngineOptionLastAckTimeout, firewallSettingReconnaissanceExcludeIpListId, platformSettingAgentSelfProtectionEnabled, firewallSettingEngineOptionDropIpv6ReservedAddressesEnabled, firewallSettingAntiEvasionCheckFinNoConnection, firewallSettingEngineOptionDebugPacketNumMax, firewallSettingEngineOptionBypassCiscoWaasConnectionsEnabled, firewallSettingReconnaissanceEnabled, platformSettingHeartbeatLocalTimeShiftAlertThreshold, antiMalwareSettingFileHashMd5Enabled, firewallSettingReconnaissanceDetectNetworkOrPortScanEnabled, firewallSettingEngineOptionSilentTcpConnectionDropEnabled, firewallSettingEngineOptionBlockSameSrcDstIpEnabled, firewallSettingEngineOptionForceAllowDhcpDns, firewallSettingReconnaissanceIncludeIpListId, firewallSettingEngineOptionsEnabled, firewallSettingReconnaissanceBlockTcpSynFinScanDuration, webReputationSettingSecurityBlockUntestedPagesEnabled, webReputationSettingAllowedUrlDomains, firewallSettingEventLogFileIgnoreSourceIpListId, firewallSettingEngineOptionDropIpv6FragmentsLowerThanMinMtuEnabled, platformSettingAutoAssignNewIntrusionPreventionRulesEnabled, firewallSettingAntiEvasionCheckRstNoConnection, webReputationSettingBlockedUrls, platformSettingCombinedModeNetworkGroupProtectionSource, webReputationSettingAlertingEnabled, antiMalwareSettingNsxSecurityTaggingOnRemediationFailureEnabled, integrityMonitoringSettingCpuUsageLevel, platformSettingAutoUpdateAntiMalwareEngineEnabled, intrusionPreventionSettingCombinedModeProtectionSource. | Required |
overrides | Show the value only if defined for the current policy. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.PolicySettings.policyId | integer | Policy Id of a Setting |
TrendMicro.PolicySettings.name | string | Name of a Setting |
TrendMicro.PolicySettings.value | string | Value of a Setting |
#
Command Example!trendmicro-reset-policy-setting name=firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled policy_id=105
#
Context Example#
Human Readable Output#
The Policy Setting
Policy Id Name Value 105 firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled false
#
trendmicro-list-policiesList all existing policies
#
Base Commandtrendmicro-list-policies
#
InputArgument Name | Description | Required |
---|---|---|
overrides | Show only overrides defined for the current policy. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.Policies.parentID | integer | ID of the parent policy |
TrendMicro.Policies.name | string | Name of the policy |
TrendMicro.Policies.description | string | Description of the policy |
TrendMicro.Policies.recommendationScanMode | string | Enable or disable ongoing recommendation scans for computers assigned this policy |
TrendMicro.Policies.autoRequiresUpdate | string | Automatically update computers assigned this policy when the configuration changes |
#
Command Example!trendmicro-list-policies
#
Context Example#
Human Readable Output#
Policies list
ID Name Description 1 Base Policy A policy from which all other policies can inherit. Only the most general settings should be applied to this policy as they will apply to all policies that inherit from it, unless overridden. More specific settings and rules should be added to sub-policies that are assigned to computers. 2 Windows An example policy from which all the example Windows policies inherit. Any settings that are common to all Windows policies can be set here. 3 Windows Server 2012 An example policy for Windows Server 2012 servers. 4 Windows Server 2008 An example policy for Windows Server 2008 servers. 5 Windows Server 2003 An example policy for Windows Server 2003 servers. 6 Linux Server An example policy for Linux servers. 7 Demo Demo policy for the demo computer added to all accounts. This policy has all security modules enabled. 8 LAMP Server Sample policy for a server running a Linux/Apache/MySQL/PHP stack. Firewall rules allow SSH access but do not allow remote access to MySQL. 37 test3 68 PoC1 PoC Policy 101 PoC Policy PoC Policy 102 test policy 105 Example Policy Example policy description
#
trendmicro-search-policiesSearch for specific policies by some field name with a certain type. Every field has a specific type. It can be a simple type like a string, a numeric or a boolean. However, it can also be a choice, which is a string with specific options (enumeration). To search, you must provide the field_name & field_type, the operation to perform, and the value to search.
#
Base Commandtrendmicro-search-policies
#
InputArgument Name | Description | Required |
---|---|---|
overrides | Show only overrides defined for the current computer. Possible values are: true, false. Default is false. | Optional |
max_items | Limits the number of objects returned. | Optional |
field_name | The field name to search for. Possible values are: ID, parentID, name, description, recommendationScanMode, autoRequiresUpdate. | Required |
field_type | The type of the field. Possible values are: boolean, numeric, choice, id, string. | Required |
operation | The search conditional to test on the field name. Possible values are: less-than, less-than-or-equal, equal, greater-than-or-equal, greater-than, not-equal. | Required |
value | The value to compare. | Required |
sort_by_object_id | If true, forces the response objects to be sorted by ID, overriding the default sort order. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.Policies.parentID | integer | ID of the parent policy |
TrendMicro.Policies.name | string | Name of the policy |
TrendMicro.Policies.description | string | Description of the policy |
TrendMicro.Policies.recommendationScanMode | string | Enable or disable ongoing recommendation scans for computers assigned this policy |
TrendMicro.Policies.autoRequiresUpdate | string | Automatically update computers assigned this policy when the configuration changes |
#
Command Example!trendmicro-search-policies field_name=name operation=equal field_type=string value="Example Policy"
#
Context Example#
Human Readable Output#
Matched Policies
ID Name Description 105 Example Policy Example policy description
#
trendmicro-create-policyCreate a new policy
#
Base Commandtrendmicro-create-policy
#
InputArgument Name | Description | Required |
---|---|---|
overrides | Show only overrides defined for the current policy. Possible values are: true, false. Default is false. | Optional |
parent_id | ID of the parent policy. | Optional |
name | Name of the policy. | Required |
description | Description of the policy. | Optional |
recommendation_scan_mode | Enable or disable ongoing recommendation scans for computers assigned this policy. Possible values are: off, ongoing. | Optional |
auto_requires_update | Automatically update computers assigned this policy when the configuration changes. Possible values are: off, on. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.Policies.parentID | integer | ID of the parent policy |
TrendMicro.Policies.name | string | Name of the policy |
TrendMicro.Policies.description | string | Description of the policy |
TrendMicro.Policies.recommendationScanMode | string | Enable or disable ongoing recommendation scans for computers assigned this policy |
TrendMicro.Policies.autoRequiresUpdate | string | Automatically update computers assigned this policy when the configuration changes |
#
Command Example!trendmicro-create-policy name="Example Policy" parent_id=2 description="Example policy description"
#
Context Example#
Human Readable Output#
The New Policy
ID Name Description 106 Example Policy Example policy description
#
trendmicro-remove-firewall-rule-id-from-computerRemove a firewall rule ID from a certain computer
#
Base Commandtrendmicro-remove-firewall-rule-id-from-computer
#
InputArgument Name | Description | Required |
---|---|---|
computer_id | The computer ID. | Required |
firewall_rule_id | The firewall rule ID to remove. | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!trendmicro-remove-firewall-rule-id-from-computer computer_id=216 firewall_rule_id=31
#
Human Readable OutputThe firewall rule 31 was successfully deleted from computer 216!
#
trendmicro-list-default-policy-settingsList default policy settings
#
Base Commandtrendmicro-list-default-policy-settings
#
InputArgument Name | Description | Required |
---|
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.DefaultPolicySettings.name | string | The name of the default policy setting |
TrendMicro.DefaultPolicySettings.value | string | The value of the default policy setting |
#
Command Example!trendmicro-list-default-policy-settings
#
Context Example#
Human Readable Output#
The Default Policy Settings
Activity Monitoring Setting Activity Enabled Activity Monitoring Setting Indicator Enabled Activity Monitoring Setting State Activity Monitoring Setting Syslog Config Id Anti Malware Setting Combined Mode Protection Source Anti Malware Setting Connected Threat Defense Suspicious File Ddan Submission Enabled Anti Malware Setting Connected Threat Defense Use Control Manager Suspicious Object List Enabled Anti Malware Setting File Hash Enabled Anti Malware Setting File Hash Md 5 Enabled Anti Malware Setting File Hash Sha 256 Enabled Anti Malware Setting File Hash Size Max Mbytes Anti Malware Setting Identified Files Space Max Mbytes Anti Malware Setting Malware Scan Multithreaded Processing Enabled Anti Malware Setting Nsx Security Tagging Enabled Anti Malware Setting Nsx Security Tagging On Remediation Failure Enabled Anti Malware Setting Nsx Security Tagging Remove On Clean Scan Enabled Anti Malware Setting Nsx Security Tagging Value Anti Malware Setting Scan File Size Max Mbytes Anti Malware Setting Smart Protection Global Server Enabled Anti Malware Setting Smart Protection Global Server Use Proxy Enabled Anti Malware Setting Smart Protection Local Server Allow Off Domain Global Anti Malware Setting Smart Protection Server Connection Lost Warning Enabled Anti Malware Setting Smart Scan State Anti Malware Setting State Anti Malware Setting Syslog Config Id Anti Malware Setting Virtual Appliance On Demand Scan Cache Entries Max Anti Malware Setting Virtual Appliance Real Time Scan Cache Entries Max Application Control Setting Execution Enforcement Level Application Control Setting Ruleset Mode Application Control Setting Shared Ruleset Id Application Control Setting State Application Control Setting Syslog Config Id Firewall Setting Anti Evasion Check Evasive Retransmit Firewall Setting Anti Evasion Check Fin No Connection Firewall Setting Anti Evasion Check Fragmented Packets Firewall Setting Anti Evasion Check Out No Connection Firewall Setting Anti Evasion Check Paws Firewall Setting Anti Evasion Check Rst No Connection Firewall Setting Anti Evasion Check Tcp Check sum Firewall Setting Anti Evasion Check Tcp Congestion Flags Firewall Setting Anti Evasion Check Tcp Paws Zero Firewall Setting Anti Evasion Check Tcp Rst Fin Flags Firewall Setting Anti Evasion Check Tcp Split Handshake Firewall Setting Anti Evasion Check Tcp Syn Fin Flags Firewall Setting Anti Evasion Check Tcp Syn Rst Flags Firewall Setting Anti Evasion Check Tcp Syn With Data Firewall Setting Anti Evasion Check Tcp Urgent Flags Firewall Setting Anti Evasion Check Tcp Zero Flags Firewall Setting Anti Evasion Security Posture Firewall Setting Anti Evasion Tcp Paws Window Policy Firewall Setting Combined Mode Protection Source Firewall Setting Config Package Exceeds Alert Max Enabled Firewall Setting Engine Option Ack Timeout Firewall Setting Engine Option Allow Null Ip Enabled Firewall Setting Engine Option Block Ipv 6 Agent 8 And Earlier Enabled Firewall Setting Engine Option Block Ipv 6 Agent 9 And Later Enabled Firewall Setting Engine Option Block Same Src Dst Ip Enabled Firewall Setting Engine Option Boot Start Timeout Firewall Setting Engine Option Bypass Cisco Waas Connections Enabled Firewall Setting Engine Option Close Timeout Firewall Setting Engine Option Close Wait Timeout Firewall Setting Engine Option Closing Timeout Firewall Setting Engine Option Cold Start Timeout Firewall Setting Engine Option Connection Cleanup Timeout Firewall Setting Engine Option Connections Cleanup Max Firewall Setting Engine Option Connections Num Icmp Max Firewall Setting Engine Option Connections Num Tcp Max Firewall Setting Engine Option Connections Num Udp Max Firewall Setting Engine Option Debug Mode Enabled Firewall Setting Engine Option Debug Packet Num Max Firewall Setting Engine Option Disconnect Timeout Firewall Setting Engine Option Drop 6 To 4 Bogons Addresses Enabled Firewall Setting Engine Option Drop Evasive Retransmit Enabled Firewall Setting Engine Option Drop Ip Zero Payload Enabled Firewall Setting Engine Option Drop Ipv 6 Bogons Addresses Enabled Firewall Setting Engine Option Drop Ipv 6 Ext Type 0 Enabled Firewall Setting Engine Option Drop Ipv 6 Fragments Lower Than Min Mtu Enabled Firewall Setting Engine Option Drop Ipv 6 Reserved Addresses Enabled Firewall Setting Engine Option Drop Ipv 6 Site Local Addresses Enabled Firewall Setting Engine Option Drop Teredo Anomalies Enabled Firewall Setting Engine Option Drop Unknown Ssl Protocol Enabled Firewall Setting Engine Option Error Timeout Firewall Setting Engine Option Established Timeout Firewall Setting Engine Option Event Nodes Max Firewall Setting Engine Option Filter Ipv 4 Tunnels Firewall Setting Engine Option Filter Ipv 6 Tunnels Firewall Setting Engine Option Fin Wait 1 Timeout Firewall Setting Engine Option Force Allow Dhcp Dns Firewall Setting Engine Option Force Allow Icmp Type 3 Code 4 Firewall Setting Engine Option Fragment Offset Min Firewall Setting Engine Option Fragment Size Min Firewall Setting Engine Option Generate Connection Events Icmp Enabled Firewall Setting Engine Option Generate Connection Events Tcp Enabled Firewall Setting Engine Option Generate Connection Events Udp Enabled Firewall Setting Engine Option Icmp Timeout Firewall Setting Engine Option Ignore Status Code 0 Firewall Setting Engine Option Ignore Status Code 1 Firewall Setting Engine Option Ignore Status Code 2 Firewall Setting Engine Option Last Ack Timeout Firewall Setting Engine Option Log All Packet Data Enabled Firewall Setting Engine Option Log Events Per Second Max Firewall Setting Engine Option Log One Packet Period Firewall Setting Engine Option Log One Packet Within Period Enabled Firewall Setting Engine Option Log Packet Length Max Firewall Setting Engine Option Logging Policy Firewall Setting Engine Option Silent Tcp Connection Drop Enabled Firewall Setting Engine Option Ssl Session Size Firewall Setting Engine Option Ssl Session Time Firewall Setting Engine Option Strict Terodo Port Check Enabled Firewall Setting Engine Option Syn Rcvd Timeout Firewall Setting Engine Option Syn Sent Timeout Firewall Setting Engine Option Tcp Mss Limit Firewall Setting Engine Option Tunnel Depth Max Firewall Setting Engine Option Tunnel Depth Max Exceeded Action Firewall Setting Engine Option Udp Timeout Firewall Setting Engine Option Verify Tcp Checksum Enabled Firewall Setting Engine Options Enabled Firewall Setting Event Log File Cached Entries Life Time Firewall Setting Event Log File Cached Entries Num Firewall Setting Event Log File Cached Entries Stale Time Firewall Setting Event Log File Retain Num Firewall Setting Event Log File Size Max Firewall Setting Events Out Of Allowed Policy Enabled Firewall Setting Failure Response Engine System Firewall Setting Failure Response Packet Sanity Check Firewall Setting Interface Isolation Enabled Firewall Setting Interface Limit One Active Enabled Firewall Setting Network Engine Mode Firewall Setting Reconnaissance Block Fingerprint Probe Duration Firewall Setting Reconnaissance Block Network Or Port Scan Duration Firewall Setting Reconnaissance Block Tcp Null Scan Duration Firewall Setting Reconnaissance Block Tcp Syn Fin Scan Duration Firewall Setting Reconnaissance Block Tcp Xmas Attack Duration Firewall Setting Reconnaissance Detect Fingerprint Probe Enabled Firewall Setting Reconnaissance Detect Network Or Port Scan Enabled Firewall Setting Reconnaissance Detect Tcp Null Scan Enabled Firewall Setting Reconnaissance Detect Tcp Syn Fin Scan Enabled Firewall Setting Reconnaissance Detect Tcp Xmas Attack Enabled Firewall Setting Reconnaissance Enabled Firewall Setting Reconnaissance Notify Fingerprint Probe Enabled Firewall Setting Reconnaissance Notify Network Or Port Scan Enabled Firewall Setting Reconnaissance Notify Tcp Null Scan Enabled Firewall Setting Reconnaissance Notify Tcp Syn Fin Scan Enabled Firewall Setting Reconnaissance Notify Tcp Xmas Attack Enabled Firewall Setting State Firewall Setting Syslog Config Id Firewall Setting Virtual And Container Network Scan Enabled Integrity Monitoring Setting Auto Apply Recommendations Enabled Integrity Monitoring Setting Combined Mode Protection Source Integrity Monitoring Setting Content Hash Algorithm Integrity Monitoring Setting Cpu Usage Level Integrity Monitoring Setting Realtime Enabled Integrity Monitoring Setting State Integrity Monitoring Setting Syslog Config Id Integrity Monitoring Setting Virtual Appliance Optimization Scan Cache Entries Max Intrusion Prevention Setting Auto Apply Recommendations Enabled Intrusion Prevention Setting Combined Mode Protection Source Intrusion Prevention Setting Engine Option Fragmented Ip Keep Max Intrusion Prevention Setting Engine Option Fragmented Ip Packet Send Icmp Enabled Intrusion Prevention Setting Engine Option Fragmented Ip Timeout Intrusion Prevention Setting Engine Option Fragmented Ip Unconcerned Mac Address Bypass Enabled Intrusion Prevention Setting Engine Options Enabled Intrusion Prevention Setting Log Data Rule First Match Enabled Intrusion Prevention Setting Nsx Security Tagging Detect Mode Level Intrusion Prevent ion Setting Nsx Security Tagging Prevent Mode Level Intrusion Prevention Setting State Intrusion Prevention Setting Virtual And Container Network Scan Enabled Log Inspection Setting Auto Apply Recommendations Enabled Log Inspection Setting Severity Clipping Agent Event Send Sys Log Level Min Log Inspection Setting Severity Clipping Agent Event Store Level Min Log Inspection Setting State Log Inspection Setting Sys Log Config Id Platform Setting Agent Communications Direction Platform Setting Agent Events Send Interval Platform Setting Agent Self Protection Enabled Platform Setting Agent Self Protection Password Enabled Platform Setting Auto Assign New Intrusion Prevention Rules Enabled Platform Setting Auto Update Anti Malware Engine Enabled Platform Setting Combined Mode Network Group Protection Source Platform Setting Heartbeat Inactive Vm Offline Alert Enabled Platform Setting Heartbeat Interval Platform Setting Heartbeat Local Time Shift Alert Threshold Platform Setting Heartbeat Missed Alert Threshold Platform Setting Inactive Agent Cleanup Override Enabled Platform Setting Notifications Suppress Popups Enabled Platform Setting Recommendation Ongoing Scans Interval Platform Setting Relay State Platform Setting Scan Cache Concurrency Max Platform Setting Scan Open Port List Id Platform Setting Smart Protection Global Server Enabled Platform Setting Smart Protection Global Server Use Proxy Enabled Platform Setting Troubleshooting Logging Level Web Reputation Setting Alerting Enabled Web Reputation Setting Blocking Page Link Web Reputation Setting Combined Mode Protection Source Web Reputation Setting Monitor Port List Id Web Reputation Setting Security Block Untested Pages Enabled Web Reputation Setting Security Level Web Reputation Setting Smart Protection Global Server Use Proxy Enabled Web Reputation Setting Smart Protection Local Server Allow Off Domain Global Web Reputation Setting Smart Protection Local Server Enabled Web Reputation Setting Smart Protection Server Connection Lost Warning Enabled Web Reputation Setting State Web Reputation Setting Syslog Config Id Off Off Off 0 Appliance preferred true true false false false 128 1024 false true true true ANTI_VIRUS.VirusFound.threat=medium 0 true false false true Automatic Off 0 500000 500000 Allow unrecognized software until it is explicitly blocked Use local ruleset 0 Off 0 Allow Allow Allow Allow Ignore Allow Allow Allow Allow Deny Deny Deny Deny Deny Allow Deny Normal 0 Agent preferred true 1 Second true true false true 20 Seconds false 0 Seconds 2 Minutes 1 Second 5 Minutes 10 Seconds 1000 10000 1000000 1000000 false 8 60 Seconds true false true true true true true false true true 10 Seconds 3 Hours 20000 Disable Detection of IPv4 Tunnels Disable Detection of IPv6 Tunnels 2 Minutes Allow DNS Query and DHCP Client Add Force Allow rule for ICMP type3 code4 60 120 false false false 60 Seconds None None None 30 Seconds false 100 5 Minutes false 1500 Bytes Default false Low - 2500 24 Hours true 60 Seconds 20 Seconds 128 Bytes 1 Drop 20 Seconds false false 30 Minutes 128 15 Minutes 3 4 MB true Fail closed Fail closed false false Inline No No No No No true true true true true true true true true true true Off 0 false No Appliance preferred sha1 High false Off 0 500000 No Agent preferred 1000 true 60 Seconds false false true No Tagging No Tagging Off true No Medium (6) Medium (6) Off 0 Agent/Appliance Initiated 60 Seconds false false true false Agent preferred false 10 Minutes Unlimited 2 false false 7 Days false 1 1-1024 true false Do Not Override false http://sitesafety.trendmicro.com/ Agent preferred 80,8080 false Medium false false false true Off 0
#
trendmicro-get-default-policy-settingGet information about a certain default policy setting
#
Base Commandtrendmicro-get-default-policy-setting
#
InputArgument Name | Description | Required |
---|---|---|
name | The name of the default setting. Possible values are: logInspectionSettingSeverityClippingAgentEventSendSyslogLevelMin, firewallSettingEngineOptionConnectionsCleanupMax, firewallSettingEngineOptionVerifyTcpChecksumEnabled, antiMalwareSettingScanCacheOnDemandConfigId, applicationControlSettingSharedRulesetId, webReputationSettingSmartProtectionServerConnectionLostWarningEnabled, applicationControlSettingExecutionEnforcementLevel, webReputationSettingBlockedUrlDomains, firewallSettingEngineOptionSynSentTimeout, platformSettingAgentSelfProtectionPassword, firewallSettingReconnaissanceBlockTcpXmasAttackDuration, intrusionPreventionSettingVirtualAndContainerNetworkScanEnabled, logInspectionSettingSyslogConfigId, firewallSettingEngineOptionDebugModeEnabled, firewallSettingVirtualAndContainerNetworkScanEnabled, antiMalwareSettingFileHashSha256Enabled, firewallSettingReconnaissanceNotifyFingerprintProbeEnabled, firewallSettingEventLogFileRetainNum, firewallSettingAntiEvasionCheckTcpPawsZero, antiMalwareSettingConnectedThreatDefenseUseControlManagerSuspiciousObjectListEnabled, intrusionPreventionSettingEngineOptionFragmentedIpKeepMax, firewallSettingEngineOptionDrop6To4BogonsAddressesEnabled, logInspectionSettingSeverityClippingAgentEventStoreLevelMin, platformSettingScanCacheConcurrencyMax, antiMalwareSettingSyslogConfigId, firewallSettingAntiEvasionTcpPawsWindowPolicy, firewallSettingReconnaissanceDetectTcpXmasAttackEnabled, applicationControlSettingRulesetMode, antiMalwareSettingSmartProtectionGlobalServerUseProxyEnabled, webReputationSettingSmartProtectionLocalServerAllowOffDomainGlobal, integrityMonitoringSettingCombinedModeProtectionSource, firewallSettingEngineOptionCloseWaitTimeout, platformSettingScanOpenPortListId, platformSettingAgentSelfProtectionPasswordEnabled, firewallSettingEngineOptionAckTimeout, firewallSettingEventLogFileCachedEntriesStaleTime, firewallSettingCombinedModeProtectionSource, platformSettingAgentEventsSendInterval, platformSettingInactiveAgentCleanupOverrideEnabled, firewallSettingFailureResponseEngineSystem, platformSettingRelayState, firewallSettingEngineOptionDropEvasiveRetransmitEnabled, activityMonitoringSettingIndicatorEnabled, intrusionPreventionSettingEngineOptionFragmentedIpTimeout, firewallSettingAntiEvasionCheckTcpZeroFlags, webReputationSettingSmartProtectionGlobalServerUseProxyEnabled, intrusionPreventionSettingNsxSecurityTaggingPreventModeLevel, firewallSettingReconnaissanceNotifyTcpXmasAttackEnabled, firewallSettingEngineOptionUdpTimeout, webReputationSettingSmartProtectionLocalServerEnabled, firewallSettingEngineOptionTcpMssLimit, firewallSettingEngineOptionColdStartTimeout, firewallSettingEngineOptionEstablishedTimeout, antiMalwareSettingIdentifiedFilesSpaceMaxMbytes, firewallSettingEngineOptionAllowNullIpEnabled, platformSettingNotificationsSuppressPopupsEnabled, firewallSettingAntiEvasionCheckTcpRstFinFlags, firewallSettingEngineOptionDisconnectTimeout, firewallSettingEngineOptionCloseTimeout, firewallSettingEngineOptionTunnelDepthMaxExceededAction, firewallSettingReconnaissanceDetectTcpNullScanEnabled, platformSettingSmartProtectionAntiMalwareGlobalServerProxyId, firewallSettingEngineOptionFilterIpv4Tunnels, webReputationSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionLogOnePacketPeriod, firewallSettingEngineOptionFilterIpv6Tunnels, firewallSettingAntiEvasionCheckTcpCongestionFlags, platformSettingHeartbeatMissedAlertThreshold, intrusionPreventionSettingEngineOptionsEnabled, firewallSettingEngineOptionConnectionsNumUdpMax, integrityMonitoringSettingAutoApplyRecommendationsEnabled, firewallSettingEngineOptionTunnelDepthMax, firewallSettingEngineOptionDropUnknownSslProtocolEnabled, antiMalwareSettingNsxSecurityTaggingValue, intrusionPreventionSettingLogDataRuleFirstMatchEnabled, firewallSettingEngineOptionLoggingPolicy, platformSettingTroubleshootingLoggingLevel, antiMalwareSettingVirtualApplianceOnDemandScanCacheEntriesMax, webReputationSettingCombinedModeProtectionSource, firewallSettingEngineOptionClosingTimeout, firewallSettingAntiEvasionCheckPaws, intrusionPreventionSettingAutoApplyRecommendationsEnabled, firewallSettingReconnaissanceDetectFingerprintProbeEnabled, antiMalwareSettingNsxSecurityTaggingRemoveOnCleanScanEnabled, firewallSettingEngineOptionLogPacketLengthMax, firewallSettingEngineOptionDropTeredoAnomaliesEnabled, webReputationSettingSecurityLevel, firewallSettingEngineOptionDropIpv6SiteLocalAddressesEnabled, activityMonitoringSettingActivityEnabled, firewallSettingEngineOptionStrictTerodoPortCheckEnabled, webReputationSettingBlockedUrlKeywords, webReputationSettingSyslogConfigId, firewallSettingFailureResponsePacketSanityCheck, firewallSettingNetworkEngineMode, firewallSettingEventLogFileSizeMax, antiMalwareSettingMalwareScanMultithreadedProcessingEnabled, firewallSettingReconnaissanceDetectTcpSynFinScanEnabled, firewallSettingEngineOptionDropIpZeroPayloadEnabled, firewallSettingEngineOptionBlockIpv6Agent8AndEarlierEnabled, intrusionPreventionSettingEngineOptionFragmentedIpPacketSendIcmpEnabled, antiMalwareSettingPredictiveMachineLearningExceptions, firewallSettingEngineOptionLogEventsPerSecondMax, firewallSettingEngineOptionSslSessionTime, antiMalwareSettingBehaviorMonitoringScanExclusionList, antiMalwareSettingSmartProtectionGlobalServerEnabled, firewallSettingEngineOptionLogOnePacketWithinPeriodEnabled, firewallSettingEngineOptionGenerateConnectionEventsIcmpEnabled, platformSettingHeartbeatInactiveVmOfflineAlertEnabled, webReputationSettingSmartProtectionWebReputationGlobalServerProxyId, antiMalwareSettingNsxSecurityTaggingEnabled, firewallSettingAntiEvasionCheckFragmentedPackets, firewallSettingEngineOptionConnectionsNumIcmpMax, firewallSettingAntiEvasionCheckTcpSplitHandshake, antiMalwareSettingCombinedModeProtectionSource, firewallSettingEngineOptionEventNodesMax, webReputationSettingMonitorPortListId, applicationControlSettingSyslogConfigId, firewallSettingAntiEvasionCheckOutNoConnection, firewallSettingEngineOptionBlockIpv6Agent9AndLaterEnabled, integrityMonitoringSettingVirtualApplianceOptimizationScanCacheEntriesMax, firewallSettingReconnaissanceNotifyTcpNullScanEnabled, firewallSettingEngineOptionIgnoreStatusCode1, firewallSettingEngineOptionIgnoreStatusCode0, firewallSettingEngineOptionIgnoreStatusCode2, firewallSettingEngineOptionSslSessionSize, antiMalwareSettingScanCacheRealTimeConfigId, platformSettingRecommendationOngoingScansInterval, platformSettingSmartProtectionGlobalServerUseProxyEnabled, firewallSettingInterfaceLimitOneActiveEnabled, firewallSettingAntiEvasionCheckTcpChecksum, firewallSettingEngineOptionDropIpv6ExtType0Enabled, antiMalwareSettingScanFileSizeMaxMbytes, firewallSettingEngineOptionGenerateConnectionEventsTcpEnabled, antiMalwareSettingFileHashSizeMaxMbytes, firewallSettingEventLogFileCachedEntriesLifeTime, platformSettingSmartProtectionGlobalServerProxyId, logInspectionSettingAutoApplyRecommendationsEnabled, antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled, webReputationSettingBlockingPageLink, firewallSettingSyslogConfigId, platformSettingAgentCommunicationsDirection, integrityMonitoringSettingScanCacheConfigId, antiMalwareSettingDocumentExploitProtectionRuleExceptions, firewallSettingAntiEvasionCheckTcpSynWithData, antiMalwareSettingFileHashEnabled, firewallSettingReconnaissanceBlockFingerprintProbeDuration, firewallSettingEngineOptionDropIpv6BogonsAddressesEnabled, firewallSettingEngineOptionBootStartTimeout, firewallSettingEngineOptionConnectionsNumTcpMax, firewallSettingAntiEvasionSecurityPosture, firewallSettingInterfacePatterns, firewallSettingInterfaceIsolationEnabled, antiMalwareSettingVirtualApplianceRealTimeScanCacheEntriesMax, firewallSettingEventsOutOfAllowedPolicyEnabled, firewallSettingAntiEvasionCheckEvasiveRetransmit, firewallSettingEngineOptionIcmpTimeout, integrityMonitoringSettingSyslogConfigId, firewallSettingEngineOptionConnectionCleanupTimeout, antiMalwareSettingSmartProtectionLocalServerAllowOffDomainGlobal, firewallSettingReconnaissanceNotifyTcpSynFinScanEnabled, firewallSettingEngineOptionErrorTimeout, webReputationSettingAllowedUrls, firewallSettingReconnaissanceNotifyNetworkOrPortScanEnabled, firewallSettingEngineOptionFinWait1Timeout, firewallSettingEngineOptionGenerateConnectionEventsUdpEnabled, activityMonitoringSettingSyslogConfigId, firewallSettingAntiEvasionCheckTcpSynRstFlags, antiMalwareSettingSpywareApprovedList, firewallSettingAntiEvasionCheckTcpUrgentFlags, intrusionPreventionSettingNsxSecurityTaggingDetectModeLevel, intrusionPreventionSettingEngineOptionFragmentedIpUnconcernedMacAddressBypassEnabled, firewallSettingEngineOptionLogAllPacketDataEnabled, firewallSettingAntiEvasionCheckTcpSynFinFlags, platformSettingHeartbeatInterval, firewallSettingEngineOptionFragmentSizeMin, antiMalwareSettingSmartProtectionServerConnectionLostWarningEnabled, firewallSettingReconnaissanceBlockNetworkOrPortScanDuration, integrityMonitoringSettingContentHashAlgorithm, antiMalwareSettingSmartScanState, firewallSettingConfigPackageExceedsAlertMaxEnabled, platformSettingEnvironmentVariableOverrides, firewallSettingEngineOptionFragmentOffsetMin, antiMalwareSettingSmartProtectionLocalServerUrls, firewallSettingEngineOptionSynRcvdTimeout, firewallSettingEventLogFileCachedEntriesNum, firewallSettingEngineOptionForceAllowIcmpType3Code4, firewallSettingReconnaissanceBlockTcpNullScanDuration, platformSettingSmartProtectionGlobalServerEnabled, integrityMonitoringSettingRealtimeEnabled, firewallSettingEngineOptionLastAckTimeout, firewallSettingReconnaissanceExcludeIpListId, platformSettingAgentSelfProtectionEnabled, firewallSettingEngineOptionDropIpv6ReservedAddressesEnabled, firewallSettingAntiEvasionCheckFinNoConnection, firewallSettingEngineOptionDebugPacketNumMax, firewallSettingEngineOptionBypassCiscoWaasConnectionsEnabled, firewallSettingReconnaissanceEnabled, platformSettingHeartbeatLocalTimeShiftAlertThreshold, antiMalwareSettingFileHashMd5Enabled, firewallSettingReconnaissanceDetectNetworkOrPortScanEnabled, firewallSettingEngineOptionSilentTcpConnectionDropEnabled, firewallSettingEngineOptionBlockSameSrcDstIpEnabled, firewallSettingEngineOptionForceAllowDhcpDns, firewallSettingReconnaissanceIncludeIpListId, firewallSettingEngineOptionsEnabled, firewallSettingReconnaissanceBlockTcpSynFinScanDuration, webReputationSettingSecurityBlockUntestedPagesEnabled, webReputationSettingAllowedUrlDomains, firewallSettingEventLogFileIgnoreSourceIpListId, firewallSettingEngineOptionDropIpv6FragmentsLowerThanMinMtuEnabled, platformSettingAutoAssignNewIntrusionPreventionRulesEnabled, firewallSettingAntiEvasionCheckRstNoConnection, webReputationSettingBlockedUrls, platformSettingCombinedModeNetworkGroupProtectionSource, webReputationSettingAlertingEnabled, antiMalwareSettingNsxSecurityTaggingOnRemediationFailureEnabled, integrityMonitoringSettingCpuUsageLevel, platformSettingAutoUpdateAntiMalwareEngineEnabled, intrusionPreventionSettingCombinedModeProtectionSource. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.DefaultPolicySettings.name | string | The name of the default policy setting |
TrendMicro.DefaultPolicySettings.value | string | The value of the default policy setting |
#
Command Example!trendmicro-get-default-policy-setting name=antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled
#
Context Example#
Human Readable Output#
Default Policy Setting
Name Value antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled true
#
trendmicro-modify-default-policy-settingModify the value of a certain default policy setting
#
Base Commandtrendmicro-modify-default-policy-setting
#
InputArgument Name | Description | Required |
---|---|---|
name | The name of the default setting. | Required |
value | The new value of the default setting. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.DefaultPolicySettings.name | string | The name of the default policy setting |
TrendMicro.DefaultPolicySettings.value | unknown | The value of the default policy setting |
#
Command Example!trendmicro-modify-default-policy-setting name=antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled value=false
#
Context Example#
Human Readable Output#
Default Policy Setting
Name Value antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled false
#
trendmicro-reset-default-policy-settingReset the value of a certain default policy setting
#
Base Commandtrendmicro-reset-default-policy-setting
#
InputArgument Name | Description | Required |
---|---|---|
name | The name of the default setting. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.DefaultPolicySettings.name | unknown | The name of the default policy setting |
TrendMicro.DefaultPolicySettings.value | unknown | The value of the default policy setting |
#
Command Example!trendmicro-reset-default-policy-setting name=antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled
#
Context Example#
Human Readable Output#
Default Policy Setting
Name Value antiMalwareSettingConnectedThreatDefenseSuspiciousFileDdanSubmissionEnabled true
#
trendmicro-list-scheduled-taskGet information on all scheduled tasks.
#
Base Commandtrendmicro-list-scheduled-task
#
InputArgument Name | Description | Required |
---|---|---|
task_id | The ID of the task to retrieve. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.ScheduledTask.name | String | The name of the scheduled task. |
TrendMicro.ScheduledTask.type | String | The type of the scheduled task. |
TrendMicro.ScheduledTask.scheduleDetails.timeZone | String | The timezone of the scheduled task. |
TrendMicro.ScheduledTask.scheduleDetails.recurrenceType | String | The recurrence type of the scheduled task. |
TrendMicro.ScheduledTask.scheduleDetails.onceOnlyScheduleParameters.startTime | Number | The start time of the scheduled task. |
TrendMicro.ScheduledTask.enabled | Boolean | Whether the scheduled task is enabled. |
TrendMicro.ScheduledTask.nextRunTime | Date | The next run time of the scheduled task. |
TrendMicro.ScheduledTask.scanForMalwareTaskParameters.computerFilter.type | String | The type of the computer filter of the scheduled task. |
TrendMicro.ScheduledTask.scanForMalwareTaskParameters.computerFilter.computerID | Number | The computer ID of the scheduled task. |
TrendMicro.ScheduledTask.scanForMalwareTaskParameters.timeout | String | The timeout for the scheduled task. |
TrendMicro.ScheduledTask.ID | Number | The ID of the scheduled task. |
#
Command example!trendmicro-list-scheduled-task task_id=1
#
Context Example#
Human Readable Output#
Scheduled Tasks
ID Name Type Enabled Last Run Time 1 Daily check for Security Updates check-for-security-updates true 2023-06-19 14:30:43
#
trendmicro-create-onceonly-scheduled-taskCreates a once-only scheduled task with a specific computer ID and runs it.
#
Base Commandtrendmicro-create-onceonly-scan-scheduled-task
#
InputArgument Name | Description | Required |
---|---|---|
name | The name of the scheduled task. | Required |
type | The type of the scheduled task. Possible values are: scan-for-open-ports, send-alert-summary, discover-computers, run-script, send-policy, generate-report, synchronize-directory, synchronize-users, scan-for-recommendations, synchronize-vcenter, scan-for-integrity-changes, scan-for-malware, check-for-security-updates, synchronize-cloud-account, check-for-software-updates, update-suspicious-objects-list. | Required |
computer_id | The computer ID to create the task on. Can be retrieved from the trendmicro-list-computers command. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TrendMicro.ScheduledTask.name | String | The name of the scheduled task. |
TrendMicro.ScheduledTask.type | String | The type of the scheduled task. |
TrendMicro.ScheduledTask.scheduleDetails.timeZone | String | The timezone of the scheduled task. |
TrendMicro.ScheduledTask.scheduleDetails.recurrenceType | String | The recurrence type of the scheduled task. |
TrendMicro.ScheduledTask.scheduleDetails.onceOnlyScheduleParameters.startTime | Number | The start time of the scheduled task. |
TrendMicro.ScheduledTask.enabled | Boolean | Whether the scheduled task is enabled. |
TrendMicro.ScheduledTask.nextRunTime | Date | The next run time of the scheduled task. |
TrendMicro.ScheduledTask.scanForMalwareTaskParameters.computerFilter.type | String | The type of the computer filter of the scheduled task. |
TrendMicro.ScheduledTask.scanForMalwareTaskParameters.computerFilter.computerID | Number | The computer ID of the scheduled task. |
TrendMicro.ScheduledTask.scanForMalwareTaskParameters.timeout | String | The timeout for the scheduled task. |
TrendMicro.ScheduledTask.ID | Number | The ID of the scheduled task. |
#
Command example!trendmicro-create-onceonly-scheduled-task name=test computer_id=1 type="scan-for-malware"
#
Context Example#
Human Readable OutputOnce-only scheduled task, named test for the computer ID 1 has been successfully created and run.
#
trendmicro-delete-scheduled-task
Deletes a scheduled task.
#
Base Commandtrendmicro-delete-scheduled-task
#
InputArgument Name | Description | Required |
---|---|---|
task_ids | A comma seperated of task-IDs to delete. | Required |
#
Context OutputThere is no context output for this command.
#
Command example!trendmicro-delete-scheduled-task task_id=1
#
Human Readable OutputScheduled task with ID 1 has been successfully deleted.