Overview of the Trend Micro Apex Central integration
You can integrate Trend Micro Apex Central with Sophos Central so that it sends alerts to Sophos for analysis.
This page gives you an overview of the integration.
Trend Micro Apex Central product overview
Sophos can ingest alerts from a wide range of Trend Micro products via Apex Central (For example, Apex One endpoint alerts). For a full list of Trend Micro tools that goes through Apex Central, see Apex Central issued documentation on their website.
Apex Central manages and administers security solutions like endpoint protection and mobile security. Offering a centralized management console, it brings visibility into security events and enhances protection measures with its real-time threat intelligence and analytics.
Sophos documents
Integrate Trend Micro Apex Central
What we ingest
Sample alerts seen by Sophos:
Data Loss PreventionUpdate StatusProduct Auditing EventsAdvanced Threat Correlation PatternEarly Launch Anti-Malware Pattern (64-bit)Spyware/Grayware PatternBehavior Monitoring Policy DescriptionsData Protection Application PatternDevice Access ControlHTTP_HNAP1_RCE_EXPLOIT_NC_Memory Scan Trigger Pattern (32-bit)Web Reputation Endpoint Patch PatternHTTP_REMOTECODE_EXECUTION_REQUEST-2_NC_HTTP_ZTE_F460_F660_RCE_EXPLOIT_NC_HackTool.Win32.PortScan.SWOSuspicious Files Engine: TCP anomaly detected
Filtering
We allow only messages in standard CEF format.
Sample threat mappings
Depending on the alert classification and the fields it contains, we use one of the following to define the alert:
- If the alert is of type
web_security_catwe use the fieldcat. - If the field
cn1,cs1, orcs2is present, we use that.
Otherwise, we default to the "def.name.
Sample mappings:
{"alertType": "Suspicious Files", "threatId": "TA0002", "threatName": "Execution"}
{"alertType": "Endpoint Sensor Trusted Pattern", "threatId": "T1518.001", "threatName": "Security Software Discovery"}
{"alertType": "Web Reputation Endpoint Patch Pattern", "threatId": "T1562.001", "threatName": "Disable or Modify Tools"}
{"alertType": "Device Access Control", "threatId": "TA0004", "threatName": "Privilege Escalation"}
{"alertType": "Web reputation", "threatId": "TA0001", "threatName": "Initial Access"}
{"alertType": "Digital Signature Pattern", "threatId": "T1553.002", "threatName": "Code Signing"}
{"alertType": "Early Boot Clean Driver (64-bit)", "threatId": "T1037.005", "threatName": "Startup Items"}
{"alertType": "CnC Callback", "threatId": "TA0011", "threatName": "Command and Control"}
{"alertType": "Product Auditing Events","threatId": "T1016", "threatName": "System Network Configuration Discovery"}
{"alertType": "Global C&C IP List", "threatId": "TA0011", "threatName": "Command and Control"}
{"alertType": "IntelliTrap Pattern", "threatId": "TA0002", "threatName": "Execution"}
{"alertType": "IntelliTrap Exception Pattern", "threatId": "TA0002", "threatName": "Execution"}
{"alertType": "Policy Enforcement Pattern", "threatId": "T1484.001", "threatName": "Group Policy Modification"}