본문으로 건너뛰기

Trend Micro Apex One Integration

Overview

Trend Micro Apex One provides endpoint security with behavioral analysis, machine learning, and virtual patching. KYRA MDR collects Apex One events via syslog or the Central API for threat visibility. Supports Apex One on-premises and SaaS.

Prerequisites

  • A KYRA MDR Collector installed and running
  • Trend Micro Apex One server with administrative access
  • For SaaS: Apex Central API key
  • Network connectivity from the server to the collector

Configuration

Configure syslog forwarding in Apex One:

  1. Log in to the Apex One Console
  2. Navigate to Administration > Settings > Syslog Settings
  3. Enable Forward Logs to a Syslog Server
  4. Configure:
SettingValue
ServerYour KYRA Collector IP
Port514
ProtocolTCP
FormatCEF
  1. Click Save

For Apex Central API:

collector-config.yaml
sources:
- type: trend-micro
api_url: https://<apex-central-url>/WebApp/API
api_key: <api-key>
poll_interval: 120s

Collected Log Types

Log TypeDescriptionSecurity Use
MalwareVirus and malware detectionsEndpoint threat protection
BehavioralSuspicious activity detectionsAdvanced threat detection
Web ReputationMalicious URL access eventsWeb threat prevention
Virtual PatchingVulnerability protection eventsExploit prevention
C&C CallbackCommand and control communicationsAPT detection
Device ControlUSB and removable media eventsData loss prevention

Troubleshooting

No syslog output: Verify syslog settings are saved and the Apex One service has been restarted.

Missing detection types: Ensure all event types are selected in the syslog configuration.

API connection timeout: For Apex Central SaaS, verify the API key has not expired and the URL is accessible.

Contact kyra@seekerslab.com for support.