icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Trend Vision One for Splunk SOAR
SHA256 checksum (trend-vision-one-for-splunk-soar_231.tgz) 2463dc090c563aa0f35abd595aa49228602b1aaafc2fe10af4674d52ea745cc6 SHA256 checksum (trend-vision-one-for-splunk-soar_230.tgz) 5f33322e01aba32ebb5dd61d11fb36e1f29f947988959c8185e8701cdfdb9973 SHA256 checksum (trend-vision-one-for-splunk-soar_221.tgz) 0b2882d7a0be892c67d52e1763e05edcc69f2d443d622f92acdf42dd5cf2117c SHA256 checksum (trend-vision-one-for-splunk-soar_220.tgz) 799c65274a8ecc81e195948a5f6cfa02815f23bdf5879de041c69c2c604d99b4 SHA256 checksum (trend-vision-one-for-splunk-soar_210.tgz) 0004de9e448b48ce2aa523d198f70bc4d055e5123844e0aa63cd30ee3b1493a8 SHA256 checksum (trend-vision-one-for-splunk-soar_200.tgz) c99c8d67b397fc7d31b9b84b0bd9e7025f1cfa1a51c8db264d286fbcd0641732 SHA256 checksum (trend-vision-one-for-splunk-soar_111.tgz) c548ecbc35d7b6606b4bf62539a4663e4840f19728cf1dfea6cbbdb4ba50e164 SHA256 checksum (trend-vision-one-for-splunk-soar_110.tgz) ffd7dd24caf36effe7c8602a6ac413af3f38638c6ebcd4c9bd77c628650b0f76

Flag As Inappropriate

soar

Trend Vision One for Splunk SOAR

Splunk SOAR Cloud
Overview
Details
Trend Vision One is a purpose-built threat defense platform that provides added value and new benefits beyond XDR solutions, allowing you to see more and respond faster. Providing deep and broad extended detection and response (XDR) capabilities that collect and automatically correlate data across multiple security layers—email, endpoints, servers, cloud workloads, and networks—Trend Vision One prevents the majority of attacks with automated protection

Supported Actions Version 2.3.1

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • get endpoint info: Gather information about an endpoint
  • quarantine device: Quarantine the endpoint
  • unquarantine device: Unquarantine the endpoint
  • on poll: Callback action for the on_poll ingest functionality
  • status check: Checks the status of a task
  • add to blocklist: Adds an item to the Suspicious Objects list in Vision One
  • remove from blocklist: Removes an item from the Suspicious Objects list
  • quarantine email message: Quarantine the email message
  • delete email message: Delete the email message
  • terminate process: Terminate the process running on the endpoint
  • add to exception: Add object to exception list
  • delete from exception: Delete object from exception list
  • add to suspicious: Add suspicious object to suspicious list
  • delete from suspicious: Delete the suspicious object from suspicious list
  • check analysis status: Get the status of file analysis based on task id
  • download analysis report: Get the analysis report of a file based on report id
  • collect forensic file: Collect forensic file
  • forensic file info: Get the download information for collected forensic file
  • start analysis: Submit file to sandbox for analysis
  • add note: Adds a note to an existing workbench alert
  • update status: Updates the status of an existing workbench alert
  • get alert details: Displays information about the specified alert
  • urls to sandbox: Submits URLs to the sandbox for analysis
  • enable account: Allows the user to sign in to new application and browser sessions
  • disable account: Signs the user out of all active application and browser sessions, and prevents the user from signing in any new session
  • restore email message: Restore quarantined email messages
  • sign out account: Signs the user out of all active application and browser sessions
  • force password reset: Signs the user out of all active application and browser sessions, and forces the user to create a new password during the next sign-in attempt
  • sandbox suspicious list: Downloads the suspicious object list associated to the specified object
  • sandbox analysis result: Displays the analysis results of the specified object
  • sandbox investigation package: Downloads the Investigation Package of the specified object
  • get suspicious list: Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, email addresses, or URLs in the Suspicious Object List and displays the information in a paginated list
  • get exception list: Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, sender addresses, or URLs in the Exception List and displays it in a paginated list
  • vault sandbox analysis: Send vault item to sandbox for analysis

Supported Actions Version 2.3.0

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • get endpoint info: Gather information about an endpoint
  • quarantine device: Quarantine the endpoint
  • unquarantine device: Unquarantine the endpoint
  • on poll: Callback action for the on_poll ingest functionality
  • status check: Checks the status of a task
  • add to blocklist: Adds an item to the Suspicious Objects list in Vision One
  • remove from blocklist: Removes an item from the Suspicious Objects list
  • quarantine email message: Quarantine the email message
  • delete email message: Delete the email message
  • terminate process: Terminate the process running on the endpoint
  • add to exception: Add object to exception list
  • delete from exception: Delete object from exception list
  • add to suspicious: Add suspicious object to suspicious list
  • delete from suspicious: Delete the suspicious object from suspicious list
  • check analysis status: Get the status of file analysis based on task id
  • download analysis report: Get the analysis report of a file based on report id
  • collect forensic file: Collect forensic file
  • forensic file info: Get the download information for collected forensic file
  • start analysis: Submit file to sandbox for analysis
  • add note: Adds a note to an existing workbench alert
  • update status: Updates the status of an existing workbench alert
  • get alert details: Displays information about the specified alert
  • urls to sandbox: Submits URLs to the sandbox for analysis
  • enable account: Allows the user to sign in to new application and browser sessions
  • disable account: Signs the user out of all active application and browser sessions, and prevents the user from signing in any new session
  • restore email message: Restore quarantined email messages
  • sign out account: Signs the user out of all active application and browser sessions
  • force password reset: Signs the user out of all active application and browser sessions, and forces the user to create a new password during the next sign-in attempt
  • sandbox suspicious list: Downloads the suspicious object list associated to the specified object
  • sandbox analysis result: Displays the analysis results of the specified object
  • sandbox investigation package: Downloads the Investigation Package of the specified object
  • get suspicious list: Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, email addresses, or URLs in the Suspicious Object List and displays the information in a paginated list
  • get exception list: Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, sender addresses, or URLs in the Exception List and displays it in a paginated list
  • vault sandbox analysis: Send vault item to sandbox for analysis

Supported Actions Version 2.2.1

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • get endpoint info: Gather information about an endpoint
  • quarantine device: Quarantine the endpoint
  • unquarantine device: Unquarantine the endpoint
  • on poll: Callback action for the on_poll ingest functionality
  • status check: Checks the status of a task
  • add to blocklist: Adds an item to the Suspicious Objects list in Vision One
  • remove from blocklist: Removes an item from the Suspicious Objects list
  • quarantine email message: Quarantine the email message
  • delete email message: Delete the email message
  • terminate process: Terminate the process running on the endpoint
  • add to exception: Add object to exception list
  • delete from exception: Delete object from exception list
  • add to suspicious: Add suspicious object to suspicious list
  • delete from suspicious: Delete the suspicious object from suspicious list
  • check analysis status: Get the status of file analysis based on task id
  • download analysis report: Get the analysis report of a file based on report id
  • collect forensic file: Collect forensic file
  • forensic file info: Get the download information for collected forensic file
  • start analysis: Submit file to sandbox for analysis
  • add note: Adds a note to an existing workbench alert
  • update status: Updates the status of an existing workbench alert
  • get alert details: Displays information about the specified alert
  • urls to sandbox: Submits URLs to the sandbox for analysis
  • enable account: Allows the user to sign in to new application and browser sessions
  • disable account: Signs the user out of all active application and browser sessions, and prevents the user from signing in any new session
  • restore email message: Restore quarantined email messages
  • sign out account: Signs the user out of all active application and browser sessions
  • force password reset: Signs the user out of all active application and browser sessions, and forces the user to create a new password during the next sign-in attempt
  • sandbox suspicious list: Downloads the suspicious object list associated to the specified object
  • sandbox analysis result: Displays the analysis results of the specified object
  • sandbox investigation package: Downloads the Investigation Package of the specified object
  • get suspicious list: Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, email addresses, or URLs in the Suspicious Object List and displays the information in a paginated list
  • get exception list: Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, sender addresses, or URLs in the Exception List and displays it in a paginated list

Supported Actions Version 2.2.0

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • get endpoint info: Gather information about an endpoint
  • quarantine device: Quarantine the endpoint
  • unquarantine device: Unquarantine the endpoint
  • on poll: Callback action for the on_poll ingest functionality
  • status check: Checks the status of a task
  • add to blocklist: Adds an item to the Suspicious Objects list in Vision One
  • remove from blocklist: Removes an item from the Suspicious Objects list
  • quarantine email message: Quarantine the email message
  • delete email message: Delete the email message
  • terminate process: Terminate the process running on the endpoint
  • add to exception: Add object to exception list
  • delete from exception: Delete object from exception list
  • add to suspicious: Add suspicious object to suspicious list
  • delete from suspicious: Delete the suspicious object from suspicious list
  • check analysis status: Get the status of file analysis based on task id
  • download analysis report: Get the analysis report of a file based on report id
  • collect forensic file: Collect forensic file
  • forensic file info: Get the download information for collected forensic file
  • start analysis: Submit file to sandbox for analysis
  • add note: Adds a note to an existing workbench alert
  • update status: Updates the status of an existing workbench alert
  • get alert details: Displays information about the specified alert
  • urls to sandbox: Submits URLs to the sandbox for analysis
  • enable account: Allows the user to sign in to new application and browser sessions
  • disable account: Signs the user out of all active application and browser sessions, and prevents the user from signing in any new session
  • restore email message: Restore quarantined email messages
  • sign out account: Signs the user out of all active application and browser sessions
  • force password reset: Signs the user out of all active application and browser sessions, and forces the user to create a new password during the next sign-in attempt
  • sandbox suspicious list: Downloads the suspicious object list associated to the specified object
  • sandbox analysis result: Displays the analysis results of the specified object
  • sandbox investigation package: Downloads the Investigation Package of the specified object
  • get suspicious list: Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, email addresses, or URLs in the Suspicious Object List and displays the information in a paginated list
  • get exception list: Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, sender addresses, or URLs in the Exception List and displays it in a paginated list

Supported Actions Version 2.1.0

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • get endpoint info: Gather information about an endpoint
  • quarantine device: Quarantine the endpoint
  • unquarantine device: Unquarantine the endpoint
  • on poll: Callback action for the on_poll ingest functionality
  • status check: Checks the status of a task
  • add to blocklist: Adds an item to the Suspicious Objects list in Vision One
  • remove from blocklist: Removes an item from the Suspicious Objects list
  • quarantine email message: Quarantine the email message
  • delete email message: Delete the email message
  • terminate process: Terminate the process running on the endpoint
  • add to exception: Add object to exception list
  • delete from exception: Delete object from exception list
  • add to suspicious: Add suspicious object to suspicious list
  • delete from suspicious: Delete the suspicious object from suspicious list
  • check analysis status: Get the status of file analysis based on task id
  • download analysis report: Get the analysis report of a file based on report id
  • collect forensic file: Collect forensic file
  • forensic file info: Get the download information for collected forensic file
  • start analysis: Submit file to sandbox for analysis
  • add note: Adds a note to an existing workbench alert
  • update status: Updates the status of an existing workbench alert
  • get alert details: Displays information about the specified alert
  • urls to sandbox: Submits URLs to the sandbox for analysis
  • enable account: Allows the user to sign in to new application and browser sessions
  • disable account: Signs the user out of all active application and browser sessions, and prevents the user from signing in any new session
  • restore email message: Restore quarantined email messages
  • sign out account: Signs the user out of all active application and browser sessions
  • force password reset: Signs the user out of all active application and browser sessions, and forces the user to create a new password during the next sign-in attempt
  • sandbox suspicious list: Downloads the suspicious object list associated to the specified object
  • sandbox analysis result: Displays the analysis results of the specified object
  • sandbox investigation package: Downloads the Investigation Package of the specified object
  • get suspicious list: Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, email addresses, or URLs in the Suspicious Object List and displays the information in a paginated list
  • get exception list: Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, sender addresses, or URLs in the Exception List and displays it in a paginated list

Supported Actions Version 2.0.0

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • get endpoint info: Gather information about an endpoint
  • quarantine device: Quarantine the endpoint
  • unquarantine device: Unquarantine the endpoint
  • on poll: Callback action for the on_poll ingest functionality
  • status check: Checks the status of a task
  • add to blocklist: Adds an item to the Suspicious Objects list in Vision One
  • remove from blocklist: Removes an item from the Suspicious Objects list
  • quarantine email message: Quarantine the email message
  • delete email message: Delete the email message
  • terminate process: Terminate the process running on the endpoint
  • add to exception: Add object to exception list
  • delete from exception: Delete object from exception list
  • add to suspicious: Add suspicious object to suspicious list
  • delete from suspicious: Delete the suspicious object from suspicious list
  • check analysis status: Get the status of file analysis based on task id
  • download analysis report: Get the analysis report of a file based on report id
  • collect forensic file: Collect forensic file
  • forensic file info: Get the download information for collected forensic file
  • start analysis: Submit file to sandbox for analysis
  • add note: Adds a note to an existing workbench alert
  • update status: Updates the status of an existing workbench alert
  • get alert details: Displays information about the specified alert
  • urls to sandbox: Submits URLs to the sandbox for analysis
  • enable account: Allows the user to sign in to new application and browser sessions
  • disable account: Signs the user out of all active application and browser sessions, and prevents the user from signing in any new session
  • restore email message: Restore quarantined email messages
  • sign out account: Signs the user out of all active application and browser sessions
  • force password reset: Signs the user out of all active application and browser sessions, and forces the user to create a new password during the next sign-in attempt
  • sandbox suspicious list: Downloads the suspicious object list associated to the specified object
  • sandbox analysis result: Displays the analysis results of the specified object
  • sandbox investigation package: Downloads the Investigation Package of the specified object
  • get suspicious list: Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, email addresses, or URLs in the Suspicious Object List and displays the information in a paginated list
  • get exception list: Retrieves information about domains, file SHA-1, file SHA-256, IP addresses, sender addresses, or URLs in the Exception List and displays it in a paginated list

Supported Actions Version 1.1.1

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • get endpoint info: Gather information about an endpoint
  • quarantine device: Quarantine the endpoint
  • unquarantine device: Unquarantine the endpoint
  • on poll: Callback action for the on_poll ingest functionality
  • status check: Checks the status of a task
  • add to blocklist: Adds an item to the Suspicious Objects list in Vision One
  • remove from blocklist: Removes an item from the Suspicious Objects list
  • quarantine email message: Quarantine the email message
  • delete email message: Delete the email message
  • terminate process: Terminate the process running on the endpoint
  • add to exception: Add object to exception list
  • delete from exception: Delete object from exception list
  • add to suspicious: Add suspicious object to suspicious list
  • delete from suspicious: Delete the suspicious object from suspicious list
  • check analysis status: Get the status of file analysis based on task id
  • download analysis report: Get the analysis report of a file based on report id
  • collect forensic file: Collect forensic file
  • forensic file info: Get the download information for collected forensic file
  • start analysis: Submit file to sandbox for analysis
  • add note: Adds a note to an existing workbench alert
  • update status: Updates the status of an existing workbench alert

Supported Actions Version 1.1.0

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • get endpoint info: Gather information about an endpoint
  • quarantine device: Quarantine the endpoint
  • unquarantine device: Unquarantine the endpoint
  • on poll: Callback action for the on_poll ingest functionality
  • status check: Checks the status of a task
  • add to blocklist: Adds an item to the Suspicious Objects list in Vision One
  • remove from blocklist: Removes an item from the Suspicious Objects list
  • quarantine email message: Quarantine the email message
  • delete email message: Delete the email message
  • terminate process: Terminate the process running on the endpoint
  • add to exception: Add object to exception list
  • delete from exception: Delete object from exception list
  • add to suspicious: Add suspicious object to suspicious list
  • delete from suspicious: Delete the suspicious object from suspicious list
  • check analysis status: Get the status of file analysis based on task id
  • download analysis report: Get the analysis report of a file based on report id
  • collect forensic file: Collect forensic file
  • forensic file info: Get the download information for collected forensic file
  • start analysis: Submit file to sandbox for analysis
  • add note: Adds a note to an existing workbench alert
  • update status: Updates the status of an existing workbench alert

Supported Actions Version 1.0.1

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • get endpoint info: Gather information about an endpoint
  • quarantine device: Quarantine the endpoint
  • unquarantine device: Unquarantine the endpoint
  • on poll: Callback action for the on_poll ingest functionality
  • status check: Checks the status of a task
  • add to blocklist: Adds an item to the Suspicious Objects list in Vision One
  • remove from blocklist: Removes an item from the Suspicious Objects list
  • quarantine email message: Quarantine the email message
  • delete email message: Delete the email message
  • terminate process: Terminate the process running on the endpoint
  • add to exception: Add object to exception list
  • delete from exception: Delete object from exception list
  • add to suspicious: Add suspicious object to suspicious list
  • delete from suspicious: Delete the suspicious object from suspicious list
  • check analysis status: Get the status of file analysis based on task id
  • download analysis report: Get the analysis report of a file based on report id
  • collect forensic file: Collect forensic file
  • forensic file info: Get the download information for collected forensic file
  • start analysis: Submit file to sandbox for analysis
  • add note: Adds a note to an existing workbench alert
  • update status: Updates the status of an existing workbench alert

Key Benefits of XDR with Trend Micro Vision One™

Prioritized view of threats across the organization

Organizations without an XDR approach ignore nearly double the security alerts as those with XDR capabilities. XDR correlates and combines low level signals into high-fidelity alerts which tell the story of an attack. Security personnel can quickly understand where to focus efforts.

More effective analysis

With native integration into email, endpoints, servers, cloud environments, and networks, XDR sensors benefit from a deep understanding of data sources. This results in more effective analytics combined with continuously updated detection rules and global threat intelligence from Trend Micro Research, compared to having third-party integration through application programming interfaces (APIs). Organizations with an XDR approach suffered half as many successful attacks.

Clearer contextual view of threats

By viewing more contextual alerts across more threat vectors, events that seem benign on their own suddenly become meaningful indicators of compromise. This allows you to connect more dots into a single view, simplifying the steps towards achieving an attack-centric view of an entire chain of events across security layers and take response actions from one place. This enables more insightful investigations and gives you the ability to detect threats earlier.

Stops more attacks, quicker

The net of XDR is better protection for your organization through earlier detection and faster response. According to ESG, those with XDR are 2.2 times more likely to detect a data breach or successful attack in a few days or less, versus weeks or months for those without.

Reduces time to detect and stop threats

Collapses the time it takes to detect, contain, and respond to threats, minimizing the severity and scope of impact. ESG found that organizations with an XDR approach respond more completely to attacks and were 60% less likely to report that attack re-propagation had been an issue.

Increased effectiveness and efficiency of threat investigation

By automatically correlating threat data from multiple sources, XDR speeds up and removes manual steps involved in investigations and enables security analysts to quickly find the story of an attack. Organizations with an XDR approach stated it would take eight full time employees to replace the data correlation capabilities of XDR and also are 2.6 times less likely to report their team is overwhelmed.

Integrated with third-party systems

As you may have other security tools and technologies deployed in your environment, we offer a growing portfolio of open APIs and integrations to third-party systems. Trend Micro Vision One™ has the ability to fit within these ecosystems and security operations workflows, acquiring meaningful data from your infrastructure to further enrich and validate your XDR capabilities.


Why not take Trend Micro Vision One™ for a test drive to see how it can help you see more and respond faster to the threats your organization faces?

Release Notes

Version 2.3.1
April 11, 2025
  • Update Python dependencies for vulnerabilities, package updates, and platform built-in removals
  • Update Python dependencies for Python 3.13 support
  • Update NOTICE file with updated dependencies
  • Apply pre-commit fixes
Version 2.3.0
Dec. 4, 2024
  • Added new action 'vault sandbox analysis' to enable user to submit item from Splunk Vault to XDR portal for analysis.
Version 2.2.1
Dec. 12, 2023
  • Minor rebrand from "Trend Micro Vision One" to "Trend Vision One"
Version 2.2.0
Nov. 8, 2023
  • Addressed an issue where a file submitted to sandbox was empty
  • Updated pytmv1 to latest release (0.6.2)
Version 2.1.0
Oct. 10, 2023
  • Updated get_endpoint_info action to accept multiple endpoints using a comma separated string.
  • Updated forensic file info to provide missing response values.
  • Update action descriptions for all actions.
  • Updated input descriptions for actions in README.md
  • Updated readme.html.
  • Updated pytmv1 to latest release (0.5.6).
Version 2.0.0
Aug. 12, 2023
  • Updated integration to use Trend Micro Vision One V3 API endpoints.
  • Added action to fetch exception and suspicious list.
  • Added action to submit URLs to sandbox for analysis.
  • Sandbox analysis action has been split into download analysis report, download suspicious list and download investigation package.
  • Added domain actions that allow enabling, disabling user accounts in addition to forcing sign-outs and password resets for compromised accounts.
  • Integrated with Pytmv1 library to ensure uniformity for each action per Trend standards.
Version 1.1.1
May 20, 2023
  • Updated SVG trendmicro logos
Version 1.1.0
March 25, 2023
  • Updated app name to 'Trend Micro Vision One for Splunk SOAR'

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.