Netskope Cloud Threat Exchange Trend Micro Vision One

  • 30 December 2022
  • 1 reply

Userlevel 3
Badge +15


Cloud Exchange CTE’s integration with Trend Micro Vision One gives you the ability to bilaterally share indicators of compromise (IOCs) in the form of URLs and file hashes. For example, if Trend Micro Vision One detects a suspicious object, you can configure an action to add it to Netskope’s blocked URL or file list. 



  • CloudExchange 4.2 or newer
  • Basic Cloud Exchange setup (Netskope tenant API v1 and v2 setup)
  • Netskope plug - Netskope CTE
  • Trend Micro Vision One

Setup Steps

Trend Micro Vision One

  1. Find Region URL
  2. Create API Token

Netskope Cloud Exchange

  1. Setup Netskope Plugins
    1. Netskope CTE Plugin
    2. Trend Micro Vision One CTE v1.0.1 or greater
  2. Create a Cloud Exchange Business Rule
  3. Create Sharing Configuration
    1. Sharing Hashes to Netskope


  1. Create File Profile Policy
  2. Create New Malware Detection Profile
  3. Add file list to Netskope Real-time Protection Policy

Verify Integration

  1. Verify Sharing of IoCs

Trend Micro Vision One setup steps

Finding your Regional URL

When you log into your Trend Micro portal, the URL will have a “Data Region” right before xdr. In my example I have “in” or India as my region. Note down your region. 


The options are: 

Australia - au

European - eu

India - in

Japan - jp

Singapore - sg

UAE - uae


Create API Token

Go to Account > User Accounts and select the user that you would like to create the token under.


In the Account Details of this user, click on generate new authentication token


Be sure to copy the token



Netskope Cloud Exchange setup steps

Cloud Exchange Plugins

On your, Netskope Cloud Exchange go to Settings > Plugins

You will need two plugins configured for this solution. The Netskope CTE  plugin and the Trend Micro Vision One v1.0.1 CTE plugin. 

If you need to update your plugins go to the Plugin Repository tab and select ‘check for updates’. 


Configure Netskope CTE plugin

Select Netskope CTE

Name your plugin and select a Tenant



For the Configuration Parameters you can select polling, which direction URL and malware will be shared and which types of malware. 



Configure Trend Micro Vision One CTE plugin

From the plugin page select Trend Micro Vision One v1.0.1 or newer. 

Give it a Configuration Name and edit the Sync Interval if needed




Configuration Parameters

Select the Data Region based on the URL from your Trend Micro Vision One portal. 

Add the API Token that you saved from your Trend Micro user account.



Create a Cloud Exchange Business Rule

On your Cloud Exchange interface go to Threat Exchange > Business Rules

Select Create New Rule


You can bring in URLs and file hashes with one rule or break up into two. 


Sharing Configuration

Now that you have the plugins configured and the business rules in place, the next step is to tell Cloud Exchange which products you would like to share the threat IoCs with. The source field will be where the IoCs are coming from and the destination field is where they will go. The business rule will act as a filter for what you are sharing. If you want bidirectional sharing, you will need two sharing rules. 

Threat Exchange > Sharing > Add Sharing Configuration



Sharing Hashes to Netskope

When sharing hashes to Netskope it will ask you for a List Name. This name needs to be set on the Netskope Tenant side also. 

  • See below on how to configure your Netskope tenant’s List Name


Create File Profile Policy

To configure the file location in your Netskope Tenant (not in Cloud Exchange) go to Policies > File > New File Profile



Go to File Hash and drop down the Add File Hash by Type and select your sharing type. I selected SHA256 for Trend Micro Vision One. 



Give it a name and Save

This file name will be the “List Name” that you will use in Cloud Exchange.


Create New Malware Detection Profile

Go to Policies > Threat Protection > New Malware Detection Profile


Click Next to get to the Blocklist page and select the File Profile you created. Scroll to the bottom and select Next


Add a Profile Name, review your blocklist and Save Malware Detection Profile


Add a Real-time Protection Policy

Go to Policies > Real-time Protection > New Policy

In my example, I selected a Threat Protection policy


Under Profile & Action select Add Profile > Threat Protection Profile

For the Action you will want to Block and select a template of what the user will see when the file is blocked. 


Select the Threat Protection Profile you created. Adjust the Severity-Based Actions as needed for your configuration. 


Give your policy a name (Set Policy) and Save

Verify Integration

Verify Sharing of IoCs. 

Go to Threat Exchange > Threat IoCs

On this page you will see a list of all IoCs that are coming into Cloud Exchange. If they have come from Netskope they will be counted on the Total Netskope Hits and if they came from a 3rd party plugin (like Trend), they will be counted until Total Other Hits. To see additional details click the arrow on the right. You will be able to see things like when it was seen and which 3rd party plugin came from. 



Trend has a cool feature that lets you easily add an IoC. Go to Threat Intelligence > Suspicious Object Management > Add. If my above Netskope picture is clear enough, you will notice that the two IoCs I created below are the ones showing up in Cloud Exchange. 



On your Netskope Tenant go to Policies > File and then to the File Profile you created and you should see your file hash under the File Hash tab. 



1 reply

Userlevel 1
Badge +9

Nice work Gary!