Table of contents

Update GCP components

The Trend Micro backend service regularly pushes updates to File Storage Security stacks on GCP.

Automatic update Stack GCP component When
Licence Scanner GCP secret Weekly
Security update: malware patterns Scanner Cloud Function configuration Daily

File Storage Security does not automatically update Cloud Functions in GCP. You have to do these manually by running a script in GCP Cloud Shell.

We regularly make updates available for File Security Stacks on GCP. Below is our usual release schedule.

Manual Update Stack GCP component
Function (Feature) Scanner:
Scanner function
Pattern Updater function
Storage:
Bucket Listener function
Post-Scan Action Tags function
Function role

To manually update stacks, see Update stacks.

Update scanner function

Run the following script in the GCP Cloud Shell:

wget https://file-storage-security.s3.amazonaws.com/latest/cloud-functions/gcp-scanner.zip
unzip gcp-scanner.zip -d scanner
gcloud functions deploy <SCANNER_FUNCTION_NAME> --project=<PROJECT_ID> --source=scanner --region=<FUNCTION_REGION>

Update pattern updater function

Run the following script in the GCP Cloud Shell:

wget https://file-storage-security.s3.amazonaws.com/latest/cloud-functions/gcp-scanner-pattern-updater.zip
unzip gcp-scanner-pattern-updater.zip -d pattern-updater
gcloud functions deploy <PATTERN_UPDATER_FUNCTION_NAME> --project=<PROJECT_ID> --source=pattern-updater --region=<FUNCTION_REGION>

Update bucket listener function

Run the following script in GCP Cloud Shell:

wget https://file-storage-security.s3.amazonaws.com/latest/cloud-functions/gcp-listener.zip
unzip gcp-listener.zip -d listener
gcloud functions deploy <BUCKET_LISTENER_FUNCTION_NAME> --project=<PROJECT_ID> --source=scanner --region=<FUNCTION_REGION>

Update post action tag function

Run the following script in GCP Cloud Shell:

wget https://file-storage-security.s3.amazonaws.com/latest/cloud-functions/gcp-action-tag.zip
unzip gcp-action-tag.zip -d action-tag
gcloud functions deploy <POST_ACTION_TAG_FUNCTION_NAME> --project=<PROJECT_ID> --source=action-tag --region=<FUNCTION_REGION>