Sample code plugins
We provide and maintain sample code plugins in GitHub that you can access and use for the following actions:
Additional sample plugins will be added as required. Please check on a regular basis.
Our sample code is available in GitHub, at: https://github.com/trendmicro/cloudone-filestorage-plugins.
Our API is documented in the API reference.
You can use plugins to deploy your stacks.
You can use the:
aws-python-storage-stack-automation plugin to deploy a storage stack automatically when a new S3 bucket is created or remove a storage stack when a S3 bucket is deleted in AWS using Lambda.
aws-terraform plugin to install stacks in AWS using Terraform CLI (0.14.9+). You can deploy all three types of stacks - all-in-one stack, scanner stack and storage stack.
You can use plugins to trigger scans.
You can use the:
- aws-python-bucket-full-and-scheduled-scan plugin to deploy all the required resources to trigger a full scan, scheduled or not, on a S3 bucket leveraging an existing Trend Micro File Storage Security deployment.
You can use plugins to send files with no found issues to storage and malicious files to quarantine. There are also several plugins that you can use to have File Storage Security send notifications when a malicious file is detected.
In AWS, you can use the:
aws-python-conformity-custom-check plugin to create a custom check within Cloud One Conformity if a malicious file is detected.
aws-python-promote-or-quarantine plugin to send files that have no found issues to one S3 bucket (promote) and malicious files to another (quarantine)
You can use the following plugins to send post-scan notifications via:
In Azure, you can use the:
- azure-python-promote-or-quarantine plugin to send files with no found issues to one Azure storage account (promote) and malicious files to another (quarantine)
You can use the following plugin to send post-scan notifications via: