Topics on this page
Deploying Network Security with hosted infrastructure requires only a few steps and has no overhead management during or after deployment. With this service, the traffic in your environment is routed through Network Security endpoints to be inspected. The only items you manage are the Network Security endpoints in your cloud environment; the virtual appliances, as well as any additional infrastructure requirements, are managed by Network Security.
Overview of deployment
- Review your environment to determine which assets (VPCs) in your cloud account need protection and where the Network Security endpoints should be deployed.
- Create the Network Security endpoints.
- Modify your route tables to route traffic to the Network Security endpoints.
- Verify successful deployment.
Before you begin deployment, make sure you have a Trend Micro Cloud One API key. If you do not have an existing API key created after August 4th, 2021, follow these steps.