vision-one-mcp-server
The Trend Vision One MCP Server enables natural language interaction between AI tools and the Trend Vision One web APIs. This allows users to leverage the power of Large Language Models (LLMs) to interpret security events and generate meaningful recommendations. It facilitates automated workflows and interactions with APIs, streamlining the retrieval and interpretation of security alerts.
GitHub Stars
20
User Rating
Not Rated
Favorites
0
Views
30
Forks
7
Issues
3
Trend Vision One MCP Server
The Trend Vision One Model Context Protocol (MCP) Server enables natural language interaction between your favourite AI tooling and the Trend Vision One web APIs.
This allows users to harness the power of Large Language Models (LLM) to interpret and respond to security events.
Example Use Cases
- Automating the retrieval and interpretation of security alerts from various Trend Vision One such tools as Workbench, Cloud Posture, and File Security.
- Allowing LLMs to gather information about security events and generate meaningful recommendations.
- Automating workflows to enhance the configuration of Trend Vision One services.
- Interacting with Trend Vision One web APIs without having to learn yet another company's APIs.
Security
- Your Trend Vision One API keys should be configured with minimial permissions.
- By default the MCP server runs in read-only mode. Be careful when running the server with
readonly=falseas it may have irreversible consequences. - Data retrieved using the MCP server is processed by the LLM configured in your AI tooling. It is your responsibility to ensure that this LLM is approved by your company for processing sensitive data.
- This MCP server is only intended to be used with local integrations and command-line tools via the Standard Input/Output transport. You should never expose this tool to the network.
Getting Started
Prerequisites
- You must have a Trend Vision One account and API key.
- You must have credits allocated for the services you wish to interact with.
- Have Docker installed.
- Have the latest version of Visual Studio Code installed.
Use With VSCode + GitHub Copilot
Open the following link in your browser to automatically install the server configuration in Visual Studio Code.
vscode:mcp/install?%7B%22name%22%3A%22trend-vision-one-mcp%22%2C%22inputs%22%3A%5B%7B%22type%22%3A%22promptString%22%2C%22id%22%3A%22trend-vision-one-api-key%22%2C%22description%22%3A%22Trend%20Vision%20One%20API%20Key%22%2C%22password%22%3Atrue%7D%2C%7B%22type%22%3A%22promptString%22%2C%22id%22%3A%22trend-vision-one-region%22%2C%22description%22%3A%22Trend%20Vision%20One%20Region%22%7D%5D%2C%22command%22%3A%22docker%22%2C%22args%22%3A%5B%22run%22%2C%22-i%22%2C%22--rm%22%2C%22-e%22%2C%22TREND_VISION_ONE_API_KEY%22%2C%22ghcr.io%2Ftrendmicro%2Fvision-one-mcp-server%22%2C%22-region%22%2C%22%24%7Binput%3Atrend-vision-one-region%7D%22%2C%22-readonly%3Dtrue%22%5D%2C%22env%22%3A%7B%22TREND_VISION_ONE_API_KEY%22%3A%22%24%7Binput%3Atrend-vision-one-api-key%7D%22%7D%7D
When prompted, enter your Vision One API Key and your Vision One region.
Alternatively, copy the following into your settings.json.
{
"mcp": {
"inputs": [
{
"type": "promptString",
"id": "trend-vision-one-api-key",
"description": "Trend Vision One API Key",
"password": true
},
{
"type": "promptString",
"id": "trend-vision-one-region",
"description": "Trend Vision One Region"
}
],
"servers": {
"trend-vision-one-mcp": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"-e",
"TREND_VISION_ONE_API_KEY",
"ghcr.io/trendmicro/vision-one-mcp-server",
"-region",
"${input:trend-vision-one-region}",
"-readonly=true"
],
"env": {
"TREND_VISION_ONE_API_KEY": "${input:trend-vision-one-api-key}"
}
}
}
},
}
Server Options
| Option | Description |
|---|---|
-readonly |
Specify whether or not the server should run in readonly mode readonly=true, readonly=false. Default true. |
-region |
Specify the Trend Vision One region. Regions are: au, jp, eu, sg, in, us or mea. |
-host |
Set the Trend Vision One endpoint you want to use. Useful for interacting with internal environments. |
Tools
Cloud Posture
| Tool | Description | Mode |
|---|---|---|
cloud_posture_accounts_list |
List CSPM Accounts. | read |
cloud_posture_account_checks_list |
List the checks of an account. | read |
cloud_posture_account_scan |
Start scanning Cloud Posture account. | write |
cloud_posture_account_scan_settings_get |
Get the scan settings for an account. | read |
cloud_posture_account_scan_settings_update |
Update an account's scan settings. | write |
cloud_posture_template_scanner_run |
Scan an infrastructure as code template using the cloud posture template scanner. | read |
Identity and Access Management (IAM)
| Tool | Description | Mode |
|---|---|---|
iam_api_keys_list |
List Vision One API Keys. | read |
iam_api_keys_delete |
Delete Vision One API Keys. | write |
iam_accounts_list |
Displays users, groups, and invitations in the account. | read |
iam_account_invite |
Sends an invitation to the specified email address to be added as an account. | write |
iam_account_update |
Updates the specified account. | write |
iam_account_delete |
Deletes the specified account. | write |
Workbench
| Tool | Description | Mode |
|---|---|---|
workbench_alerts_list |
List Trend Vision One Workbench Alerts. | read |
workbench_alert_detail_get |
Displays information about the specified alert. | read |
workbench_observed_attack_techniques_list |
List observed attack techniques. | read |
Cyber Risk & Exposure Management (CREM)
| Tool | Description | Mode |
|---|---|---|
crem_attack_surface_devices_list |
List discovered attack surface devices. | read |
crem_attack_surface_domain_accounts_list |
List discovered attack surface domain accounts. | read |
crem_attack_surface_service_accounts_list |
List discovered service accounts. | read |
crem_attack_surface_global_fqdns_list |
List discovered internet facing domains (Fully Qualified Domain Names). | read |
crem_attack_surface_public_ips_list |
List discovered public IP addresses. | read |
crem_attack_surface_cloud_assets_list |
List discovered cloud assets. | read |
crem_attack_surface_high_risk_users_list |
List high risk users. | read |
crem_attack_surface_cloud_asset_profile_get |
Get a cloud asset's profile. | read |
crem_attack_surface_cloud_asset_risk_indicators_list |
List a cloud asset's risk indicators. | read |
crem_attack_surface_local_apps_list |
List discovered local applications. | read |
crem_attack_surface_local_app_profile_get |
Get a local app's profile. | read |
crem_attack_surface_local_app_risk_indicators_list |
List a local app's risk indicators. | read |
crem_attack_surface_local_app_devices_list |
Displays the devices with the specified local application installed. | read |
crem_attack_surface_local_app_executable_files_list |
Displays the local applications installed executable files. | read |
crem_attack_surface_custom_tags_list |
List tag definitions. | read |
Cloud Account Management (CAM)
| Tool | Description | Mode |
|---|---|---|
cam_alibaba_account_get |
Get the details of an Alibaba account managed by Cloud Account Manangement. | read |
cam_alibaba_accounts_list |
Displays all Alibaba Cloud accounts connected to Trend Vision One in a paginated list. | read |
cam_aws_accounts_list |
List AWS accounts managed by Cloud Account Management. | read |
cam_aws_account_get |
Get the details of an AWS account managed by Cloud Account Management. | read |
cam_gcp_accounts_list |
List Google Cloud Projects managed by Cloud Account Management. | read |
cam_gcp_account_get |
Get the details of a GCP project managed by Cloud Account Manangement. | read |
Email Security
| Tool | Description | Mode |
|---|---|---|
email_security_accounts_list |
Returns all email accounts managed by an email protection solution or with email sensor detection enabled. | read |
email_security_domains_list |
Returns all email domains managed by an email protection solution. | read |
email_security_servers_list |
Returns all email servers managed by an on-premises email protection solution. | read |
Container Security
| Tool | Description | Mode |
|---|---|---|
container_security_ecs_clusters_list |
Displays all registered Amazon Elastic Container Service (ECS) clusters in a paginated list | read |
container_security_image_vulnerabilities_list |
Displays the container image vulnerabilities detected in Kubernetes and Amazon ECS clusters for your account | read |
container_security_k8_cluster_get |
Displays the details of the specified Kubernetes cluster | read |
container_security_k8_clusters_list |
Displays all registered Kubernetes clusters | read |
container_security_k8_images_list |
Displays the Kubernetes images that are running in all clusters for your account | read |
Endpoint Security
| Tool | Description | Mode |
|---|---|---|
endpoint_security_agent_update_policies_list |
Displays the available agent update policies | read |
endpoint_security_endpoint_get |
Displays the detailed profile of the specified endpoint | read |
endpoint_security_endpoints_list |
Displays a detailed list of your endpoints | read |
endpoint_security_task_get |
Displays the status of the specified task | read |
endpoint_security_tasks_list |
Displays the tasks of your endpoints in a paginated list | read |
endpoint_security_version_control_policies_list |
Displays your Endpoint Version Control policies | read |
Architecture

Examples
Start a Scan With Cloud Posture

Domain Account Analysis


Deleting Expired Trend Vision One API Keys

Filtering Attack Surface Devices

Change Log
See releases.
Contibuting
Please see the contributing guide.
Code of Conduct
This project adopts the Go Code of Conduct.
389
Followers
53
Repositories
0
Gists
0
Total Contributions