Views:
The Trend Micro backend service regularly pushes updates to File Storage Security stacks on GCP.
Automatic update
Stack
GCP component
When
Licence
Scanner
GCP secret
Weekly
Security update: malware patterns
Scanner
Cloud Function configuration
Daily
If the variable <functionAutoUpdate> is true, then File Storage Security updates your GCP cloud function; if false, you update the function by running a script in GCP Cloud Shell.
We regularly make updates available for File Security Stacks on GCP. Below is our usual release schedule.
Manual Update
Stack
GCP component
Function (Feature)
Scanner: Scanner function Pattern Updater function Storage: Bucket Listener function Post-Scan Action Tags function
Function role
Tip
Tip
To manually update stacks, see Update stacks.

Update scanner function

Run the following script in the GCP Cloud Shell:
wget https://file-storage-security.s3.amazonaws.com/latest/cloud-functions/gcp-scanner.zip
unzip gcp-scanner.zip -d scanner
gcloud functions deploy <SCANNER_FUNCTION_NAME> --project=<PROJECT_ID> --source=scanner --region=<FUNCTION_REGION>

Update pattern updater function

Run the following script in the GCP Cloud Shell:
wget https://file-storage-security.s3.amazonaws.com/latest/cloud-functions/gcp-scanner-pattern-updater.zip
unzip gcp-scanner-pattern-updater.zip -d pattern-updater
gcloud functions deploy <PATTERN_UPDATER_FUNCTION_NAME> --project=<PROJECT_ID> --source=pattern-updater --region=<FUNCTION_REGION>

Update bucket listener function

Run the following script in GCP Cloud Shell:
wget https://file-storage-security.s3.amazonaws.com/latest/cloud-functions/gcp-listener.zip
unzip gcp-listener.zip -d listener
gcloud functions deploy <BUCKET_LISTENER_FUNCTION_NAME> --project=<PROJECT_ID> --source=scanner --region=<FUNCTION_REGION>

Update post action tag function

Run the following script in GCP Cloud Shell:
wget https://file-storage-security.s3.amazonaws.com/latest/cloud-functions/gcp-action-tag.zip
unzip gcp-action-tag.zip -d action-tag
gcloud functions deploy <POST_ACTION_TAG_FUNCTION_NAME> --project=<PROJECT_ID> --source=action-tag --region=<FUNCTION_REGION>