The Trend Micro backend service regularly pushes updates to File Storage Security
stacks on GCP.
Automatic update
|
Stack
|
GCP component
|
When
|
Licence
|
Scanner
|
GCP secret
|
Weekly
|
Security update: malware patterns
|
Scanner
|
Cloud Function configuration
|
Daily
|
If the variable
<functionAutoUpdate>
is true
,
then File Storage Security updates your GCP cloud function; if
false
, you update the function by running a script in GCP Cloud
Shell.We regularly make updates available for File Security Stacks on GCP. Below is our
usual release schedule.
Manual Update
|
Stack
|
GCP component
|
Function (Feature)
|
Scanner: Scanner function Pattern Updater function
Storage: Bucket Listener function Post-Scan
Action Tags function
|
Function role
|
![]() |
TipTo manually update stacks, see Update
stacks.
|
Update scanner function
Run the following script in the GCP Cloud Shell:
wget https://file-storage-security.s3.amazonaws.com/latest/cloud-functions/gcp-scanner.zip unzip gcp-scanner.zip -d scanner gcloud functions deploy <SCANNER_FUNCTION_NAME> --project=<PROJECT_ID> --source=scanner --region=<FUNCTION_REGION>
Update pattern updater function
Run the following script in the GCP Cloud Shell:
wget https://file-storage-security.s3.amazonaws.com/latest/cloud-functions/gcp-scanner-pattern-updater.zip unzip gcp-scanner-pattern-updater.zip -d pattern-updater gcloud functions deploy <PATTERN_UPDATER_FUNCTION_NAME> --project=<PROJECT_ID> --source=pattern-updater --region=<FUNCTION_REGION>
Update bucket listener function
Run the following script in GCP Cloud Shell:
wget https://file-storage-security.s3.amazonaws.com/latest/cloud-functions/gcp-listener.zip unzip gcp-listener.zip -d listener gcloud functions deploy <BUCKET_LISTENER_FUNCTION_NAME> --project=<PROJECT_ID> --source=scanner --region=<FUNCTION_REGION>
Update post action tag function
Run the following script in GCP Cloud Shell:
wget https://file-storage-security.s3.amazonaws.com/latest/cloud-functions/gcp-action-tag.zip unzip gcp-action-tag.zip -d action-tag gcloud functions deploy <POST_ACTION_TAG_FUNCTION_NAME> --project=<PROJECT_ID> --source=action-tag --region=<FUNCTION_REGION>