{"id":43183,"date":"2020-09-18T00:00:00","date_gmt":"2020-09-18T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security.html"},"modified":"2020-09-18T00:00:00","modified_gmt":"2020-09-18T00:00:00","slug":"run-command-line-interface-with-hybrid-cloud-security-solution-engineer","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/","title":{"rendered":"Run Command Line Interface with Hybrid Cloud Security Solution Engineer"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security\/thus-you-must-check-out-the-new-trend-micro-hybrid-cloud-security.jpg\"><!-- Begin mPulse library --><!-- END mPulse library --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width\"> <meta name=\"description\" content=\"Learn how to run Command Line Interface against Trend Micro Cloud One\u2122 services. \"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"how to,cloud native,workload security,article,multi cloud\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"defaultArticleWithoutHero\"> <meta property=\"article:published_time\" content=\"2020-09-18\"> <meta property=\"article:tag\" content=\"cloud native\"> <meta property=\"article:section\" content=\"how to\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security.html\"> <title>How to Run Command Line Interface with Hybrid Cloud Security<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security.html\"><br \/>\n<meta property=\"og:title\" content=\"How to Run Command Line Interface with Hybrid Cloud Security\"><br \/>\n<meta property=\"og:description\" content=\"Learn how to run Command Line Interface against Trend Micro Cloud One\u2122 services. \"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security\/thus-you-must-check-out-the-new-trend-micro-hybrid-cloud-security.jpg\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"How to Run Command Line Interface with Hybrid Cloud Security\"><br \/>\n<meta name=\"twitter:description\" content=\"Learn how to run Command Line Interface against Trend Micro Cloud One\u2122 services. \"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security\/thus-you-must-check-out-the-new-trend-micro-hybrid-cloud-security.jpg\"> <\/head> <body class=\"articlepage page basicpage context-business context-devops\" id=\"readabilityBody\" readability=\"50.882721575649\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layer *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyNoHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"1222699262\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"7.2244897959184\">\n<div class=\"article-details\" role=\"heading\" readability=\"33.714285714286\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Cloud Native<\/p>\n<p class=\"article-details__description\">Learn how you can get started with running CLI commands against Trend Micro Cloud One\u2122 services.<\/p>\n<p class=\"article-details__author-by\">By: Chuck Losh <time class=\"article-details__date\">September 18, 2020<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-md-8 col-md-push-2\"> <\/p>\n<div class=\"richText\" readability=\"33.076305220884\">\n<div readability=\"14.907630522088\">\n<p>Hi all! Been awhile since we last met! Today, I wanted to talk to you about a pretty cool recent addition from the folks at Trend Micro for customers. This is Thus! The Trend Micro Hybrid Cloud Security CLI project on GitHub.<\/p>\n<p>Check out the GitHub repository for the project! <a href=\"https:\/\/github.com\/trendmicro\/thus\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/trendmicro\/thus<\/a><\/p>\n<p>This is a python project that you can pull down and install in your virtual environment, or you can run a pip3 based install to put on a system that you already have Python 3.6 or greater.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security\/02-run-command-line-interface-with-hybrid-cloud-security.jpg\" alt=\"Image 2\"> <\/figure>\n<\/p><\/div>\n<div>\n<div class=\"richText\" readability=\"43.5\">\n<div readability=\"32\">\n<p>In this case, I ran my tests inside the Windows Subsystem for Linux or WSL as you can see above. My distribution is the new Ubuntu version 20.04 LTS release. The instructions for setup can be followed in the GitHub markdown article referenced previously to install the Python packages and dependencies. You can also enable autocomplete utilizing tabs which is a very useful feature in any CLI based tool! Here is the example of the pip install command to install the CLI!<\/p>\n<p><span class=\"pre\"><span class=\"rte-icon-component-text\">pip3 install &#8211;user tm-thus<\/span><\/span><\/p>\n<p>Once you get the CLI installed, let&#8217;s go ahead and add our API information to the software. The CLI tool allows you to connect to your associated Trend Micro Cloud One Services. At the time of this article, Trend Micro Workload Security, Trend Micro Container Image Security, and Trend Micro Cloud Conformity are supported for connections.<\/p>\n<p>To start, let&#8217;s go with Trend Micro Cloud One Workload Security. First, make a credentials file to connect the CLI to the corresponding service.<\/p>\n<p><span class=\"pre\"><span class=\"rte-icon-component-text\">vi ~\/.thus\/credentials<\/span><\/span><\/p>\n<p>You can do this in the vi editor, or nano if your prefer. You are going to want the structure of the credentials file pretty similar to below. The DSMapikey variable is an api key generated from your Cloud One Workload Security Console.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security\/02-run-command-line-interface-with-hybrid-cloud-security.jpg\" alt=\"Image 3\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"31.5\">\n<div readability=\"8\">\n<p>You can easily generate an API key in the Cloud One Workload Security console shown below as an example.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security\/04-run-command-line-interface-with-hybrid-cloud-security.jpg\" alt=\"Image 4\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"33\">\n<div readability=\"11\">\n<p>The next file that you are going to want to create for the Thus CLI to use for Cloud One Workload Security is the configuration file. Again, use vi, or nano to edit. Your resulting configuration file should look pretty similar to below.<\/p>\n<p><span class=\"pre\"><span class=\"rte-icon-component-text\">vi ~\/.thus\/config.<\/span><\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security\/05-run-command-line-interface-with-hybrid-cloud-security.jpg\" alt=\"Image 5\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"36\">\n<div readability=\"17\">\n<p>This file is going to have the API of the DSMHost entered which should be the address below for Trend Micro Cloud One Workload Security.<\/p>\n<p><span class=\"pre\"><span class=\"rte-icon-component-text\">https:\/\/app.deepsecurity.trendmicro.com\/api<\/span><\/span><\/p>\n<p>A totally optional piece is if you want to verify the SSL certificate, or not. This is done with the DSMVerifyssl flag.<\/p>\n<p>Ok cool! Let&#8217;s see if the CLI interface works. I edited my bashrc file to add the autocomplete functionality. That is shown below.<\/p>\n<p><span class=\"pre\"><span class=\"rte-icon-component-text\">vi ~\/.bashrc<\/span><\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security\/06-run-command-line-interface-with-hybrid-cloud-security.jpg\" alt=\"Image 6\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"31\">\n<div readability=\"7\">\n<p>This is so autocomplete automatically starts up each and every new terminal session.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security\/07-run-command-line-interface-with-hybrid-cloud-security.jpg\" alt=\"Image 7\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"37\">\n<div readability=\"19\">\n<p>As we can see above, I type in thus and then deepsecurity and hit tab and all available CLI commands are available to me. This will in turn interact with the exposed API using my credentials. Cool! So, we now know that the autocomplete portion is working. Let&#8217;s go ahead and list out all computers associated with my Trend Micro Cloud One Workload Security Subscription.<\/p>\n<p>Ok, so we can see the following command worked, and was talking properly to my Cloud One Workload Security subscription. I used the jq pipe to make the JSON returned more human readable.<\/p>\n<p><span class=\"pre\"><span class=\"rte-icon-component-text\">thus deepsecurity computers list | jq<\/span><\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security\/08-run-command-line-interface-with-hybrid-cloud-security.jpg\" alt=\"Image 8\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"35.5\">\n<div readability=\"16\">\n<p>Let&#8217;s go ahead and try another Trend Micro Cloud One service CLI command!<\/p>\n<p>In this example, I have Trend Micro Cloud One Container Image Security running inside my Microsoft Azure Subscription.<\/p>\n<p>I just want to run a quick command to get a listing of all container scans that I have in the solution in Azure and those associated results.<\/p>\n<p><span class=\"pre\"><span class=\"rte-icon-component-text\">thus smartcheck scans list | jq<\/span><\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security\/09-run-command-line-interface-with-hybrid-cloud-security.jpg\" alt=\"Image 9\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"35.5\">\n<div readability=\"16\">\n<p>Pretty cool look at that! Shows my summary information for all the container image scans.<\/p>\n<p>The last Trend Micro Cloud One service that I am going to check out is Trend Micro Cloud One Conformity.<\/p>\n<p>As a test, I wanted to get an account listing of protected accounts in my Cloud One Conformity subscription.<\/p>\n<p><span class=\"pre\"><span class=\"rte-icon-component-text\">thus cloudconformity accounts list | jq<\/span><\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security\/10-run-command-line-interface-with-hybrid-cloud-security.jpg\" alt=\"Image 10\"> <\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"33.5\">\n<div readability=\"12\">\n<p>Well, That&#8217;s a good start right??<\/p>\n<p>Pretty cool project and how you can get started running CLI commands against Trend Micro Cloud One services! Until, next time!<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <a id=\"devopsrc-313ff8\" href=\"http:\/\/cloudone.trendmicro.com\/SignUp.screen?refer=devopsrc\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/trial-banners\/cloud-one-trial-banner.jpg\" alt=\"cloud-one-trial\"> <\/a> <\/figure>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <!-- Go to www.addthis.com\/dashboard to customize your tools --> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/20\/i\/run-command-line-interface-with-hybrid-cloud-security.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how you can get started with running CLI commands against Trend Micro Cloud One\u2122 services. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43184,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9503,9501,9571,9507,9500],"class_list":["post-43183","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-devops-article","tag-trend-micro-devops-cloud-native","tag-trend-micro-devops-how-to","tag-trend-micro-devops-multi-cloud","tag-trend-micro-devops-workload-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Run Command Line Interface with Hybrid Cloud Security Solution Engineer 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Run Command Line Interface with Hybrid Cloud Security Solution Engineer 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-18T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1917\" \/>\n\t<meta property=\"og:image:height\" content=\"1014\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Run Command Line Interface with Hybrid Cloud Security Solution Engineer\",\"datePublished\":\"2020-09-18T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/\"},\"wordCount\":774,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer.jpg\",\"keywords\":[\"Trend Micro DevOps : Article\",\"Trend Micro DevOps : Cloud Native\",\"Trend Micro DevOps : How To\",\"Trend Micro DevOps : Multi Cloud\",\"Trend Micro DevOps : Workload Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/\",\"name\":\"Run Command Line Interface with Hybrid Cloud Security Solution Engineer 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer.jpg\",\"datePublished\":\"2020-09-18T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer.jpg\",\"width\":1917,\"height\":1014},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro DevOps : Article\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-article\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Run Command Line Interface with Hybrid Cloud Security Solution Engineer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Run Command Line Interface with Hybrid Cloud Security Solution Engineer 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/","og_locale":"en_US","og_type":"article","og_title":"Run Command Line Interface with Hybrid Cloud Security Solution Engineer 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-09-18T00:00:00+00:00","og_image":[{"width":1917,"height":1014,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Run Command Line Interface with Hybrid Cloud Security Solution Engineer","datePublished":"2020-09-18T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/"},"wordCount":774,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer.jpg","keywords":["Trend Micro DevOps : Article","Trend Micro DevOps : Cloud Native","Trend Micro DevOps : How To","Trend Micro DevOps : Multi Cloud","Trend Micro DevOps : Workload Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/","url":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/","name":"Run Command Line Interface with Hybrid Cloud Security Solution Engineer 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer.jpg","datePublished":"2020-09-18T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer.jpg","width":1917,"height":1014},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/run-command-line-interface-with-hybrid-cloud-security-solution-engineer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro DevOps : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-article\/"},{"@type":"ListItem","position":3,"name":"Run Command Line Interface with Hybrid Cloud Security Solution Engineer"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43183"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43183\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43184"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}