Viewing At Risk Endpoints and Recipients

Control Manager checks Web Reputation, URL filtering, network content inspection, and rule-based detection logs received from all managed products and then compares these logs with its list of suspicious objects.

Required Products

Optional Products

  • Control Manager 7.0 (or later)

  • At least one optional product

  • Trend Micro products managed by Control Manager

  • Endpoint Sensor 1.5 (or later)

    Important:
    • Endpoint Sensor 1.5 only provides information related to the File and IP address suspicious object types.

    • Endpoint Sensor 1.6 (or later) provides information related to the File, IP address, and Domain suspicious object types.

  1. On the Control Manager console, go to Administration > Suspicious Objects > Virtual Analyzer Objects.
  2. Expand the arrow to the left of the Object you want to view.
    • The At Risk Endpoints list displays all endpoints and users still affected by the suspicious object.

      • For File detections, the Latest Action Result column displays the last action result reported from managed products.

      • For all other detection types, the Latest Action Result column displays "N/A".

    • The At Risk Recipients list displays all recipients still affected by the suspicious object.