Suspicious Object List Settings Screen

Suspicious objects are digital artifacts resulting from an analysis completed by Trend Micro Deep Discovery products or other sources. Endpoint Application Control can synchronize a list of suspicious objects and retrieve actions against these objects from a Control Manager server (that is connected to Deep Discovery).

Go to Administration > Suspicious Object List Settings to do the following tasks:

Task

Steps

Specify or modify Control Manager service URL where the Endpoint Application Control server synchronizes a suspicious object list

Click Edit.

Allow Endpoint Application Control to automatically synchronize a suspicious object list from the specified Control Manager server every five minutes

Click Subscribe.

Stop synchronizing for a suspicious object list

Click Unsubscribe

Disable detection and defense against suspicious objects

Click Unsubscribe and then click Delete Local List.

Immediately synchronize a list of suspicious objects from the specified Control Manager server

Click Sync Now.