Collapse AllExpand All
  • account management [1]
  • Activation Code [1]
  • administration [1]
    • file passwords [1]
  • Advanced Threat Scan Engine [1] [2]
  • alerts [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16]
  • API key [1]
  • ATSE [1] [2]
  • average Virtual Analyzer queue time alert [1]
  • C&C list [1]
  • components [1]
  • contact management [1]
  • CPU usage alert [1]
  • critical alerts [1] [2]
  • customized alerts and reports [1]
  • dashboard [1] [2]
  • Deep Discovery Malware Pattern [1] [2]
  • detected message alert [1]
  • detection surge alert [1]
  • disk space alert [1]
  • documentation feedback [1]
  • email scanning
    • file passwords [1]
  • exceptions [1]
  • extended session timeout [1]
  • file passwords [1]
  • generated reports [1]
  • getting started tasks [1]
  • ICAP [1]
    • headers [1]
    • MIME content-types [1]
    • settings [1]
  • ICAP integration [1]
  • images [1] [2]
  • important alerts [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11]
  • informational alerts [1]
  • integration with other products [1]
  • IntelliTrap Exception Pattern [1] [2]
  • IntelliTrap Pattern [1] [2]
  • Internet Content Adaptation Protocol (ICAP) [1]
  • license [1]
  • license expiration alert [1]
  • log settings [1]
  • management console [1]
    • navigation [1]
    • session duration [1]
  • management console accounts [1]
  • message delivery alert [1]
  • Network Content Correlation Pattern [1]
  • Network Content Inspection Engine [1]
  • Network Content Inspection Pattern [1]
  • notification parameters [1]
  • on-demand reports [1]
  • preconfiguration console [1]
  • processing surge alert [1]
  • product integration [1]
  • reports [1] [2]
    • on demand [1]
  • report schedules [1]
  • sandbox analysis [1] [2]
  • sandbox error alert [1]
  • sandbox images [1] [2]
  • sandbox instances [1]
  • sandbox management [1]
    • archive passwords [1]
    • images [1]
      • importing [1]
      • modifying instances [1]
    • image status [1]
    • network connection [1] [2]
    • Virtual Analyzer status [1]
  • sandbox queue alert [1]
  • Script Analyzer Pattern [1]
  • service stopped alert [1]
  • Spyware/Grayware Pattern [1]
  • submissions [1]
  • support
    • resolve issues faster [1]
  • suspicious objects [1]
  • syslog server [1]
  • syslog settings
    • syslog server [1]
  • system maintenance [1]
    • back up tab [1]
      • configuration settings backup [1]
      • data backup [1]
    • cluster tab
    • nodes list [1]
    • restore tab [1]
  • system settings [1]
    • Network Tab [1]
    • Password Policy Tab [1]
    • power off / restart tab [1]
    • Proxy Tab [1]
    • Session Timeout Tab [1]
    • Time Tab [1]
  • tabs [1]
  • third-party licenses [1]
  • TLS [1]
  • tools [1]
  • unreachable relay MTA alert [1]
  • update completed surge [1]
  • update failed alert [1]
  • updates [1]
    • components [1]
    • firmware [1]
    • update settings [1]
  • Virtual Analyzer [1] [2]
    • file passwords [1]
  • Virtual Analyzer Configuration Pattern [1]
  • Virtual Analyzer Sensors [1]
  • watchlist alert [1]
  • widgets [1] [2]
  • YARA rule file

Getting Started Tasks Parent topic

Procedure

  1. Activate the product license using a valid Activation Code. For details, see License.
  2. Specify the Deep Discovery Analyzer host name and IP address. For details, see Network Tab.
  3. Configure proxy settings if Deep Discovery Analyzer connects to the management network or Internet through a proxy server. For details, see Proxy Tab.
  4. Configure date and time settings to ensure that Deep Discovery Analyzer features operate as intended. For details, see Time Tab.
  5. Configure SMTP settings to enable sending of notifications through email. For details, see SMTP Tab.
  6. Import sandbox instances to Virtual Analyzer. For details, see Importing an Image.
  7. Configure Virtual Analyzer network settings to enable sandbox instances to connect to external destinations. For details, see Enabling External Connections.
  8. (Optional) Deploy and configure additional Deep Discovery Analyzer appliances for use in a high availability or load-balancing cluster. For details, see Cluster Tab.
  9. Configure supported Trend Micro products for integration with Deep Discovery Analyzer. For details, see Integration with Trend Micro Products.
  10. Adjust Virtual Analyzer resource allocation between all sources by assigning weight and timeout values to all sources that submit objects to Deep Discovery Analyzer for analysis. For details, see Submitters.