You can protect your network from objects not yet
identified on your network by adding the suspicious objects to the User-Defined
Suspicious Object list. Apex
Central provides you the options to add objects based on the
file, file SHA-1, domain, IP address, or URL. You can also specify the scan action
that supported Trend Micro products perform after detecting the suspicious
objects.
For more information, see the following topics:
Procedure
- Go to .The Custom Intelligence screen appears.
- Click the User-Defined Suspicious Objects
tab.The User-Defined Suspicious Object list appears.
- Click Add.
- Specify the Type of object.
-
File: Click Browse to upload a suspicious object file.
-
File: Specify the File SHA-1 hash value for the file.
-
IP address: Specify the IP address.
-
URL: Specify the URL.
-
Domain: Specify the domain.
-
- Specify the Scan action that supported
products take after detecting the object.
-
Log
-
Block
-
Quarantine
Note
This scan action is only available for File or File SHA-1 objects.
-
- (Optional) Specify a Note to assist in identifying the suspicious object.
- (Optional) Specify the expiration date.
- Click Add.The object appears in the User-Defined Suspicious Object list. Managed products that subscribe to the suspicious objects lists receive the new object information during the next synchronization.