Views:
Suspicious objects are digital artifacts resulting from an analysis completed by Trend Micro Deep Discovery products or other sources. Trend Micro Apex One can synchronize the Suspicious Object lists and retrieve actions against these objects from one of the following sources:
  • Apex Central
  • Deep Discovery Analyzer 5.1 (or later)
  • A Control Manager 7.0 (or later) or the Apex Central 2019 (or later) on-premises server (that is connected to Deep Discovery)
Note
Note
  • You must subscribe Trend Micro Apex One to a suspicious object source to synchronize the Suspicious Object lists.
  • If Trend Micro Apex One is subscribed to Deep Discovery Analyzer, only the suspicious URL list is available.
After you subscribe Trend Micro Apex One to a suspicious object source, select the types of suspicious objects to monitor for C&C callbacks or possible targeted attacks identified by agents on the network. Suspicious objects include:
  • Suspicious URL List
  • Suspicious IP List
  • Suspicious File List
  • Suspicious Domain List