web
You’re offline. This is a read only version of the page.
close

Online Help Center

  • Search
  • Support
    • For Home
    • For Business
  • English (US)
    • Bahasa Indonesia (Indonesian)
    • Dansk (Danish)
    • Deutsch (German)
    • English (Australia)
    • English (US)
    • Español (Spanish)
    • Français (French)
    • Français Canadien
      (Canadian French)
    • Italiano (Italian)
    • Nederlands (Dutch)
    • Norsk (Norwegian)
    • Polski (Polish)
    • Português - Brasil
      (Portuguese - Brazil)
    • Português - Portugal
      (Portuguese - Portugal)
    • Svenska (Swedish)
    • ภาษาไทย (Thai)
    • Tiếng Việt (Vietnamese)
    • Türkçe (Turkish)
    • Čeština (Czech)
    • Ελληνικά (Greek)
    • Български (Bulgarian)
    • Русский (Russian)
    • עברית (Hebrew)
    • اللغة العربية (Arabic)
    • 日本語 (Japanese)
    • 简体中文
      (Simplified Chinese)
    • 繁體中文
      (Traditional Chinese)
    • 繁體中文 HK
      (Traditional Chinese)
    • 한국어 (Korean)
  • Online Help Center
  • Deep Discovery and Web Security
  • Deep Discovery Director - Network Analytics
  • Deep Discovery Director - Network Analytics 3.0 SP1 Installation and Deployment Help
  • Using Correlation Data for Advanced Threat Analysis
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
  • Preface
    • Documentation
    • Audience
    • Document Conventions
    • About Trend Micro
  • Introduction
    • Overview of Deep Discovery Director - Network Analytics
  • Deployment
    • Deployment Overview of Integrated Solution
    • Pre-deployment Checklist
    • System Requirements
    • Deep Discovery Director IP Address/API Key
    • Installation
    • Initial Setup Using the Preconfiguration Console
    • Registering to Deep Discovery Director
    • Moving the Appliance to a Managed Group
  • Getting Started
    • Accessing the Settings Screen
    • Activating Your Product License
    • Registering to Deep Discovery Inspector
    • Adding as a Syslog Server
    • Configuring Settings
      • Configuring the Domain Exception List
      • Configuring the Priority Watch List
      • Configuring the Registered Services Lists
      • Configuring the Trusted Internal Networks List
      • Configuring SMTP Settings
      • (Optional) Modifying Network Settings
      • (Optional) Configuring Proxy Settings
      • Configuring Time Zone and NTP Settings
      • Configuring Alert Settings
        • Alerts
      • Configuring Storage Retention Settings
      • (Optional) Configuring Disk Space
      • Configuring Automatic Backups
    • Performing Additional Tasks
      • Viewing Triggered Alerts
      • Viewing Your Product License
  • Using Correlation Data for Advanced Threat Analysis
    • Viewing Correlation Data
      • Supported Protocols
      • Viewing Correlation Data from Correlated Events
      • Viewing Correlation Data for Suspicious Objects
    • Analyzing Correlation Data Information
      • Overview of the Correlation Data Screen
        • Dynamic Correlation Data Analysis
      • Reviewing the Correlation Data Summary
      • Analysis Using the Correlation Data Graph
      • Analysis Using Transaction Data
    • Configuring Incident Report Email Notifications
  • Updating Deep Discovery Director - Network Analytics
    • Hotfixes and Patches Overview
    • Uploading a Hotfix / Critical Patch / Firmware File
    • Adding a Hotfix / Critical Patch / Firmware Deployment Plan
    • Synchronizing Modifications
  • Backing Up or Restoring a Configuration
    • Settings That Are Backed Up or Restored
    • Manually Exporting a Backup
    • Configuring Automatic Backups
    • Restoring from Backup
  • Technical Support
    • Troubleshooting Resources
      • Using the Success Portal
      • Threat Encyclopedia
    • Contacting Trend Micro
      • Speeding Up the Support Call
    • Sending Suspicious Content to Trend Micro
      • Email Reputation Services
      • File Reputation Services
      • Web Reputation Services
    • Other Resources
      • Download Center
Using Correlation Data for Advanced Threat Analysis
  • Viewing Correlation Data
  • Analyzing Correlation Data Information
Related information
  • Viewing Correlation Data
  • Analyzing Correlation Data Information
  • Configuring Incident Report Email Notifications
Was this article helpful?

Please share more details.

Please share more details.

Please share more details.

Please share more details.

Online Help Center

Support
For Home For Business


Privacy Notice
© 2025 Trend Micro Incorporated. All rights reserved.
Table of Contents
  • Preface
    • Documentation
    • Audience
    • Document Conventions
    • About Trend Micro
  • Introduction
    • Overview of Deep Discovery Director - Network Analytics
  • Deployment
    • Deployment Overview of Integrated Solution
    • Pre-deployment Checklist
    • System Requirements
    • Deep Discovery Director IP Address/API Key
    • Installation
    • Initial Setup Using the Preconfiguration Console
    • Registering to Deep Discovery Director
    • Moving the Appliance to a Managed Group
  • Getting Started
    • Accessing the Settings Screen
    • Activating Your Product License
    • Registering to Deep Discovery Inspector
    • Adding as a Syslog Server
    • Configuring Settings
      • Configuring the Domain Exception List
      • Configuring the Priority Watch List
      • Configuring the Registered Services Lists
      • Configuring the Trusted Internal Networks List
      • Configuring SMTP Settings
      • (Optional) Modifying Network Settings
      • (Optional) Configuring Proxy Settings
      • Configuring Time Zone and NTP Settings
      • Configuring Alert Settings
        • Alerts
      • Configuring Storage Retention Settings
      • (Optional) Configuring Disk Space
      • Configuring Automatic Backups
    • Performing Additional Tasks
      • Viewing Triggered Alerts
      • Viewing Your Product License
  • Using Correlation Data for Advanced Threat Analysis
    • Viewing Correlation Data
      • Supported Protocols
      • Viewing Correlation Data from Correlated Events
      • Viewing Correlation Data for Suspicious Objects
    • Analyzing Correlation Data Information
      • Overview of the Correlation Data Screen
        • Dynamic Correlation Data Analysis
      • Reviewing the Correlation Data Summary
      • Analysis Using the Correlation Data Graph
      • Analysis Using Transaction Data
    • Configuring Incident Report Email Notifications
  • Updating Deep Discovery Director - Network Analytics
    • Hotfixes and Patches Overview
    • Uploading a Hotfix / Critical Patch / Firmware File
    • Adding a Hotfix / Critical Patch / Firmware Deployment Plan
    • Synchronizing Modifications
  • Backing Up or Restoring a Configuration
    • Settings That Are Backed Up or Restored
    • Manually Exporting a Backup
    • Configuring Automatic Backups
    • Restoring from Backup
  • Technical Support
    • Troubleshooting Resources
      • Using the Success Portal
      • Threat Encyclopedia
    • Contacting Trend Micro
      • Speeding Up the Support Call
    • Sending Suspicious Content to Trend Micro
      • Email Reputation Services
      • File Reputation Services
      • Web Reputation Services
    • Other Resources
      • Download Center
Close