Views:
Deep Discovery Email Inspector can synchronize suspicious objects with an external source (for example, Trend Vision One, Trend Micro Apex Central, Deep Discovery Director, or Deep Discovery Analyzer). View synchronized suspicious objects to understand your risk, find related messages, and assess the relative prevalence of the suspicious object.
Note
Note
  • If Deep Discovery Email Inspector is registered to both Trend Micro Apex Central and Deep Discovery Director 3.0 (or later), Deep Discovery Email Inspector synchronizes suspicious objects from Deep Discovery Director and overwrites existing suspicious objects from Trend Micro Apex Central.
  • If you register Deep Discovery Email Inspector to Trend Vision One, Deep Discovery Director 3.0 (or later), and Trend Micro Apex Central, Deep Discovery Email Inspector synchronizes suspicious objects and exception lists with the integrated products in the following priority: Trend Vision One, Deep Discovery Director, Trend Micro Apex Central.

Procedure

  1. Go to DetectionsSuspicious ObjectsSynchronized Suspicious Objects.
  2. Specify the search criteria.
    • Suspicious Object (IP address, host name, URL, sender, file SHA-1, or file SHA-256)
    • Period (time range to filter based on the last synchronized time)
  3. Press ENTER.
    All suspicious objects matching the search criteria appear.
  4. View the results.
    Header
    Description
    Suspicious Object
    The object associated with the synchronized suspicious object:
    • IP address
    • Host name
    • URL
    • Sender
    • File SHA-1
    • File SHA-256
    Type
    The suspicious object type:
    • Domain
    • File
    • IP
    • Sender
    • URL
    Risk Level
    View the level of potential danger in a sample after Virtual Analyzer executes the file or opens the URL.
    Source
    The source of the synchronized suspicious object:
    • Trend Vision One
    • Trend Micro Apex Central
    • Deep Discovery Analyzer
    • Deep Discovery Director
    User-Defined
    Whether the synchronized suspicious object is user-defined or not.
    Expiration
    The date and time the object is not considered suspicious.
    Last Synchronized
    The date and time the entry was last synchronized with the source.