Procedure
- Go to .
- Set the detection severity level by dragging the Detection severity slider to the desired rating.
- Select a time period.
- Click Customize Columns, select one or more optional
columns for display and click Apply to return to the
modified Affected Hosts screen.
Customize Columns Host Information Columns
Column NamePreselectedDescriptionIP AddressXIP address of the affected hostHost NameXComputer name of the hostMAC AddressMedia Access Control address of a network nodeNetwork GroupXNetwork group that an IP address/host is assignedHost SeverityXHighest impact on a host determined from aggregated detections by Trend Micro products and servicesFor details about the Host Severity scale, see Host Severity.Most Notable ThreatXThreat description of the highest severity detectionLatest DetectionXMost recent detection, based on timestamp
Note
The default IP Address, Host Severity and Latest Detection columns cannot be removed.Notable Statistics Columns
Column NamePreselectedDescriptionTargeted AttackA threat that aims to exfiltrate data from a target systemFor details, see APT Attack SequenceAttack Phase Columns
ColumnsPreselectedDescriptionIntelligence GatheringXAttackers identify and research target individuals using public sources (for example, social media websites) and prepare a customized attack.Point of EntryXThe initial compromise is typically from zero-day malware delivered via social engineering (email, IM, or drive-by download). A backdoor is created and the network can now be infiltrated. Alternatively, a website exploitation or direct network hack may be employed.C&C CommunicationXC&C communication is typically used throughout the attack, allowing the attacker to instruct and control the malware used, and to exploit compromised machines, move laterally within the network, and exfiltrate data.Lateral MovementXOnce inside the network, an attacker compromises additional machines to harvest credentials, escalate privilege levels, and maintain persistent control.Asset/Data DiscoveryXSeveral techniques (such as port scanning) are used to identify the noteworthy servers and the services that house the data of interest.Data ExfiltrationXOnce sensitive information is gathered, the data is funneled to an internal staging server where it is chunked, compressed, and often encrypted for transmission to external locations under an attacker's control.Unknown Attack PhaseXDetection is triggered by a rule that is not associated with an attack phase. - To run a basic search, do one of the following:
-
Type an IP address or host name in the search text box and press Enter.
-
Click the
icon.
By default, Deep Discovery Inspector searches Affected Hosts by IP Address and Host Name. -
- To run a saved search, go to , open the drop-down menu of the search box, and click a saved
search.Deep Discovery Inspector provides the following preset saved searches.
Preset Saved Searches
NameFilter OptionsHosts with Targeted Attack detectionsNotable events in Targeted AttackHosts with C&C Communication detectionsNotable events in C&C CommunicationHosts with Lateral Movement detectionsNotable events in Lateral Movement - To create and apply an advanced search filter, click
Advanced.For details, see Affected Hosts Advanced Search Filter.
- Click Export.The following file downloads:
-
affected_host.csv
-
