Deep Discovery Web
Inspector can synchronize suspicious objects with an external source
(either Trend Micro Apex Central or Deep Discovery Director). View synchronized suspicious
objects to understand your risk and assess the relative prevalence of the suspicious
object.
NoteYou can use only one of Trend Micro Apex Central or Deep Discovery Director as a source for synchronized
suspicious objects with Deep Discovery Web
Inspector at any given time. You cannot register Deep Discovery Web
Inspector with both
products at the same time. If Deep Discovery Web
Inspector is already registered with one of the two sources, you
cannot register with the other source until you unregister the currently
registered product.
|
Procedure
- Go to .
- Filter the suspicious object results.
- Specify the search criteria by suspicious object type or time
period.
-
Type (All, File, IP Address, URLs, or Domains)
-
Period (Last 4 hours, Last 24 hours, Last 7 days, Last 30 days, Last 90 days, Custom range)The chosen period represents the last synchronization time.
When specifying a type or period, Deep Discovery Web Inspector dynamically filters the results. -
- Filter the results by entering the search criteria in the search box (IP address, domain, URL, or file SHA-1) and then press ENTER.
All detections matching the search criteria appear. - Specify the search criteria by suspicious object type or time
period.
- View the results.HeaderDescriptionSuspicious ObjectView the IP address, domain, URL, or file SHA-1 associated with the synchronized suspicious object.TypeView the suspicious object type (File, IP address, URL, or Domain).Risk LevelView the level of potential danger in an suspicious object.SourceView the source of the synchronized suspicious object.The source can be one of the following:
-
Trend Micro Apex Central
-
Deep Discovery Director
User DefinedView whether the synchronized suspicious object is user-defined or not.ExpirationView the date and time the object is not considered suspicious.Last SynchronizedView the date and time the entry was last synchronized with the source. -
Next steps
You can add synchronized suspicious objects to the Blocked/Approved Lists. See Adding Synchronized Suspicious Objects to
the Approved/Blocked Lists.
