Views:

Submit samples for analysis in a secure virtual environment.

Sandbox Analysis manages and analyzes objects submitted to the sandbox by integrated products and users.
The following table outlines the actions available on the Sandbox Analysis screen.
Action
Description
Click Submit Object to manually submit an object for analysis in the sandbox.
Set the daily reserve, view the usage guide and submission usage details, and configure global settings that affect all submissions by clicking gear_icon=fc9a51ad-35af-4fe3-92c6-5e41b2dfc5d9.pngSubmission Settings.
View the Sandbox Analysis report
Click Sandbox_Analysis_Report_icon=GUID-20231212104040.png to view the dynamic analysis for a submitted object.
Create a High-Risk Submissions report
Select Manage ReportsHigh-Risk Submissions to create a High-Risk Submissions report.
Filter submitted object data
Use the search and filters to locate specific submitted object data.
  • Object: The name of the object
  • Status: The status of the submission
  • Submitted: The date and time the object was submitted to the sandbox
  • SHA-1 hash value: The SHA-1 hash value of the object
  • Risk level: The risk level assigned to the object by the sandbox
  • Threat type: The threat type as detected by the sandbox
  • Threat name: The name of the threat as detected by the sandbox
Partial matching applies to Object, Threat type, and Threat name. Exact matching applies to SHA-1 hash value.
Refresh the table
Click refresh=5bd75452-c2fb-43ed-90e6-7b552fdc5dd2.png to refresh data displayed in the table.
Click any object name to display the object profile.
Take additional actions
Click the options=ddb0b67f-0654-4aa5-8bc7-48ec554c5448.png to select additional actions on the submitted object.
Important
Important
Downloading and re-analyzing file objects requires granting Trend Micro permission to save submitted files.
  • sandbox_analysis_threat_connect=GUID-5F89C25F-5693-4A7F-9844-10B64A9672A8=1=en-us=Low.png View on Threat Connect: Displays information about the object on Trend Micro Threat Connect
  • add_to_intelligence_reports=GUID-20230222174444.png Add to Intelligence Reports: Adds the object to Intelligence Reports and runs an auto sweep
  • investigation_package=224e6f30-a8c9-45e3-b664-8be5ed1e05da.png Download investigation package : Downloads the investigation package of submitted objects with high, medium, and low risk levels
  • download_file_obj=bdb00930-9206-4d5b-baf0-2b4cb39043bf.png Download file object: Downloads the submitted file object to your computer
    WARNING
    WARNING
    Downloading suspicious samples may potentially harm your endpoint. Ensure that you take the necessary precautions before continuing.
  • re-analyze=7d0b0a7b-0fa8-46a9-80a2-8b23a5d2b4c8.png Re-analyze: Submits the file or URL back to the Virtual Analyzer for further analysis
    Important
    Important
    Re-analysis of objects counts toward the daily reserve.
  • trash_icon=GUID-47cf6867-6315-438e-8670-86ff36f22a28.png Delete submission: Deletes the previous analysis results and any associated files from Sandbox Analysis
Comments (0)