The following table lists all options available:
Task |
Steps |
---|---|
Export All |
Click Export All to save all the objects to a CSV file. |
Add to Exception |
Select one or several objects that you consider harmless and then click Add to Exception . The objects move to the Exceptions tab. |
Never Expire |
Select one or several objects that you always want flagged as suspicious and then click Never Expire . |
Expire Now |
Select one or several objects that you want removed from the Objects tab and then click Expire Now . When the same object is detected in the future, it will be added back to the Objects tab. |
Configure Scan Action |
Select one or several objects that you want managed products to take an action against (or do not make any selection to select all objects) and then click Configure Scan Action. In the new window that opens, select the action. There are separate actions for files and IP addresses/URLs. Control Manager automatically deploys the actions to certain managed products. For a list of supported managed products, see Suspicious Object Management and Handling Process. |
Assess Impact |
Select one or several files or IP addresses and then click Assess Impact to see how many endpoints are affected by these objects. A message displays on top of the screen, informing you that impact assessment has started. Impact assessment on suspicious objects requires a Trend Micro product called Deep Discovery Endpoint Sensor. After the assessment is complete, check the At Risk Endpoints column to see the number of affected endpoints. |
Data Filters |
If there are too many entries in the table, limit the entries by performing these tasks:
|
Records and Pagination Controls |
The panel on the bottom right section of the screen shows the total number of objects. If all objects cannot be displayed at the same time, use the pagination controls to view the objects that are hidden from view. |