You can protect your network from objects not yet identified on your network by adding the suspicious objects to the User-Defined Suspicious Objects list. Control Manager provides you the options to add objects based on the file, file SHA-1, domain, IP address, or URL. You can also specify the scan action that supported Trend Micro products take after detecting the suspicious objects (excluding domain objects).
The User-Defined Suspicious Objects screen appears.
File: Click Browse to upload a suspicious object file.
File SHA-1: Specify the SHA-1 hash value for the file.
IP address: Specify the IP address.
URL: Specify the URL.
Domain: Specify the domain.
Log
Block
Quarantine
This option is only available for File or File SHA-1 objects.
The object appears in the User-Defined Suspicious Objects list. Managed products that subscribe to the suspicious objects lists receive the new object information during the next synchronization.