Objects in the exceptions list are automatically considered safe and are not added to the suspicious objects list. Manually add trustworthy objects or go to the Virtual Analyzer > Suspicious Objects screen and select suspicious objects that you consider harmless.
The following columns show information about objects in the exception list.
Column Name |
Information |
---|---|
Added |
Date and time Virtual Analyzer added the object to the Exceptions tab |
Type |
The object type (IP address, Domain, URL, File SHA-1, or File SHA-256 ). |
Object |
The IP address, domain, URL, or SHA-1 or SHA-256 hash value of the file |
Source |
The source (Trend Micro Vision One, Apex Central, Deep Discovery Director, or local) that added the exception |
Notes |
Notes for the object. Click the link to edit the notes. |