Suspicious objects are digital artifacts resulting from an analysis completed by Trend Micro Deep Discovery products or other sources. Endpoint Application Control can synchronize a list of suspicious objects and retrieve actions against these objects from a Control Manager server (that is connected to Deep Discovery).
Go to Administration > Suspicious Object List Settings to do the following tasks:
Task |
Steps |
---|---|
Specify or modify Control Manager service URL where the Endpoint Application Control server synchronizes a suspicious object list |
Click Edit. |
Allow Endpoint Application Control to automatically synchronize a suspicious object list from the specified Control Manager server every five minutes |
Click Subscribe. |
Stop synchronizing for a suspicious object list |
Click Unsubscribe |
Disable detection and defense against suspicious objects |
Click Unsubscribe and then click Delete Local List. |
Immediately synchronize a list of suspicious objects from the specified Control Manager server |
Click Sync Now. |