You can add the domain, file SHA-1, file SHA-256, IP address, sender address, or URL object to the Suspicious Objects List.
The Suspicious Object Management screen appears with the Suspicious Object List tab displayed.
The Add Suspicious Object screen appears.
Domain: type a domain name.
File SHA-1: type the SHA-1 hash value of a file.
File SHA-256: type the SHA-256 hash value of a file.
IP address: type an IPv4 or IPv6 address.
Sender address: type an email address.
URL: type a URL.
For more information, see Suspicious Object Actions.
Set the object to automatically expire in a specified number of days.
Set the object to never expire.
The object appears in the Suspicious Objects List.
The connected products receive the new object information from Trend Micro Vision One during the next synchronization.