Suspicious Object Management

You can manage the Suspicious Object List and Exception List to control the specific information for synchronization.

The Exception List has a higher priority than the Suspicious Object List. Objects may appear in both lists, but Trend Vision One calculates the list of effective suspicious objects before sending the information to connected products.

Trend Vision One currently supports sending the Suspicious Object List to the following products if they are connected properly:

  • Trend Micro Apex One as a Service

  • Trend Micro Cloud App Security

    By default, Suspicious Object List synchronization is disabled in the Cloud App Security console. Therefore, make sure you have enabled Suspicious Object List synchronization for Cloud App Security to receive suspicious object information.

  • Trend Cloud One - Endpoint & Workload Security

    By default, Trend Vision One Suspicious Object Management is disabled in Threat Intelligence of Endpoint & Workload Security. Therefore, make sure you have enabled the option in the Endpoint & Workload Security console to receive suspicious object information.

  • Service Gateway Management

    For more information about Service Gateway, see Service Gateway Overview.

Besides, Deep Security Software retrieves the Suspicious Object List from Trend Vision One and currently consumes the file SHA-1 objects added from Sandbox.

Note:

Make sure you have configured Deep Security Software to compare local objects against Suspicious Object List of Trend Vision One.

Internet Access in the Zero Trust Secure Access app also retrieves the Suspicious Object List to protect users' access to the internet against security threats through secure access rules.

Note:

By default, the Suspicious Object Management app does not synchronize the Suspicious Object List with Zero Trust Secure Access. Therefore, make sure you have enabled Internet Access in the Zero Trust Secure Access app to receive suspicious object information.