Consolidate suspicious object information based on input from different sources.
Suspicious objectsare known malicious or potentially malicious domains, file SHA-1, file SHA-256, IP addresses, or URLs.
Exceptionsare objects that are considered safe.
![]() |
NoteDeep Discovery Inspector retrieves the User-Defined Suspicious Objects list and the Exception list from Trend Micro Vision One, Deep Discovery Director, and Apex Central.
|
Action
|
Description
|
||
---|---|---|---|
Display the User-Defined Suspicious Objects list
|
Click on the Suspicious Objects tab to display the User-Defined Suspicious Objects list.
|
||
Display the Exceptions list
|
Click on the Exceptions tab to display the Exceptions list.
|
||
Filter object data
|
Use the search field or object type list to filter objects.
|
||
Sort list
|
Click any of the column titles to sort the User-Defined Suspicious Objects list or
the Exceptions list.
|
||
Export all synchronized data
|
On the Suspicious Objects tab, click Export All (
![]() On the Exceptions tab, click Export All (
![]() |