Consolidate suspicious object information based on input from different sources.
Suspicious objectsare known malicious or potentially malicious domains, file SHA-1, file SHA-256, IP addresses, or URLs.
Exceptionsare objects that are considered safe.
NoteDeep Discovery Inspector retrieves the User-Defined Suspicious Objects list and the Exception list from Trend Micro Vision One, Deep Discovery Director, and Apex Central.
|
Action
|
Description
|
||
---|---|---|---|
Display the User-Defined Suspicious Objects list
|
Click on the Suspicious Objects tab to display the User-Defined Suspicious Objects list.
|
||
Display the Exceptions list
|
Click on the Exceptions tab to display the Exceptions list.
|
||
Filter object data
|
Use the search field or object type list to filter objects.
|
||
Sort list
|
Click any of the column titles to sort the User-Defined Suspicious Objects list or
the Exceptions list.
|
||
Export all synchronized data
|
On the Suspicious Objects tab, click Export All () to export all synchronized suspicious object data into a CSV file.
On the Exceptions tab, click Export All () to export all synchronized exceptions data into a CSV file.
|