Web Reputation
Deep Discovery Web Inspector integrates the Trend Micro Smart Protection Network, a cloud-based infrastructure that determines the reputation of websites that users attempt to access. Deep Discovery Web Inspector logs URLs that Smart Protection technology identifies as fraudulent or known sources of threats, and uploads the logs to the Threat Management Services Portal for report generation.
Data collected | URLs |
---|---|
Console location | This feature cannot be disabled. If you do not want this data to be collected, please uninstall the application. |
Console settings |
Scan Policies
Deep Discovery Web Inspector uses scan policies to determine what incoming traffic should be scanned and the action to take if there is a policy match.
To prevent the transmission of data by scan policies, you can delete all custom policies and disable the default policy (which cannot be deleted).
Data collected |
|
---|---|
Console location | Policy > Policy > [Policy Name] |
Console settings |
Enable |
Smart Feedback
Smart Feedback enables you to participate, share, and leverage Trend Micro’s global database of threat related intelligence to rapidly identify and defend against potential threats within your unique network environment.
Data collected |
|
---|---|
Console location | This feature cannot be disabled from the product console. Contact Technical Support for assistance if you want to disable data collection from Smart Feedback. |
Console settings |
Virtual Analyzer
Virtual Analyzer is a secure virtual environment that opens suspicious files submitted by Deep Discovery Web Inspector to test for malicious behavior. Virtual Analyzer is able to find exploit code, Command & Control (C&C) and botnet connections, and other suspicious behaviors or characteristics.
Data collected |
|
---|---|
Console location | Administration > Virtual Analyzer > Images |
Console settings |
[Image Name] > Delete You must delete all images to prevent the transmission of data to Trend Micro.
|
Threat Connect
Threat Connect allows you to assess and understand the complete nature of an attack or threat based on a visual representation of relevant intelligence gathered by the Trend Micro Smart Protection Network™ and Trend Micro Threat Researchers. Threat Connect can characterize specific attack components such as malware and command & control activity, and map the complex relationships between the components.
Data collected |
|
---|---|
Console location | Detections > All Detections > [expand details] > Detection Information |
Console settings |
Threat name [link] The only way to prevent the transmission of the data back to Trend Micro servers is to not click the Threat name link.
|