Views:

Threat Connect

Threat Connect allows the administrator to view related threat information from the global intelligence database.

Data is only sent when the administrator manually clicks the “View in Threat Connect” button in the “Detection Details” view.

Data collected
  • IP address
  • URL
  • host name
Console location

The user manually triggers Threat Connect connection in the “Detection Details” view of a network detection.

  • Detection Details > Connection Details
Console settings

View in Threat Connect

Threat-Connect1

Click the image to enlarge.

Data collected
  • IP address
  • URL
  • host name
Console location

The user manually triggers Threat Connect connection in the “Detection Details” view of an email detection.

  • Detection Details > Connection Details
Console settings

View in Threat Connect

Threat-Connect2

Click the image to enlarge.

Back to top

Domain Exceptions

The administrator can add domains that they consider safe to an exception list.

Data is only collected when the administrator manually adds domain names on the management console.

Data collectedDomain name
Console locationAdministration > Network Analytics > Domain Exceptions
Console settings

Domain Exceptions

Domain-Exceptions

Click the image to enlarge.

Back to top

Priority Watchlist

The administrator can add servers that they consider high-priority for tracking and reporting.

Data is only collected when the administrator manually adds IP addresses on the management console.

Data collectedIP address
Console locationAdministration > Network Analytics > Priority Watch List
Console settings

Priority Watch List

Priority-Watchlist

Click the image to enlarge.

Back to top

Registered Services

The administrator can add servers for specific services that their organization uses.

Data is only collected when the administrator manually adds domains name on the management console.

Data collectedIP address
Console locationAdministration > Network Analytics > Registered Services
Console settings

Registered Services

Registered-Services

Click the image to enlarge.

Back to top

Trusted Internal Network

The administrator can specify IP addresses or ranges to treat as part of their trusted internal network.

Data is only collected when the administrator manually adds IP addresses or ranges on the management console.

Data collected
  • IP address
Console locationAdministration > Network Analytics > Trusted Internal Network
Console settings

Trusted Internal Network

Click the image to enlarge.

Back to top

Analysis Report

The administrator can view the correlation data of a correlated event.

Data is only sent when the administrator manually clicks the “Correlation Data” icon on the “Correlated Events” screen.

Data collected
  • IP address
Console locationDetections > Correlated Events
Console settings

Analysis Report 1

Click the image to enlarge.

The administrator can view the correlation data of a synchronized suspicious object.

Data is only sent when the administrator manually clicks the “Correlation Data” icon on the “Synchronized Suspicious Objects” screen.

Data collected
  • IP address
  • URL
  • domain name
  • file SHA-1s
Console locationThreat Intelligence > Product Intelligence > Synchronized Suspicious Objects
Console settings

Analysis Report 2

Click the image to enlarge.

Back to top

RCA Report

Endpoint analysis reports can be collected from Endpoint Sensor to help with correlation.

Data is automatically collected periodically when the administrator enables retrieval of endpoint analysis reports from Apex Central on the management console.

Data collected
  • IP address
  • URL
  • domain name
  • file SHA-1
Console locationAdministration > Integrated Products/Services > Apex Central
Console settings

RCA-Report

Click the image to enlarge.

Back to top

Threat Connect in Correlative Events

Threat Connect allows the administrator to view related threat information from the global intelligence database.

Data is only sent when the administrator manually clicks the “Threat Connect” button in the “Correlation Data” view.

Data collected
  • IP address
  • domain name
Console location

The user manually triggers Threat Connect connection in the “Correlation Data” view of a correlated event.

Console settings

Threat Connect

Threat-Connect-in-Correlative-Events

Click the image to enlarge.

Back to top

Email Encryption

In the Domain List screen, the administrator can specify email domains for email encryption and an email address for receiving key files to complete the domain registration process.

In the Identification screen, the administrator can specify the email address that is used to sign messages with domains that are not part of the Domain List.

Data collected
  • Email domains
  • administrators’ email addresses
Console locationAppliances > Email Encryption
Console settings

Email Encryption1

Click the image to enlarge.

Email Encryption 2

Click the image to enlarge.

Email Encryption 3

Click the image to enlarge.

Back to top

XDR

In the status tab, users click the register button to register XDR service to connect DDI, DDD-NAaaS, and DDD to XDR.

Data collected
  • IP address
  • Host Name
Console locationAdministration > Trend Micro XDR > Status
Console settings

Register

Register

Click the image to enlarge.

Back to top