Deep Discovery Trend Micro
Deep Discovery Trend Micro
es ns pc
Endpoint Security Network Security Protected Cloud
Trend Micro Incorporated reserves the right to make changes to this
document and to the product described herein without notice. Before
installing and using the product, review the readme files, release notes,
and/or the latest version of the applicable documentation, which are
available from the Trend Micro website at:
http://docs.trendmicro.com
Trend Micro, the Trend Micro t-ball logo, Deep Discovery Inspector, Apex
Central, and Trend Micro Control Manager are trademarks or registered
trademarks of Trend Micro Incorporated. All other product or company
names may be trademarks or registered trademarks of their owners.
Copyright © 2020. Trend Micro Incorporated. All rights reserved.
Document Part No.: APEM59037/20072
Release Date: August 2020
Protected by U.S. Patent No.: 8595840; 8925074; 7707635; 8505094
This documentation introduces the main features of the product and/or
provides installation instructions for a production environment. Read
through the documentation before installing or using the product.
Detailed information about how to use specific features within the product
may be available at the Trend Micro Online Help Center and/or the Trend
Micro Knowledge Base.
Trend Micro always seeks to improve its documentation. If you have
questions, comments, or suggestions about this or any Trend Micro
document, please contact us at [email protected].
Evaluate this documentation on the following site:
https://www.trendmicro.com/download/documentation/rating.asp
Privacy and Personal Data Collection Disclosure
Certain features available in Trend Micro products collect and send feedback
regarding product usage and detection information to Trend Micro. Some of
this data is considered personal in certain jurisdictions and under certain
regulations. If you do not want Trend Micro to collect personal data, you
must ensure that you disable the related features.
The following link outlines the types of data that Deep Discovery Inspector
collects and provides detailed instructions on how to disable the specific
features that feedback the information.
https://success.trendmicro.com/data-collection-disclosure
Data collected by Trend Micro is subject to the conditions stated in the Trend
Micro Privacy Notice:
https://www.trendmicro.com/privacy
Table of Contents
Chapter 1: Introduction
About Deep Discovery Inspector .......................................... 1-2
What's New ........................................................................ 1-2
Features and Benefits .......................................................... 1-3
Threat Management Capabilities ................................... 1-4
APT Attack Sequence .................................................... 1-4
Host Severity ................................................................ 1-6
Advanced Threat Scan Engine ....................................... 1-9
Virtual Analyzer ........................................................... 1-9
Chapter 3: Dashboard
Dashboard Overview ........................................................... 3-2
Tabs ................................................................................... 3-3
Tab Tasks ..................................................................... 3-3
Adding/Modifying Tabs ................................................. 3-3
Moving Tabs ................................................................. 3-6
Closing/Deleting Tabs ................................................... 3-6
i
DDI AG - Deep Discovery Inspector Administrators Guide
Chapter 4: Detections
About the Detections Screen ................................................ 4-2
Affected Hosts .................................................................... 4-3
Display Options and Search Filters ................................. 4-3
Viewing Affected Hosts ................................................. 4-6
Viewing Affected Hosts - Host Details ........................... 4-11
Viewing Affected Hosts - Detection Details ................... 4-15
Affected Hosts Advanced Search Filter ......................... 4-30
C&C Callback Addresses .................................................... 4-54
Viewing C&C Callback Addresses ................................. 4-54
Suspicious Objects ............................................................ 4-56
Viewing Suspicious Objects ......................................... 4-56
Retro Scan ........................................................................ 4-58
Retro Scan and the Smart Protection Network ............... 4-59
ii
Table of Contents
Chapter 5: Reports
About Reports .................................................................... 5-2
Scheduled Reports .............................................................. 5-4
Schedules ........................................................................... 5-6
Scheduling a Report ...................................................... 5-7
Deleting a Report Schedule .......................................... 5-10
On-demand Reports .......................................................... 5-10
Generating an On-demand Report ................................ 5-12
Deleting an On-demand Report .................................... 5-14
Customization .................................................................. 5-14
Customizing Reports ................................................... 5-15
Chapter 6: Administration
Updates .............................................................................. 6-2
Component Updates ..................................................... 6-2
Product Updates ........................................................... 6-8
Notifications ..................................................................... 6-17
Configuring Threat Detection Notifications .................. 6-18
Configuring High Risk Hosts Detections Notifications ... 6-20
Configuring Suspicious Hosts Detections Notifications .. 6-24
Configuring High Network Traffic Notifications ............ 6-26
Configuring Unanalyzed Sample Detections Notifications
................................................................................... 6-28
Configuring Virtual Analyzer Detections Notifications ... 6-31
iii
DDI AG - Deep Discovery Inspector Administrators Guide
iv
Table of Contents
Chapter 7: Troubleshoot
Frequently Asked Questions (FAQs) ...................................... 7-2
FAQs - Appliance Rescue ............................................... 7-2
FAQs - Configuration ..................................................... 7-3
FAQs - Detections .......................................................... 7-3
FAQs - Installation ........................................................ 7-3
v
DDI AG - Deep Discovery Inspector Administrators Guide
Appendices
Appendix A: Virtual Analyzer Supported File Types
vi
Table of Contents
vii
Preface
Preface
This Guide introduces Trend Micro™ Deep Discovery™ Inspector 5.7.
Learn more about the following topics:
• Documentation on page x
• Audience on page xi
• Document Conventions on page xi
ix
DDI AG - Deep Discovery Inspector Administrators Guide
Documentation
The documentation set for Deep Discovery Inspector includes the following:
Table 1. Product Documentation
Document Description
AWS Deployment Guide The AWS Deployment Guide contains information about
requirements and procedures for planning deployment,
deploying, and troubleshooting Deep Discovery Inspector
deployment on AWS.
Installation and Deployment The Installation and Deployment Guide contains information
Guide about requirements and procedures for planning deployment,
installing Deep Discovery Inspector, and using the
Preconfiguration Console to set initial configurations and
perform system tasks.
Syslog Content Mapping The Syslog Content Mapping Guide provides information about
Guide log management standards and syntaxes for implementing
syslog events in Deep Discovery Inspector.
Quick Start Card The Quick Start Card provides user-friendly instructions on
connecting Deep Discovery Inspector to your network and on
performing the initial configuration.
x
Preface
Document Description
View and download product documentation from the Trend Micro Online
Help Center:
https://docs.trendmicro.com/en-us/home.aspx
Audience
The Deep Discovery Inspector documentation is written for IT
administrators and security analysts. The documentation assumes that the
reader has an in-depth knowledge of networking and information security,
including the following topics:
• Network topologies
• Database management
• Antivirus and content security protection
The documentation does not assume the reader has any knowledge of
sandbox environments or threat event correlation.
Document Conventions
The documentation uses the following conventions:
xi
DDI AG - Deep Discovery Inspector Administrators Guide
Convention Description
Monospace Sample command lines, program code, web URLs, file names,
and program output
Configuration notes
Note
Recommendations or suggestions
Tip
xii
Chapter 1
Introduction
Learn about product features, capabilities, and security technology in the
following topics:
• About Deep Discovery Inspector on page 1-2
• Features and Benefits on page 1-3
• Threat Management Capabilities on page 1-4
• APT Attack Sequence on page 1-4
• Host Severity on page 1-6
• Advanced Threat Scan Engine on page 1-9
• Virtual Analyzer on page 1-9
1-1
DDI AG - Deep Discovery Inspector Administrators Guide
What's New
Deep Discovery Inspector 5.7 includes the following new features.
Table 1-1. Deep Discovery Inspector 5.7 New Features
SAML for single sign-on Deep Discovery Inspector supports the Security Assertion Markup
(SSO) Language (SAML) authentication standard using Okta and Active
Directory Federation Services (ADFS) identify providers to allow
users to single sign-on to the Deep Discovery Inspector console
when they sign in to their organization's portal.
Enhanced Virtual Analyzer The internal Virtual Analyzer has been enhanced. This release
adds the following features:
• Image support for Windows 10 19H1 and 19H2, and Windows
Server 2019
• Infection chain graphic for detected malware in analysis
reports
1-2
Introduction
JA3 and JA3S Detection Deep Discovery Inspector provides the option to create detection
Exception exceptions for JA3 and JA3S detections
Enhanced Inline Product This release adds the following features for Inline product
Integration integration:
• Object synchronization frequency setting for all supported
inline products
• Object expiration for Trend Micro TippingPoint Security
Management System
• Support for Palo Alto PAN-OS 9.0
Deep Discovery Director – Deep Discovery Inspector supports integration of Deep Discovery
Network Analytics On- Director – Internal Network Analytics and Deep Discovery Director
premises Support - Standalone Network Analytics
1-3
DDI AG - Deep Discovery Inspector Administrators Guide
Capability Description
Expanded APT and targeted Deep Discovery Inspector detection engines deliver expanded
attack detection APT and targeted attack detection including custom sandbox
analysis. New discovery and correlation rules detect malicious
content, communication, and behavior across every stage of an
attack sequence.
Visibility, analysis, and Using an intuitive multi-level format, the Deep Discovery
action Inspector management console provides real-time threat
visibility and analysis. This allows security professionals to
focus on the real risks, perform forensic analysis, and rapidly
implement containment and remediation procedures.
1-4
Introduction
In targeted attacks, the APT life cycle follows a continuous process of six key
phases.
Table 1-3. APT Attack Sequence
Phase Description
Intelligence Gathering Identify and research target individuals using public sources (for
example, social media websites) and prepare a customized attack
Point of Entry An initial compromise typically from zero-day malware delivered via
social engineering (email/IM or drive-by download)
A backdoor is created and the network can now be infiltrated.
Alternatively, a website exploitation or direct network hack may be
employed.
Command & Control Communications used throughout an attack to instruct and control
(C&C) the malware used
Communication
C&C communication allows the attacker to exploit compromised
machines, move laterally within the network, and exfiltrate data.
Asset/Data Discovery Several techniques (for example, port scanning) used to identify
noteworthy servers and services that house data of interest
1-5
DDI AG - Deep Discovery Inspector Administrators Guide
Host Severity
In Deep Discovery Inspector, host severity is the impact on a host as
determined from aggregated detections by Trend Micro products and
services.
Investigating beyond event security, the host severity numerical scale
exposes the most vulnerable hosts and allows you to prioritize and quickly
respond.
Host severity is based on the aggregation and correlation of the severity of
the events that affect a host. If several events affect a host and have no
detected connection, the host severity will be based on the highest event
severity of those events. However, if the events have a detected correlation,
the host severity level will increase accordingly.
For example: Of five events affecting a host, the highest risk level is
moderate. If the events have no correlation, the host severity level will be
based on the moderate risk level of that event. However, if the events are
correlated, then the host severity level will increase based on the detected
correlation.
The host severity scale consolidates threat information from multiple
detection technologies and simplifies the interpretation of overall severity.
You can prioritize your responses based on this information and your related
threat response policies.
1-6
Introduction
1-7
DDI AG - Deep Discovery Inspector Administrators Guide
1-8
Introduction
Virtual Analyzer
Virtual Analyzer is a secure virtual environment that manages and analyzes
objects submitted by integrated products, administrators, and investigators.
Custom sandbox images enable observation of files, URLs, registry entries,
API calls, and other objects in environments that match your system
configuration.
Virtual Analyzer performs static and dynamic analysis to identify an object's
notable characteristics in the following categories:
• Anti-security and self-preservation
1-9
DDI AG - Deep Discovery Inspector Administrators Guide
1-10
Chapter 2
Get Started
Learn about the Deep Discovery Inspector management console and basic
appliance settings in the following topics:
• Preconfiguration Console on page 2-2
• Get Started Tasks on page 2-2
• Management Console on page 2-3
• Network on page 2-9
2-1
DDI AG - Deep Discovery Inspector Administrators Guide
Preconfiguration Console
The Deep Discovery Inspector Preconfiguration Console is a terminal
communications program used to configure the network and system settings
that are required to access the Deep Discovery Inspector management
console.
For details, see the Deep Discovery Inspector Installation and Deployment Guide.
For information on the settings you need to configure, refer to the help
topics for each step below.
Procedure
5. Update components.
2-2
Get Started
Management Console
Deep Discovery Inspector provides a built-in online management console for
viewing system status, configuring and viewing threat detections and logs,
running reports, administering Deep Discovery Inspector, updating
components, and obtaining help.
2-3
DDI AG - Deep Discovery Inspector Administrators Guide
# UI Element Description
1. Account name and basic Basic user account operations are located under the
user account operations account name in the upper right corner of the
management console screen and include the following:
• Change Password
Note
The passwords of non-local accounts
cannot be changed from the management
console.
• Log Off
3. Main screen tabs The management console includes the following tabs:
• Dashboard
• Detections
• Reports
• Administration
• Help
• Google™ Chrome™
• Mozilla™ Firefox™
2-4
Get Started
• Microsoft™ Edge
Procedure
2. Set the Internet security level to Medium and enable ActiveX Binary and
Script Behaviors to make sure that tool tips and reports appear.
https://192.168.252.1/index.html
Note
The URL is case sensitive.
admin
admin
2-5
DDI AG - Deep Discovery Inspector Administrators Guide
Important
After changing the Deep Discovery Inspector appliance IP address, update
browser bookmarks to reflect the new IP address.
Note
The passwords of non-local accounts cannot be changed from the management
console.
2-6
Get Started
Note
The passwords of non-local accounts cannot be changed from the management
console.
Tip
For added security, change the Deep Discovery Inspector password
periodically.
Tip
An administrator password can also be reset on the Accounts screen.
Procedure
1. On any Deep Discovery Inspector main screen, at the top-right corner,
open the drop-down menu under your account name.
2-7
DDI AG - Deep Discovery Inspector Administrators Guide
Note
The passwords of non-local accounts cannot be changed from the management
console.
Tip
For added security, change the Deep Discovery Inspector password
periodically.
Procedure
1. On any Deep Discovery Inspector main screen, at the top-right corner,
open the drop-down menu under your account name.
2-8
Get Started
5. Click Save.
Procedure
1. On the Log On screen, select a service name from the drop-down list.
Network
Go to Administration > System Settings > Network to manage the Deep
Discovery Inspector appliance network settings.
2-9
DDI AG - Deep Discovery Inspector Administrators Guide
Deep Discovery Inspector uses a management port and several data ports.
Go to Administration > System Settings > Network Interface to do the view
the status of these ports.
Procedure
2-10
Get Started
Important
The host name must be resolvable within your network.
Note
Deep Discovery Inspector requires its own IP address to ensure that the
management port can access the management console. To enable a DHCP
server on your network to dynamically assign an IP address to Deep
Discovery Inspector, select Dynamic IP address (DHCP). Otherwise, select
Static IP address.
2-11
DDI AG - Deep Discovery Inspector Administrators Guide
Important
The appliance must be restarted after Always use TLS 1.2 or above is
enabled or disabled.
When enabled, Deep Discovery Inspector cannot connect to products/
services that do not support TLS 1.2 and above.
2-12
Get Started
Note
To be compliant with the Payment Card Industry Data Security Standard
(PCI-DSS) v3.2, the appliance should use TLS 1.2 or above for all inbound
and outbound connections.
Ensure that the integrated products and services are using the latest
version that support TLS 1.2 or above. For details, see TLS Support for
Integrated Products/Services on page C-1.
Verify that the following products/services are configured to use TLS 1.2 or
above.
• The ActiveUpdate server source at Administration > Updates >
Component Updates > Source must use HTTPS.
• The Apex Central server address at Administration > Integrated
Products/Services > Apex Central must use HTTPS.
• The syslog servers at Administration > Integrated Products/Services
> Syslog must use SSL.
• The SMTP server at Administration > System Settings > SMTP must
use SSL/TLS or STARTTLS.
• The Threat Intelligence Sharing service at Administration >
Integrated Products/Services > Threat Intelligence Sharing must
use only HTTPS (disable Share information using HTTP).
8. Click Save.
2-13
DDI AG - Deep Discovery Inspector Administrators Guide
Appliance Host Name The host name can contain alphanumeric characters and dashes
Format ("A-Z", "a-z", "0-9", "-").
2-14
Get Started
Subnet Prefix Format IPv6 addresses convert groups of bits into groups of hexadecimal
digits, separated by colons. The high-order bits on the left of an
IPv6 address specify the network, the rest specify particular
addresses in that network. All the addresses in one network have
the same first N bits, called the "prefix".
Use "/N" to denote a prefix N bits long.
IPv6 address subnet prefix example:
• For 2001:db8::/32, the prefix is /32 and is 32 bits long.
This example means all addresses where the first 32 bits are
2001:db8.
Default Gateway Address The gateway must be in the same subnet as the IP address.
Format
Procedure
2-15
DDI AG - Deep Discovery Inspector Administrators Guide
Note
When this option is enabled, Deep Discovery Inspector additionally
checks the VLAN ID of each stream to differentiate TCP connections.
2-16
Chapter 3
Dashboard
Learn about the information that displays on the Dashboard tab in the
following sections:
• Dashboard Overview on page 3-2
• Tabs on page 3-3
• Widgets on page 3-7
• About Deep Discovery Inspector Widgets on page 3-8
• Deep Discovery Inspector Widgets on page 3-9
• Deep Discovery Inspector Default Widget Tabs on page 3-12
• Optional Widgets on page 3-31
3-1
DDI AG - Deep Discovery Inspector Administrators Guide
Dashboard Overview
Monitor your network integrity with the dashboard.
• Summary graphs
3-2
Dashboard
Tabs
Tabs provide a container for widgets.
Tab Tasks
Table 3-1. Tab Tasks
Task Steps
Add a tab Click the plus icon at the top of the dashboard. For details, see
Adding/Modifying Tabs on page 3-3.
Edit tab settings Click Tab Settings. For details, see Adding/Modifying Tabs on page
3-3.
Move tab Drag-and-drop to change a tab's position. For details, see Moving
Tabs on page 3-6.
Important
Deleting a tab deletes all the widgets contained in the tab.
Adding/Modifying Tabs
Procedure
1. To add a new tab or modify an existing tab, perform one of the following
tasks:
3-3
DDI AG - Deep Discovery Inspector Administrators Guide
• To add a new tab, go to the Dashboard screen and click the tab with
the + icon.
The New Tab window appears.
3-4
Dashboard
Note
The auto-fit function is affected by the selected layout and the amount of
widgets added in the tab. Deep Discovery Inspector applies auto-fit only
when auto-fit is enabled and the widgets are arranged one widget per row.
3. Click Save.
The updated tab appears on the Dashboard screen.
3-5
DDI AG - Deep Discovery Inspector Administrators Guide
Moving Tabs
Procedure
1. Go to Dashboard.
Note
All widgets contained by a tab move with the tab.
Closing/Deleting Tabs
On the dashboard, select the tab you wish to close or delete.
Important
Deleting a tab deletes all the widgets contained in the tab.
Procedure
1. To close or delete a tab, click the icon beside the tab title.
3-6
Dashboard
Widgets
Widgets are the core components of the dashboard. Widgets contain visual
charts and graphs that allow you to track threats and associate them with the
logs accumulated from one or several sources.
Widgets can be customized to provide a clear snapshot of network health and
vulnerabilities. For details, see Widget Tasks on page 3-7.
Widget Tasks
Table 3-2. Widget Tasks
Task Steps
Note
Widget views refresh automatically. Different widgets have
different refresh times.
Procedure
1. Go to the Dashboard screen and click Add Widgets.
3-7
DDI AG - Deep Discovery Inspector Administrators Guide
3-8
Dashboard
Tab Description
Summary This tab contains widgets that display hosts requiring priority attention and
other detailed, actionable information. For details, see Summary on page
3-12.
Threat This tab contains widgets that display real-time threat data to help
Monitoring administrators identify affected hosts and network threat distribution. For
details, see Threat Monitoring on page 3-17.
Virtual This tab contains widgets that display the top suspicious files, top hosts with
Analyzer Status Virtual Analyzer detections, top malicious sites analyzed by Virtual Analyzer,
and Virtual Analyzer status and detections. For details, see Virtual Analyzer
Status on page 3-20.
Top Trends This tab contains widgets that display summary information for eight
predefined threat types. For details, see Top Trends on page 3-26.
System Status This tab contains widgets that display basic Deep Discovery Inspector
statuses including: CPU usage, disk usage, and memory usage. For details,
see System Status on page 3-29.
Optional, undisplayed widgets may be added to any widget tab. For details,
see Adding Widgets to the Dashboard on page 3-7.
For widgets that display threat data, see All Detections - Detection Details -
Detection Information on page 4-75 to view a list of displayed threat types.
Widget Description
Threats at a Glance This widget displays actionable information about six key metrics
and links to the corresponding detection logs.
3-9
DDI AG - Deep Discovery Inspector Administrators Guide
Widget Description
Top Affected Hosts This widget displays hosts with the highest severity rating by
severity in the past 1 hour/24 hours/7 days/30 days.
Threat Summary This widget displays the threat count of various threat types within
the past 24 hours/7 days/30 days.
Malicious Scanned This widget displays real-time total and malicious scanned traffic
Network Traffic volume detected by Deep Discovery Inspector by HTTP, SMTP, and
other traffic, in hours.
Scanned Traffic by This widget displays total traffic volume by protocol, in the past 1
Protocol Type hour/24 hours/7 days/30 days.
Widget Description
Threat Geographic Map This widget displays a graphical representation of the affected hosts
on a virtual world map within the past hour/current day/past 7 days/
past 30 days.
Monitored Network This widget displays the total size of network traffic across the
Traffic in Past 30 Days mirrored switch in the past 30 days.
Widget Description
Top Hosts with Virtual This widget displays the top affected hosts analyzed by Virtual
Analyzer Detections Analyzer based on the number of detections, in the past 1 hour/24
hours/7 days/30 days.
Top Malicious Sites This widget displays top malicious sites analyzed by Virtual Analyzer
Analyzed by Virtual by detection and affected host count, in the past 1 hour/24 hours/7
Analyzer days/30 days.
Top Suspicious Files This widget displays top suspicious files analyzed by Virtual Analyzer
by detection and affected host count, in the past 1 hour/24 hours/7
days/30 days.
Virtual Analyzer This widget displays the status of Virtual Analyzer, including Virtual
Analyzer threat analysis results within the past 1 hour/24 hours/7
days/30 days.
3-10
Dashboard
Widget Description
Top Disruptive This widget displays the most detected disruptive applications
Applications within the past 1 hour/24 hours/7 days/30 days.
Top Malicious URLs This widget displays the most detected malicious URLs within the
Detected past 1 hour/24 hours/7 days/30 days.
Widget Description
CPU Usage This widget displays real-time CPU consumption for each CPU used
by Deep Discovery Inspector.
The indicator color is green if CPU usage is 85% or less. It turns
yellow when CPU usage is between 85% and 95%, and red if more
than 95%.
Disk Usage This widget displays real-time disk usage for all disks. Green
indicates the amount of disk space (in GB) being used. Blue
indicates the amount of available disk space (in GB).
Memory Usage This widget displays real-time memory usage. Green indicates the
amount (in GB) of memory being used. Blue indicates the amount
(in GB) of available memory.
Memory usage information is also available on the Preconfiguration
Console.
Widget Description
All Scanned Traffic This widget displays total scanned traffic volume for the past 24
hours by HTTP, SMTP, and other traffic, in seconds.
Malicious Real-time This widget displays real-time total and malicious traffic volume
Network Traffic detected by Deep Discovery Inspector by HTTP, SMTP, and other
traffic, in seconds.
Real-time Scanned Traffic This widget displays real-time total traffic volume scanned by Deep
Discovery Inspector by HTTP, SMTP, and other traffic, in seconds.
3-11
DDI AG - Deep Discovery Inspector Administrators Guide
Widget Description
Top Exploited Hosts This widget displays the most detected exploited hosts within the
past 1 hour/24 hours/7 days/30 days.
Top Grayware-infected This widget displays the most grayware-infected hosts within the
Hosts past 1 hour/24 hours/7 days/30 days.
Top Malicious Content This widget displays the most detected threats within the past 1
Detected hour/24 hours/7 days/30 days.
Top Malware-infected This widget displays the hosts most affected by malware within the
Hosts past 1 hour/24 hours/7 days/30 days.
Top Suspicious Behaviors This widget displays the most detected suspicious behaviors within
Detected the past 1 hour/24 hours/7 days/30 days.
Summary
The Summary tab contains widgets that display hosts requiring priority
attention and other detailed actionable information.
3-12
Dashboard
Threats at a Glance
This widget displays actionable information about six key metrics and links
to the corresponding detection logs.
Table 3-10. Threats at a Glance
3-13
DDI AG - Deep Discovery Inspector Administrators Guide
3-14
Dashboard
This widget displays hosts with the highest severity rating by severity level in
the past 1 hour/24 hours/7 days/30 days.
Click Edit to change the number of affected hosts displayed (up to 20).
For details about the Host Severity scale, see Host Severity on page 1-6.
Threat Summary
This widget displays total threats within the past 24 hours, 7 days, or 30 days.
Information is displayed in a graph relating time and total threats. The type
of threat is distinguishable by color.
The time range is editable from the top left drop-down.
Click a bar to open the All Detections screen with the Detection type:
Malicious Behavior filter applied for that time period.
Click Edit to filter the types of threats displayed in the graph.
3-15
DDI AG - Deep Discovery Inspector Administrators Guide
This widget displays real-time total and malicious scanned traffic volume
detected by Deep Discovery Inspector by HTTP, SMTP, and other traffic, in
hours. This data can be filtered by traffic type:
• All traffic
• HTTP
• SMTP
• Other
3-16
Dashboard
This widget displays total traffic volume by protocol, in the past 1 hour/24
hours/7 days/30 days.
Click Edit to change whether data is displayed in a bar, pie, or line chart.
Select up to 10 protocols to display.
Threat Monitoring
The Threat Monitoring tab contains widgets that display real-time threat
data to help administrators identify affected hosts and network threat
distribution.
By default, this tab displays the following widgets:
3-17
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Select one of the following time frames:
• Past 1 hour
• Today
• Past 7 days
• Past 30 days
2. Modify the location.
a. On the Threat Geographic Map, click the Edit icon.
3-18
Dashboard
c. Click Apply.
Note
The right pane displays information about affected hosts organized by
country.
4. Click the total number of events for any threat in the pop-up window.
A table populated with details about all threats (related to the indicated
threat, country, and time period) appears.
3-19
DDI AG - Deep Discovery Inspector Administrators Guide
This widget displays a graph of the total traffic received by Deep Discovery
Inspector in the past 30 days. Hover over a point on the graph to learn about
the traffic size. When Deep Discovery Inspector has exceeded or is close to
exceeding the maximum bandwidth capacity, a red line appears to indicate
the maximum bandwidth capacity.
Click, drag, and then release the mouse over a section of the timeline to
zoom in. After zooming in, click Reset to reset the zoom level.
Use this widget to evaluate whether or not Deep Discovery Inspector has had
sufficient bandwidth to scan all the network traffic it has received in the past
30 days.
3-20
Dashboard
This widget displays the top affected hosts analyzed by Virtual Analyzer
based on the number of detections.
3-21
DDI AG - Deep Discovery Inspector Administrators Guide
Viewing hosts attacked in the past 1 hour, 24 hours, 7 days, or 30 days and the
type of detected attack allows users (typically system or network
administrators) to take appropriate action (blocking network access,
isolating computers according to IP address) to prevent malicious operations
from affecting hosts.
Click a bar to open the Filtered Detections screen for that host with the
selected time period.
Click Edit to change whether data displays in a chart, graph or table. You can
also control the total number of affected hosts displayed (up to 20).
This widget displays the top malicious sites analyzed by Virtual Analyzer as
detections per affected host. Deep Discovery Inspector, combined with
3-22
Dashboard
This widget displays top suspicious files analyzed by Virtual Analyzer, along
with the following information:
• The file count as detected by Deep Discovery Inspector
• The hosts affected by the suspicious file
Viewing suspicious files affecting hosts in the past 1 hour, 24 hours, 7 days or
30 days in a graphical format allows users (typically system or network
administrators) to take appropriate action by adding email block lists,
3-23
DDI AG - Deep Discovery Inspector Administrators Guide
Click Edit to change whether data displays in a chart, graph or table. You can
also control the total number of top suspicious files displayed (up to 20).
Click the download icon ( ) beside a file name to download the suspicious
file in a password-protected .zip archive.
Click a row to open the Filtered Detections screen for that malicious file
with the selected time period.
3-24
Dashboard
Virtual Analyzer
This widget displays information about files analyzed by Virtual Analyzer.
3-25
DDI AG - Deep Discovery Inspector Administrators Guide
Top Trends
The Top Trends tab displays threat summary information from various
perspectives. Administrators can use top threats data to identify the most
dangerous hosts or the most severe threats in order to take appropriate
action. Several Deep Discovery Inspector widgets identify the most affected
3-26
Dashboard
hosts along with the most severe threats within certain time frames. For each
widget, a detailed threat log can be exported for further analysis.
By default, this tab displays the following widgets:
• Top Disruptive Applications on page 3-27
• Top Malicious URLs Detected on page 3-28
This widget displays disruptive applications within the past 1 hour, 24 hours,
7 days, or 30 days.
Click a bar to open the All Detections screen with the Protocol and
Detection type: Disruptive Application filters applied.
3-27
DDI AG - Deep Discovery Inspector Administrators Guide
Click Edit to change whether data is displayed in a chart, graph or table. You
can also control the total number of top disruptive applications displayed (up
to 20).
This widget displays the most malicious URL detections within the past 1
hour, 24 hours, 7 days, or 30 days.
By default, all detections within the selected time frame are shown in a table
containing the URL and total detections.
Click a row to open the All Detections screen with the IP address/
Domain/URL and Detection type: Malicious URL filters applied.
Click Edit to change whether data is displayed in a chart, graph or table. You
can also control the total number of hosts displayed (up to 20).
3-28
Dashboard
System Status
The System Status tab shows administrators whether Deep Discovery
Inspector is operating within specifications; insufficient resources may cause
a system failure. These widgets display real-time system resource data to
ensure that all Deep Discovery Inspector resources are operating within
specifications.
By default, this tab displays the following widgets:
• CPU Usage on page 3-29
• Disk Usage on page 3-30
• Memory Usage on page 3-31
CPU Usage
3-29
DDI AG - Deep Discovery Inspector Administrators Guide
Disk Usage
This widget displays how much disk space is available for your appliance.
3-30
Dashboard
Memory Usage
Optional Widgets
By default, the following widgets are not displayed in Deep Discovery
Inspector 5.7, but may be added to any widget tab.
• All Scanned Traffic on page 3-32
• Malicious Real-time Network Traffic on page 3-33
3-31
DDI AG - Deep Discovery Inspector Administrators Guide
This widget displays all scanned traffic for the past 24 hours and can be
filtered by traffic type:
3-32
Dashboard
• All traffic
• HTTP
• SMTP
• Other
3-33
DDI AG - Deep Discovery Inspector Administrators Guide
• Other
Traffic size is displayed with the time scale moving from right to left in
seconds. Hover over a point on the graph to learn about the traffic size.
Click Edit to control whether data is displayed using traffic size or percent.
You can also choose whether to display all scanned traffic data.
This widget displays scanned traffic in a line graph based on all real-time
HTTP, SMTP, or other traffic information. The time scale moves from right to
left in seconds. Hover over a point on the graph to learn about the traffic size.
3-34
Dashboard
This widget shows which hosts on your networks have been most affected by
exploit attempts within the past 1 hour, 24 hours, 7 days, or 30 days. By
default, all exploited hosts within the selected time frame are shown in a
table showing the IP addresses of the top exploited hosts and total
detections.
Click a row to open the Host Details screen for that host with the Detection
type: Exploit filter applied.
Click Edit to change whether data is displayed in a chart, graph or table. You
can also control the total number to exploited hosts displayed (up to 20).
3-35
DDI AG - Deep Discovery Inspector Administrators Guide
This widget displays the most detected grayware on your networks within the
past 1 hour, 24 hours, 7 days, or 30 days.
Note
This widget shows only those hosts with threats categorized as "High" severity.
By default, all grayware detections within the selected time frame are shown
in a table.
Click a row to open the Host Details screen for that host with the Detection
type: Grayware filter applied.
Click Edit to change whether data is displayed in a chart, graph or table. You
can also control the total number of grayware-infected hosts displayed (up to
20).
3-36
Dashboard
3-37
DDI AG - Deep Discovery Inspector Administrators Guide
3-38
Dashboard
This widget displays the most detected suspicious behavior on your networks
within the past 1 hour, 24 hours, 7 days, or 30 days.
By default, all suspicious behaviors within the selected time frame are shown
in a table containing the description of the top suspicious behaviors and total
detections.
Click a row to open the All Detections screen with the Threat/Detection/
Reference filter applied and only high detection severity .
Click Edit to change whether data is displayed in a chart, graph or table. You
can also control the total number to suspicious behaviors displayed (up to
20).
3-39
Chapter 4
Detections
Learn about information that displays on the Detections tab in the following
topics:
• About the Detections Screen on page 4-2
• Affected Hosts on page 4-3
• C&C Callback Addresses on page 4-54
• Suspicious Objects on page 4-56
• Retro Scan on page 4-58
• All Detections on page 4-63
4-1
DDI AG - Deep Discovery Inspector Administrators Guide
Affected Hosts Hosts that have been involved in one or more phases of a
targeted attack
For details, see Affected Hosts on page 4-3.
For details about the Host Severity scale, see Host Severity on
page 1-6.
C&C Callback Addresses C&C addresses of callback attempts to known C&C addresses
For details, see C&C Callback Addresses on page 4-54.
Retro Scan A cloud-based service that scans historical web access logs for
callback attempts to C&C servers and other related activities in
your network
For details, see Retro Scan on page 4-58.
All Detections Hosts with detections from all event logs, including global
intelligence, user-defined lists, and other sources
For details, see All Detections on page 4-63.
4-2
Detections
Affected Hosts
The Affected Hosts screens display information about hosts that have been
involved in one or more phases of a targeted attack.
Investigating beyond event security, the host severity numerical scale
exposes the most vulnerable hosts and allows you to prioritize and quickly
respond. For details about the Host Severity scale, see Host Severity on page
1-6.
Access different information about Affected Hosts on the following views:
1. Affected Hosts view:
• Displays a summary of affected hosts by attack phase
• Provides access to Host Details views
By default, Deep Discovery Inspector searches the Affected Hosts
view by IP Address and Host Name.
2. Host Details view:
• Displays host event details in chronological order
• Provides access to Detection Details views
By default, Deep Discovery Inspector searches the Affected Hosts -
Host Details view by Peer Host.
3. Detection Details view:
• Displays details of each detected threat
• Provides access to different information panels, depending on
search and other filter criteria and settings
4-3
DDI AG - Deep Discovery Inspector Administrators Guide
Detection severity Filter options include the following detection severity settings:
Past 7 days
Past 30 days
Custom range
Specify a custom range from the current day to the past 31 days.
4-4
Detections
Tip
Type a case-insensitive keyword in the basic search field to
search a partial host match.
4-5
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Go to Detections > Affected Hosts.
2. Set the detection severity level by dragging the Detection severity slider
to the desired rating.
3. Select a time period.
4. Click Customize Columns, select one or more optional columns for
display and click Apply to return to the modified Affected Hosts screen.
4-6
Detections
4-7
DDI AG - Deep Discovery Inspector Administrators Guide
Note
The default IP Address, Host Severity and Latest Detection columns
cannot be removed.
4-8
Detections
4-9
DDI AG - Deep Discovery Inspector Administrators Guide
4-10
Detections
Procedure
3. Set the detection severity level by dragging the Detection severity slider.
Columns Preselected
Status X
Timestamp X
4-11
DDI AG - Deep Discovery Inspector Administrators Guide
Columns Preselected
Source Host
Destination Host
Interested Host
Peer Host X
Sender
Recipients
Email Subject
User Account
Threat Description X
Detection Name X
Detection Type
Protocol X
Detection Severity X
Attack Phase X
Direction X
Notable Object X
Note
The default Timestamp and Threat Description columns cannot be
removed.
4-12
Detections
Note
After marking all displayed detections as resolved, detections can only be
individually marked as unresolved.
4-13
DDI AG - Deep Discovery Inspector Administrators Guide
9. To run a saved search, open the drop-down menu of the search box, and
click a saved search.
4-14
Detections
Procedure
1. To view Affected Hosts detection details for any event, click the icon
under the Details column on the Affected Hosts - Hosts Details screen.
4-15
DDI AG - Deep Discovery Inspector Administrators Guide
4-16
Detections
Important
Suspicious files must always be handled with caution. Extract the detected
file and pcap file at your own risk.
Important
Suspicious files must always be handled with caution. Extract the detected
file at your own risk.
4-17
DDI AG - Deep Discovery Inspector Administrators Guide
4-18
Detections
Click Download and then select Connection Details to download a CSV file
of the connection details.
Click Download and then select Detected File to download a password
protected ZIP archive containing the detected file.
If a packet capture has been enabled and the detection matched a packet
capture rule, click Download and then select PCAP File to download a
password protected ZIP archive containing the pcap file. In the pcap file, the
comment "Detected Packet" in the "pkt_comment" field marks the packet
that triggered the detection.
For details about packet capture, see Packet Capture on page 6-67.
Click Download and then select All to download a password protected ZIP
archive containing the detected file, the packet capture file, and the
connection details.
4-19
DDI AG - Deep Discovery Inspector Administrators Guide
Important
Suspicious files and pcap files must always be handled with caution. Extract the
detected file and pcap file at your own risk. Trend Micro recommends
analyzing the files in an isolated environment.
The password for the zip archive is "virus".
Tip
Click the detection rule number to view more details about the rule in the
Threat Encyclopedia.
• Detection severity
• Detection type
• Event class
• MITRE ATT&CK™ Framework
• Tactics
• Techniques
Tip
Click the tactic or technique to view more details on the MITRE website.
4-20
Detections
Note
Additional information may appear for specific correlated incidents.
4-21
DDI AG - Deep Discovery Inspector Administrators Guide
Suspicious Behavior Behavior that could indicate compromise but requires further
correlation to confirm, including the following:
• Anomalous behavior
• False or misleading data
• Suspicious and malicious behavioral patterns and strings
4-22
Detections
• Operating system
• BOT command
• BOT URL
• Certificate Information
• Issued To
• Common name
• Organization
• Organizational unit
• Issued By
• Common name
• Organization
• Organizational unit
• Domain name
• Host name
• HTTP referer
• ICMP code
• ICMP type
• Message ID
4-23
DDI AG - Deep Discovery Inspector Administrators Guide
• Protocol
• Queried domain
• Recipients
• Sender
• SNI host name
• Subject
• Target share
• Transport Layer Security (TLS)
• URL
• User agent
• User name
4-24
Detections
• Fingerprinting
• JA3 hash value
• JA3S hash value
• VLAN ID
Tip
Viewing or downloading the Virtual Analyzer report may take longer than the
other options. Allocate more time for the Virtual Analyzer report to appear or
download.
Important
Suspicious files must always be handled with caution. Extract the detected file
at your own risk.
The password for the zip archive is "virus".
4-25
DDI AG - Deep Discovery Inspector Administrators Guide
Click Download and then select All to download a password protected ZIP
archive containing the detected file, the Virtual Analyzer report, and the
investigation package.
• Child files
• Type
• File SHA-1
• File SHA-256
• File name
• File size
• File type
• File MD5
• File SHA-1
• File SHA-256
• Tactics
• Techniques
4-26
Detections
Tip
Click the tactic or technique to view more details on the MITRE website.
4-27
DDI AG - Deep Discovery Inspector Administrators Guide
4-28
Detections
• File SHA-1
• File name
• File size
• File type
• File MD5
• File SHA-1
• File SHA-256
• MITRE ATT&CK™ Framework
• Tactics
• Techniques
Tip
Click the tactic or technique to view more details on the MITRE website.
4-29
DDI AG - Deep Discovery Inspector Administrators Guide
• Rootkit, cloaking
• Description
• Detailed description
• Impact
• Immediate action
For details, see About Affected Hosts Advanced Search Filter on page 4-31.
For details, see About Affected Hosts - Host Details Advanced Search Filter on
page 4-39.
4-30
Detections
Note
Include the following in each advanced search filter:
• A maximum of 20 criteria sets
• A maximum of 1024 characters in each text-based value field
Save up to 50 advanced search filters.
To view specific data, select from the following optional attributes and
operators and type an associated value.
Table 4-10. Search Filter Criteria: Affected Hosts
4-31
DDI AG - Deep Discovery Inspector Administrators Guide
4-32
Detections
Procedure
Tip
Type a keyword to search a partial match.
For details, see About Affected Hosts Advanced Search Filter on page 4-31.
Note
You can add multiple criteria entries separated by a comma.
4. (Optional) Click Add new to include other criteria sets in the search
filter.
5. Click Search.
The Affected Hosts screen updates and displays data filtered by the
search criteria. All search criteria sets are displayed in a summary.
4-33
DDI AG - Deep Discovery Inspector Administrators Guide
The name of the new saved search is added to the list of saved
searches.
Note
A saved search includes any search filter you create and the current
customized column settings.
7. (Optional) Click Cancel to exit the advanced search feature and return to
the previous screen.
Procedure
4-34
Detections
Tip
Type a keyword to search a partial match.
For details, see About Affected Hosts Advanced Search Filter on page 4-31.
Note
You can add multiple criteria entries separated by a comma.
4-35
DDI AG - Deep Discovery Inspector Administrators Guide
Note
A saved search includes any search filter you create and the current
customized column settings.
Important
Deleting a saved search will also permanently delete any report schedule
associated with that saved search. However, any generated reports will not be
deleted.
Procedure
1. To delete a saved search, go to Detections > Affected Hosts, and open
the Saved Searches drop-down menu.
4-36
Detections
Note
Preset filters cannot be deleted.
Procedure
3. Click Browse and select the file containing the saved searches.
4-37
DDI AG - Deep Discovery Inspector Administrators Guide
The file is uploaded and validated. By default, all valid saved searches
are selected for import.
4. (Optional) Hover over a saved search's name and then click the edit icon
to rename the saved search before importing.
Note
Saved searches that have a duplicate name must be renamed before
importing. Saved searches with a duplicate name are highlighted by a red
box.
5. Mark the check box next to each saved search that you want to import or
mark the check box at the top of the column to mark all the saved
searches.
6. Click Import.
Procedure
4-38
Detections
Note
Deep Discovery Inspector cannot export preset filters.
4. Click Export.
The saved searches file download begins.
4-39
DDI AG - Deep Discovery Inspector Administrators Guide
To view specific data, select from the following optional attributes and
operators and type an associated value.
Table 4-11. Search Filter Criteria: Affected Hosts - Host Details
Exam
Attribute Operator Action
ples
4-40
Detections
Exam
Attribute Operator Action
ples
4-41
DDI AG - Deep Discovery Inspector Administrators Guide
Exam
Attribute Operator Action
ples
4-42
Detections
Exam
Attribute Operator Action
ples
4-43
DDI AG - Deep Discovery Inspector Administrators Guide
Exam
Attribute Operator Action
ples
Is Targeted Yes/No
Attack
Related
4-44
Detections
Exam
Attribute Operator Action
ples
4-45
DDI AG - Deep Discovery Inspector Administrators Guide
Exam
Attribute Operator Action
ples
• Adding an Affected Hosts - Host Details Advanced Search Filter on page 4-46
Procedure
2. Click Advanced.
4-46
Detections
Tip
Type a keyword to search a partial match.
For details, see About Affected Hosts Advanced Search Filter on page 4-31.
Note
You can add multiple criteria entries separated by a comma.
5. (Optional) Click Add new to include other criteria sets in the search
filter.
Include the following in each advanced search filter:
• A maximum of 20 criteria sets
• A maximum of 1024 characters in each text-based value field
Save up to 50 advanced search filters.
6. Click Search.
The Affected Hosts - Host Details screen updates and displays data
filtered by the search criteria. All search criteria sets are displayed in a
summary.
7. (Optional) To save a search, do the following:
a. Click the Save icon and click Save as ... .
The Saved Searches window opens.
4-47
DDI AG - Deep Discovery Inspector Administrators Guide
Note
A saved search includes any search filter you create and the current
customized column settings.
Procedure
1. To edit an advanced Affected Hosts - Host Details saved search, go to
Detections > Affected Hosts and click any detection link.
2. Open the Saved Searches drop-down menu.
3. Select a saved search to edit.
4. To edit a saved search, do one of the following:
• Click Advanced.
5. Select an attribute and an associated operator.
6. Do one of the following to provide an action:
• Type a value in the text box.
• Click an action from the drop-down menu.
Tip
Type a keyword to search a partial match.
4-48
Detections
For details, see About Affected Hosts Advanced Search Filter on page 4-31.
Note
Add multiple criteria entries separated by a comma.
7. (Optional) Click Add new to include other criteria sets in the search
filter.
Note
Include the following in each advanced search filter:
• A maximum of 20 criteria sets
• A maximum of 1024 characters in each text-based value field
Save up to 50 advanced search filters.
8. Click Search.
The Affected Hosts - Host Details screen updates and displays data
filtered by the search criteria. All search criteria sets are displayed in a
summary.
9. (Optional) To save an edited saved search, click the Save icon and do one
of the following:
• To save the edited saved search with the same name, click Save.
The edited saved search is saved with the original name.
• To save the edited saved search with a new name, do the following:
a. Click Save As ....
4-49
DDI AG - Deep Discovery Inspector Administrators Guide
The name of the new saved search is added to the list of saved
searches.
Note
A saved search includes any search filter you create and the current
customized column settings.
10. (Optional) To exit the advanced search feature, do one of the following:
Procedure
1. To drill down to Affected Hosts - Host Details from the Affected Hosts
screen, do one of the following:
4-50
Detections
Note
Preset filters cannot be deleted.
Procedure
1. To import one or more saved searches, go to Detections > Affected
Hosts and click any detection link.
2. Open the Saved Searches drop-down menu.
4-51
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Saved searches that have a duplicate name must be renamed before
importing. Saved searches with a duplicate name are highlighted by a red
box.
6. Mark the check box next to each saved search that you want to import or
mark the check box at the top of the column to mark all the saved
searches.
7. Click Import.
The imported saved searches appear in the Saved Searches drop-down
menu.
4-52
Detections
Procedure
4. Mark the check box next to each saved search that you want to export or
mark the check box at the top of the column to mark all the saved
searches.
Note
Deep Discovery Inspector cannot export preset filters.
5. Click Export.
4-53
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
2. Click the drop-down for detection type and then select one of the
following detection types:
4-54
Detections
• All (default)
• IP Addresses/Domains
• URLs
3. (Optional) Copy a callback address to the Deny List or the Allow List.
d. Click Reload.
5. (Optional) To sort the list of C&C callback addresses, click the column
titles.
Note
Only one column can be sorted at a time.
4-55
DDI AG - Deep Discovery Inspector Administrators Guide
Suspicious Objects
The Suspicious Objects screen displays a list of suspicious files, IP
addresses, URLs, and domains identified by Virtual Analyzer or
synchronized from an external source.
Procedure
2. Click detection type drop-down and then select one of the following
detection types:
4-56
Detections
• All (default)
• Files
• IP Addresses
• URLs
• Domains
3. Click the time period drop-down and then select a time period.
Note
The table contains all suspicious objects regardless of the time period. The
time period filters the number for detections for each suspicious object
during that time period. If a suspicious object was not detected during the
selected time period, the total detections for that suspicious object will be
"0".
d. Click Reload.
4-57
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Only one column can be sorted at a time.
Retro Scan
Retro Scan is a cloud-based service that scans historical web access logs for
callback attempts to C&C servers and other related activities in your network.
Web access logs may include undetected and unblocked connections to C&C
servers that have only recently been discovered. Examination of such logs is
an important part of forensic investigations to determine if your network is
affected by attacks.
Retro Scan stores the following log information in the Smart Protection
Network:
Retro Scan then periodically scans the stored log entries to check for
callback attempts to C&C servers in the following lists:
• Trend Micro Global Intelligence List: Trend Micro compiles the list from
multiple sources and evaluates the risk level of each C&C callback
address. The C&C list is updated and delivered to enabled products daily.
4-58
Detections
• User-defined list: Retro Scan can also scan logs against your own C&C
server list. Addresses must be stored in a text file.
Important
The Retro Scan screen in Deep Discovery Inspector only displays information
for scans that use the Trend Micro Global Intelligence List.
4-59
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Go to Administration > Monitoring / Scanning > Web Reputation.
4-60
Detections
6. Click Save.
Note
Clicking the link opens the Report Repository in a new browser tab.
Column Description
Callback Number of C&C callback attempts found in the logs during the scan period
Attempts
Note
Click the number to display the details for a specific report. For details, see
Retro Scan Report Details Screen on page 4-62.
The Retro Scan screen also allows you to export the summary information to
a .csv file.
4-61
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Clicking the link opens the online version of the report in a new browser
tab.
Column Description
4-62
Detections
WARNING!
Disabling Retro Scan deletes all Retro Scan detection logs received and
displayed by Deep Discovery Inspector.
Procedure
1. To disable Retro Scan service, go to Administration > Monitoring /
Scanning > Web Reputation.
2. Under Smart Protection Settings, deselect Enable Retro Scan.
3. In the confirmation message window, click OK to disable Retro Scan and
delete all Retro Scan detection logs.
All Detections
The All Detections screen displays a list of hosts that have experienced an
event in a user-defined time period. Detections are displayed from global
intelligence, user-defined lists, and other sources.
By default, Deep Discovery Inspector searches All Detections by Source
Host, Destination Host and Interested Host.
4-63
DDI AG - Deep Discovery Inspector Administrators Guide
4-64
Detections
Tip
Type a case-insensitive keyword in the basic search field to
search a partial host match.
Advanced Search Filter Search by user-defined criteria sets, including the following:
Each set includes one or more of the following:
• Attributes
• Operators
• Associated values
For details, see All Detections Advanced Search Filter on page 4-85.
4-65
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
2. Set the detection severity level by dragging the Detection severity slider.
Columns Preselected
Status X
Timestamp X
Source Host X
Destination Host X
4-66
Detections
Columns Preselected
Interested Host X
Peer Host
Sender
Recipients
Email Subject
User Account
Threat Description X
Detection Name X
Reference
Detection Type
Protocol X
Detection Severity X
Attack Phase X
Direction
Notable Object X
Note
The default Timestamp and Threat Description columns cannot be
removed.
The default Details column cannot not be removed and does not appear in
the Customize Columns option.
4-67
DDI AG - Deep Discovery Inspector Administrators Guide
Note
After marking all displayed detections as resolved, detections can only be
individually marked as unresolved.
4-68
Detections
For details, see All Detections Advanced Search Filter on page 4-85.
9. Click Export.
• threats.csv
4-69
DDI AG - Deep Discovery Inspector Administrators Guide
• malicious_urls.csv
• application_filters.csv
• correlated_incidents.csv
Procedure
1. To view All Detections detection details for any event, click the icon
under the Details column on the All Detections screen.
4-70
Detections
4-71
DDI AG - Deep Discovery Inspector Administrators Guide
Important
Suspicious files must always be handled with caution. Extract the detected
file and pcap file at your own risk.
Important
Suspicious files must always be handled with caution. Extract the detected
file at your own risk.
4-72
Detections
4-73
DDI AG - Deep Discovery Inspector Administrators Guide
Click Download and then select Connection Details to download a CSV file
of the connection details.
Click Download and then select Detected File to download a password
protected ZIP archive containing the detected file.
If a packet capture has been enabled and the detection matched a packet
capture rule, click Download and then select PCAP File to download a
password protected ZIP archive containing the pcap file. In the pcap file, the
comment "Detected Packet" in the "pkt_comment" field marks the packet
that triggered the detection.
For details about packet capture, see Packet Capture on page 6-67.
Click Download and then select All to download a password protected ZIP
archive containing the detected file, the packet capture file, and the
connection details.
4-74
Detections
Important
Suspicious files and pcap files must always be handled with caution. Extract the
detected file and pcap file at your own risk. Trend Micro recommends
analyzing the files in an isolated environment.
The password for the zip archive is "virus".
Tip
Click the detection rule number to view more details about the rule in the
Threat Encyclopedia.
• Detection severity
• Detection type
• Event class
• MITRE ATT&CK™ Framework
• Tactics
• Techniques
Tip
Click the tactic or technique to view more details on the MITRE website.
4-75
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Additional information may appear for specific correlated incidents.
4-76
Detections
Suspicious Behavior Behavior that could indicate compromise but requires further
correlation to confirm, including the following:
• Anomalous behavior
• False or misleading data
• Suspicious and malicious behavioral patterns and strings
4-77
DDI AG - Deep Discovery Inspector Administrators Guide
• Operating system
• BOT command
• BOT URL
• Certificate Information
• Issued To
• Common name
• Organization
• Organizational unit
• Issued By
• Common name
• Organization
• Organizational unit
• Domain name
• Host name
• HTTP referer
• ICMP code
• ICMP type
• Message ID
4-78
Detections
• Protocol
• Queried domain
• Recipients
• Sender
• SNI host name
• Subject
• Target share
• Transport Layer Security (TLS)
• URL
• User agent
• User name
4-79
DDI AG - Deep Discovery Inspector Administrators Guide
• Fingerprinting
• JA3 hash value
• JA3S hash value
• VLAN ID
Tip
Viewing or downloading the Virtual Analyzer report may take longer than the
other options. Allocate more time for the Virtual Analyzer report to appear or
download.
Important
Suspicious files must always be handled with caution. Extract the detected file
at your own risk.
The password for the zip archive is "virus".
4-80
Detections
Click Download and then select All to download a password protected ZIP
archive containing the detected file, the Virtual Analyzer report, and the
investigation package.
• Child files
• Type
• File SHA-1
• File SHA-256
• File name
• File size
• File type
• File MD5
• File SHA-1
• File SHA-256
• Tactics
• Techniques
4-81
DDI AG - Deep Discovery Inspector Administrators Guide
Tip
Click the tactic or technique to view more details on the MITRE website.
4-82
Detections
• Expiration date
• Suspicious object
• Type
• Child files
• File name
• File type
4-83
DDI AG - Deep Discovery Inspector Administrators Guide
• File SHA-1
• File name
• File size
• File type
• File MD5
• File SHA-1
• File SHA-256
• MITRE ATT&CK™ Framework
• Tactics
• Techniques
Tip
Click the tactic or technique to view more details on the MITRE website.
4-84
Detections
Note
Include the following in each advanced search filter:
• A maximum of 20 criteria sets
• A maximum of 1024 characters in each text-based value field
Save up to 50 advanced search filters.
4-85
DDI AG - Deep Discovery Inspector Administrators Guide
Exam
Attribute Operator Action
ples
4-86
Detections
Exam
Attribute Operator Action
ples
4-87
DDI AG - Deep Discovery Inspector Administrators Guide
Exam
Attribute Operator Action
ples
4-88
Detections
Exam
Attribute Operator Action
ples
4-89
DDI AG - Deep Discovery Inspector Administrators Guide
Exam
Attribute Operator Action
ples
Is Targeted Yes/No
Attack
Related
4-90
Detections
Exam
Attribute Operator Action
ples
4-91
DDI AG - Deep Discovery Inspector Administrators Guide
Exam
Attribute Operator Action
ples
Procedure
4-92
Detections
Tip
Type a keyword to search a partial match.
For details, see All Detections Advanced Search Filter on page 4-85.
Note
You can add multiple criteria entries separated by a comma.
4. (Optional) Click Add new to include other criteria sets in the search
filter.
Include the following in each advanced search filter:
• A maximum of 20 criteria sets
• A maximum of 1024 characters in each text-based value field
Save up to 50 advanced search filters.
5. Click Search.
The All Detections screen updates and displays data filtered by the
search criteria. All search criteria sets are displayed in a summary.
6. (Optional) To save a search, do the following:
a. Click the Save icon and select Save as ....
The Saved Searches window opens.
b. Type a name and click Save.
The name of the new saved search is added to the list of saved
searches.
Note
A saved search includes any search filter you create together with the
current customized column settings.
4-93
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. To edit an All Detections saved search, go to Detections > All Detections
and open the Saved Searches drop-down menu.
4-94
Detections
Tip
Type a keyword to search a partial match.
For details, see the Search Filter Criteria: All Detections table All
Detections Advanced Search Filter on page 4-85.
Note
Add multiple criteria entries separated by a comma.
5. (Optional) Click Add new to include other criteria sets in the search
filter.
Note
Include the following in each advanced search filter:
6. Click Search.
The All Detections screen updates and displays data filtered by the
search criteria. All search criteria sets are displayed in a summary.
7. (Optional) To save an edited saved search, click the Save icon and do one
of the following:
• To save the edited saved search with the same name, click Save.
4-95
DDI AG - Deep Discovery Inspector Administrators Guide
• To save the edited saved search with a new name, do the following:
The name of the new saved search is added to the list of saved
searches.
Note
A saved search includes any search filter you create and the current
customized column settings.
Procedure
1. To delete a saved search, go to Detections > All Detections, and open the
Saved Searches drop-down menu.
4-96
Detections
2. Click the Remove Filter icon beside the saved search to be deleted.
Note
Preset filters cannot be deleted.
Procedure
1. To import one or more saved searches, go to Detections > All Detections
and open the Saved Searches drop-down menu.
4-97
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Saved searches that have a duplicate name must be renamed before
importing. Saved searches with a duplicate name are highlighted by a red
box.
5. Mark the check box next to each saved search that you want to import or
mark the check box at the top of the column to mark all the saved
searches.
6. Click Import.
The imported saved searches appear in the Saved Searches drop-down
menu.
4-98
Detections
Procedure
3. Mark the check box next to each saved search that you want to export or
mark the check box at the top of the column to mark all the saved
searches.
Note
Deep Discovery Inspector cannot export preset filters.
4. Click Export.
4-99
Chapter 5
Reports
Learn how to generate and access Deep Discovery Inspector scheduled and
on-demand reports in the following topics:
• About Reports on page 5-2
• Scheduled Reports on page 5-4
• Schedules on page 5-6
• Scheduling a Report on page 5-7
• Deleting a Report Schedule on page 5-10
• On-demand Reports on page 5-10
• Generating On-demand Reports on page 5-12
• Deleting an On-demand Report on page 5-14
• Customization on page 5-14
• Customizing Reports on page 5-15
5-1
DDI AG - Deep Discovery Inspector Administrators Guide
About Reports
Deep Discovery Inspector provides report templates for easy access to threat
information. Reports help you better understand complex threat scenarios,
prioritize responses, and plan containment and mitigation.
Table 5-1. Deep Discovery Inspector Reports
5-2
Reports
5-3
DDI AG - Deep Discovery Inspector Administrators Guide
Scheduled Reports
The Scheduled Reports screen displays user-scheduled daily, weekly, and
monthly reports on a calendar.
5-4
Reports
5-5
DDI AG - Deep Discovery Inspector Administrators Guide
Schedules
Column Description
5-6
Reports
Column Description
Scheduling a Report
Reports can be scheduled to generate daily, weekly, and monthly.
Procedure
1. On the Reports > Schedules tab, click Add. The Add Schedule window
opens.
5-7
DDI AG - Deep Discovery Inspector Administrators Guide
5-8
Reports
For details about available reports, see About Reports on page 5-2.
• Filtered hosts
Note
Selectable saved filters include the preset Affected Hosts saved
searches and any custom saved searches.
7. Click Save.
Note
Report schedules can only be edited by the user account that created the
schedule. However, any user may delete any report schedule.
5-9
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. On the Reports > Schedules tab, select a report schedule to delete.
2. Click Delete.
Note
This removes the report schedule. The report is not deleted.
Important
When a user account is deleted, any report schedule created by the account will
also be deleted. However, any generated reports will not be deleted.
When a saved search is deleted, any report schedule associated with the search
will also be deleted. However, any generated reports will not be deleted.
On-demand Reports
Generate one-time reports anytime you need them. Use the On-demand
Reports screen to do the following:
• Review the attributes of generated on-demand reports
5-10
Reports
Column Description
5-11
DDI AG - Deep Discovery Inspector Administrators Guide
Note
On-demand reports are generated as soon as possible and are available for
viewing immediately after they are generated. Email notifications are not
provided for on-demand reports.
Procedure
2. Click Add.
5-12
Reports
• Past 7 days
• Past 2 weeks
• Past 4 weeks
Note
When you click a preset period, the From/To field automatically adds the
correct dates.
For details about available reports, see About Reports on page 5-2.
• Filtered hosts
Note
Selectable saved searches include preset Affected Hosts saved
searches and any custom saved searches. To configure a saved search
for application to a report, go to Detections > Affected Hosts >
Advanced and select a host attribute and associated criteria.
5-13
DDI AG - Deep Discovery Inspector Administrators Guide
Important
This procedure removes the report from Deep Discovery Inspector. Once
deleted, the report cannot be recovered.
Procedure
2. Click Delete.
Customization
Use the Customization screen to configure report cover options. For details,
see Customizing Reports on page 5-15.
5-14
Reports
Customizing Reports
Procedure
1. Go to Reports > Customization.
2. Type a company name.
3. To display a company logo, click Display and browse to select an image.
Important
Image files must be in JPG or PNG file format. The maximum file size is
200 KB.
Note
The Display Trend Micro logo is preselected by default.
5. Click Save.
5-15
Chapter 6
Administration
Learn how to administer Deep Discovery Inspector operations in the
following sections:
6-1
DDI AG - Deep Discovery Inspector Administrators Guide
Updates
Use the Updates screen to configure component and product update settings.
Component Updates
Download and deploy product components used to scan for and detect
network threats. Because Trend Micro frequently creates new component
versions, perform regular updates to address the latest threats.
Components to Update
To help protect your network, Deep Discovery Inspector uses the
components listed in the following table.
Table 6-1. Deep Discovery Inspector Components
Component Description
Advanced Persistent Advanced Persistent Threat Information Pattern provides details about
Threat Information advanced persistent threats.
Pattern
Advanced Threat The Advanced Threat Correlation Pattern contains a list of file features
Correlation Pattern that are not relevant to any known threats.
Advanced Threat The Advanced Threat Scan Engine protects against viruses, malware,
Scan Engine for Deep and exploits to vulnerabilities in software such as Java and Flash.
Discovery (Linux, 64- Integrated with the Trend Micro Virus Scan Engine, the Advanced
bit) Threat Scan Engine employs signature-based, behavior-based, and
aggressive heuristic detection.
C&C Identification C&C Identification Pattern contains a list of known C&C servers and
Pattern callback addresses.
Common Threat Common Threat Family Information Pattern provides the common
Family Information threat family name for detections.
Pattern
6-2
Administration
Component Description
Deep Discovery The Trend Micro Virus Scan Engine protects against viruses and
Malware Pattern malware in files through heuristic, signature-based, and behavior-
based detection. Trend Micro updates the virus pattern files as soon as
detection routines for new threats are available.
IntelliTrap Exception The IntelliTrap Exception Pattern contains detection routines for safe
Pattern compressed executable (packed) files to reduce the amount of false
positives during IntelliTrap scanning.
IntelliTrap Pattern The IntelliTrap Pattern contains the detection routines for compressed
executable (packed) file types that are known to commonly obfuscate
malware and other potential threats.
Network Content The Network Content Correlation Pattern implements detection rules
Correlation Pattern defined by Trend Micro.
Network Content The Network Content Inspection Engine is used to perform network
Inspection Engine scanning.
(3.10, Kernel mode,
64-bit, Conf: 5600)
Network Content The Network Content Inspection Engine is used to perform network
Inspection Engine scanning.
(Linux, User mode,
64-bit)
Network Content The Network Content Inspection Pattern is used by the Network
Inspection Pattern Content Inspection Engine to perform network scanning.
Script Analyzer The Script Analyzer Pattern is used during analysis of web page scripts
Unified Pattern to identify malicious code.
6-3
DDI AG - Deep Discovery Inspector Administrators Guide
Component Description
Threat Correlation The Threat Correlation Pattern is used by Deep Discovery Inspector
Pattern during threat correlation.
Trend Micro Trend Micro Intelligence Agent v.2 retrieves additional information
Intelligence Agent v.2 about detections.
(Deep Discovery
Inspector, Linux, 64-
bit)
Trusted Certificate Trusted Certificate Authorities Pattern provides the trusted certificate
Authorities Pattern authorities to verify PE signatures.
Virtual Analyzer The Virtual Analyzer Sensors are a collection of utilities used to
Sensors execute and detect malware and to record behavior in Virtual Analyzer.
6-4
Administration
Method Description
Note
Deep Discovery Inspector updates all components. You cannot
update components individually.
Manual Updates
Deep Discovery Inspector allows on-demand component updates. Use this
feature during outbreaks or when updates do not arrive according to a fixed
schedule.
6-5
DDI AG - Deep Discovery Inspector Administrators Guide
Details Description
Current Version Version number of each component currently used by the product
Procedure
1. Go to Administration > Updates > Component Updates > Manual.
2. Deep Discovery Inspector automatically checks which components need
updating.
Any components that need updating appear in red.
3. Click the Update button.
The Deep Discovery Inspector components update. When the update
completes, the following confirmation message appears:
All components are up-to-date.
Scheduled Updates
Configure scheduled updates to ensure that Deep Discovery Inspector
components are up-to-date.
Procedure
1. Go to Administration > Updates > Component Updates > Scheduled.
6-6
Administration
Tip
Trend Micro recommends setting the update schedule to every two hours.
4. Click Save.
Update Source
Deep Discovery Inspector downloads components from the Trend Micro
ActiveUpdate server, the default update source. Deep Discovery Inspector
can be configured to download components from another update source in
your organization.
When using the Trend Micro ActiveUpdate server or Trend Micro Apex
Central as the update source, Deep Discovery Inspector always uses TLS 1.2
and verifies the package integrity.
When using the Trend Micro ActiveUpdate server as the update source, Deep
Discovery Inspector performs an HTTPS server authentication check.
When using Other update source as the update source, you must enable
Always use TLS 1.2 or above in Administration > System Settings >
Network to use a TLS connection.
Note
You can configure Deep Discovery Inspector to download directly from Trend
Micro Apex Central. For details on how the Apex Central server can act as an
update source, see the Trend Micro Apex Central Administrator’s Guide.
6-7
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Go to Administration > Updates > Component Updates > Source.
2. Under Download updates from, select one of the following update
sources:
• Trend Micro ActiveUpdate Server: The Trend Micro ActiveUpdate
server is the default source for the latest components.
• Other update source: Select this option to specify an alternative
update source. The update source must begin with "http://" or
"https://".
For example:
• http://activeupdate.example.com
• https://activeupdate.example.com
Note
Update sources cannot be specified in UNC path format.
Product Updates
Product updates include the following:
• Hot Fixes / Patches
• Service Packs / Version Upgrade
To update Deep Discovery Inspector, do any of the following:
• Upgrade the firmware from the management console or configure Deep
Discovery Director to manage upgrades.
6-8
Administration
For details, see Service Packs / Version Upgrade on page 6-12 and Deep
Discovery Director on page 6-113.
However, data and logs are not backed up or restored, and no new
features are installed. Back up existing configuration settings by
exporting them to an encrypted file, and importing the file to restore
settings. You can also reset Deep Discovery Inspector by restoring the
default settings that shipped with the product.
System
Description
Update
Security patch A security patch focuses on security issues suitable for deployment to all
customers. Non-Windows patches commonly include a setup script.
Patch A patch is a group of hot fixes and security patches that solve multiple
program issues. Trend Micro makes patches available on a regular basis.
Non-Windows patches commonly include a setup script.
6-9
DDI AG - Deep Discovery Inspector Administrators Guide
Your vendor or support provider may contact you when these items become
available. Check the Trend Micro website for information on new hot fix,
patch, and service pack releases:
https://downloadcenter.trendmicro.com/
Procedure
1. Save the hot fix / patch file to any folder on a computer.
WARNING!
Save the hot fix / patch file with its original name to avoid problems
applying it.
2. On the computer where you saved the file, access and then log on to the
management console.
3. Go to Administration > Updates > Product Updates > Hot Fixes /
Patches.
4. Browse to locate the hot fix / patch file.
5. Click Upload.
WARNING!
To avoid problems uploading the file, do not close the browser or navigate
to other screens.
6-10
Administration
Note
You will be redirected to the management console’s logon screen after the
update is applied.
WARNING!
To avoid problems applying the hot fix / patch, do not close the browser or
navigate to other screens.
Note
If there are problems applying the system update, details will be available
in the Hot Fixes / Patches screen, or in the system log if a restart is
required.
9. If a restart is required:
10. Clear the browser cache. For details, see Clearing the Browser Cache on
page 6-15.
11. Verify that the hot fix / patch displays in the History section as the latest
update.
The system update also appears as the first entry in the Hot fix / patch
history table. This table lists all the hot fixes / patches that you have
applied or rolled back.
6-11
DDI AG - Deep Discovery Inspector Administrators Guide
Only the latest hot fix / patch can be rolled back. After a rollback, no other
existing hot fix / patch can be rolled back. The rollback function will only
become available again when a new hot fix / patch is applied.
Note
The rollback process automatically restarts Deep Discovery Inspector, so make
sure that all tasks on the management console have been completed before
rollback.
Procedure
3. Check the rollback result in the first row of the Hot fix / patch history
table.
6-12
Administration
System
Description
Upgrade
Service Pack A service pack is a consolidation of hot fixes, patches, and feature
enhancements significant enough to be a product upgrade. Non-Windows
service packs include a setup program and setup script.
Version Upgrading the firmware updates existing application files and enhances
Upgrade features.
Procedure
6-13
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Deep Discovery Inspector migrates the current product settings after the
service pack / version upgrade is complete so that you do not need to
reconfigure settings. Deep Discovery Inspector re-registers to Apex
Central automatically after the firmware update completes.
3. Download the Deep Discovery Inspector firmware image from the Trend
Micro website or obtain the image from your Trend Micro reseller or
support provider.
4. Save the image to any folder on a computer.
5. Go to Administration > Updates > Product Updates > Service Packs /
Version Upgrade.
6. Browse to locate the folder where you saved the firmware image.
Tip
The image file has an .R.tar extension.
7. Click Upload.
WARNING!
Performing the next step restarts Deep Discovery Inspector. Make sure
that you have finished all product console tasks before continuing.
8. Click OK.
6-14
Administration
9. Wait 5 minutes for the upgrade progress screen to load. Optionally, click
Refresh in the browser to view the upgrade progress screen.
11. Clear the browser cache. For details, see Clearing the Browser Cache on
page 6-15.
Procedure
1. On Chrome:
6-15
DDI AG - Deep Discovery Inspector Administrators Guide
6-16
Administration
d. Select Cookies and saved website data and Cached data and files.
e. Click Clear.
Notifications
Deep Discovery Inspector can send email notifications for threshold-based
network events.
• Notification settings
• Delivery options
Event Description
High Risk Hosts Detections Deep Discovery Inspector identified a high-risk host on your
network. For details, see Configuring High Risk Hosts Detections
Notifications on page 6-20.
Suspicious Hosts The number of suspicious hosts reached the threshold. For
Detections details, see Configuring Suspicious Hosts Detections Notifications
on page 6-24.
High Network Traffic The network traffic volume reached the threshold. For details, see
Configuring High Network Traffic Notifications on page 6-26.
6-17
DDI AG - Deep Discovery Inspector Administrators Guide
Event Description
Unanalyzed Sample Virtual Analyzer was unable to analyze files. For details, see
Detections Configuring Unanalyzed Sample Detections Notifications on page
6-28.
Deny List A detection matched an object in the user-defined Deny List. For
details, see Configuring Deny List Notifications on page 6-33.
Retro Scan Detections Retro Scan detected historical callback attempts to C&C servers in
the TM Global Intelligence List. For details, see Configuring Retro
Scan Detections Notifications on page 6-35
Procedure
1. Go to Administration > Notifications > Notification Settings > Threat
Detections.
6-18
Administration
6-19
DDI AG - Deep Discovery Inspector Administrators Guide
Note
When a __LOOP_[variable]__ message token is applied, the LOOP variable
will repeat continuously between the LOOP start time and the LOOP end
time.
7. Click Save.
6-20
Administration
Procedure
6-21
DDI AG - Deep Discovery Inspector Administrators Guide
Tip
Trend Micro recommends sending summary notifications for better
performance.
__DST_IP_ADDR__ Destination IP
6-22
Administration
7. Click Save.
Procedure
4. Click Add.
6-23
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Go to Administration > Notifications > Notification Settings >
Suspicious Hosts Detections.
6-24
Administration
Tip
Trend Micro recommends using the default settings.
6-25
DDI AG - Deep Discovery Inspector Administrators Guide
Note
When a __LOOP_[variable]__ message token is applied, the LOOP variable
will repeat continuously between the LOOP start time and the LOOP end
time.
6. Click Save.
Procedure
6-26
Administration
6-27
DDI AG - Deep Discovery Inspector Administrators Guide
Note
The amount of network traffic is rounded up to the nearest whole
number. For example, 1.2 GB displays as 2 GB and 2.6 GB displays as 3
GB.
6. Click Save.
6-28
Administration
Procedure
1. Go to Administration > Notifications > Notification Settings >
Unanalyzed Sample Detections.
The Unanalyzed Sample Detections screen appears.
Tip
Trend Micro recommends using the default settings.
6-29
DDI AG - Deep Discovery Inspector Administrators Guide
Note
When a __LOOP_[variable]__ message token is applied, the LOOP variable
will repeat continuously between the LOOP start time and the LOOP end
time.
6. Click Save.
6-30
Administration
Procedure
1. Go to Administration > Notifications > Notification Settings > Virtual
Analyzer Detections.
6-31
DDI AG - Deep Discovery Inspector Administrators Guide
Tip
Trend Micro recommends sending summary notifications for better
performance.
6-32
Administration
Variable Description
6. Click Save.
Procedure
1. Go to Administration > Notifications > Notification Settings > Deny
List.
6-33
DDI AG - Deep Discovery Inspector Administrators Guide
Tip
Trend Micro recommends using the default settings.
6-34
Administration
6. Click Save.
Procedure
1. Go to Administration > Notifications > Retro Scan Detections.
6-35
DDI AG - Deep Discovery Inspector Administrators Guide
Tip
Trend Micro recommends using the default settings.
6-36
Administration
6. Click Save.
Delivery Options
Use the Email Settings screen to configure the following for all notifications:
• Recipient email address
• Maximum notifications per time period
• Notification time period
Procedure
1. Go to Administration > Notifications > Delivery Options > Email
Settings.
6-37
DDI AG - Deep Discovery Inspector Administrators Guide
3. Type the amount of maximum notifications that can be sent during the
specified time period.
Tip
Trend Micro recommends using the default settings.
Tip
Trend Micro recommends using the default settings.
5. Click Save.
6-38
Administration
Monitoring / Scanning
Monitoring / Scanning settings establish filters and exclusions for the
following Deep Discovery Inspector network detection features:
• Hosts / Ports on page 6-39
• Threat Detections on page 6-41
• Web Reputation on page 6-47
For more information, see Smart Protection on page 6-43
• Application Filters on page 6-51
• Deny List / Allow List on page 6-53
• Detection Rules on page 6-66
• Packet Capture on page 6-67
• Detection Exceptions on page 6-70
Hosts / Ports
Configure Hosts / Ports to specify the network traffic that Deep Discovery
Inspector monitors. Scan all traffic in your network or traffic through
specified segments of your network.
Deep Discovery Inspector monitors all network traffic by default.
Monitoring specific network traffic on portions of a network can significantly
reduce the number of threat- and event-related detections. For example, to
scan inbound and outbound email traffic, select Monitor specific IP ranges
and/or ports and then add a rule with the following settings:
• Source IP: All
• Destination IP: All
• Destination port: 25
6-39
DDI AG - Deep Discovery Inspector Administrators Guide
Tip
Trend Micro recommends using the default setting to monitor all network
traffic.
Procedure
e. Click Save.
6-40
Administration
Tip
For certain IP addresses, subnet prefix "/32" is required.
Threat Detections
Enable or disable the following features:
• Threat Detections: Detects both known and potential threats. Deep
Discovery Inspector enables this feature by default.
• Outbreak Containment Service: Enables Deep Discovery Inspector to
record detection information in the logs and block network traffic.
Procedure
1. Go to Administration > Monitoring / Scanning > Threat Detections.
6-41
DDI AG - Deep Discovery Inspector Administrators Guide
Note
The MARS Service enables Deep Discovery Inspector to send detection
information about mobile devices to the MARS server for analysis.
• class
• cmd
• hta
• jar
• js
• lnk
6-42
Administration
• macho
• mov
• ps1
• svg
• swf
• vbe
• vbs
• wsf
Feedback may include product name/ID and version and detection
information, including file types and SHA-1s, URLs, IP addresses, and
domains.
7. Click Save.
Smart Protection
Trend Micro Smart Protection technology is a next-generation, in-the-cloud
protection solution providing File and Web Reputation Services. By
integrating Web Reputation Services, Deep Discovery Inspector can obtain
reputation data for websites that users attempt to access. Deep Discovery
Inspector logs URLs that Smart Protection technology verifies to be
fraudulent or known sources of threats and then uploads the logs for report
generation.
Note
Deep Discovery Inspector does not use the File Reputation Service that is part
of Smart Protection technology.
6-43
DDI AG - Deep Discovery Inspector Administrators Guide
Reputation services are delivered through the Trend Micro Smart Protection
Network and Smart Protection Server. The following table provides a
comparison.
Note
For details about the supported versions of Smart Protection Server, see
Integrated Trend Micro Products/Services on page 6-107.
6-44
Administration
Usage Use if you do not plan to install Use as primary source and the
Smart Protection Server Smart Protection Network as an
alternative source
To configure Smart Protection
Network as source, see Configuring For guidelines on setting up Smart
Web Reputation Settings on page Protection Server and configuring
6-47. it as source, see Setting Up Smart
Protection Server on page 6-45.
Consideration Description
Deployment If you have previously installed a Smart Protection Server for use with
another Trend Micro product, you can use the same server for Deep
Discovery Inspector. While several Trend Micro products can send
queries simultaneously, the Smart Protection Server may become
overloaded as the volume of queries increases. Make sure that the
Smart Protection Server can handle queries coming from different
products. Contact your support provider for sizing guidelines and
recommendations.
IP Address Smart Protection Server and the VMware ESX/ESXi server (which hosts
the Smart Protection Server) require unique IP addresses. Check the
IP addresses of the VMware ESX/ESXi server and Deep Discovery
Inspector to make sure that these IP addresses are not assigned to the
Smart Protection Server.
Procedure
1. Install Smart Protection Server (standalone) on a VMware ESX/ESXi
server.
6-45
DDI AG - Deep Discovery Inspector Administrators Guide
Note
• Smart Protection Server may not have reputation data for all URLs
because it cannot replicate the entire Smart Protection Network
database. When updated infrequently, Smart Protection Server may
also return outdated reputation data.
• Enabling this option improves the accuracy and relevance of the
reputation data.
• Disabling this option reduces the time and bandwidth to obtain the
data.
Procedure
1. Go to Administration > Monitoring / Scanning > Web Reputation >
Smart Protection Server List.
2. To verify the connection status with a Smart Protection Server, click Test
Connection.
3. To modify server settings:
a. Click the server address.
b. In the window that appears, modify the server's IP address,
description, and settings.
6-46
Administration
Web Reputation
Deep Discovery Inspector integrates the Trend Micro Smart Protection
Network, a cloud-based infrastructure that determines the reputation of
websites that users attempt to access. Deep Discovery Inspector logs URLs
that Smart Protection technology identifies as fraudulent or known sources
of threats.
Note
Web Reputation logs can be queried from Detections > All Detections.
Procedure
1. Go to Administration > Monitoring / Scanning > Web Reputation.
6-47
DDI AG - Deep Discovery Inspector Administrators Guide
6-48
Administration
Important
Selecting this option allows you to enable Retro Scan, a cloud-based
service that scans historical web access logs for callback attempts to
C&C servers and other related activities in your network. Web access
logs may include undetected and unblocked connections to C&C
servers that have only recently been discovered. Examination of such
logs is an important part of forensic investigations and may help you
determine if your network is affected by attacks.
Important
Selecting this option disables Retro Scan and deletes all previous
Retro Scan detection logs.
6-49
DDI AG - Deep Discovery Inspector Administrators Guide
Note
If proxy settings are disabled, Smart Protection Servers that connect
through the proxy server will connect to Deep Discovery Inspector
directly. Under the Proxy Connection column, the status displays
“No” when proxy settings are disabled.
Note
On the proxy server, configure the following ports to allow a
connection to Smart Protection Server:
• 5275
• 443
f. Click Add.
6-50
Administration
Note
Add up to 10 servers. If multiple servers are configured, Deep
Discovery Inspector connects to servers following the order in which
they appear in the list.
Tip
Trend Micro recommends adding multiple Smart Protection Servers
for failover purposes. If Deep Discovery Inspector is unable to
connect to a server, it attempts to connect to other servers on the
Smart Protection Server List.
h. Use the arrows under the Order column to set server priority.
Most Web Reputation detections are related to spam and adware. Reduce
detection volume by excluding spam and adware detections.
7. Click Save.
Application Filters
Application Filters provide valuable information to quickly identify security
risks and prevent the spread of malicious code.
Applicatio
Description
n
6-51
DDI AG - Deep Discovery Inspector Administrators Guide
Applicatio
Description
n
Procedure
Tip
Use the Ctrl key to select one or multiple applications.
6-52
Administration
Tip
Use the Ctrl key to select one or multiple applications.
Tip
Use the Ctrl key to select one or multiple applications.
5. Click Save.
The Deny List / Allow List screen includes the following tabs: Deny List,
Allow List, and Import/Export.
6-53
DDI AG - Deep Discovery Inspector Administrators Guide
Tab Description
Deny List Deep Discovery Inspector allows you to manage the connection to
entities in the Deny List. You can set the action for Deny List entities
as follows:
• Monitor
• Monitor and reset
Allow List Deep Discovery Inspector allows the connection to entities in the
Allow List.
Tip
Use the Allow List to lower the number of false positive
detections from the Deny List.
6-54
Administration
IP Address Syntax
• Single IP:
IP addresses must be in the format: XXX.XXX.XXX.XXX, where X is a
whole number between 0 and 255.
IPv4 example: 192.168.1.1
IPv6 example: fd00:1:1111:200::1000
• IP Range:
IP addresses must be in the format: XXX.XXX.XXX.XXX-XXX.XXX.XXX.XXX,
where X is a whole number between 0 and 255.
IPv4 example: 192.168.1.0-192.168.1.255
IPv6 example: fd00:1:1111:200::1000-fd00:1:1111:200::1fff
• Subnet:
IP addresses must be in the format: XXX.XXX.XXX.XXX/<Mask Bit>,
where X is a whole number between 0 and 255, and <Mask Bit> is a
whole number between 1 and 32.
IPv4 example: 192.168.1.0/24
IPv6 example: fd00:1:1111:200::1000/116
6-55
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Convert non-UTF8 characters to Punycode.
Maximum Length
Maximum length of each domain name: 63 characters
Maximum length of domain: 255 characters
Wildcards (*)
Wildcards are only allowed in a prefix. When a wildcard is used in a prefix, it
must be connected with ". ". Only one wildcard may be used in a domain.
Domain matching is case-sensitive.
6-56
Administration
URL Syntax
[http:// | https://]<Domain>[:<Port>][/<URI-prefix>]
• [http:// | https://]
If unassigned, the default is "http://".
To match both "http://:" and "https://", create multiple rules.
• <Domain>
Follow the syntax of Domain deny list for DNS.
• [:<Port>]
(Optional) If unassigned, the default is ":80" (port 80) for HTTP or
":443" (port 443) for HTTPS.
Assign a specific port with a whole number between 1 and 65,535, or
use a wildcard (*) to assign all ports.
• [/<URI-prefix>]
(Optional) If unassigned, the default is a wildcard that matches all
paths.
Use "/" and "/*" to match a URL without a path.
Example: www.abc.com/* matches www.abc.com
[/<URI-prefix>] is always applied as a prefix matching. Only one
wildcard is accepted in a prefix.
URI matching is not case-sensitive.
6-57
DDI AG - Deep Discovery Inspector Administrators Guide
SHA-1 Syntax
Deep Discovery Inspector supports the following characters for SHA-1 rules:
ASCII
• 0x30 (0) ~ 0x39 (9)
• 0x41 (A) ~ 0x46 (F)
• 0x61 (a) ~ 0x66 (f)
Maximum Length
Maximum length of a SHA-1 rule: 40
6-58
Administration
6-59
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Configure View to display one of the following Deny List / Allow List
entities.
• Files
• IP Addresses
• URLs
• Domains
2. Click Add to open the Add Item to Deny List/Add Item to Allow List
screens.
Files SHA-1
IP Addresses IP Address
URLs URL
Domains Domain
Note
To configure the maximum file size, go to Administration > System
Maintenance > Storage Maintenance.
c. (Deny List only) Set an Action to manage the connection to the new
entity.
6-60
Administration
Files Monitor
IP Addresses • Monitor
• Monitor and reset
URLs • Monitor
• Monitor and reset
Domains • Monitor
• Monitor and reset
3. To remove one or more Deny List or Allow List entities, click Delete.
6. (Optional: Deny List only) To change the priority of a Deny List Entity,
click the icon next to its priority number.
The priority number indicates the order that a Deny List Entity is
matched to detections. Priority numbers are sequential in numerical
order. Smaller numbers match first.
Note
To search for a SHA-1 entity, type the exact value. For IP Address, Domain,
or URL entities, Deep Discovery Inspector matches partial values.
6-61
DDI AG - Deep Discovery Inspector Administrators Guide
Note
For optimum performance, use the Reload button when updating a Deny
List / Allow List.
CSV Format Deep Discovery Inspector supports only standard .csv format. Use comma
separation and UTF-8 encoding.
For all other Deny List / Allow List format rules, refer to Deny List / Allow List
Format Rules on page 6-54.
6-62
Administration
Procedure
1. Go to Administration > Monitoring / Scanning > Deny List / Allow List
> Import/Export.
2. Select the Import/Export tab.
3. To export a Deny List, click Export Deny List, and then click Export.
Deep Discovery Inspector exports a .csv file that includes all custom
Deny Lists.
4. To export an Allow List, click Export Allow List, and then click Export.
Deep Discovery Inspector exports a .csv file that includes all custom
Allow Lists.
6-63
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Go to Administration > Monitoring / Scanning > Deny List / Allow List
> Import/Export.
2. Select the Import/Export tab.
3. (Optional) Prepare a .csv file.
Do one of the following:
• Prepare a custom Deny List.
Prepare a .csv file that includes the following fields: Status,
Priority, Deny List Entity, Source Type, Type, Action, Comments,
and Last Modified
• Prepare a custom Allow List.
Prepare a .csv file that includes the following fields: Status, Allow
List Entity, Source Type, Type, Comments, and Last Modified
Status
6-64
Administration
• 0: Disable
• 1: Enable
Source Type
• 0: User-defined
• 1: Virtual Analyzer
• 2: C&C Callback
• 0: Monitor
Note
If you do not input a value for Status, Source Type, and Action, default
values are applied as follows:
• Status: 1
• Source Type: 0
• Action: 0
Note
The .csv file, type, and allow list entity fields must be populated with a
valid entity. Select File, IP address, URL, or Domain as Type.
For Status and Action, only 0 and 1 are valid characters. For Source Type,
only 0, 1, and 2 are valid characters. If you use any other characters, the
import attempt will return an error.
5. Click Import.
6-65
DDI AG - Deep Discovery Inspector Administrators Guide
Detection Rules
Customize threat detections by enabling and disabling detection rules.
Access the Threat Encyclopedia to learn more about detection rules, such as
confidence level, overview, technical details, and more. To access the Threat
Encyclopedia, in the management console go to Help > Threat Encyclopedia
and then browse the Network Content Inspection Rules or search for a
specific rule number.
Procedure
5. (Optional) Select one of the following options from the Change all rules
to drop-down menu, and then click Save Changes.
Note
Trend Micro recommends using the Default Status setting.
6-66
Administration
Packet Capture
Select Enable packet capture to capture TCP/UDP packets that are associated
with specified detections. Deep Discovery Inspector has the ability to capture
not only detection traffic, but also other traffic associated with the specified
client that initiated the connection, or the specified server that connected
with the client within the time that detection happens.
WARNING!
Enabling this feature requires the appliance to restart. Disabling this feature
does not require the appliance to restart.
On this screen, you can Add, Delete, Import, and Export packet capture
rules. You can add a maximum of 1000 rules.
Use Export to export the packet capture rules and share the rules with other
Deep Discovery Inspector appliances. Use Import to import packet capture
rules that have been exported from other Deep Discovery Inspector
appliances.
Packet capture files for the specified detections can be downloaded from the
detection details screens. In the pcap file, the comment "Detected Packet" in
the "pkt_comment" field marks the packet that triggered the detection. For
details, see All Detections - Detection Details - Connection Details on page 4-73
and Affected Hosts - Detection Details - Connection Details on page 4-18.
6-67
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Trend Micro recommends using this feature sparingly. Capturing too many
network packets may consume processing capability and disk space.
To increase available storage space, you can delete PCAP files and logs at
Administration > System Maintenance > Storage Maintenance.
Procedure
1. Go to Administration > Monitoring / Scanning > Packet Capture.
2. Click Add.
A new screen appears.
3. Select Enable.
4. Specify the rule priority.
5. (Optional) Type a Description.
6. Type one or more IP addresses, or IP address ranges.
Note
Only packets for detections of the specified addresses or within the
specified ranges are captured.
You can add a maximum of 50 entries that can be IP addresses or IP
address ranges.
6-68
Administration
• Threat/Detection/Reference
Note
Contains and Does not contain match partial strings. Equals does
not match partial strings.
• Severity
Note
Click "+" to add additional criteria. Alternatively, click "-" to remove
criteria.
You can add a maximum of 10 criteria.
6-69
DDI AG - Deep Discovery Inspector Administrators Guide
Detection Exceptions
Detection Exceptions contains a list of exception criteria. Detections that
match any of the enabled criteria are not recorded in the logs.
Procedure
1. Go to Administration > Monitoring / Scanning > Detection Exceptions.
2. (Optional) Add a detection exception.
a. Click Add.
The Add Exception window appears.
b. Select the Status.
• Enabled: enable the detection exception.
• Disabled: disable the detection exception.
a. (Optional) For Description, type your own description about the
detection exception.
b. For Exception criteria, specify the criteria for the detection
exception. Click + to add additional criteria.
6-70
Administration
Note
Use TAB or ENTER as the delimiter to specify multiple values.
Use the contains operator to match a partial string, or use the in
operator to match an exact string. Deep Discovery Inspector uses
case-insensitive string matching.
Examples:
• Host Name - In - abc,DEF
This criteria matches any host name that is exactly (case-
insensitive) "abc" or "def".
• "abc" is matched
• "deF" is matched
• "abcxyz" is not matched
• "xyzdEf" is not matched
• Host Name - Contains - abc,DEF
This criteria matches any host name that contains (case-
insensitive) "abc" or "def" in any part of the host name.
• "abc" is matched
• "deF" is matched
• "abcxyz" is matched
• "xyzdEf" is matched
c. Click Add.
The Add Exception window closes.
d. Click Save.
3. (Optional) Delete one or more detection exceptions.
a. Select each checkbox next to the detection exceptions that you want
to delete.
b. Click Delete.
6-71
DDI AG - Deep Discovery Inspector Administrators Guide
c. Click Save.
4. (Optional) Click Export All to save a file containing all the detection
exceptions criteria.
WARNING!
Importing detection exceptions replaces all current detection exceptions.
Trend Micro recommends that you first create a backup of your current
detection exceptions by first using the Export All feature.
a. Click Import.
a. Click the icon in the Edit column next to the item that you want to
edit.
c. Click Save.
d. Click Save.
b. Click Save.
6-72
Administration
Virtual Analyzer
Virtual Analyzer provides an isolated virtual environment to manage and
analyze samples with no network risk. Virtual Analyzer uses system images
to observe sample behavior and characteristics, and then assigns a risk level
to the sample.
Support for an internal or external Virtual Analyzer is built into Deep
Discovery Inspector and can be enabled at any time. Deep Discovery
Inspector can also connect to an external Virtual Analyzer built into other
Trend Micro products.
This section includes the following categories:
• Virtual Analyzer Setup on page 6-73
• File Submissions on page 6-77
• Internal Virtual Analyzer on page 6-85
• Modifying Instances on page 6-91
Note
Availability may vary depending on your Deep Discovery Inspector model
and license.
Note
For details about supported external Virtual Analyzer products, see
Integrated Trend Micro Products/Services on page 6-107.
6-73
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Availability may vary depending on your Deep Discovery Inspector model
and license.
Procedure
Note
Options may vary depending on your Deep Discovery Inspector model and
license.
• Internal
6-74
Administration
WARNING!
Trend Micro recommends using a custom network for sample
analysis.
The custom network should be independent of the management
network and other internal networks so that malicious samples
in the custom network do not affect hosts in the other networks.
Custom network Configure a specific port for Virtual Analyzer traffic. Make
(recommended) sure that the port is able to connect directly to an outside
network.
Virtual Analyzer connects to the Internet using another
port. Specify an available port and make sure that there
are no port conflicts.
Note
Virtual Analyzer requires an Internet connection to query Trend
Micro cloud-based services (for example, WRS and CSSS) for
available threat data.
Note
To configure the proxy settings, the management network or
custom network must be selected as the network type.
6-75
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Virtual Analyzer supports HTTP and HTTPS proxy servers.
Note
Log onto the external Virtual Analyzer to obtain the API key.
Note
By default, the proxy setting is enabled when Sandbox as a Service is
selected. If a proxy is not configured, Deep Discovery Inspector still
connects to the service.
6-76
Administration
Note
Trend Micro recommends testing the Internet connectivity whenever new
settings are saved.
File Submissions
To reduce the number of files in the Virtual Analyzer queue, enable Certified
Safe Software Service (CSSS) and configure file submission rules.
When CSSS is enabled, Deep Discovery Inspector prevents safe files from
entering the Virtual Analyzer queue. Benefits include the following:
6-77
DDI AG - Deep Discovery Inspector Administrators Guide
Tip
Certified Safe Software Service is enabled by default. Trend Micro recommends
using the default settings.
• Criteria: Set of conditions that a file must satisfy before the specified
action is taken
Deep Discovery Inspector checks a file against each rule in the list until
finding a match. If you do not add any rules, Deep Discovery Inspector uses
the following default rules.
Table 6-12. Default Submission Rule Elements
6-78
Administration
6-79
DDI AG - Deep Discovery Inspector Administrators Guide
Example File
Option File Type
Extensions
6-80
Administration
Note
To submit Mac OS X Installer Packages, you must select Mac OS X
Installer Package for the File Type option and specify pkg for the File
Extension option.
3. File Extension
4. File Size
Specify a value that is less than or equal to the maximum file size
configured at Administration > System Maintenance > Storage
Maintenance > File Size Settings.
5. Direction
6. Src / Dest IP
• All
• Specific IP address
7. URL
Syntax: [http://]<Domain>[:<Port>][/<URI-prefix>]
• [http://]
• <Domain>
6-81
DDI AG - Deep Discovery Inspector Administrators Guide
• [:<Port>]
• [/<URI-prefix>]
Tip
If you add URL criteria, Trend Micro recommends also adding a new
criteria for Protocol. For example, add HTTP or email related protocols.
You can perform any of the following actions on the File Submission Rules
screen:
• Import: Import rules that were exported from any Deep Discovery
Inspector appliance.
6-82
Administration
Note
Importing replaces all existing rules. Trend Micro recommends creating a
backup of all existing rules before importing.
Note
Deep Discovery Inspector exports rules to a .dat file.
Procedure
1. Go to Administration > Virtual Analyzer > File Submissions.
2. Under File Submission Rules, click Add.
The New Submission Rule window appears.
3. Select Enable submission rule.
4. Under Criteria, select one of the following:
• Basic: Checks files based on detection type and other properties
• Advanced: Checks files based on detection rules and other
properties
5. (Optional) For Basic, select at least one of the following detection types:
• No detection types: Files that did not trigger any Deep Discovery
Inspector detection rules
6-83
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Select this option to search for files that meet certain criteria but do
not have detections.
Note
Select at least one detection type.
6-84
Administration
• Internal hosts
• External hosts
• Src / Dest IP: For both source and destination, click Select and
select one of the following:
• All
• Specify IP address
Tip
If you add URL criteria, Trend Micro recommends also adding a new
criteria for Protocol. For example, add HTTP or email related
protocols.
9. Select the action that Deep Discovery Inspector takes when the file
meets the configured criteria.
10. Specify the rule priority. Type a number between one and the total
number of rules.
Before using Deep Discovery Inspector, import images and configure the
internal Virtual Analyzer settings.
6-85
DDI AG - Deep Discovery Inspector Administrators Guide
Note
No settings under Internal Virtual Analyzer apply to an external Virtual
Analyzer nor Sandbox as a Service. For details about external analysis modules,
refer to the applicable product Administrator's Guide.
Sandbox Management
The Sandbox Management screen contains the following tabs:
• Status
• Images
• Passwords
• Sandbox for macOS
Note
No settings under Sandbox Management apply to an external Virtual Analyzer
nor Sandbox as a Service. For details about external analysis modules, refer to
the applicable product Administrator's Guide.
6-86
Administration
• Importing images…
• Stopping…
• Stopped
• Running
• No active images
• Disabled
To allow Virtual Analyzer to analyze files, import custom OVA files that are
between 1 GB and 30 GB in size.
Image Preparation
Virtual Analyzer does not contain any images by default. To analyze samples,
you must prepare and import at least one image in the Open Virtual
Appliance (OVA) format.
You can use existing VirtualBox or VMware images, or create new images
using VirtualBox. For details, see Chapters 2 and 3 of the Virtual Analyzer
Image Preparation User's Guide at http://docs.trendmicro.com/en-us/
enterprise/virtual-analyzer-image-preparation.aspx.
Before importing, validate and configure images using the Virtual Analyzer
Image Preparation Tool. For details, see Chapter 4 of the Virtual Analyzer
Image Preparation User's Guide.
6-87
DDI AG - Deep Discovery Inspector Administrators Guide
Importing an Image
Deep Discovery Inspector stops all analysis and keeps all samples in the
Virtual Analyzer queue whenever an image is imported or deleted, or when
instances are modified. All instances are also automatically redistributed
whenever you import images.
Note
Windows operating systems and other Microsoft products are available
separately from Microsoft and Microsoft channel partners.
Important
Trend Micro does not provide any Microsoft Windows operating systems or
third-party products required for installation on virtual appliances or
sandboxes you create within Deep Discovery Inspector. You must provide the
operating system and any other application installation media with appropriate
licensing rights necessary for you to create any sandboxes.
Procedure
1. Go to Administration > Virtual Analyzer > Internal Virtual Analyzer >
Sandbox Management > Images.
2. Click Import.
The Import Image screen appears.
3. Select one of the following image sources and configure the applicable
settings.
6-88
Administration
Source Procedure
Local or network folder a. Type an image name with a maximum of 260 characters.
Note
Trend Micro Cloud Sandbox is a reserved name
and cannot be used.
b. Click Connect.
c. Once connected, import the image using the Virtual
Analyzer Image Import Tool.
For details, see Importing an Image Using the Virtual
Analyzer Image Import Tool on page 6-90.
Note
Deep Discovery Inspector deploys instances
immediately after the image uploads. Wait for
deployment to complete.
HTTP or FTP server a. Type an image name with a maximum of 260 characters.
Note
Trend Micro Cloud Sandbox is a reserved name
and cannot be used.
Note
Select Log on anonymously only if the server
supports this function.
d. Click Import.
6-89
DDI AG - Deep Discovery Inspector Administrators Guide
Virtual Analyzer supports OVA files that are between 1 GB and 30 GB in size.
Procedure
6-90
Administration
Modify Instances
Deep Discovery Inspector stops all analysis and keeps all samples in the
Virtual Analyzer queue whenever an image is imported or deleted, or when
instances are modified. All instances are also automatically redistributed
whenever you import images.
Modifying Instances
Procedure
1. Go to Administration > Virtual Analyzer > Internal Virtual Analyzer >
Sandbox Management > Images.
2. Click Modify.
The Modify Instances screen appears.
3. Specify the number of instances for each image.
Note
Each image must have a minimum of one instance.
6-91
DDI AG - Deep Discovery Inspector Administrators Guide
4. Click Save.
Deleting Instances
Procedure
1. Go to Administration > Virtual Analyzer > Internal Virtual Analyzer >
Sandbox Management > Images.
2. Click Modify.
The Modify Instances screen appears.
3. To delete an instance, click the minus icon to the left of an image's
instance count.
Note
Each image must have a minimum of one instance.
4. Click Save.
Archive Passwords
Suspicious files must always be handled with caution. Trend Micro
recommends adding such files to a password-protected archive file before
transporting across the network.
Virtual Analyzer uses user-specified passwords to extract files from archive
files.
To use this feature, add and enable a basic file submission rule with the
following criteria:
• Detection type: Files with no detections
• File type: Selectable file types to be decrypted with the listed passwords
For details, see Adding a File Submission Rule on page 6-83.
6-92
Administration
Note
Passwords can only be used for the first encryption layer. Decryption of SMTP
attachments is not supported.
Deep Discovery Inspector stores archive file passwords as unencrypted text.
Procedure
1. Go to Administration > Virtual Analyzer > Internal Virtual Analyzer >
Sandbox Management > Passwords.
2. Under Archive File Passwords, type a password.
3. (Optional) Click Add password... and type another password.
4. Click Save.
6-93
DDI AG - Deep Discovery Inspector Administrators Guide
and then enable Send possible threats for macOS to Sandbox as a Service
for analysis.
Verify the service connectivity on the Network Services Diagnostics screen.
For details, see Cannot Connect to Network Services on page 7-17.
Important
Replacing the Deep Discovery Inspector Activation Code automatically disables
the sandbox for macOS. After replacing the Deep Discovery Inspector
Activation Code, re-enable the sandbox for macOS.
YARA Rules
Deep Discovery Inspector uses YARA rules to identify malware. YARA rules
are malware detection patterns that are fully customizable to identify
targeted attacks and security threats specific to your environment.
YARA rules are applied only to objects submitted to the internal Virtual
Analyzer. No settings under YARA Rules apply to an external Virtual
Analyzer nor Sandbox as a Service. For details about external analysis
modules, refer to the applicable product Administrator's Guide.
Deep Discovery Inspector supports a maximum of 5,000 enabled YARA rules
regardless of the number of YARA rule files. On the top-right corner of the
YARA rule table, the Rules in use field indicates the number of YARA rules
currently enabled in the system.
When integrated with Deep Discovery Director, Deep Discovery Director
centrally manages all YARA rules and you must manage the YARA rules in
the Deep Discovery Director management console. For details, see the Deep
Discovery Director Administrator's Guide.
Important
After you register Deep Discovery Inspector to Deep Discovery Director, Deep
Discovery Inspector automatically synchronizes YARA rule settings from Deep
Discovery Director and overwrites existing YARA rule settings that you have
configured.
6-94
Administration
Field Description
Files To Analyze File types to analyze using the YARA rules in the YARA rule file.
Last Updated Date and time the YARA rule file was last updated.
rule NumberOne
{
meta:
desc = "Sonala"
weight = 10
strings:
$a = {6A 40 68 00 30 00 00 6A 14 8D 91}
$b = {8D 4D B0 2B C1 83 C0 27 99 6A 4E 59 F7 F9}
$c = "UVODFRYSIHLNWPEJXQZAKCBGMT"
condition:
6-95
DDI AG - Deep Discovery Inspector Administrators Guide
$a or $b or $c
}
The following table lists the different parts of the YARA rule and how they
are used:
Table 6-14. YARA Rule Parts and Usage
Part Usage
rule The YARA rule name. Must be unique and cannot contain spaces.
meta: Indicates that the "meta" section begins. Parts in the meta section do
not affect detection.
weight Optional part that must be between 1 and 10 that determines the risk
level if rule conditions are met:
• 1 to 9 = Low risk
• 10 = High risk
Note
The weight value does not correspond to the risk level assigned
by Deep Discovery Inspector.
strings: Indicates that the "strings" section begins. Strings are the main means
of detecting malware.
$a or $b or $c Conditions are Boolean expressions that define the logic of the rule.
They tell the condition under which a submitted object satisfies the
rule or not. Conditions can range from the typical Boolean operators
and, or and not, to relational operators >=, <=, <, >, == and !=.
Arithmetic operators (+, -, *, \, %) and bitwise operators (&, |, <<, >>,
~, ^) can be used on numerical expressions.
6-96
Administration
Procedure
1. Go to Administration > Virtual Analyzer > Internal Virtual Analyzer >
YARA Rules.
2. Click Add to add a YARA rule file.
The Add YARA Rule File window appears.
3. In the new window that opens, configure the following:
a. Rule file: Browse and select a YARA rule file to add.
b. Files to analyze: Select file types that Virtual Analyzer processes
specific to this YARA rule file.
Note
Analyzing all file types may cause unintended detections. Trend
Micro recommends analyzing specific file types that are targeted by
the YARA rule file.
4. Click Add when you have selected the YARA rule file to add and the file
types to analyze.
Virtual Analyzer validates the YARA rule file before adding it.
Procedure
1. Go to Administration > Virtual Analyzer > Internal Virtual Analyzer >
YARA Rules.
6-97
DDI AG - Deep Discovery Inspector Administrators Guide
4. Click Save.
Procedure
3. Click Delete.
Procedure
Note
You can export only one YARA rule at a time.
6-98
Administration
Network configuration defines and establishes the profile of the network that
Deep Discovery Inspector monitors for the Network Content Correlation
Engine.
Procedure
2. Click Add.
6-99
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Provide specific groups with descriptive names for easy identification of
the network to which the IP address belongs. For example: "Finance
network", "IT network", or "Administration".
4. Type an IP address range in the text box (up to 1,000 IP address ranges).
Note
The IP address range cannot contain a Class D or Class E address (224.0.0.0
- 255.255.255.255)
Tip
Create a new network group by editing the Default network group.
6-100
Administration
Note
Add up to three layers of sub-groups.
Note
Trusted indicates a secure network and Untrusted indicates a degree of
doubt about the security of the network.
6. Click Add.
7. Click Save.
Procedure
1. Go to Administration > Network Groups and Assets > Registered
Domains.
2. (Optional) Specify registered domains to add.
6-101
DDI AG - Deep Discovery Inspector Administrators Guide
a. Click Add.
The Add Registered Domains window appears.
b. For Domains, type one or more domains delimited by spaces.
c. (Optional) For Description, type your own description for the
domains.
3. (Optional) Analyze detections and select registered domains to add.
a. Click Analyze.
The detections are analyzed. After analysis, a list of detected
services and domains on your network appears.
b. Select the checkbox for each item you want to add.
c. (Optional) In the Description column, type a description for each
item that you selected.
d. Click Save.
e. Refresh the page in your browser.
The domains appear in the list.
4. (Optional) To edit a domain, click on the domain in the list.
6-102
Administration
Note
Add up to 10000 total registered services. More than one server (IP address)
may be dedicated to each service.
Each service-IP address combination adds an entry that counts towards the
total 10000 registered services. For example, if you specify DNS for Services,
and 10.2.1.1 and 10.2.1.2 for IP addresses, then 2 registered services are
added.
Procedure
1. Go to Administration > Network Groups and Assets > Registered
Services.
2. (Optional) Specify registered services to add.
a. Click Add.
The Add Registered Services window appears.
b. For Services, select one or more services.
Table 6-15. Service Types
Active Directory Provides directory services and stores user accounts and
passwords
Configure the same server as the Domain Controller.
6-103
DDI AG - Deep Discovery Inspector Administrators Guide
6-104
Administration
For example, if you specify DNS and SMTP for Services, and
10.2.1.1 and 10.2.1.2 for IP addresses, then the following 4
registered services are added:
• DNS: 10.2.1.1
• DNS: 10.2.1.2
• SMTP: 10.2.1.1
• SMTP: 10.2.1.2
d. (Optional) For Description, type your own description for the
services.
3. (Optional) Analyze detections and select registered services to add.
a. Click Analyze.
The detections are analyzed. After analysis, a list of detected
services and domains on your network appears.
b. Select the checkbox for each item you want to add.
c. (Optional) In the Description column, type a description for each
item that you selected.
d. Click Save.
e. Refresh the page in your browser.
The services appear in the list.
4. (Optional) To edit a service, click on the IP address in the list.
6-105
DDI AG - Deep Discovery Inspector Administrators Guide
The default file name is cav.xml, which you can change to a preferred file
name.
Note
To replicate Deep Discovery Inspector settings in addition to network
configuration settings, see Backup / Restore on page 6-198.
Procedure
1. On Appliance 1, go to Administration > Monitoring / Scanning >
Network Groups and Assets > Import/Export.
2. Under Export Configuration, click Export.
A message prompts you to open or save the cav.xml file.
3. Click Save, browse to the target location of the file, and click Save again.
4. On Appliance 2, go to Administration > Monitoring / Scanning >
Network Groups and Assets > Import/Export.
5. Under Export Configuration, click Export.
A message prompts you to open or save the cav.xml file.
6. Click Save, browse to the target location of the file, and click Save again.
This backs up the current network configuration settings.
7. Under Import Configuration, click Choose File.
8. Locate the cav.xml file and click Open.
9. Click Import.
6-106
Administration
Integrated Products/Services
Deep Discovery Inspector integrates with other Trend Micro products and
services.
6-107
DDI AG - Deep Discovery Inspector Administrators Guide
Apex Central
Trend Micro Apex Central is a software management solution that simplifies
the administration of your corporate antivirus and content security policies.
Apex Central provides the following features:
• Centrally manages the following:
• Suspicious objects, user-defined lists, and exception lists
• Multiple Deep Discovery Inspector system statuses
• Antivirus and content security programs, regardless of the
program's physical location or platform
6-108
Administration
For information about managing products using Apex Central, see the Trend
Micro Apex Central Administrator's Guide.
Use the Apex Central screen on the Deep Discovery Inspector management
console to perform the following:
Note
Make sure that both Deep Discovery Inspector and the Apex Central server
belong to the same network segment. If Deep Discovery Inspector is not in the
same network segment as Apex Central, configure the port forwarding settings
for Deep Discovery Inspector.
Component Description
6-109
DDI AG - Deep Discovery Inspector Administrators Guide
Component Description
Procedure
1. Go to Administration > Integrated Products/Services > Apex Central.
2. Under Connection Settings, specify the name that identifies Deep
Discovery Inspector in the Apex Central Product Directory.
Note
Specify a unique and meaningful name to help you quickly identify Deep
Discovery Inspector.
6-110
Administration
Note
5. If you have configured proxy settings for Deep Discovery Inspector and
want to use these settings for Apex Central connections, select Connect
through a proxy server.
Important
You can only choose to synchronize suspicious objects with one
source. If you enable Deep Discovery Inspector to sync with Apex
Central, you will not receive suspicious objects from any other
external sources.
Note
Log on to Apex Central to obtain an API key.
6-111
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
Note
Use this option to unregister Deep Discovery Inspector from Apex Central
or to register to another Apex Central.
Procedure
3. To update the Apex Central server with changes after registration, click
Update Settings.
6-112
Administration
Procedure
1. Go to Administration > Integrated Products/Services > Deep Discovery
Director > Management Server.
6-113
DDI AG - Deep Discovery Inspector Administrators Guide
Note
The following table describes the supported products or services for each
server type. For more details, see the Deep Discovery Director
documentation.
Table 6-18. Deep Discovery Director Server Supported Products/Services
Deep Discovery
Deep Discovery
Director -
Deep Discovery Director -
Network Trend Micro
Director Network
Analytics as a XDR Support
Server Type Analytics
Service
Support
Support
Note
You can find this information on the Help screen on the management
console of Deep Discovery Director.
6-114
Administration
Tip
This setting can be changed after registering to Deep Discovery
Director.
To update this setting without unregistering from Deep Discovery
Director, click Update Settings.
e. Click Register.
The Status changes to Registered | Connected.
Note
If the Deep Discovery Director fingerprint changes, the connection is
interrupted and the Trust button appears. To restore the connection,
verify that the Deep Discovery Director fingerprint is valid and then
click Trust.
After the registration process is complete, the Test Connection
button appears. You can click Test Connection to test the connection
to Deep Discovery Director.
6-115
DDI AG - Deep Discovery Inspector Administrators Guide
Note
To register to Deep Discovery Director - Network Analytics as a
Service (DDD - NAaaS), see the Deep Discovery Director
documentation.
4. If you selected Cloud version for Server type, perform the following
steps.
a. Click Register.
6-116
Administration
Note
You can find this information on the Help screen on the management
console of Deep Discovery Director.
Tip
This setting can be changed after registering to Deep Discovery
Director.
d. Click Register.
6-117
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
2. Click Unregister.
Note
When you unregister Deep Discovery Director, Deep Discovery Director -
Network Analytics and Deep Discovery Director - Network Analytics as a
Service also become unregistered.
6-118
Administration
Procedure
1. Open the Deep Discovery Inspector management console, and go to the
Administration > Integrated Products/Services > Threat Investigation
Center.
The Threat Investigation Center screen appears.
2. Click Add.
The Add Threat Investigation Center Server window appears.
3. Select Enabled.
4. In Server address, type the HTTPS log server address for Threat
Investigation Center.
5. (Optional) Enable File retrieval.
Note
When file retrieval is enabled, Threat Investigation Center collects the
investigation package and packet capture files from Deep Discovery
Inspector. This feature is available when Deep Discovery Inspector is
registered to Threat Investigation Center.
6. (Optional) Enable Use CA certificate and then click Select to select the
Threat Investigation Center CA certificate.
Note
Using a CA certificate is optional. A certificate is necessary when there is a
man-in-the-middle appliance between the Threat Investigation Center
server and Deep Discovery Inspector.
Note
Configure the system proxy settings at Administration > System Settings
> Proxy.
6-119
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. On the Deep Discovery Inspector management console, go to
Administration > Integrated Products/Services > Threat Intelligence
Sharing.
2. Select Enable Threat Intelligence Sharing to allow integrated
products/services to get information from Deep Discovery Inspector.
3. Under Criteria, select which objects to include in the threat intelligence
data file.
Note
The maximum length of shared URL objects is 997 characters.
The objects appear in the generated file under the following categories.
Table 6-19. Object Categories in Generated File
6-120
Administration
4. Under Criteria, select the risk level of the objects to be included in the
threat intelligence data file.
6. Click Save.
Note
After the file generation is successful, you can click the URL to download
the threat intelligence data file to view the content.
6-121
DDI AG - Deep Discovery Inspector Administrators Guide
Inline Products/Services
To help provide effective detection and blocking at the perimeter, Deep
Discovery Inspector can distribute Virtual Analyzer suspicious objects to
inline products and services.
Name Versions
6-122
Administration
Note
Deep Discovery Inspector supports only one inline product/service at a time.
Procedure
1. On the Deep Discovery Inspector management console, go to
Administration > Integrated Products/Services > Inline Products/
Services and select Trend Micro TippingPoint Security Management
System (SMS).
2. Provide the following information:
• Server address
6-123
DDI AG - Deep Discovery Inspector Administrators Guide
Note
The server address must be the IPv4 address or FQDN of the inline
product.
Note
Only supported by SMS 5.0 or higher.
• Suspicious Object
• IPv4 address
• Domain
6-124
Administration
• URL
Note
Only supported by SMS 5.0 or higher.
• Risk level:
• High only
• High and medium
• High, medium, and low
6. Click Save.
The following tag categories are displayed in the TippingPoint SMS
Reputation Database.
6-125
DDI AG - Deep Discovery Inspector Administrators Guide
c. On the Entry Criteria screen, type search parameters and then click
Search.
Suspicious objects and C&C callback addresses distributed by Deep
Discovery Inspector are displayed.
6-126
Administration
The SAM API implements communications between the SAM client (Deep
Discovery Inspector) and the Check Point firewall, which acts as a SAM
Server. Deep Discovery Inspector uses the SAM API to request that the Check
Point firewall take specified actions for certain connections.
For example, Deep Discovery Inspector may ask Check Point OPSEC to block
a connection with a client that is attempting to issue illegal commands or
repeatedly failing to log on.
Procedure
v. Click OK.
6-127
DDI AG - Deep Discovery Inspector Administrators Guide
6-128
Administration
6-129
DDI AG - Deep Discovery Inspector Administrators Guide
6-130
Administration
6-131
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Ensure that your network configuration allows Deep Discovery
Inspector to connect to the Check Point appliance.
Note
The server address must be the IPv4 address or FQDN of the inline
product.
Note
This port must be the same port that is configured on the security
gateway. For details, see Preconfiguring a Security Gateway on page
6-135.
6-132
Administration
Note
If the one-time password is reset on the Check Point appliance, the
new one-time password must be different than the previous one-time
password.
Note
To enable integration with this inline product/service, you must
accept the Legal Statement.
6-133
DDI AG - Deep Discovery Inspector Administrators Guide
m. Click Save.
d. Click the Launch Menu icon and go to Tools > Suspicious Activity
Rules.
6-134
Administration
Procedure
1. Log on to your Check Point appliance.
6-135
DDI AG - Deep Discovery Inspector Administrators Guide
Note
The image of the default configuration is for reference only. The actual file
contents may vary.
Note
On Deep Discovery Inspector, verify that the Check Point Open
Platform for Security (OPSEC) Port setting at Administration >
Integrated Products/Services > Inline Products/Services is
also 18183.
6-136
Administration
Note
Configure the same port in fwopsec.conf and in the Check
Point Open Platform for Security (OPSEC) Port setting on Deep
Discovery Inspector at Administration > Integrated Products/
Services > Inline Products/Services.
Note
Configure the same port in fwopsec.conf and in the Check
Point Open Platform for Security (OPSEC) Port setting on Deep
Discovery Inspector at Administration > Integrated Products/
Services > Inline Products/Services.
Procedure
1. Open the Check Point SmartConsole and click the main menu icon
( ).
2. Go to New object > More object types > Server > OPSEC Application >
New Application....
6-137
DDI AG - Deep Discovery Inspector Administrators Guide
6-138
Administration
3. Type a Name.
Note
• Use this name as the OPSEC application name in Deep Discovery
Inspector.
• The application name must be less than 101 characters, start with an
English alphabetical letter, and contain only English alphabetical
letters, periods, underscores, or dashes.
4. Select a Host.
5. Under Client Entities, select SAM.
6. Click Communication....
The Communication window appears.
6-139
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Use this password as the SIC one-time password in Deep Discovery
Inspector.
Note
If the one-time password is reset on the Check Point appliance, the new
one-time password must be different than the previous one-time
password.
8. Click Initialize.
6-140
Administration
Procedure
1. On the IBM XGS console, do the following to configure the generic
agent:
a. Go to Manage System Settings > Network Settings > Advanced
Threat Protection Agents.
6-141
DDI AG - Deep Discovery Inspector Administrators Guide
6-142
Administration
The new agent appears in the Advanced Threat Protection Agents list.
• Server address
Note
The server address must be the IPv4 address or FQDN of the inline
product.
6-143
DDI AG - Deep Discovery Inspector Administrators Guide
Note
To enable integration with this inline product/service, you must accept the
Legal Statement.
10. To send object information from Deep Discovery Inspector to this inline
product/service, configure the following criteria:
• Object type:
• IPv4 address
• URL
• Suspicious Object
• IPv4 address
• URL
• Risk level:
• High only
6-144
Administration
Note
Suspicious objects with a low risk level do not appear in the IBM XGS
Active Quarantine Rules. To view all suspicious objects sent by Deep
Discovery Inspector, go to Security Policy Configuration > Advanced
Threat Policy and specify the following settings:
• Agent Type: Generic
• Alert Type: Reputation
• Alert Severity: Low
6-145
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Go to Administration > Integrated Products/Services > Inline
Products/Services and select Palo Alto Panorama or Firewalls.
2. Provide the following information:
• Server address
Note
The server address must be the IPv4 address or FQDN of the inline
product.
• Server type
• Panorama
6-146
Administration
• Firewalls
Note
Deep Discovery Inspector supports Palo Alto Panorama and firewalls
with virtual systems.
Note
To enable integration with this inline product/service, you must accept the
Legal Statement.
• Object type:
6-147
DDI AG - Deep Discovery Inspector Administrators Guide
6-148
Administration
d. Click OK.
e. Assign the admin role to an administrator account.
11. (Optional) To view suspicious objects and C&C callback addresses sent
by Deep Discovery Inspector on the Palo Alto product console, go to
Objects > Custom URL Category.
6-149
DDI AG - Deep Discovery Inspector Administrators Guide
SAML Authentication
Security Assertion Markup Language (SAML) is an open authentication
standard that allows for the secure exchange of user identity information
from one party to another. SAML supports single sign-on (SSO), a technology
that allows for a single user login to work across multiple applications and
services. When you configure SAML settings in Deep Discovery Inspector,
users signing in to your organization's portal can seamlessly sign in to Deep
Discovery Inspector without an existing Deep Discovery Inspector account.
6-150
Administration
Deep Discovery Inspector supports the following identity providers for single
sign-on:
• Microsoft Active Directory Federation Services (AD FS) 4.0 or 5.0
• Okta
To connect Deep Discovery Inspector to your organization environment for
single-sign-on, complete the following:
1. Access the Deep Discovery Inspector management console to obtain the
service provider metadata file.
You can also update the certificate in Deep Discovery Inspector.
2. In your identity provider:
a. Configure the required settings for single sign-on.
b. Obtain the metadata file.
For more information, see the documentation that comes with your
identity provider.
3. In Deep Discovery Inspector:
a. Import the metadata file for your identity provider.
b. Create SAML user groups.
6-151
DDI AG - Deep Discovery Inspector Administrators Guide
• Single Sign Off URL: The endpoint URL responsible for initiating the
SAML logout process
Note
If you change the Deep Discovery Inspector FQDN after importing the
metadata file on your identity provider, you will need to download the
metadata file again and reimport the file on your identity provider.
Note
• Before you add an identity provider, obtain the metadata file from your
identity provider.
• You can add up to two identity providers in Deep Discovery Inspector, one
each for AD FS and Okta.
6-152
Administration
Procedure
Note
Deep Discovery Inspector displays the service name in the drop-down list
on the Log On screen.
5. Type a description.
6. Click Select and choose the metadata file obtained from your identity
provider.
After importing the metadata file, the system displays the identity
provider information.
7. Click Save.
Configuring Okta
Okta is a standards-compliant OAuth 2.0 authorization server that provides
cloud identity solutions for your organization. Okta is a single sign-on
provider that allows you to manage user access to Deep Discovery Inspector.
6-153
DDI AG - Deep Discovery Inspector Administrators Guide
• You have a valid subscription with Okta that handles the sign-in process
and that eventually provides the authentication credentials to the Deep
Discovery Inspector management console.
• You are logged on to the management console as a Deep Discovery
Inspector administrator.
Procedure
1. Log in to your Okta organization as a user with administrative privileges.
2. Click Admin in the upper right, and then navigate to Applications >
Applications.
3. Click Add Application, and then click Create New App.
The Create a New Application Integration screen appears.
4. Select Web as the Platform and SAML 2.0 as the Sign on method, and
then click Create.
5. On the General Settings screen, type a name for Deep Discovery
Inspector in App name, for example, "Deep Discovery Inspector", and
click Next.
6. On the Configure SAML screen, specify the following:
a. Type the Single sign on URL for Deep Discovery Inspector.
Note
To obtain the Deep Discovery Inspector single sign on URL, go to
Administration > Integrated Products/Services > SAML Integration
in the Deep Discovery Inspector management console, and copy the
Single Sign On URL in the Service Provider section.
6-154
Administration
• Name: DDI_GROUP
f. Click Next.
Note
Import this metadata file to Deep Discovery Inspector.
b. Click the groups that you want to assign the application to, and then
click Manage Apps.
6-155
DDI AG - Deep Discovery Inspector Administrators Guide
You are now ready to configure Okta for single sign-on and create the
required SAML groups in the Deep Discovery Inspector management
console.
Note
Deep Discovery Inspector supports connecting to the federation server using
AD FS 4.0 and 5.0.
Active Directory Federation Services (AD FS) provides support for claims-
aware identity solutions that involve Windows Server and Active Directory
technology. AD FS supports the WS-Trust, WS-Federation, and Security
Assertion Markup Language (SAML) protocols.
• You have obtained the metadata file from Deep Discovery Inspector.
6-156
Administration
Procedure
1. Go to Start > All Programs > Administrative Tools to open the AD FS
management console.
2. Click AD FS in the left navigation, and under the Action area on the
right, click Add Relying Party Trust....
3. Complete settings on each tab of the Add Relying Party Trust Wizard
screen.
a. On the Welcome tab, select Claims aware and click Start.
b. On the Select Data Source tab, select Import data about the relying
party from a file, click Browse to select the metadata file you obtain
from Deep Discovery Inspector; then, click Next.
c. On the Specify Display Name tab, specify a display name for Deep
Discovery Inspector, for example, "Deep Discovery Inspector", and
click Next.
d. On the Choose Access Control Policy tab, select Permit everyone
and click Next.
e. On the Ready to Add Trust tab, click Next.
f. On the Finish tab, select Open the Edit Claim Rules dialog for this
relying party trust when the wizard closes and click Close.
The Edit Claim Rules screen appears.
4. On the Issuance Transform Rules tab, click Add Rule....
5. Complete the settings on each tab of the Add Transform Claim Rule
Wizard screen.
a. On the Choose Rule Type tab, select Send LDAP Attributes as
Claims from the Claim rule template drop-down list, and click
Next.
6-157
DDI AG - Deep Discovery Inspector Administrators Guide
b. On the Configure Claim Rule tab, specify a claim rule name in the
Claim rule name text box, and select Active Directory from the
Attribute store drop-down list.
c. Select the User-Principal-Name LDAP attribute and specify Name
ID as the outgoing claim type for the attribute.
d. Click OK.
6. Click Add Rule....
The Add Transform Claim Rule Wizard screen appears.
7. Complete the settings on each tab of the Add Transform Claim Rule
Wizard screen.
a. On the Choose Rule Type tab, select Send Group Membership as a
Claim from the Claim rule template drop-down list, and click Next.
The Configure Claim Rule tab appears.
b. For Claim rule name, type the name of the AD group.
c. For User's group, click Browse and then select the AD group.
d. For Outgoing claim type, type DDI_GROUP.
e. For Outgoing claim value, type the name of the AD group.
f. Click Apply and then click OK.
8. Collect the single sign-on URL and export the Identity Provider metadata
for AD FS.
a. On the AD FS management console, go to AD FS > Service >
Endpoints.
b. In the right pane, under Endpoints > Metadata, in the Federation
Metadata row, copy the URL path.
c. Add the host name of the AD FS computer to the URL path that you
copied.
For example, https://hostname/FederationMetadata/2007-06/
FederationMetadata.xml
6-158
Administration
Note
Import this metadata file to Deep Discovery Inspector.
Procedure
1. On an endpoint, open the Control Panel from the Start menu.
2. Click Network and Internet > Internet Options.
The Internet Properties screen appears.
3. Click the Security tab.
4. Select Local intranet and click Sites.
5. Click Advanced.
6. In the Add this website to the zone field, type FQDN or IP address of the
account federation server and click Add.
7. Repeat Step 6 to add the FQDN or IP address of Deep Discovery
Inspector to the Websites list.
6-159
DDI AG - Deep Discovery Inspector Administrators Guide
8. Click Close.
9. Click OK.
10. Click OK.
Procedure
1. Obtain the information required to configure Microsoft Active Directory
integration from the server administrator.
2. Go to Administration > Integrated Products/Services > Microsoft
Active Directory.
3. Select the server type that is integrating.
• Microsoft Active Directory
• Microsoft AD Global Catalog
4. Type the server address.
5. Select the encryption method.
• SSL
• StartTLS
6-160
Administration
Note
Trend Micro recommends using the following default ports:
• For Microsoft Active Directory:
• SSL: 636
• StartTLS: 389
• For Microsoft AD Global Catalog:
• SSL: 3269
• STARTTLS: 3268
Syslog
Deep Discovery Inspector transports log content to syslog servers through
the following channels:
• Transmission Control Protocol (TCP)
• Transmission Control Protocol (TCP) with Secure Sockets Layer (SSL)
encryption
6-161
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Go to Administration > Integrated Products / Services > Syslog.
2. Click Add.
The Add Syslog Server screen appears.
6-162
Administration
4. Type the server name or IP address and the port number of the syslog
server.
• UDP: 514
• TCP: 601
• SSL: 6514
The syslog severity level specifies the type of messages to be sent to the
syslog server.
Table 6-25. Syslog Severity Levels
6-163
DDI AG - Deep Discovery Inspector Administrators Guide
Note
Setting the debug level can generate
a large amount of syslog traffic in a
busy network. Use with caution.
• CEF
• LEEF
6-164
Administration
Mitigation Products/Services
Mitigation products and services receive threat information gathered by
Deep Discovery Inspector. These products and services work with an agent
program installed on an endpoint to resolve threats.
Mitigation products and services that control network access may prevent an
endpoint from accessing the network until the endpoint is free of threats.
Procedure
1. Go to Administration > Integrated Products/Services > Mitigation
Products/Services > Registration.
2. Register Deep Discovery Inspector to at least one mitigation product or
service.
For details, see Registering to Mitigation Products/Services on page 6-165.
3. Under Mitigation Products/Services Enforcement, enable or disable
sending mitigation requests.
6-165
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
Note
To save network bandwidth, specify IP address ranges for each mitigation
product or service. Deep Discovery Inspector only sends mitigation tasks
for specific IP addresses to the mitigation product or service. If the IP
address range is empty, all mitigation requests will be sent to the
mitigation product or service.
5. Click Register.
7. Click Apply.
Procedure
3. Click Delete.
6-166
Administration
The mitigation product or service is removed from the list and the
product or service removes Deep Discovery Inspector from its list of
data sources.
Procedure
1. Go to Administration > Integrated Products/Services > Mitigation
Products/Services > Exceptions.
2. Type a name for the exception. Specify a meaningful name for easy
identification.
Example: "Lab Computers”.
3. Specify an IP address or IP address range for exception from mitigation
actions.
Example: 192.1.1.1-192.253.253.253
4. Click Add.
5. To remove an exception, select the exception and click Delete.
6-167
DDI AG - Deep Discovery Inspector Administrators Guide
System Settings
Go to Administration > System Settings to configure basic Deep Discovery
Inspector settings.
This section includes the following basic settings:
• Network on page 6-168
• Network Interface on page 6-168
• Proxy on page 6-169
• SMTP on page 6-170
• SNMP on page 6-171
• HTTPS Certificate on page 6-174
• Time on page 6-177
• Session Timeout on page 6-178
Network
The Network screen enables management of the appliance's network
settings, including TLS 1.2 or above enforcement.
Go to Administration > System Settings > Network.
See Configuring the Appliance IP Settings on page 2-10 for details on
configuring the network settings.
Network Interface
Deep Discovery Inspector uses a management port and several data ports.
Go to Administration > System Settings > Network Interface to do the
following:
• View the status of these ports
6-168
Administration
For details about managing the network interface ports, see Managing
Network Interface Ports on page 2-15.
Proxy
Configure a proxy server for the following operations:
Procedure
2. Select Use a proxy server for pattern, engine, and license updates.
Note
Deep Discovery Inspector supports HTTP and HTTPS proxy servers.
6-169
DDI AG - Deep Discovery Inspector Administrators Guide
SMTP
The Simple Mail Transfer Protocol (SMTP) is used to send email notifications
and reports.
Procedure
1. Enable Use an SMTP server for sending notifications and reports.
2. Type a valid SMTP server address and port number.
3. Select the Connection security.
4. Type the Sender email address.
5. If the SMTP server requires authentication, specify the authentication
settings.
Important
Make sure to add the Deep Discovery Inspector IP address to the SMTP
relay list.
Note
Deep Discovery Inspector supports LOGIN, PLAIN, and CRAM-MD5 SMTP
authentication.
6-170
Administration
6. Click Save.
7. (Optional) Send a test email using the SMTP server.
a. Click Test Mail.
b. Type the Recipient email address.
c. Click OK.
If the SMTP server settings are correctly configured, Deep Discovery
Inspector sends a test email message to the recipient addresses.
SNMP
Simple Network Management Protocol (SNMP) is used to manage devices on
IP networks. Deep Discovery Inspector supports SNMP version 1 and version
2.
Enable the SNMP to check system running status, network card link up or
link down, and component update status.
The SNMP has two modes:
• SNMP trap
SNMP trap allows a managed product to report its status to the SNMP
Network Management Station.
• SNMP agent
An SNMP agent is a program that gathers and organizes information
about a product into predefined hierarchies, and responds to queries
using the SNMP protocol.
Use SNMP agent to obtain Deep Discovery Inspector system
information, including the following:
• Product version
• CPU, memory, and disk information
6-171
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Go to Administration > System Settings > SNMP.
2. Select Send SNMP trap messages to Network Management Station
(NMS).
3. Specify the Community Name and NMS IP Address.
4. Click Save.
Note
Deep Discovery Inspector can be monitored from the SNMP Network
Management Station.
6-172
Administration
Procedure
1. Go to Administration > System Settings > SNMP.
2. Select Enable SNMP agent.
3. Specify a System location and System contact.
4. At Accepted Community Name, specify the community name and click
Add to >.
The name is added to the Community Name list.
5. At Accepted Network Management Station, specify an IP Address and
click Add to >.
The IP address is added to the IP Address list.
6. Click Save.
7. (Optional ) Click Export MIB file.
The MIB file can be imported to the SNMP Management Station.
6-173
DDI AG - Deep Discovery Inspector Administrators Guide
HTTPS Certificate
Verify that the HTTPS certificate details are accurate.
Item Description
Issuer Entity that verified the information and issued the certificate
6-174
Administration
Item Description
Public Key The 2048-bit or higher public key used for encryption
Procedure
1. From a Linux operating system, use the following command to generate
a certificate:
openssl req -newkey rsa:2048 -x509 -sha512 -days 365 -nodes
-out server.pem -keyout server.pem
6-175
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Go to Administration > System Settings > HTTPS Certificate.
2. On the HTTPS Certificate screen, click Replace Certificate.
The Import Certificate screen appears.
3. On the Import Certificate screen, click Choose File to navigate to and
select a new certificate.
6-176
Administration
4. Click Import.
Note
Deep Discovery Inspector does not need to be restarted.
Time
Synchronize the system time with the Network Time Protocol (NTP) server or
configure it manually.
Procedure
Note
For virtual Deep Discovery Inspector appliances, Trend Micro
recommends using an NTP server to synchronize the appliance time.
6-177
DDI AG - Deep Discovery Inspector Administrators Guide
a. Click the calendar icon or type the month, day, and year using
the mm/dd/yyyy format.
b. Select the hour, minute, and second.
3. Using the Time Zone drop-down menu, select the time zone.
4. Click Save.
Session Timeout
Configure how long Deep Discovery Inspector waits before logging out an
inactive management console user session.
Procedure
1. Go to Administration > System Settings > Session Timeout.
6-178
Administration
• 5 minutes
• 10 minutes
• 15 minutes (Recommended)
• 30 minutes
• 60 minutes
• 1 day
• 3 days
3. Click Save.
Note
The default management console timeout is 15 minutes.
Accounts
This section includes the following topics:
6-179
DDI AG - Deep Discovery Inspector Administrators Guide
About Accounts
Deep Discovery Inspector allows you to grant access to selected sections of
the management console.
Deep Discovery Inspector supports 128 local accounts, 512 Active Directory
accounts, and 512 SAML accounts, including the following roles:
• System administrator (default)
• Administrator (user-created)
• Viewer (user-created)
All users (system administrator, other administrators, viewers) share one
dashboard. Each management console viewer account is provided a partially
independent dashboard. Changes to any account's dashboard affect the
dashboards of other accounts.
Deep Discovery Inspector logs the following activities for all users:
• Log on
• Account password changes
• Log off
• Session timeout
Deep Discovery Inspector displays the state of each user as follows:
• Online: Green
• Offline: Gray
Deep Discovery Inspector displays users who sign on to Deep Discovery
Inspector from Trend Micro Apex Central.
Created By Example
6-180
Administration
Created By Example
Role Description
6-181
DDI AG - Deep Discovery Inspector Administrators Guide
System
Administrat
Section Subsection Administrat Viewer
or
or
6-182
Administration
System
Administrat
Section Subsection Administrat Viewer
or
or
6-183
DDI AG - Deep Discovery Inspector Administrators Guide
System
Administrat
Section Subsection Administrat Viewer
or
or
6-184
Administration
Procedure
1. Go to Administration > Accounts.
2. Click the Local tab.
3. Click Add.
The Add Local Account screen appears.
4. Configure the account status.
• Enabled (default)
• Disabled
Note
A user cannot disable their own account.
Note
The user name can include the following special characters:
• Underscore ( _ )
• Period ( . )
• Hyphen ( - )
6-185
DDI AG - Deep Discovery Inspector Administrators Guide
Note
The default value for Allow user to mark detections as resolved is
unselected.
9. Click Save.
Deep Discovery Inspector adds the account information to the local
accounts list and generates a default account password.
What to do next
Provide the generated default password to the new user. The user must
change this password after logging on for the first time. For details, see
Management Console Account Passwords on page 2-6
Procedure
1. Go to Administration > Accounts.
2. Click the Active Directory tab.
3. Click Add.
The Add Active Directory User / Group screen appears.
4. Configure the account status.
• Enabled (default)
• Disabled
Note
A user cannot disable their own account.
6-186
Administration
Note
User accounts are not displayed in the results table if:
• The user account's User Principal Name (UPN) is not specified on the
Active Directory server
• The user account is disabled on the Active Directory server
Note
The default value for Allow user to mark detections as resolved is
unselected.
6-187
DDI AG - Deep Discovery Inspector Administrators Guide
Note
To transfer a user's detection filters and generated reports from an Active
Directory account to a SAML account, create the SAML account and have the
user log in to the SAML account first before deleting the user's Active Directory
account.
Procedure
1. Go to Administration > Accounts.
2. Click the SAML tab.
3. Click Add.
The Add SAML Account screen appears.
4. Configure the account status.
Note
A user cannot disable their own account.
Note
The claim value is the outgoing claim value in ADFS Claim Issuance Policy
Rules or the group name in Okta.
6-188
Administration
Note
The default value for Allow user to mark detections as resolved is
unselected.
9. Click Save.
Editing an Account
Only administrators can edit accounts. Any administrator can add an
account and edit or delete any other administrator account except for the
system administration account. Administrators can change their account
password but cannot edit or delete their own accounts.
Procedure
• Local
• Active Directory
• SAML
• Enabled (default)
• Disabled
6-189
DDI AG - Deep Discovery Inspector Administrators Guide
Important
Make sure you are targeting the correct account before clicking Reset.
a. Under the Reset Password column for the target account, click
Reset.
b. Provide the generated default password to the user. The user must
change this password after logging on for the first time. For details,
see Management Console Account Passwords on page 2-6.
• Viewer (default)
• Administrator
Note
The default value for Allow user to mark detections as resolved is
unselected.
8. Click Save.
6-190
Administration
Procedure
Important
Make sure you are targeting the correct account before clicking Reset.
3. Under the Reset Password column for the target account, click Reset.
What to do next
Provide the generated default password to the user. The user must change
this password after logging on for the first time. For details, see Management
Console Account Passwords on page 2-6.
Deleting an Account
An administrator can delete any account except the system administrator
account, logged-on accounts, and Active Directory and SAML group accounts
with logged-on accounts.
6-191
DDI AG - Deep Discovery Inspector Administrators Guide
Important
When an account is deleted, any saved search and report schedule created by
the account will also be deleted. However, any generated reports will not be
deleted.
Procedure
1. Go to Administration > Accounts.
2. Click the tab for the account type.
3. Check the box beside a user name.
4. Click Delete.
Important
Make sure you are targeting the correct account before clicking Delete.
Unlocking an Account
After 5 failed log in attempts, local accounts are automatically locked.
Locked accounts are automatically unlocked after 10 minutes. To manually
unlock an account, follow the procedure below.
Procedure
1. Log in to the Deep Discovery Inspector management console using an
administrator account that is not locked.
2. Go to Administration > Accounts.
3. Click the Local tab.
4. View the locked status of accounts in the Locked column.
5. In the left-most column, select each account to unlock.
6-192
Administration
6. Click Unlock.
The Unlock Account window appears and displays which accounts were
unlocked.
System Logs
Deep Discovery Inspector maintains system logs that provide summaries of
system events, including component updates and appliance restarts.
Query logs to gather information from log databases. Export queried logs to
a .csv file.
Deep Discovery Inspector stores system logs in the appliance hard drive.
6-193
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Go to Administration > System Logs.
2. Select a log type.
• All
• System Events
• Update Events
Events display automatically with the following information.
Column Description
• Warning
• Error
• Failure
6-194
Administration
Column Description
3. Specify a period or click the calendar icon to select a specific date and
time.
6-195
DDI AG - Deep Discovery Inspector Administrators Guide
System Maintenance
Go to System Maintenance to perform the following operations:
• Storage Maintenance on page 6-196
• Backup / Restore on page 6-198
• Power Off / Restart on page 6-202
Storage Maintenance
Use the Storage Maintenance screen for the following operations:
• Manage log and report storage
• View the status of the Deep Discovery Inspector database
• Repair corrupted database files
Deep Discovery Inspector maintains logs and reports in the appliance hard
disk. To set criteria and view logs, go to Detections on page 4-1 and Querying
System Logs on page 6-193.
Manually delete logs and reports on a regular basis to manage hard disk
space. The deletion schedule depends on your environment and the quantity
of logs and reports you want to retain.
When log and report storage exceed the maximum disk space, Deep
Discovery Inspector automatically deletes logs, beginning with the oldest, by
date until the disk size is sufficient to hold the latest logs.
Note
Deep Discovery Inspector can send logs to a syslog server or Apex Central. For
details, see Syslog on page 6-161 and Registering to Apex Central on page 6-110.
6-196
Administration
Procedure
1. Go to Administration > System Maintenance > Storage Maintenance.
2. Under Log/Report Deletion, select logs to delete.
3. Select a deletion action.
• Delete all logs selected above
• Delete logs selected above older than the specified number of days
Note
Deep Discovery Inspector automatically deletes logs after 121 days and
PCAP files after 16 days.
4. Click Delete.
Procedure
1. Go to Administration > System Maintenance > Storage Maintenance.
2. Under Log Database Status, click Check database status.
3. (Optional) If one or more database files are corrupted, click Repair.
Deep Discovery Inspector repairs the corrupted files and indicates the
database status when the repair action is complete.
6-197
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. Go to Administration > System Maintenance > Storage Maintenance.
2. Under File Size Settings, specify the maximum file size.
3. Click Save.
Backup / Restore
Configuration settings include both Deep Discovery Inspector and network
configuration settings. Back up configuration settings by exporting them to
an encrypted file. If needed, import this file to restore settings.
Deep Discovery Inspector can be reset by restoring the default settings that
shipped with the product.
The following settings cannot be backed up:
• Appliance IP settings
• Apex Central settings
• Deep Discovery Director settings
• Licenses and Activation Codes
• Mitigation Device settings
• Network Interface settings
• Retro Scan settings
• SAML Authentication settings
• Sandbox as a Service settings
• Smart Protection settings in the Web Reputation screen
6-198
Administration
Note
Virtual Analyzer is disabled after restoring configuration settings.
• HTTPS Certificate
Tip
Verify all the above settings after importing a configuration file.
Note
Procedure
1. Go to Administration > System Maintenance > Backup / Restore.
2. Under Backup Configuration, click Backup.
A file download screen appears.
6-199
DDI AG - Deep Discovery Inspector Administrators Guide
3. Click Save, browse to the target location of the file, and click Save again.
Procedure
5. Click OK.
Note
When Deep Discovery Inspector starts, it checks the integrity of its
configuration files. The management console password may reset if the
configuration file containing password information is corrupted. If you are
unable to log on to the management console using your preferred
password, log on using the default password admin.
6-200
Administration
Important
After importing the configuration file, Deep Discovery Inspector disables
Virtual Analyzer, even if it was enabled in the encrypted file.
Important
Restoring default settings resets all settings including the appliance network
settings and product license.
Procedure
1. Before restoring settings, back up the current configurations. For
details, see Backing Up File Settings on page 6-199.
2. Go to Administration > System Maintenance > Backup / Restore.
3. Under Default Settings, click Reset to Default Settings.
A confirmation message appears.
4. Click OK.
Deep Discovery Inspector restarts after restoring the default
configuration settings.
5. Wait one minute after re-starting to log onto the management console.
Tip
Use the preconfiguration console to modify the appliance network settings
or access the management console using the default IP address,
192.168.252.1/24.
6-201
DDI AG - Deep Discovery Inspector Administrators Guide
Note
When Deep Discovery Inspector starts, it checks the integrity of its
configuration files. The management console password may reset if the
configuration file containing password information is corrupted. If you are
unable to log on to the management console using your preferred
password, log on using the default password admin.
Note
When Deep Discovery Inspector starts, it checks the integrity of its
configuration files. The management console password may reset if the
configuration file containing password information is corrupted. If you are
unable to log on to the management console using your password, log on using
the default password admin.
Procedure
1. Go to Administration > System Maintenance > Power Off / Restart.
2. Click Restart.
• To restart services, click Service.
• To restart Deep Discovery Inspector, click System.
3. (Optional) In the Comment field, specify a reason for restarting the
system or service.
4. Click OK.
6-202
Administration
Procedure
1. Go to Administration > System Maintenance > Power Off / Restart.
2. Click Power off.
3. (Optional) In the Comment field, specify a reason for powering off Deep
Discovery Inspector.
4. Click OK.
Licenses
The License screen displays license information and accepts valid Activation
Codes for Deep Discovery Inspector and Sandbox as a Service.
The trial license for Deep Discovery Inspector limits some of the available
on-screen information for the following widgets:
• All Scanned Traffic
• Malicious Network Activities
• Malicious Scanned Traffic
• Monitored Network Traffic in Past 30 Days
• Real-time Scanned Traffic
• Virtual Analyzer
Activation Codes
Use a valid Activation Code to enable Deep Discovery Inspector and Sandbox
as a Service. Deep Discovery Inspector and Sandbox as a Service will not be
operable until activation is complete.
6-203
DDI AG - Deep Discovery Inspector Administrators Guide
Product Version
The Activation Code provided by Trend Micro is associated with the product
version.
• Trial version: Includes all product features
Upgrade a trial version to the fully licensed version at any time.
• Fully licensed version: Includes all product features and technical
support
A 30-day grace period takes effect after the license expires. Renew the
license before it expires by purchasing a maintenance renewal.
6-204
Administration
Version Reminder
Licence Type
Result
and Status
Fully Licensed Technical support and component updates are not available.
(Expired)
Deep Discovery Inspector monitors the network using out-of-date
components. These components may not completely protect the network
from the latest threats.
Procedure
6-205
DDI AG - Deep Discovery Inspector Administrators Guide
Note
This option only appears on supported Deep Discovery Inspector models.
6. (Optional) To view the Trend Micro Terms of Sale and Software License
Agreement for the family of products, go to https://<appliance IP
address>/html/eula.htm.
Note
Deep Discovery Inspector may contain or be delivered with one or more
third-party components, some of which may be open source software or
other similar license agreements and be subject to different license
agreement terms, conditions, limitations, and disclaimers than those set
forth in the Trend Micro License Agreement. For details, go to Help >
About.
6-206
Administration
Note
The internal Virtual Analyzer sandbox for macOS is automatically disabled
when the Deep Discovery Inspector Activation Code is replaced.
For details, see Sandbox for macOS on page 6-93.
6-207
Chapter 7
Troubleshoot
Learn about common troubleshooting options available in Deep Discovery
Inspector and find answers to frequently asked questions in the following
topics:
• Frequently Asked Questions (FAQs) on page 7-2
• Troubleshooting on page 7-5
7-1
DDI AG - Deep Discovery Inspector Administrators Guide
• Reinstall Deep Discovery Inspector and use the saved or default settings.
Important
All log data is deleted during reinstallation.
Important
The service pack or version upgrade file must be the same version as the
installed version.
7-2
Troubleshoot
FAQs - Configuration
Can I register Deep Discovery Inspector to more than one Apex Central
server?
No, you cannot register Deep Discovery Inspector to more than one Apex
Central server. For details on registering to an Apex Central server, see
Registering to Apex Central in the Deep Discovery Inspector Administrator's Guide.
FAQs - Detections
Why are there no more Virtual Analyzer detections on the widget or the
Log Query screen after Deep Discovery Analyzer or TippingPoint
Advanced Threat Protection Analyzer reinstalls?
After Deep Discovery Analyzer or TippingPoint Advanced Threat Protection
Analyzer reinstalls, the API key changes. Change the API key on the Deep
Discovery Inspector management console from Administration > Virtual
Analyzer > Setup.
FAQs - Installation
Does Deep Discovery Inspector installation disrupt network traffic?
No. Deep Discovery Inspector installation should not disrupt the network
traffic because the appliance connects to the mirror port of the switch and
not directly to the network.
After a fresh installation, Deep Discovery Inspector is unable to obtain a
dynamic IP address. What do I do?
Restart the appliance and verify that it is able to obtain an IP address. Next,
connect an ethernet cable from the management port to a known good
ethernet connection and restart the appliance.
7-3
DDI AG - Deep Discovery Inspector Administrators Guide
FAQs - Upgrade
Can I roll back to a previous version after upgrading to Deep Discovery
Inspector 5.7?
No. The rollback function is not supported.
Why does Deep Discovery Inspector still use old components after
updating the software and restarting?
When updating components, Deep Discovery Inspector updates the software
first. Restart Deep Discovery Inspector and update the Network Content
Inspection Engine. After updating the Network Content Inspection Engine,
click Update, or wait for the next scheduled update.
How do I verify that the migration was successful?
After the upgrade, go to Administration > System Logs and in the
Description column, find the 2 events that are similar to "Attempted to
upgrade database instance" and "Updating Deep Discovery Inspector from
<old version> to <new version>." Verify that the Outcome is Success for those
2 events.
What does Deep Discovery Inspector do when the database upgrade
process is unsuccessful?
Deep Discovery Inspector rebuilds a new, empty database. All previous
database data is not recoverable.
7-4
Troubleshoot
The Found New Hardware wizard opens when the image is tested in
VirtualBox. Does this affect Virtual Analyzer?
The Found New Hardware wizard automatically runs whenever an image is
transferred from one machine to another. If the Found New Hardware
wizard appears when the image is tested in VirtualBox, it may interfere with
the CD/DVD auto-run.
Troubleshooting
This section describes common troubleshooting options available in Deep
Discovery Inspector.
• Slow Management Console Response on page 7-5
• Detections on page 7-6
• "Database is Corrupt" Alert Displays on page 7-9
• Virtual Analyzer on page 7-10
• Virtual Analyzer Images on page 7-11
• Cannot Connect to Network Services on page 7-17
• Diagnostics on page 7-17
Procedure
1. To verify CPU, memory, and disk usage, go to https://<appliance IP
address>/html/troubleshooting.htm.
7-5
DDI AG - Deep Discovery Inspector Administrators Guide
CPU CPU Idle The lower the number, the busier the CPU is.
If this number is low, view the process
information and record the CPU with the highest
usage.
Disk DSK Busy A high number indicates that the disk is busy.
Detections
• No Detections on All Detections Screen on page 7-7
7-6
Troubleshoot
Procedure
1. Verify that the switch mirror port is configured to mirror both directions
of network traffic to the mirror port.
e. Click View.
7-7
DDI AG - Deep Discovery Inspector Administrators Guide
7-8
Troubleshoot
Verify that the server has been added to the Registered Services list. For
more details, see Adding Registered Services in the Deep Discovery Inspector
Administrator's Guide.
Make sure that all IP addresses in your network have been added to the
network group correctly. For details, see Adding Network Groups in the Deep
Discovery Inspector Adminstrator's Guide.
• Add any safe objects to the Allow List. For details, see Creating a Custom
Allow List in the Deep Discovery Inspector Administrator's Guide.
• Move any safe objects from the Suspicious Objects list to the Allow List.
For details, see Viewing Suspicious Objects in the Deep Discovery Inspector
Administrator's Guide.
This message occurs when the database has been corrupted. As a precaution,
data is not written to the database, which now must be manually repaired.
For details, see Performing Product Database Maintenance in the Deep Discovery
Inspector Administrator's Guide.
Note
After a manual repair, all current data will be lost.
7-9
DDI AG - Deep Discovery Inspector Administrators Guide
Virtual Analyzer
• Cannot Upload OVA on page 7-10
Procedure
For details, see Enabling Virtual Analyzer in the Deep Discovery Inspector
Administrator's Guide.
2. Go to Administration > Virtual Analyzer > File Submissions > Add and
verify file submission rules are configured as follows:
7-10
Troubleshoot
For details, see File Submission Rules in the Deep Discovery Inspector
Administrator's Guide.
For details, see Enabling Virtual Analyzer in the Deep Discovery Inspector
Administrator's Guide.
For details, see Configuring Email Notification Settings in the Deep Discovery
Inspector Administrator's Guide.
7-11
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
1. In Oracle VM VirtualBox Manager, click the imported custom Virtual
Analyzer image in the left panel.
2. Click Settings and select Storage.
3. Select Controller: IDE and verify that the specified type is PIIX4.
4. Select the optical disc icon and verify that the specified CD/DVD drive is
IDE Secondary Master.
7-12
Troubleshoot
7-13
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
• Chipset: ICH9
• Enable IO APIC
7-14
Troubleshoot
7-15
DDI AG - Deep Discovery Inspector Administrators Guide
7-16
Troubleshoot
Procedure
1. Go to https://<appliance IP address>/html/troubleshooting.htm
and click Network Services Diagnostics.
Wait for the connection test to complete. The time required depends on
the network environment and the number of services selected. View the
connection test result in the Result column.
Diagnostics
For any issue not mentioned, run diagnostics and provide a test result and
debug log to your Trend Micro Deep Discovery Inspector support provider.
7-17
DDI AG - Deep Discovery Inspector Administrators Guide
Procedure
a. Go to https://<appliance IP address>/html/
troubleshooting.htm.
c. In Debug Log Settings, set the debug level to Debug for the related
module.
Important
To avoid performance loss, only set the debug level to Debug for
required modules. Contact your support provider for advice on how
to set the level to debug and obtain the debug report.
d. Click Save.
g. Click Export.
7-18
Troubleshoot
Important
To conserve system resources, only perform one export at a time.
7-19
Chapter 8
Technical Support
Learn about the following topics:
• Troubleshooting Resources on page 8-2
• Contacting Trend Micro on page 8-3
• Sending Suspicious Content to Trend Micro on page 8-4
• Other Resources on page 8-5
8-1
DDI AG - Deep Discovery Inspector Administrators Guide
Troubleshooting Resources
Before contacting technical support, consider visiting the following Trend
Micro online resources.
Procedure
1. Go to https://success.trendmicro.com.
2. Select from the available products or click the appropriate button to
search for solutions.
3. Use the Search Support box to search for available solutions.
4. If no solution is found, click Contact Support and select the type of
support needed.
Tip
To submit a support case online, visit the following URL:
https://success.trendmicro.com/smb-new-request
Threat Encyclopedia
Most malware today consists of blended threats, which combine two or more
technologies, to bypass computer security protocols. Trend Micro combats
this complex malware with products that create a custom defense strategy.
8-2
Technical Support
Go to https://www.trendmicro.com/vinfo/us/threat-encyclopedia/#malware
to learn more about:
• Malware and malicious mobile code currently active or "in the wild"
Website https://www.trendmicro.com
https://www.trendmicro.com/us/about-us/contact/index.html
8-3
DDI AG - Deep Discovery Inspector Administrators Guide
https://docs.trendmicro.com
8-4
Technical Support
https://success.trendmicro.com/solution/1112106
Other Resources
In addition to solutions and support, there are many other helpful resources
available online to stay up to date, learn about innovations, and be aware of
the latest security trends.
Download Center
From time to time, Trend Micro may release a patch for a reported known
issue or an upgrade that applies to a specific product or service. To find out
whether any patches are available, go to:
https://www.trendmicro.com/download/
8-5
DDI AG - Deep Discovery Inspector Administrators Guide
If a patch has not been applied (patches are dated), open the Readme file to
determine whether it is relevant to your environment. The Readme file also
contains installation instructions.
Documentation Feedback
Trend Micro always seeks to improve its documentation. If you have
questions, comments, or suggestions about this or any Trend Micro
document, please go to the following site:
https://docs.trendmicro.com/en-us/survey.aspx
8-6
Appendices
Appendices
Appendix A
Example File
Full File Type
Extensions
.ocx
Note
.drv
64-bit DLL files are analyzed only in images that use a 64-bit
operating system.
A-1
DDI AG - Deep Discovery Inspector Administrators Guide
Example File
Full File Type
Extensions
A-2
Virtual Analyzer Supported File Types
Example File
Full File Type
Extensions
Note
Virtual Analyzer does not support the java library.
.cla
.html
.xla
.xlt
.xlm
A-3
DDI AG - Deep Discovery Inspector Administrators Guide
Example File
Full File Type
Extensions
.xltx
.xlsm
.xlam
.xltm
.docm
.dotm
.pps
A-4
Virtual Analyzer Supported File Types
Example File
Full File Type
Extensions
.xhtml
Note
Deep Discovery Inspector also supports the submission of Java Archive (.jar)
and class (.class) files to Sandbox for macOS.
A-5
Appendix B
B-1
DDI AG - Deep Discovery Inspector Administrators Guide
B-2
Settings Replicated by Deep Discovery Director
B-3
DDI AG - Deep Discovery Inspector Administrators Guide
B-4
Appendix C
Note
A hotfix may be required on Check Point Open Platform for Security for
TLS 1.2 or later support. See the official support website of Check Point for
details.
C-1
DDI AG - Deep Discovery Inspector Administrators Guide
Note
TLS 1.2 or later must be enabled in the operating system of the Apex
Central server, and only Microsoft Windows Server 2008 R2 or later is
supported.
See the Microsoft Windows documentation for details about enabling TLS
1.2 or later on Microsoft Windows.
• SMTP
Note
TLS 1.2 or later must be enabled in the operating system of the Control
Manager server, and only Microsoft Windows Server 2008 R2 or later is
supported.
See the Microsoft Windows documentation for details about enabling TLS
1.2 or later on Microsoft Windows.
C-2
TLS Support for Integrated Products/Services
C-3
Appendix D
Note
All services connect using HTTPS with TLS 1.2 or above. If your environment
has man-in-the-middle devices, verify that the devices support TLS 1.2 or
above.
Trend Micro recommends using the Network Service Diagnostics screen to
troubleshoot the connection to all services. For details, see Cannot Connect to
Network Services on page 7-17.
D-1
DDI AG - Deep Discovery Inspector Administrators Guide
D-2
Service Addresses and Ports
D-3
DDI AG - Deep Discovery Inspector Administrators Guide
D-4
Service Addresses and Ports
D-5
DDI AG - Deep Discovery Inspector Administrators Guide
D-6
TREND MICRO INCORPORATED
225 E. John Carpenter Freeway, Suite 1500
Irving, Texas 75062 U.S.A.
Phone: +1 (817) 569-8900, Toll-free: (888) 762-8736
Email: [email protected]
www.trendmicro.com
Item Code: APEM59037/200721