Ddan 7.6 Ag
Ddan 7.6 Ag
TM
7.6
Administrator's Guide
Breakthrough Protection Against APTs and Targeted Attacks
Trend Micro Incorporated reserves the right to make changes to this
document and to the product described herein without notice. Before
installing and using the product, review the readme files, release notes,
and/or the latest version of the applicable documentation, which are
available from the Trend Micro website at:
http://docs.trendmicro.com/en-us/enterprise/deep-discovery-analyzer.aspx
Trend Micro, the Trend Micro t-ball logo, Trend Micro Apex Central, Control
Manager, Trend Micro Apex One, OfficeScan, Deep Discovery, InterScan,
ScanMail, and Smart Protection Network are trademarks or registered
trademarks of Trend Micro Incorporated. All other product or company
names may be trademarks or registered trademarks of their owners.
Copyright © 2024. Trend Micro Incorporated. All rights reserved.
Document Part No.: APEM769913/240703
Release Date: August 2024
Protected by U.S. Patent No.: Patents pending.
This documentation introduces the main features of the product and/or
provides installation instructions for a production environment. Read
through the documentation before installing or using the product.
Detailed information about how to use specific features within the product
may be available at the Trend Micro Online Help Center and/or the Trend
Micro Knowledge Base.
Trend Micro always seeks to improve its documentation. If you have
questions, comments, or suggestions about this or any Trend Micro
document, please contact us at docs@trendmicro.com.
Evaluate this documentation on the following site:
https://www.trendmicro.com/download/documentation/rating.asp
Privacy and Personal Data Collection Disclosure
Certain features available in Trend Micro products collect and send feedback
regarding product usage and detection information to Trend Micro. Some of
this data is considered personal in certain jurisdictions and under certain
regulations. If you do not want Trend Micro to collect personal data, you
must ensure that you disable the related features.
The following link outlines the types of data that Deep Discovery Analyzer
collects and provides detailed instructions on how to disable the specific
features that feedback the information.
https://success.trendmicro.com/data-collection-disclosure
Data collected by Trend Micro is subject to the conditions stated in the Trend
Micro Privacy Notice:
https://www.trendmicro.com/privacy
Table of Contents
Preface
Preface ................................................................................. 1
Documentation ..................................................................... 2
Audience .............................................................................. 3
Document Conventions ......................................................... 3
Terminology ......................................................................... 5
About Trend Micro ................................................................ 6
Chapter 1: Introduction
About Deep Discovery Analyzer ........................................... 1-2
What's New ........................................................................ 1-2
Features and Benefits .......................................................... 1-3
Chapter 3: Dashboard
Dashboard Overview ........................................................... 3-2
i
Deep Discovery Analyzer 7.6 Administrator's Guide
ii
Table of Contents
iii
Deep Discovery Analyzer 7.6 Administrator's Guide
Chapter 6: Administration
Updates .............................................................................. 6-2
Components Tab .......................................................... 6-2
Component Update Settings Tab .................................... 6-4
Hotfixes / Patches Tab ................................................... 6-5
Installing a Hotfix / Patch ........................................ 6-6
Rolling Back a Hotfix / Patch ................................... 6-7
Firmware Tab ............................................................... 6-8
iv
Table of Contents
v
Deep Discovery Analyzer 7.6 Administrator's Guide
vi
Table of Contents
Appendices
vii
Deep Discovery Analyzer 7.6 Administrator's Guide
Index
Index ............................................................................... IN-1
viii
ix
Preface
Preface
This guide contains information about product settings and service levels.
1
Deep Discovery Analyzer 7.6 Administrator's Guide
Documentation
The documentation set for Deep Discovery Analyzer includes the following:
Table 1. Product Documentation
Document Description
Quick Start Card The Quick Start Card provides user-friendly instructions on
connecting Deep Discovery Analyzer to your network and on
performing the initial configuration.
2
Preface
Document Description
View and download product documentation from the Trend Micro Online
Help Center:
https://docs.trendmicro.com/en-us/home.aspx
Audience
The Deep Discovery Analyzer documentation is written for IT administrators
and security analysts. The documentation assumes that the reader has an
in-depth knowledge of networking and information security, including the
following topics:
• Network topologies
• Database management
• Antivirus and content security protection
The documentation does not assume the reader has any knowledge of
sandbox environments or threat event correlation.
Document Conventions
The documentation uses the following conventions:
3
Deep Discovery Analyzer 7.6 Administrator's Guide
Monospace Sample command lines, program code, web URLs, file names,
and program output
Configuration notes
Note
Recommendations or suggestions
Tip
4
Preface
Terminology
Terminology Description
Active primary appliance Clustered appliance with which all management tasks are
performed. Retains all configuration settings and allocates
submissions to secondary appliances for performance
improvement.
High availability cluster In a high availability cluster, one appliance acts as the active
primary appliance, and one acts as the passive primary
appliance. The passive primary appliance automatically takes
over as the new active primary appliance if the active primary
appliance encounters an error and is unable to recover.
Passive primary appliance Clustered appliance that is on standby until active primary
appliance encounters an error and is unable to recover.
Provides high availability.
5
Deep Discovery Analyzer 7.6 Administrator's Guide
Terminology Description
Standalone appliance Appliance that is not part of any cluster. Clustered appliances
can revert to being standalone appliances by detaching the
appliance from its cluster.
YARA YARA rules are malware detection patterns that are fully
customizable to identify targeted attacks and security threats
specific to your environment.
6
Preface
7
Chapter 1
Introduction
This chapter introduces Deep Discovery Analyzer and the new features in
this release.
1-1
Deep Discovery Analyzer 7.6 Administrator's Guide
What's New
Table 1-1. What's New in Deep Discovery Analyzer 7.6
Feature/Enhancement Details
New hardware model This release of Deep Discovery Analyzer supports the new
support Deep Discovery Analyzer 1300 appliance with UEFI support.
Enhanced Virtual Analyzer The internal Virtual Analyzer has been enhanced to include
new image support for Windows 10 22H2, Windows 11, and
Ubuntu 20.04.
Enhanced Trend Vision One This release of Deep Discovery Analyzer includes STIX files
integration in investigation packages sent to Trend Vision One for
intelligence report generation and Auto Sweeping.
Enhanced network share The network share scanning feature has been enhanced to
scanning include configuration settings for the following:
• Output folder per risk level
• Cloud storage server address (AWS/Azure)
1-2
Introduction
Feature/Enhancement Details
Inline migration from Deep On hardware models 1100 and 1200, Deep Discovery Analyzer
Discovery Analyzer 7.5 can automatically migrate the settings of a Deep Discovery
Analyzer 7.5 installation to 7.6.
Custom Sandboxing
Deep Discovery Analyzer performs sandbox simulation and analysis in
environments that match the desktop software configurations attackers
expect in your environment and ensures optimal detection with low false-
positive rates.
YARA Rules
Deep Discovery Analyzer uses YARA rules to identify malware. YARA rules
are malware detection patterns that are fully customizable to identify
targeted attacks and security threats specific to your environment.
1-3
Deep Discovery Analyzer 7.6 Administrator's Guide
Detailed Reporting
Deep Discovery Analyzer delivers full analysis results including detailed
sample activities and C&C communications via central dashboards and
reports.
Alert Notifications
Alert notifications provide immediate intelligence about the state of Deep
Discovery Analyzer.
Clustered Deployment
Multiple standalone Deep Discovery Analyzer appliances can be deployed
and configured to form a cluster that provides fault tolerance, improved
performance, or a combination thereof.
Sample Submissions
Deep Discovery Analyzer allows sample submissions using one of the
following:
• Integrated security products through web services API
• Manual submissions on the management console
1-4
Introduction
ICAP Integration
Deep Discovery Analyzer supports integration with Internet Content
Adaptation Protocol (ICAP) clients. After integration, Deep Discovery
Analyzer can perform the following functions:
• Work as an ICAP server that analyzes samples submitted by ICAP clients
• Serve User Configuration Pages to the end user when the specified
network behavior (URL access / file upload / file download) is blocked
• Control which ICAP clients can submit samples by configuring the ICAP
Client list
• Bypass file scanning based on selected MIME content-types
• Bypass file scanning based on true file types
• Bypass URL scanning in RESPMOD mode
• Scan samples using different scanning modules
• Filter sample submissions based on the file types that Virtual Analyzer
can process.
1-5
Chapter 2
Getting Started
This chapter describes how to get started with Deep Discovery Analyzer and
configure initial settings.
2-1
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
Make sure Javascript is enabled in the web browser.
To log on, open a browser window and type the following URL:
https://<Appliance IP Address>/pages/login.php
You can log on to the Deep Discovery Analyzer management console using
one of the following methods:
• Logging On Using Local Accounts on page 2-3
• Logging On With Single Sign-On on page 2-3
2-2
Getting Started
Procedure
1. On the Log On screen, type the logon credentials (user name and
password) for the management console.
Use the default administrator logon credentials when logging on for the
first time:
• User name: admin
• Password: Admin1234!
Note
Depending on your account, provide one of the following information in
the User name field:
• User name
• UPN
• Email address
2-3
Deep Discovery Analyzer 7.6 Administrator's Guide
Procedure
1. On the Log On screen, select a service name from the drop-down list.
2. Click Single Sign-on (SSO).
The system automatically navigates to the logon page for your
organization.
3. Follow the on-screen instructions and provide your account credentials
to access the Deep Discovery Analyzer management console.
Main Menu Bar The main menu bar contains several menu items that allow you to
configure product settings. For some menu items, such as Dashboard,
clicking the item opens the corresponding screen. For other menu
items, submenu items appear when you click or mouseover the menu
item. Clicking a submenu item opens the corresponding screen.
2-4
Getting Started
Section Details
Scroll Up and Arrow Use the Scroll up option when a screen’s content exceeds the
Buttons available screen space. Next to the Scroll up button is an arrow button
that expands or collapses the bar at the bottom of the screen.
Context-sensitive Use Help to find more information about the screen that is currently
Help displayed.
Change Password
You can change the password of the account that is currently used to access
the management console. From the management console banner, click the
account name on the top-right hand corner and select Change password.
In the fields provided, type the old password and the new passwords twice;
then, click Save.
Procedure
1. Activate the product license using a valid Activation Code. For details,
see License on page 6-103.
2. Specify the Deep Discovery Analyzer host name and IP address. For
details, see Network Tab on page 6-50.
3. Configure proxy settings if Deep Discovery Analyzer connects to the
management network or Internet through a proxy server. For details,
see Proxy Tab on page 6-54.
4. Configure date and time settings to ensure that Deep Discovery Analyzer
features operate as intended. For details, see Time Tab on page 6-57.
5. Configure SMTP settings to enable sending of notifications through
email. For details, see SMTP Tab on page 6-55.
6. Import sandbox instances to Virtual Analyzer. For details, see Importing
an Image on page 4-54.
2-5
Deep Discovery Analyzer 7.6 Administrator's Guide
Sandbox Analysis
The following lists the Trend Micro products that can send samples to Deep
Discovery Analyzer for sandbox analysis:
• Apex One as a Service
• Apex One 2019
• Deep Discovery Email Inspector 2.5 or later
• Deep Discovery Inspector 3.7 or later
• Deep Discovery Web Inspector 2.5 or later
2-6
Getting Started
Note
• You can view all samples on the Virtual Analyzer > Submissions
screen. Deep Discovery Analyzer administrators and investigators can
also manually submit samples on this screen.
• ICAP
• Email messages
2-7
Deep Discovery Analyzer 7.6 Administrator's Guide
Important
If the Deep Discovery Analyzer API key changes after registering with the
integrated product, remove Deep Discovery Analyzer from the integrated
product and add it again.
Note
Some integrating products require additional configuration to integrate with
Deep Discovery Analyzer properly. See the product documentation for details.
2-8
Getting Started
Important
If the Deep Discovery Analyzer API key changes after registering with the
integrated product, remove Deep Discovery Analyzer from the integrated
product and add it again.
2-9
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
Some integrating products require additional configuration to integrate with
Deep Discovery Analyzer properly. See the product documentation for details.
Exceptions
Products that send exceptions to Deep Discovery Analyzer:
• Deep Discovery Director
• Trend Micro Apex Central 2019 with the latest hotfix
• Trend Vision One
On the management console of the integrating product, go to the appropriate
screen (see the product documentation for information on which screen to
access) and specify the following information:
• Deep Discovery Analyzer IPv4 or IPv6 address. If unsure of the IP
address, check the URL used to access the Deep Discovery Analyzer
management console. The IP address is part of the URL.
• Deep Discovery Analyzer IPv4 or IPv6 virtual address. When using Deep
Discovery Analyzer in a high availability configuration, the virtual IP
address is used to provide integrated products with a fixed IP address
for configuration. This is available on the Deep Discovery Analyzer
management console, in Administration > System Settings > High
Availability.
• Deep Discovery Analyzer SSL port 443. This is not configurable.
• Deep Discovery Analyzer user logon credentials. For details, see
Accounts Tab on page 6-84.
Important
If the Deep Discovery Analyzer API key changes after registering with the
integrated product, then Deep Discovery Analyzer will need to be deleted
from the integrated product and added again.
2-10
Getting Started
Note
Some integrating products require additional configuration to integrate with
Deep Discovery Analyzer properly. See the product documentation for details.
2-11
Chapter 3
Dashboard
This chapter describes the Deep Discovery Analyzer dashboard.
3-1
Deep Discovery Analyzer 7.6 Administrator's Guide
Dashboard Overview
Monitor your network integrity with the dashboard. Each management
console user account has an independent dashboard. Changes made to one
user account dashboard do not affect other user account dashboards.
The dashboard consists of the following user interface elements.
Element Description
Note
Click the gear icon ( ) to display the following options:
Tabs
Tabs provide a container for widgets. Each tab on the dashboard can hold up
to 20 widgets. The dashboard supports up to 30 tabs.
Tab Tasks
The following table lists all the tab-related tasks:
Task Steps
Add a tab Click the plus icon ( ) on top of the dashboard. The system adds
a new tab with the default tab name.
3-2
Dashboard
Task Steps
Edit a tab Click the down-arrow icon ( ) next to the tab title and select an
option.
• Rename: Select this option to change the tab name
• Change Layout: Select this option and select a layout option
• Delete: Select this option to remove a tab
Widgets
Widgets are the core components of the dashboard. Widgets contain charts
and graphs that allow you to monitor the system status and track threats.
Widget Tasks
All widgets follow a widget framework and offer similar task options.
Task Steps
Add a widget At the top right corner of a tab screen, click the gear icon ( ) and
then click Add Widgets. The Add Widgets screen displays.
For details, see Adding Widgets to the Dashboard on page 3-4.
Refresh widget data Click the refresh icon ( ) to refresh widget data.
Click the refresh settings icon ( ) to set the frequency that the
widget refreshes or to automatically refresh widget data.
Delete a widget Click the delete icon ( ) to close the widget. This action removes
the widget from the tab that contains it, but not from any other
tabs that contain it or from the widget list in the Add Widgets
screen.
Change period If available, click the Period drop-down menu to select the time
period.
Change the node If available, click the Node drop-down box on top of the widget to
change the node.
3-3
Deep Discovery Analyzer 7.6 Administrator's Guide
Task Steps
Move a widget within the Use drag-and-drop to move the widget to a different location
same tab within the tab.
Resize a widget Point the cursor to the widget's right edge to resize a widget.
When you see a thick vertical line and an arrow (as shown in the
following image), hold and then move the cursor to the left or
right.
You can resize any widget within a multi-column tab (red squares).
These tabs have any of the following layouts.
3-4
Dashboard
Procedure
• To reduce the widgets that appear, click a category from the left side.
• To search for a widget, specify the widget name in the search text box at
the top.
• To change the widget count per page, select a number from the Records
drop-down menu.
• To switch between the Detailed and Summary views, click the display
icons ( ) at the top right.
• To select the widget to add to the dashboard, select the check box next to
the widget's title.
• To add the selected widgets, click Add.
Summary Tab
View the Summary tab widgets to understand threats detected by Deep
Discovery Analyzer based on type and amount, the volume of suspicious
objects discovered during analysis, submissions over time, and the Virtual
Analyzer summary.
Threat Types
This widget shows the type, amount, and risk level of threats detected in all
submissions during the specified time period.
The default period is Last 24 hours. Change the period according to your
preference.
Click a number under High Risk, Medium Risk, Low Risk, or Total to go to
the Submissions screen and view detailed information.
Suspicious Objects
This widget plots the number of objects (IP addresses, domains, URLs, and
files) added to the Suspicious Objects list during the specified time period.
3-5
Deep Discovery Analyzer 7.6 Administrator's Guide
The default period is Last 24 hours. Change the period according to your
preference.
Click View suspicious objects to go to the Suspicious Objects screen and
view detailed information.
For details, see Generated Suspicious Objects List on page 4-41.
3-6
Dashboard
Note
• The Node drop-down list is not available when you deploy Deep
Discovery Analyzer as a standalone appliance.
3-7
Deep Discovery Analyzer 7.6 Administrator's Guide
Queued Samples
This widget displays the number of queued samples in Virtual Analyzer. The
red line indicates the estimated number of samples Virtual Analyzer can
analyze within 5 minutes.
Click View queue to go to the Queued tab in the Submissions screen and
view detailed information.
For details, see Submissions on page 4-2.
Hardware Status
This widget displays the real-time utilization of key hardware components.
3-8
Chapter 4
Virtual Analyzer
This chapter describes the Virtual Analyzer.
4-1
Deep Discovery Analyzer 7.6 Administrator's Guide
Virtual Analyzer
Virtual Analyzer is a secure virtual environment that manages and analyzes
objects submitted by integrated products, administrators, and investigators.
Custom sandbox images enable observation of files, URLs, registry entries,
API calls, and other objects in environments that match your system
configuration.
Virtual Analyzer performs static and dynamic analysis to identify an object's
notable characteristics in the following categories:
• Anti-security and self-preservation
• Autostart or other system configuration
• Deception and social engineering
• File drop, download, sharing, or replication
• Hijack, redirection, or data theft
• Malformed, defective, or with known malware traits
• Process, service, or memory object change
• Rootkit, cloaking
• Suspicious network or messaging activity
During analysis, Virtual Analyzer rates the characteristics in context and
then assigns a risk level to the object based on the accumulated ratings.
Virtual Analyzer also generates analysis reports, suspicious object lists, PCAP
files, and OpenIOC files that can be used in investigations.
It works in conjunction with Threat Connect, the Trend Micro service that
correlates suspicious objects detected in your environment and threat data
from the Smart Protection Network.
Submissions
The Submissions screen, in Virtual Analyzer > Submissions, includes a
list of samples processed by Virtual Analyzer. Samples are files and URLs
submitted automatically by integrated products, through email messages
4-2
Virtual Analyzer
Note
Samples listed on the Unsuccessful tab are not included in the sample
count displayed on a widget.
Note
The ICAP Pre-scan tab displays when you enable ICAP integration on the
Administration > > Integrated Products/Services > ICAP screen.
Object Information
4-3
Deep Discovery Analyzer 7.6 Administrator's Guide
Column Information
Note
"NONAMEFL" if file size is 0 or too small for analysis
Note
Downloads are only available for file submissions. Click to
download the file sample as an archived file. The archive
password is virus.
4-4
Virtual Analyzer
Column Information
Submitter Name • Host name of the product that submitted the sample
• Logon account name if a sample is submitted manually
• IP address of the ICAP client or SMTP server that submitted the
sample
ICAP Mode Mode reported by the ICAP client when the sample was detected
Possible values are:
• REQMOD: ICAP Request modification method
• RESPMOD: ICAP Response modification method
This column is available on the ICAP Pre-scan tab only.
Analysis Information
4-5
Deep Discovery Analyzer 7.6 Administrator's Guide
Column Information
Risk Level Virtual Analyzer performs static analysis and behavior simulation to
identify a sample's characteristics. During analysis, Virtual Analyzer rates
the characteristics in context and then assigns a risk level to the sample
based on the accumulated ratings.
• Red icon ( ): High risk. The object exhibited highly suspicious
characteristics that are commonly associated with malware.
Examples:
• Malware signatures; known exploit code
• Disabling of security software agents
• Connection to malicious network destinations
• Self-replication; infection of other files
• Dropping or downloading of executable files by documents
• Yellow icon ( ): Low risk. The object exhibited mildly suspicious
characteristics that are most likely benign.
• Green icon ( ): No risk. The object did not exhibit suspicious
characteristics.
• Gray icon ( ): Not analyzed
For possible reasons why Virtual Analyzer did not analyze a file, see
Possible Reasons for Analysis Failure on page 4-38.
Note
If several instances processed a sample, the icon for the most
severe risk level displays. For example, if the risk level on one
instance is yellow and then red on another, the red icon displays.
Mouseover the icon for details about the risk level.
4-6
Virtual Analyzer
Column Information
Note
"Empty" or "UNKNOWN" if file size is 0 or too small to identify file
type for analysis
This column is available on the Completed and ICAP Pre-scan tabs only.
Threat Name of threat as detected by Trend Micro pattern files and other
components
This column is available on the Completed and ICAP Pre-scan tabs only.
Note
For the ICAP Pre-scan tab, if the threat name is not available (e.g.
the Web Inspection Service doesn't provide a threat name for a
URL), "Undefined threat" is displayed.
Threat Types Type of threat as detected by Trend Micro pattern files and other
components
This column is available on the Completed tab only.
Elapsed Time The amount of time that has passed since processing started
This column is available on the Processing tab only.
4-7
Deep Discovery Analyzer 7.6 Administrator's Guide
Column Information
Processed By IP address of the node that is processing the object, if Deep Discovery
Analyzer is configured in a load-balancing cluster
This column is available on the Completed and Processing tabs only.
Note
When Deep Discovery Analyzer is analysing a sample with
interactive mode enabled, you can perform the following tasks
on the Processing screen:
Time in Queue The amount of time that has passed since Virtual Analyzer added the
sample to the queue
This column is available on the Queued tab only.
Identified By The name of the detection module that processed the object
This column is available on the ICAP Pre-scan tab only.
4-8
Virtual Analyzer
Column Information
YARA Rule File Name of the YARA rule file that contains the matched YARA rule
If a child file is detected, you can click the link to view detailed YARA
detection information.
This column is available on the Completed tab only.
Note
• If a match is found for a child file but not the parent file, this
field displays the name of any YARA rule file that contains the
matched YARA rule.
Event Information
Event Logged • For samples submitted by other Trend Micro products, the date and
time the product dispatched the sample
• For manually submitted samples and for samples submitted by ICAP
clients, the date and time Deep Discovery Analyzer received the
sample
4-9
Deep Discovery Analyzer 7.6 Administrator's Guide
Column Information
Protocol • Protocol used for sending the sample, such as SMTP for email or
HTTP for network traffic
• No data (indicated by a dash) if manually submitted
This column is available on the Completed, Processing, Queued and
Unsuccessful tabs only.
Note
Deep Discovery Analyzer may have normalized the URL when
submitted using the management console.
Source IP IP address where the sample originated, based on the X-Client-IP ICAP
header sent by the ICAP client
This column is available on the ICAP Pre-scan tab only.
Destination IP IP address where the sample was sent, based on the X-Server-IP ICAP
header sent by the ICAP client
This column is available on the ICAP Pre-scan tab only.
Source User User currently logged on when the sample was found, based on the
X-Authenticated-User ICAP header sent by the ICAP client
This column is available on the ICAP Pre-scan tab only.
4-10
Virtual Analyzer
ICAP Submissions
Deep Discovery Analyzer supports integration with Internet Content
Adaptation Protocol (ICAP) clients.
ICAP Pre-scans
When ICAP clients send samples to Deep Discovery Analyzer for analysis,
Deep Discovery Analyzer performs a pre-scan which compares samples
received with known existing threats using the following resources:
• Advanced Threat Scan Engine (ATSE) for file scans
• YARA rules
• Suspicious objects and user-defined suspicious objects lists
• Predictive Machine Learning engine
• Web Reputation Services (WRS) for URL scans
• Deep Discovery Analyzer cache
Depending on the result of the pre-scan, Deep Discovery Analyzer performs
the following actions.
Result Action
If the sample is a • Deep Discovery Analyzer sends the original request as a response
known good file / back to the ICAP client.
URL
4-11
Deep Discovery Analyzer 7.6 Administrator's Guide
Result Action
If the pre-scan result • Deep Discovery Analyzer sends the original request as a response
for the sample is back to the ICAP client.
unknown
• Deep Discovery Analyzer treats the sample as a submission and
sends it to the Submission queue. The sample is not shown on
the ICAP Pre-scan tab.
• Deep Discovery Analyzer adds the sample to the Deep Discovery
Analyzer database to benefit later submissions.
Note
If Virtual Analyzer does not support the file type of a
submitted sample, Deep Discovery Analyzer does not send the
sample to the Submission queue or add to the Deep Discovery
Analyzer database.
Note
To view the ICAP Pre-scan tab on the Submissions screen, enable the setting
in Administration > Integrated Products/Services > ICAP. This tab is hidden
by default.
ICAP/1.0 200 OK
Server: Deep Discovery Analyzer 7.2 Build 1165
4-12
Virtual Analyzer
ISTag: "12.300.1011"
X-Virus-ID: TROJ_FRS.0NA103DD20,TROJ_FRS.0NA104DD20
X-Infection-Found: Type=0; Resolution=2; Threat=TROJ_FRS.0NA103
DD20,TROJ_FRS.0NA104DD20;
X-Response-Desc: URL: No risk rating from WRS; FILE: Detected b
y ATSE
Encapsulated: res-hdr=0, res-body=86
Date: Thu, 16 Apr 2020 07:38:01 GMT
ICAP
Values Examples
Headers
Server Deep Discovery Analyzer version and build number Server: Deep
Discovery Analyzer
7.2 Build 1165
4-13
Deep Discovery Analyzer 7.6 Administrator's Guide
ICAP
Values Examples
Headers
ISTag Version of the Advanced Threat Scan Engine for Deep ISTag:
Discovery (Linux, 64-bit) component "12.300.1011"
This is used to validate that previous Deep Discovery
Analyzer responses can still be considered fresh by an
ICAP client that may still be caching them.
Encapsulated The offset of each encapsulated section's start relative Encapsulated: req-
to the start of the encapsulating message's body hdr=0, req-body=86
Date The date time value provided by the Deep Discovery Date: Thu, 16 Apr
Analyzer clock, specified as an RFC 1123 compliant 2020 07:38:01 GMT
date/time string
For more details about ICAP headers, refer to the following site:
http://www.icap-forum.org/
The following table describes the additional headers that Deep Discovery
Analyzer returns.
Note
If enabled, Deep Discovery Analyzer always returns the X-Response-Desc
header, and only returns the X-Virus-ID and X-Infection-Found headers when
a known threat is detected during the pre-scanning of samples received from
ICAP clients.
4-14
Virtual Analyzer
Note
To enable these headers and configure other ICAP settings, go to
Administration > Integrated Products/Services > ICAP.
No risk rating from WRS The URL is detected by Web Reputation Services (WRS) and is
considered as safe.
Match found in URL exception The URL matches an entry in the exception list and is
list displayed on the Exceptions screen.
No risk rating from VA The URL is detected by Virtual Analyzer is considered as safe.
Bypass URL scanning in If you select Bypass URL scanning in RESPMOD mode on the
RESPMOD mode ICAP screen, Deep Discovery Analyzer does not scan URLs in
RESPMOD mode.
Detected by suspicious The URL matches an entry in the suspicious objects list.
objects list
4-15
Deep Discovery Analyzer 7.6 Administrator's Guide
URL submitted to VA No pre-scan result is available for the URL. Submit the URL
sample to Virtual Analyzer for analysis.
Match found in file exception The file matches an entry in the exception list and is displayed
list on the Exceptions screen.
No risk rating from VA The file is detected by Virtual Analyzer is considered as safe.
Unsupported file type in VA The file is not analyzed by Virtual Analyzer due to one of the
following:
• The file type is not supported in Virtual Analyzer
For more information on supported file types, see
Supported File Types in Virtual Analyzer on page 4-74.
• The file is password protected and cannot be extracted by
Virtual Analyzer for analysis
• Other reasons that Virtual Analyzer is unable to perform
the file analysis
Bypass MIME content-type If you select Enable MIME content-type exclusion and the
scanning content-type is in the exclusion list, Deep Discovery Analyzer
does not scan the file.
Maximum file size exceeded The file size has exceeded the maximum (60MB).
Bypass true file type scanning If you select Enable MIME content-type validation and the
file type is in the exclusion list, Deep Discovery Analyzer does
not scan the file.
Detected by ATSE The file is detected by Advanced Threat Scan Engine (ATSE) for
Deep Discovery.
4-16
Virtual Analyzer
Detected by suspicious The file matches an entry in the suspicious objects list.
objects list
Detected by Predictive The file is detected by the Predictive Machine Learning engine.
Machine Learning engine
File submitted to VA No pre-scan result is available for the file. Submit the file
sample to Virtual Analyzer for analysis.
The following header example indicates that the file and URL are considered
safe.
4-17
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
If you configure the redirect page in the management console, Deep
Discovery Analyzer sends the redirect page content after the HTTP 403
Forbidden header.
ICAP/1.0 200 OK
Server: Deep Discovery Analyzer 7.2 Build 1165
ISTag: "12.300.1011"
X-Virus-ID: TROJ_FRS.0NA103DD20,TROJ_FRS.0NA104DD20
X-Infection-Found: Type=0; Resolution=2; Threat=TROJ_FRS.0NA103
DD20,TROJ_FRS.0NA104DD20;
X-Response-Desc: URL: Bypass URL scanning in RESPMOD mode; FILE
: Detected by ATSE
Encapsulated: res-hdr=0, res-body=86
Date: Thu, 16 Apr 2020 07:38:01 GMT
Submissions Tasks
The following table lists all the Submissions tasks.
4-18
Virtual Analyzer
Submit Objects Click Submit when you are done and then check the status on the
Processing or Queued tab. When the sample has been analyzed, it
appears in the Completed tab.
For details, see Submitting Objects on page 4-24.
To manually submit multiple files at once, use the Manual Submission
Tool. See Manually Submitting Objects on page 4-27.
Detailed Information On the Completed tab, click anywhere on a row to view detailed
Screen information about the submitted sample. A new section below the row
shows the details.
For details, see Detailed Information Screen on page 4-32.
Prioritize Objects On the Queued tab, select one or more entries (up to 50) and click
Prioritize to move the entries to the top of the queue.
4-19
Deep Discovery Analyzer 7.6 Administrator's Guide
Task Steps
Data Filters If there are too many entries in the table, use data filters to limit the
entries. Each tab uses a different set of data filters.
Available data filters on the Completed tab only:
• Risk level: Filters by the Risk Level column.
• Event logged: Filters by the Event Logged column. All time
periods indicate the time used by Deep Discovery Analyzer. If
no time period is selected, the default configuration of Last 24
hours is used.
Available data filter on the Processing tab only:
• Type: Allows you to display all entries or samples processed with
interactive mode enabled
Available data filters on the Unsuccessful tab only:
• Error: Filters by the Error column.
• Submitted: Filters by the Submitted column. All time periods
indicate the time used by Deep Discovery Analyzer. If no time
period is selected, the default configuration of Last 24 hours is
used.
Available data filter on the ICAP Pre-scan tab only:
• Detected: Filters by the Detected column. All time periods
indicate the time used by Deep Discovery Analyzer. If no time
period is selected, the default configuration of Last 24 hours is
used.
The following options are available on all tabs:
• All tabs contain a search box. Type some characters in the
search text box, and then press ENTER. Deep Discovery Analyzer
searches only the file names and URLs in the current tab
for matches. Performing a search on the Completed tab also
searches for child file names as well.
• The Advanced link can limit the entries according to information
specified in one or more columns. For details, see Applying
Advanced Filters on page 4-21.
4-20
Virtual Analyzer
Task Steps
Customize columns To customize which columns appear in the table, click the gear icon
( ), select the columns to be displayed in the table, and click Apply.
Deep Discovery Analyzer saves the column settings for your user
account and displays the selected table columns the next time you
access the Submissions screen.
Records and The panel at the bottom of the screen shows the total number of
Pagination Controls samples. If all samples cannot display at the same time, use the
pagination controls to view the samples that are hidden from view.
Procedure
1. Click Advanced.
The filter bar appears.
2. In the Filter drop-down box, select an attribute.
3. Depending on the attribute selected, specify any additional details
required by the attribute.
4. To add another attribute, click .
To remove an attribute, click . You cannot delete the last filter.
5. Click Apply to immediately apply the filter to the current table.
Once applied, the following options are available:
• Edit: Modify the current filter
• Clear: Removes the applied filter
• Save: Saves any changes made to the filter, or saves the filter under
a new name
4-21
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
• Filters are saved in the tab where they were created. However,
Deep Discovery Analyzer does not allow duplicate filter names,
even if they were saved in a different tab.
• Click ▼ on the search text box to view all filters saved for the
current tab. Selecting a saved filter immediately applies that
filter to the current table.
Reanalyzing Samples
You can reanalyze selected samples to:
• Remove the existing analysis result
• Resubmit the sample to the queue
• Reanalyze the sample again, ignoring any cached data
Note
You can also reanalysis samples with interactive mode enabled.
Procedure
1. Go to Virtual Analyzer > Submissions.
2. Select one or more samples and click Reanalyze.
3. (Optional) Select Delete associated suspicious objects to remove
suspicious objects detected from the last sample analysis.
4. (Optional) To allow VNC access to Virtual Analyzer for the sample
analysis, select Enable interactive mode for this sample analysis and
configure the following settings:
4-22
Virtual Analyzer
Note
Note
5. Click Continue.
4-23
Deep Discovery Analyzer 7.6 Administrator's Guide
Submitting Objects
Procedure
1. Go to Virtual Analyzer > Submissions.
2. Click Submit Objects.
The Submit objects window appears.
3. To submit a single file, select File.
a. Browse and select a sample to upload.
b. (Optional) For Portable Executable samples, specify command line
parameters if required.
c. (Optional) Select Prioritize to put submitted objects at the top of the
queue.
d. (Optional) To allow VNC access to Virtual Analyzer for the sample
analysis, select Enable interactive mode for this sample analysis
and configure the following settings:
1. Select an image.
2. Select a timeout period.
Note
Deep Discovery Analyzer starts the countdown timer for
the timeout when a sample is submitted successfully. When
the timeout period is reached, Deep Discovery Analyzer
terminates VNC access, even when an analysis is still in
progress. For example, when you configure a timeout period of
30 minutes for a sample submission and start a VNC session
after 5 minutes, the remaining time for the session is 25
minutes.
4-24
Virtual Analyzer
Note
e. Click Submit.
Note
• After submitting a sample, you can view the VNC access information
and analysis status on the Processing tab. Use the VNC access
information to start a VNC session to a running Virtual Analyzer
image.
• For archives, Virtual Analyzer merges analysis results for files inside
archives into one report.
4-25
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
Before submission, Deep Discovery Analyzer normalizes all
occurrences of the following:
Note
A URL list is a CSV or TXT file containing a maximum of 1,000 URLs.
For CSV files, specify URLs in the first column. The URL list file
must specify each URL in own line, and use UTF-8 encoding.
4-26
Virtual Analyzer
Note
For archives, Virtual Analyzer merges analysis results for files inside
archives into one report.
Note
To manually submit multiple files at once, use the Manual Submission Tool.
For details, see Manually Submitting Objects on page 4-27.
4-27
Deep Discovery Analyzer 7.6 Administrator's Guide
Important
glibc.i686 and zlib.i686 must be installed on 64-bit Linux distributions.
Procedure
1. If it is not already installed, install the Manual Submission Tool. For
details, see Manual Submission Tool on page 6-101.
2. Go to the Manual Submission Tool package folder, open the work folder,
and then place all of the sample files or an URL list file into the indir
folder.
3. Run cmd.exe, and change the directory (cd) to the tool package folder.
4. Depending on the type of object you want to upload, do one of the
following:
Tip
Execute dtascli.exe for help.
4-28
Virtual Analyzer
4-29
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
The URL list must use the name URL.txt.
5. After uploading the files or URLs to Virtual Analyzer, confirm that they
are being analyzed in the management console. Click Virtual Analyzer >
Submissions to locate the files.
Shortly after submitting the files or URLs, before they have been
analyzed, they appear in the Processing or Queued tab. When the
samples have been analyzed, they appear in the Completed tab. If
the samples encountered errors during analysis, they appear in the
Unsuccessful tab.
Procedure
1. If it is not already installed, install the Manual Submission Tool. For
details, see Manual Submission Tool on page 6-101.
2. Go to the Manual Submission Tool package folder, open the work folder,
and then place all of the sample files or an URL list file into the indir
folder.
3. Open the terminal, and change the directory (cd) to the tool package
folder.
4. Execute chmod +x dtascli.
5. Depending on the type of object you want to upload, do one of the
following:
4-30
Virtual Analyzer
Tip
Execute ./dtascli for help.
After executing ./dtascli -u, terminal shows all of the files that
were uploaded from the work/indir folder.
• URL list: Execute ./dtascli -u --url to upload the file url.txt
in the work/indir folder to Virtual Analyzer.
Note
The URL list must use the name URL.txt.
6. After uploading the files or URLs to Virtual Analyzer, confirm that they
are being analyzed in the management console. Click Virtual Analyzer >
Submissions to locate the files.
Shortly after submitting the files or URLs, before they have been
analyzed, they appear in the Processing or Queued tab. When the
samples have been analyzed, they appear in the Completed tab. If
the samples encountered errors during analysis, they appear in the
Unsuccessful tab.
4-31
Deep Discovery Analyzer 7.6 Administrator's Guide
Information
Field Name
File/Email Message Sample URL Sample
Submission Basic data fields (such as Logged, Basic data fields (such as Logged,
details File name, and Type) extracted from URL, Source IP and port, and
the raw logs Destination IP and port) extracted
from the raw logs
Note
Deep Discovery Analyzer
may have normalized the
URL.
• Sample ID (SHA-1)
• Child files, if available, contained in or generated from the submitted
sample
• The IP address of the node that processed the sample
• The Raw Logs link shows all the data fields in the raw logs
• Scan actions for scans performed on network shares
4-32
Virtual Analyzer
Information
Field Name
File/Email Message Sample URL Sample
Notable The categories of notable characteristics that the sample exhibits, which
characteristics can be any or all of the following:
• • Anti-security, self-preservation
• Autostart or other system reconfiguration
• Deception, social engineering
• File drop, download, sharing, or replication
• Hijack, redirection, or data theft
• Malformed, defective, or with known malware traits
• Process, service, or memory object change
• Rootkit, cloaking
• Suspicious network or messaging activity
Other A table that shows the following information about other log submissions:
submission logs
• Logged
• Protocol
• Direction
• Source IP
• Source Host Name
• Destination IP
• Destination Host Name
MITRE ATT&CK ™ A list of MITRE ATT&CK ™ tactics, techniques, and sub-techniques detected.
Framework Click a link to view more information on the MITRE website.
4-33
Deep Discovery Analyzer 7.6 Administrator's Guide
Information
Field Name
File/Email Message Sample URL Sample
Report The PDF icon ( ) links to a downloadable PDF report and the HTML icon
( ) links to an interactive HTML report.
Note
An unclickable link means there were errors during simulation.
Mouseover the link to view details about the error.
Global View in Threat Connect is a link that opens Trend Micro Threat Connect
intelligence
The page contains detailed information about the sample.
VirusTotal Click View in VirusTotal to open VirusTotal in a new browser tab with a
query for the sample.
Tip
If the object contains multiple objects, you can view the VirusTotal
information for selected detected child objects in a window that
appears.
Procedure
1. Go to Virtual Analyzer > Submissions.
2. Click the ICAP Pre-scan tab.
3. Click the number in the Child Files column.
4-34
Virtual Analyzer
Field Description
Threat Name of threat as detected by Trend Micro pattern files and other
components
YARA Rule Name Name of the YARA rule that was matched
YARA Rule File Name of the YARA rule file that contains the matched YARA rule
VirusTotal Click to open VirusTotal in a new browser tab with a query for the
child file.
Investigation Package
The investigation package helps administrators and investigators inspect and
interpret threat data generated from samples analyzed by Virtual Analyzer.
It includes files in OpenIOC format that describe Indicators of Compromise
(IOC) identified on the affected host or network.
The table below describes some of the files within the investigation package
that will aid in an investigation.
Table 4-5. Investigation Package Contents
4-35
Deep Discovery Analyzer 7.6 Administrator's Guide
4-36
Virtual Analyzer
Note
To ensure the availability of the investigation package data, Trend Micro
recommends backing up the data to an external server. For details, see Data
Backup on page 6-94.
The following examples illustrate how storage limitations can affect the
amount of time that the investigation package data is retained in Deep
Discovery Analyzer.
Based on testing done by Trend Micro, the average size of the investigation
package data is 8 MB. If Deep Discovery Analyzer analyzes 8000 samples per
day, then the resulting investigation package data is 64000 MB.
4-37
Deep Discovery Analyzer 7.6 Administrator's Guide
If Deep Discovery Analyzer is in cluster mode, the disk space occupied per
day is multiplied by the number of appliances in the cluster.
Virtual Analyzer does Check the supported file type list in the Virtual Analyzer > Sandbox
not support the file Management > Submission Policies tab.
format, or the file is
empty.
The available Check the sandbox image information in the Virtual Analyzer >
sandbox images do Sandbox Management > Images tab.
not support the file
format.
The URL exceeds Verify that the URL does not exceed 2,083 characters.
the limit of 2083
characters.
Virtual Analyzer Check the password list in the Virtual Analyzer > Sandbox
does not support Management > File Passwords tab.
the encryption or
compression format.
Virtual Analyzer does Unsupported file type in current sandbox image. Check the sandbox
not support the file image information in the Virtual Analyzer > Sandbox Management >
format. Images tab.
Virtual Analyzer is Verify the connection of the sandbox management network to the
unable to access the Internet.
Internet.
4-38
Virtual Analyzer
Reason Action
The Sandbox for Resubmit the object for analysis. If the issue persists, contact your
macOS did not return support provider.
an analysis result
before the timeout
period expired.
Unable to establish Verify the connection of the management network to the Internet.
a connection to the
Sandbox for macOS.
The URL is invalid. Verify that the specified URL is in a valid format.
Extracted file sizes Verify that the total file size of the extracted samples do not exceed the
exceeds total specified limitation.
limitation
Archive extracted See the scan results for the extracted files.
for analysis. Child
file scanning is
unsuccessful.
Virtual Analyzer is Verify that the disk space is sufficient to perform the analysis.
unable to analyze
the object. The
available disk space
is insufficient.
Virtual Analyzer is Resubmit the object for analysis. If the issue persists, contact your
unable to analyze support provider.
the object within the
timeout period.
Virtual Analyzer is Missing required files to execute the application. Use the Bundle files
unable to analyze the option to upload the required files to analyze the object.
object. Dependencies
that the object
requires cannot be
found.
4-39
Deep Discovery Analyzer 7.6 Administrator's Guide
Reason Action
Virtual Analyzer is Resubmit the object for analysis. If the issue persists, contact your
unable to analyze the support provider.
object. The object
crashes while being
analyzed.
Virtual Analyzer is Resubmit the object with the required command line parameters.
unable to analyze the
object. The object
must be run with
the correct command
line arguments.
Virtual Analyzer is Re-import an image with a valid license for Microsoft Office.
unable to analyze
the object. The Office
license has expired.
An unexpected error Resubmit the object for analysis. If the issue persists, contact your
has occurred. support provider.
Analysis has been A user has stopped the sample analysis in Interactive Mode. Resubmit
canceled by the user the object for analysis.
Virtual Analyzer is In Interactive Mode, a sample is not analyzed before the timeout
unable to analyze period and Virtual Analyzer returns a rating of -45. Resubmit the object
the object within the for analysis, set a longer timeout value, and start the sample analysis
timeout period before the timeout period in Interactive Mode.
Suspicious Objects
Suspicious objects are objects with the potential to expose systems to
danger or loss. Deep Discovery Analyzer detects and analyzes suspicious IP
addresses, host names, files, and URLs.
4-40
Virtual Analyzer
Note
For more information, see Trend Vision One Tab on page 6-10 or
Registering to Deep Discovery Director on page 6-18.
You can check the synchronization status on the Deep Discovery Director
management console. For more information, see the Deep Discovery
Director Administrator's Guide.
• If you integrate Deep Discovery Analyzer with Trend Vision One, Deep
Discovery Director, and Trend Micro Apex Central, Deep Discovery
Analyzer uploads the Suspicious Objects list only to Trend Vision One.
Field Description
Last Detected Date and time Virtual Analyzer last found the object in a submitted
sample
Expiration Date and time Virtual Analyzer will remove the object from the
Suspicious Objects tab
4-41
Deep Discovery Analyzer 7.6 Administrator's Guide
Field Description
Object The IP address, domain, URL, or SHA-1 hash value of the file
Latest Related SHA-1 hash value of the sample where the object was last found.
Sample
Related Submissions The total number of samples where the object was found.
Clicking the number opens the Submissions screen with the SHA-1
hash value as the search criteria.
The following table describes the tasks you can perform on the Generated
Suspicious Objects tab.
Table 4-7. Suspicious Objects Tasks
Task Steps
Export/Export All Select one or several objects and then click Export to save the objects
to a CSV file.
Click Export All to save all the objects to a CSV file.
Add to Exceptions Select one or several objects that you consider harmless and then
click Add to Exceptions. The objects move to the Exceptions tab.
4-42
Virtual Analyzer
Task Steps
Never Expire Select one or several objects that you always want flagged as
suspicious and then click Never Expire.
Expire Now Select one or several objects that you want to remove from the
Suspicious Objects and then click Expire Now. When the same object
is detected in the future, it will be added back to the Suspicious
Objects.
Data Filters If there are too many entries in the table, limit the entries by
performing these tasks:
• Select an object type in the Show drop-down box.
• Select a column name in the Search column drop-down box
and then type some characters in the Search keyword text box
next to it. As you type, the entries that match the characters you
typed are displayed. Deep Discovery Analyzer searches only the
selected column in the table for matches.
Records and The panel at the bottom of the screen shows the total number of
Pagination Controls objects. If all objects cannot be displayed at the same time, use the
pagination controls to view the objects that are hidden from view.
Field Description
Object The IP address, domain, URL, or SHA-1 hash value of the file
Source The source (Deep Discovery Director or Trend Vision One) that added
the suspicious object
4-43
Deep Discovery Analyzer 7.6 Administrator's Guide
Field Description
Expiration Date and time Virtual Analyzer will remove the object from the
Suspicious Objects tab
Last synchronized Date and time the object was last synchronized from Deep Discovery
Director or Trend Vision One
The following table describes the tasks you can perform on the
Synchronized Suspicious Objects tab.
Task Steps
Export All Click Export All to save all the objects to a CSV file.
Data Filters If there are too many entries in the table, limit the entries by
performing these tasks:
• Select an object type from the Type drop-down list.
• Type a keyword in the Search keyword text box.
Records and The panel at the bottom of the screen shows the total number of
Pagination Controls objects. If all objects cannot be displayed at the same time, use the
pagination controls to view the objects that are hidden from view.
4-44
Virtual Analyzer
Added Date and time when the suspicious object was added
Object The IP address, domain, URL, or SHA-1 or SHA-256 hash value of the file
Click Edit to modify the displayed value.
Source The source (Deep Discovery Director, local, or Trend Vision One) that added
the suspicious object
Deep Discovery Analyzer can import STIX files formatted using the 1.2, 1.1.1
and 1.0.1 version specifications. The 1.0.1 specification can only be used for
Virtual Analyzer output.
The STIX file can include multiple objects. However, Deep Discovery
Analyzer only imports the following supported STIX indicators:
• Indicator - File Hash Watchlist (SHA-1 and SHA-256)
• Indicator - URL Watchlist
• Indicator - Domain Watchlist
• Indicator - IP Watchlist
STIX indicators can use the following Properties attributes:
• @condition must be Equals
• @apply_condition must be ANY
4-45
Deep Discovery Analyzer 7.6 Administrator's Guide
Procedure
1. Go to Virtual Analyzer > Suspicious Objects, and click the User-defined
Suspicious Objects tab.
2. To specify a single object:
a. Click Add.
The Add Object window appears.
b. Select an object type:
• IP address: Type the IP address or a hyphenated range
• Domain: Type a domain name
Note
Wildcards are only allowed in a prefix, and must be connected
with a ". " symbol. Use only one wildcard per domain. For
example, *.com will match abc.com or test.com.
Note
Deep Discovery Analyzer supports both HTTP and HTTPS.
4-46
Virtual Analyzer
Note
The User-defined Suspicious Objects list supports a maximum of
25,000 objects.
Note
Deep Discovery Analyzer can import STIX files formatted using the
1.2, 1.1.1 and 1.0.1 version specifications. The 1.0.1 specification can
only be used for Virtual Analyzer output.
• Indicator - IP Watchlist
4-47
Deep Discovery Analyzer 7.6 Administrator's Guide
Exceptions
Objects in the exceptions list are automatically considered safe and are not
added to the suspicious objects list. Manually add trustworthy objects or go
to the Virtual Analyzer > Suspicious Objects screen and select suspicious
objects that you consider harmless.
The following columns show information about objects in the exception list.
Table 4-9. Exceptions Columns
Column Name Information
Added Date and time Virtual Analyzer added the object to the Exceptions tab
Type The object type (IP address, Domain, URL, File SHA-1, or File
SHA-256 ).
Object The IP address, domain, URL, or SHA-1 or SHA-256 hash value of the
file
Source The source (Trend Vision One, Apex Central, Deep Discovery Director,
or local) that added the exception
Exceptions Tasks
The following table lists all the Exceptions tab tasks:
4-48
Virtual Analyzer
Note
Wildcards are only allowed in a prefix. When a
wildcard is used in a prefix, it must be connected
with ". ". Only one wildcard may be used in a
domain. For example, *.com will match abc.com or
test.com.
• For URLs, select URL for the type and then type the URL.
Note
4-49
Deep Discovery Analyzer 7.6 Administrator's Guide
Task Steps
• For files, select File SHA-1 or File SHA-256 for the type and
type the hash value.
• Notes: Type some notes for the object.
• Add More: Click this button to add more objects. Select an
object type, type the object in next field, type some notes,
and then click Add to List.
3. (Optional) Type some notes for the object.
4. Click Add More to add more objects.
a. Specify the IP address, Domain, URL, File SHA-1, or File
SHA-256 exception criteria.
b. Click Add to List.
5. Click Add when you have defined all the objects that you wish to
add.
Note
Deep Discovery Analyzer supports the addition of up to 25,000
exceptions.
Import Click Import to add objects from a properly-formatted CSV file. In the
new window that opens:
• If you are importing exceptions for the first time, click Download
sample CSV, save and populate the CSV file with objects (see the
instructions in the CSV file), browse and then select the CSV file.
• If you have imported exceptions previously, save another copy of
the CSV file, populate it with new objects, browse and then select
the CSV file.
4-50
Virtual Analyzer
Task Steps
Important
Delete/Delete All Select one or several objects to remove and then click Delete.
Click Delete All to delete all the objects.
Export/Export All Select one or several objects and then click Export to save the objects
to a CSV file.
Click Export All to save all the objects to a CSV file.
Data Filters If there are too many entries in the table, limit the entries by
performing these tasks:
• Select an object type in the Show drop-down box.
• Select a column name in the Search column drop-down box
and then type some characters in the Search keyword text box
next to it. As you type, the entries that match the characters you
typed are displayed. Deep Discovery Analyzer searches only the
selected column in the table for matches.
Records and The panel at the bottom of the screen shows the total number of
Pagination Controls objects. If all the objects cannot be displayed at the same time, use
the pagination controls to view the objects that are hidden from view.
Sandbox Management
The Sandbox Management screen includes the following:
• Status Tab on page 4-52
• Images Tab on page 4-53
• YARA Rules Tab on page 4-58
4-51
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
If Virtual Analyzer does not contain images, clicking Sandbox Management
displays the Images tab.
Status Tab
The Status tab displays the following information:
• Overall status of Virtual Analyzer, including the number of samples
queued and currently processing
Virtual Analyzer displays the following:
Table 4-11. Virtual Analyzer Statuses
Status Description
4-52
Virtual Analyzer
Status Description
Unrecoverable error Virtual Analyzer is unable to recover from an error. Contact your
support provider for troubleshooting assistance.
Deploying images Virtual Analyzer is deploying images from Deep Discovery Director.
from Deep
Discovery Director...
Images Tab
Virtual Analyzer does not contain any images by default. To analyze samples,
you must prepare and import at least one image in the Open Virtual
Appliance (OVA) format.
You can use existing VirtualBox or VMware images, or create new
images using VirtualBox. For details, see Chapters 2 and 3 of the Virtual
Analyzer Image Preparation User's Guide at http://docs.trendmicro.com/en-us/
enterprise/virtual-analyzer-image-preparation.aspx.
4-53
Deep Discovery Analyzer 7.6 Administrator's Guide
Before importing, validate and configure images using the Virtual Analyzer
Image Preparation Tool. For details, see Chapter 4 of the Virtual Analyzer
Image Preparation User's Guide.
The hardware specifications of your product determine the number of
images that you can import and the number of instances that you can deploy
per image.
You can view the following information on the Images screen:
• The number of configured instances for an image
• The number of instances in use
The following table describes the tasks that you can perform on the Images
screen.
Task Description
Note
For Linux images, Deep Discovery Analyzer supports CentOS
7.8, RedHat 7.9, and RedHat 8.3 only.
Importing an Image
You can import up to four images (one Linux and three Windows images).
The hardware specifications of your product determine the number of
4-54
Virtual Analyzer
images that you can import and the number of instances that you can deploy
per image.
Virtual Analyzer supports OVA files up to 30GB in size.
Important
Virtual Analyzer stops analysis and keeps all samples in the queue whenever
an image is added or deleted, or when instances are modified.
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the Images
tab.
The Images screen appears.
2. Click Import.
The Import Image screen appears.
3. Select a Platform option.
4. Select an image source and configure the applicable settings.
a. Type a permanent image name with a maximum of 50 characters.
b. Choose the number of instances to allocate for the image.
c. Type the URL or network share path of the OVA file.
d. (Optional) Select Connect through a proxy sever.
e. (Optional) Type the logon credentials if authentication is required.
5. Click Import.
Virtual Analyzer validates the OVA files before starting the import
process.
4-55
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the Images
tab.
2. Click Import.
3. Select a Platform option.
4. For Source, select Image import tool.
5. Click Download to download the image import tool.
6. Open the file VirtualAnalyzerImageImportTool.exe.
7. Type the IP address for Deep Discovery Analyzer.
Deep Discovery Analyzer deploys instances immediately after an image
uploads. Wait for the instance deployment to complete.
4-56
Virtual Analyzer
You can import up to four images (one Linux and three Windows images).
The hardware specifications of your product determine the number of
images that you can import and the number of instances that you can deploy
per image.
Important
Virtual Analyzer stops all analysis and keeps all samples in the queue
whenever an image is added or deleted, or when instances are modified. All
instances are also automatically redistributed whenever you add images.
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the Images
tab.
The Images screen appears.
2. Click Modify.
The Modify Sandbox Instances screen appears.
3. (Optional) Modify the name of an image.
4. Modify the instances allocated to any image.
5. Click Configure.
Virtual Analyzer displays a confirmation message.
4-57
Deep Discovery Analyzer 7.6 Administrator's Guide
6. Click OK.
Virtual Analyzer configures the sandbox instances. Please wait for the
process to finish before navigating away from the screen.
Note
If configuration is unsuccessful, Virtual Analyzer reverts to the previous
settings and displays an error message.
Files to analyze File types to analyze using the YARA rules in the YARA rule file
Added Date and time the YARA rule file was added
The following table lists all the YARA Rules tab tasks:
Table 4-14. YARA Rules Tasks
Task Steps
Add Browse and select a YARA rule file and the file types to analyze.
For details, see Managing YARA Rule Files on page 4-61.
Delete Select one or several YARA rule files to remove and then click Delete.
4-58
Virtual Analyzer
Task Steps
Export Select one YARA rule file, and click Export to download a copy of the
YARA rule file.
Edit Click the File name of the YARA rule file to be edited.
For details, see Managing YARA Rule Files on page 4-61.
Records and The panel at the bottom of the screen shows the total number of
Pagination Controls YARA rule files. If all samples cannot display at the same time, use the
pagination controls to view the samples that are hidden from view.
4-59
Deep Discovery Analyzer 7.6 Administrator's Guide
$a or $b or $c
}
The following table lists the different parts of the YARA rule and how they
are used:
Table 4-15. YARA Rule Parts and Usage
Part Usage
rule The YARA rule name. Must be unique and cannot contain spaces.
meta: Indicates that the "meta" section begins. Parts in the meta section do
not affect detection.
weight Optional part that must be between 1 and 10 that determines the risk
level if rule conditions are met:
• 1 to 9 = Low risk
• 10 = High risk
Note
The weight value does not correspond to the risk level
assigned by Deep Discovery Analyzer.
strings: Indicates that the "strings" section begins. Strings are the main means
of detecting malware.
$a or $b or $c Conditions are Boolean expressions that define the logic of the rule.
They tell the condition under which a submitted object satisfies the
rule or not. Conditions can range from the typical Boolean operators
and, or and not, to relational operators >=, <=, <, >, == and !=.
Arithmetic operators (+, -, *, \, %) and bitwise operators (&, |, <<, >>,
~, ^) can be used on numerical expressions.
4-60
Virtual Analyzer
Procedure
1. Go to Virtual Analyzer > Sandbox Management, and then go to the
YARA Rule tab.
2. Do one of the following:
• To add a new YARA rule, click Add.
Virtual Analyzer validates the YARA rule file before adding it. For
details about creating valid YARA rule files, see Creating a YARA Rule
File on page 4-59.
• To edit an existing YARA rule, click the File name of the YARA rule
file to be edited.
3. Click Choose File to browse and select a YARA rule file to add.
4. For Files to analyze, do one of the following:
• Select Specify file types and add selected file types that Virtual
Analyzer associates with this YARA rule file.
• Select All file types to have Virtual Analyzer associate all file types
with this YARA rule file.
Note
Analyzing all file types may cause unintended detections and affect
system performance. Trend Micro recommends analyzing specific
file types that are targeted by the YARA rule file.
5. Click Save.
After adding a YARA rule file, you can:
• Click Export to download a copy of the selected YARA rule file.
• Click Delete to delete one or more selected YARA rule files.
4-61
Deep Discovery Analyzer 7.6 Administrator's Guide
4-62
Virtual Analyzer
• xls
• xlsx
If Virtual Analyzer is unable to extract files using any of the listed passwords,
Deep Discovery Analyzer displays the error Unsupported file type.
Note
The following table describes the tasks that you can perform on the File
Passwords screen.
Task Description
Import passwords Click Import Passwords to import passwords from a selected file.
Export all passwords Click Export All to export all file passwords and save the file on your
computer.
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the File
Passwords tab.
4-63
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
Passwords are case-sensitive.
Note
Importing passwords from a file replaces the existing passwords in Deep
Discovery Analyzer. Before you import passwords, it is recommended you use
the export feature to back up the existing passwords.
Procedure
1. Go to Sandbox Management > File Passwords.
The File Passwords screen appears.
2. Click Import Passwords.
The Import Passwords window appears.
3. Browse and select the file to import.
4-64
Virtual Analyzer
Note
Click Download sample file to view a sample of a properly formatted file.
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the Network
Connection tab.
The Network Connection screen appears.
2. Select Enable external connections.
The settings panel appears.
3. Select the type of connection to be used by sandbox instances.
4-65
Deep Discovery Analyzer 7.6 Administrator's Guide
Important
Trend Micro recommends using an environment isolated from the
management network.
WARNING!
Enabling connections to the management network may result in
malware propagation and other malicious activity in the network.
4-66
Virtual Analyzer
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the Network
Connection tab.
2. Click Test Internet Connectivity.
Note
Test Internet Connectivity will be disabled if external connections are
not enabled or the settings are not saved.
Note
To enable this scan setting, you must also configure Deep Discovery Analyzer
to synchronize suspicious objects from Trend Vision One or Deep Discovery
Director.
For more information, see Trend Vision One Tab on page 6-10 or Registering to
Deep Discovery Director on page 6-18.
4-67
Deep Discovery Analyzer 7.6 Administrator's Guide
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the
Interactive Mode tab.
2. Type a password that contains at least 8 characters and includes
uppercase letters, lowercase letters, numbers, and special characters.
Leave this field empty if you do not want to set the password.
Note
If you forget the password you specify, you must reset it.
Note
The starting port number must be between 5900 and 6100.
4. Click Save.
4-68
Virtual Analyzer
• Sample of the following detected file types: bat, class, cmd, dll, exe, htm,
html, jar, js, lnk, macho, mov, ps1, svg, swf, url, vbe, vbs, wsf
• Macros in Microsoft Office files
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the Smart
Feedback tab.
2. Configure Smart Feedback settings.
a. Select Enable Smart Feedback (recommended) to send protected
threat information to Trend Micro from your network.
b. Select Submit suspicious files to Trend Micro to send high-risk files
to Trend Micro for further investigation.
Note
In a cluster environment, the Trend Micro Sandbox for macOS setting does
not propagate from the primary appliance. Enable the Trend Micro Sandbox
for macOS setting on the management console of each secondary appliance.
4-69
Deep Discovery Analyzer 7.6 Administrator's Guide
Important
The Trend Micro Sandbox for macOS setting is automatically disabled if the
Deep Discovery Analyzer license expires.
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the Sandbox
for macOS tab.
2. Select Send possible threats for macOS to Sandbox as a Service for
analysis.
3. Click Save.
Note
For information on how Deep Discovery Analyzer matches and applies
submission policies, see Submission Policy Matching on page 4-84.
Field Description
4-70
Virtual Analyzer
Field Description
Submitters One or more submitters that are associated with the submission
policy
Image Name of the image that is associated with the submission policy
The following table lists all the tasks you can perform on the Submission
Policies screen.
Task Description
Important
Before you can create a submission policy, import one or
more images. For more information, see Importing an Image
on page 4-54.
Delete a submission Select one or more entries and click Delete and click OK to confirm.
policy
Create a copy of a Select the submission policy you want to copy and click Duplicate.
submission policy
Enable or disable a Click the toggle switch in the Status field to enable or disable a
submission policy submission policy
4-71
Deep Discovery Analyzer 7.6 Administrator's Guide
Task Description
Search for a Type a keyword in the text field and press [Enter] to search.
submission policy
Note
You can also filter the entries by submitter and image type.
Important
Before you can create a submission policy, import one or more images. For
more information, see Importing an Image on page 4-54.
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the
Submission Policies tab.
2. Do one of the following:
• Click Add to create a new submission policy.
• Click a policy name to edit the settings.
Note
Some settings in the default policy are not configurable.
4-72
Virtual Analyzer
Tip
Click >> or << to move the selected entries between the lists.
Note
a. Click Save.
b. (Optional) Repeat the steps to create more submission rules for the
policy.
8. Click Save.
4-73
Deep Discovery Analyzer 7.6 Administrator's Guide
Tip
For information on how Deep Discovery Analyzer matches and applies
submission policies, see Submission Policy Matching on page 4-84.
Note
Updates to the Virtual Analyzer Configuration Pattern may also include added
support for new file types. After the update, Virtual Analyzer places new file
types in the Analyzed list.
.cla
4-74
Virtual Analyzer
.dotm
4-75
Deep Discovery Analyzer 7.6 Administrator's Guide
4-76
Virtual Analyzer
.html
Java™ Application
Note
Virtual Analyzer does not support the java
library.
mhtml .mhtml
4-77
Deep Discovery Analyzer 7.6 Administrator's Guide
.pps
.xla
.xlt
.xlm
4-78
Virtual Analyzer
.xlsm
.xlam
.xltm
xhtml .xhtml
4-79
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
For the following script types, Virtual Analyzer does not perform an analysis if
the file extension and file type do not match:
• bat
• cmd
• csv
• hta
• htm
• html
• iqy
• js
• jse
• mht
• mhtml
• ps1
• shtml
• slk
• svg
• url
• vbe
• vbs
• wsf
• xht
• xhtml
• xls
4-80
Virtual Analyzer
Virtual Analyzer can scan files that match the supported file types in an
archive file that is not password protected. The following table lists the
supported archive file types.
Note
For the list of password-protected archive files that Virtual Analyzer can
analyze, see File Passwords Tab on page 4-62.
Example File
True File Type Full File Type
Extensions
.bzip2
4-81
Deep Discovery Analyzer 7.6 Administrator's Guide
Example File
True File Type Full File Type
Extensions
.gz
.lharc
.sitx
.tgz
.win.dat
4-82
Virtual Analyzer
Example File
True File Type Full File Type
Extensions
XZ XZ archive .xz
The following table lists the Mac file types that Deep Discovery Analyzer
automatically submits to Sandbox for MacOS for analysis, regardless of the
submission settings.
Note
Deep Discovery Analyzer submits JAR and CLASS files to both Sandbox for
MacOS and the internal Virtual Analyzer for analysis.
Java™ Application
Note
Virtual Analyzer does not support the java
library.
.cla
4-83
Deep Discovery Analyzer 7.6 Administrator's Guide
4-84
Virtual Analyzer
Note
If the Trend Micro Sandbox for macOS service is enabled for supported Mac
file type, Deep Discovery Analyzer sends samples to Sandbox for macOS for
analysis and includes the result in the analysis report.
4-85
Deep Discovery Analyzer 7.6 Administrator's Guide
• EXE • Windows 8
• CSV • Windows 10
• PPT
• DOC
• PDF
Note
• Deep Discovery Analyzer automatically adds the EXE, CSV, and PPT file
types to the default policy based on the user-defined policies (Policy A
and Policy B).
• If the default policy is the only policy matched, Deep Discovery Analyzer
analyzes the SH and ELF files using the CentOS 7 image. Any supported
Windows file types are analyzed using the Windows images.
The following table shows the matched policies and the Virtual Analyzer
image used for samples submitted to Deep Discovery Analyzer.
Table 4-21. Policy matching result examples
Matched
Sample File Type Submitter Image Used
Policy
4-86
Virtual Analyzer
Matched
Sample File Type Submitter Image Used
Policy
Default • Windows 8
• Windows 10
4-87
Deep Discovery Analyzer 7.6 Administrator's Guide
Matched
Sample File Type Submitter Image Used
Policy
Submitters
Use the Submitters screen, in Virtual Analyzer > Submitters, to adjust
Virtual Analyzer resource allocation between all sources that submit objects
to Deep Discovery Analyzer for analysis. Virtual Analyzer utilizes more
resources to process submissions by submitters with higher weight settings.
The following columns show information about submitters, average
processing time, total submissions, and total resources allocated to
submitters. Columns for the adjustment of weight and removal of submitters
are provided as well.
Table 4-22. Submitters Columns
Column Name Information / Action
Submitter Name of the Trend Micro product that submits the objects
Host Name • Host name of the integrated security product that submitted the
objects
• No data (indicated by a dash) for email or manual submissions
• IP address of the ICAP clients
• Name of the network share
Last Submission Date and time Virtual Analyzer last received a submission
4-88
Virtual Analyzer
Average Processing Average time it takes Virtual Analyzer to process a submitted object
Time
% of Total Resources Percentage of total Virtual Analyzer resources allocated to the Trend
Micro product.
Action Deletes the Trend Micro product from Deep Discovery Analyzer
Deleted products cannot submit new objects for scanning and analysis
or query analysis results, but queued objects will be processed and
analysis results will be stored.
Note
To reintegrate the product, see Integration with Trend Micro
Products and Services on page 2-6.
Network Shares
With network share scanning, Deep Discovery Analyzer scans files on
network shares to detect and prevent potential malicious files from
propagating in your network environment.
The following table describes the information on the Network Shares
screen.
4-89
Deep Discovery Analyzer 7.6 Administrator's Guide
Field Description
Scan results Scan results of the most recent network share scan. Click a number to
view detailed scan results.
Note
If a scan is in progress, the system automatically updates the
scan results every 10 seconds.
Network status Connection status (Accessible or Inaccessible) for the network share
Status Toggle to enable or disable the scan settings for the network share
Note
If you disable the scan settings for a network share, the
system disables the manual scan function and the scheduled
scan settings do not take effect.
The following table describes the tasks you can perform on the Network
Shares screen.
4-90
Virtual Analyzer
Tip
After you add a network share, you can access the Submitters
screen to view the associated sample submissions and adjust
the weight value (the default is 4) for Virtual Analyzer resource
allocation.
Test the connection Click a network share name and click Test Connection. Check the test
to a network share result in the Network status field on the Network Shares screen.
Edit a network share Click a network share name to edit the settings.
For more information, see Configuring a Network Share on page 4-92.
Note
You cannot edit the settings of a network share If a scan for
the network share is in progress.
Delete a network Select one or more entries and click Delete and click OK to confirm.
share
Stop a scan When a scan is in progress, click Stop in the Scan status field.
Start a manual scan Click Scan in the Manual scan field to start a scan.
Enable or disable Click the toggle switch in the Status field to enable or disable network
network share share configuration
configuration
4-91
Deep Discovery Analyzer 7.6 Administrator's Guide
Task Description
Procedure
1. Go to Virtual Analyzer > Network Shares.
2. Do one of the following:
• Click Add to configure a new network share.
• Click a network share name to change the settings.
3. Click the Status toggle to enable or disable the network share
configuration.
4. Type a descriptive name for the network share.
5. Type additional information for the network share.
6. Select a storage service and configure the required settings.
• NFS or CIFS storage service
4-92
Virtual Analyzer
Field Description
Server address Type the IP address or fully qualified domain name (FQDN) of
the network share server.
Note
Make sure the network share server uses UTF-8
encoding to allow Deep Discovery Analyzer to
perform sample analysis and display the server
address properly.
User name Type the user name to access the network share.
For domain users, type the user name in the format
domain_name\user_name.
Note
Field Description
Server address This field displays the server address for the storage service.
4-93
Deep Discovery Analyzer 7.6 Administrator's Guide
Field Description
Path Type the bucket name or bucket folder path (for example,
my_bucket or my_bucket/my_folder/../).
Note
You must specify at least the bucket name in the
path.
Access key ID Type the access key ID that Deep Discovery Analyzer uses to
access AWS S3.
Secret access key Type the secret access key that Deep Discovery Analyzer uses
to access AWS S3.
Note
Field Description
Server address This field displays the server address for the storage service.
4-94
Virtual Analyzer
Field Description
Note
You must specify at least the container name in the
path.
Account name Type the account name that Deep Discovery Analyzer uses to
access Azure Storage.
Access key Type the access key that Deep Discovery Analyzer uses to
access Azure Storage.
7. For file matching, configure file name patterns that Deep Discovery
Analyzer uses to filter files for scanning. Do the following:
a. Select to match files based on the inclusion or exclusion list.
Note
If you select to use both lists for file name matching, the exclusion
list has a higher priority.
b. Type one or more file name pattern for the selected list.
4-95
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
• *: Matches all
• The same file name pattern cannot exist in both inclusion and
exclusion lists.
• Deep Discovery Analyzer scans files that match the selected file
name pattern list.
Action Description
Do not move files Select this option to keep the files in the original folder after
after scanning scanning. This is the default setting.
Note
To have Deep Discovery Analyzer automatically create the
output_ddan output folder, select the Copy analysis
report to output folder option.
4-96
Virtual Analyzer
Action Description
Move files Select this option to move files to the specified output location
after scanning. Select one of the following options:
• Destination path: Select this option to move a detected
file to a sub-folder in the destination path you specify. The
system automatically creates the sub-folder for each risk
level in the destination path.
• Destination path by risk level: Select this option and
specify the destination path for each risk level to move
detected files.
To access the output path using the same access credentials
as the network share, select Inherit credentials from network
share; otherwise, specify the access credentials for the output
path.
Note
Delete files with the Select this option to delete files with the selected risk levels after
selected risk level(s) scanning.
after scanning
Note
To have Deep Discovery Analyzer automatically create the
output_ddan output folder, select the Copy analysis
report to output folder option.
4-97
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
This setting is not applicable if you select the option to move files after
scanning.
• Quick scan: Select this option to only scan files that are modified
since the last scan. This is the default setting.
• Full scan: Select this option scan all files.
Note
• For the first quick scan, Deep Discovery Analyzer performs a full
scan and scans only modified files in subsequent quick scans.
• If you switch from Full scan to Quick scan, Deep Discovery Analyzer
scans only modified files after the previous full scan is completed.
For example, if the original file name is test, the renamed file
becomes 56_test.vir.
• Copy analysis report to output folder: Select this option to create a
copy of the analysis report to the output folder.
4-98
Virtual Analyzer
Note
If you enable a scan setting, make sure read-write permissions are set on
the output location.
Note
If you select Full scan, you can only configure a weekly or monthly
schedule.
12. (Optional) Click Test Connection to test the connection to the network
share.
13. Click Save.
Tip
After you add a network share, you can access the Submitters screen to
view the associated sample submissions and adjust the weight value (the
default is 4) for Virtual Analyzer resource allocation.
Note
Deep Discovery Analyzer will attempt to scan the files again in the next
scheduled or on-demand scan.
4-99
Deep Discovery Analyzer 7.6 Administrator's Guide
You can use the search function or filter entries (by file name, path, network
share name, error type, or event logged time).
The following table describes the information on the Unsuccessful Scans
screen.
Field Description
File name View the name of the file that Deep Discovery Analyzer cannot scan
successfully
4-100
Chapter 5
5-1
Deep Discovery Analyzer 7.6 Administrator's Guide
Alerts
The Alerts screen includes the following:
• Triggered Alerts Tab
• Rules Tab
Triggered Date and Time Deep Discovery Analyzer triggered the alert
notification.
Affected Appliance Host name, IPv4 and IPv6 addresses of the appliance affected by the
alert notification content, if applicable.
Details Click the icon to view the full alert notification details, including
the list of notification recipients, subject, and message of the alert
notification.
Rules Tab
The Rules tab, in Alerts / Reports > Alerts, shows all alert notification rules
used by Deep Discovery Analyzer.
5-2
Alerts and Reports
The following columns show information about the alert notification rules
used by Deep Discovery Analyzer:
Table 5-2. Rules Columns
Column Name Information
Alert Frequency Frequency at which the alert notification is sent if threshold is reached
or exceeded.
The threshold to trigger each alert is configurable. For details, see Modifying
Rules on page 5-6
Critical Alerts
The following table explains the critical alerts triggered by events requiring
immediate attention. Deep Discovery Analyzer considers malfunctioning
sandboxes and appliances as critical problems.
Table 5-3. Critical Alerts
Alert
Criteria
Name Frequency
(Default)
(Default)
Virtual Analyzer Virtual Analyzer encountered an error and was unable Immediate
Stopped to recover. Analysis has stopped.
Passive Primary The active primary appliance encountered an error and Immediate
Appliance was unable to recover. The passive primary appliance
Activated took over the active role.
5-3
Deep Discovery Analyzer 7.6 Administrator's Guide
Alert
Criteria
Name Frequency
(Default)
(Default)
Important Alerts
The following table explains the important alerts triggered by events that
require observation. Deep Discovery Analyzer considers suspicious object
detections, hardware capacity changes, certain sandbox queue activity,
component update, account and clustering issues as important problems.
Table 5-4. Important Alerts
Alert
Criteria
Name Frequency
(Default)
(Default)
Long Virtual The number of Virtual Analyzer submissions has Once every 30
Analyzer Queue exceeded the threshold of 100. minutes
High CPU Usage The average CPU usage in the last 5 minutes has Once every 30
exceeded the threshold of 90%. minutes
High Memory The average memory usage in the last 5 minutes has Once every 30
Usage exceeded the threshold of 90%. minutes
High Disk Usage Disk usage has exceeded the threshold of 85%. Once every 30
minutes
5-4
Alerts and Reports
Alert
Criteria
Name Frequency
(Default)
(Default)
High Availability The passive primary appliance encountered an error Once every 30
Suspended and was unable to recover. High availability was minutes
suspended.
New High-Risk The number of new high-risk objects identified during Immediate
Objects the last 30 minutes has reached the threshold of 10.
Identified
Long Virtual The Virtual Analyzer processing time has exceeded the Once every 30
Analyzer threshold of 30 minutes. minutes
Processing Time
Note
Consider decreasing the number of sandbox instances if the system
frequently experiences high CPU or memory usage for long periods of time.
Informational Alerts
The following table explains the alerts triggered by events that require
limited observation. Deep Discovery Analyzer considers restoration of high
availability, and inaccessibility of syslog and backup servers as informational
events.
5-5
Deep Discovery Analyzer 7.6 Administrator's Guide
Syslog Server The syslog server was inaccessible. Logs were not sent Once every 30
Inaccessible to the server. minutes
Backup Server The backup server was inaccessible. Logs and objects Once every 30
Inaccessible were not backed up. minutes
High Availability The passive primary appliance recovered from an error Immediate
Restored and high availability was restored.
Modifying Rules
Before you begin
Configure the SMTP server to send notifications. For details, see SMTP Tab on
page 6-55.
All triggered alert rules can notify recipients with a custom email message.
Some rules have additional parameters, including object count, submission
count, or time period. Trend Micro recommends adding at least one
notification recipient for all critical and important alerts.
Procedure
1. Go to Alerts / Reports > Alerts > Rules
The Rules screen appears.
2. Click the name of an alert rule under the Rule column.
The alert rule configuration screen appears.
3. Modify the rule settings.
Note
For details, see Alert Notification Parameters on page 5-7.
5-6
Alerts and Reports
4. Click Save.
Note
For explanations about available message tokens in each alert, see Alert
Notification Message Tokens on page 5-24.
Alert frequency Shows the frequency at which this alert is sent when rule criteria are
met. Cannot be modified.
5-7
Deep Discovery Analyzer 7.6 Administrator's Guide
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Alert frequency Shows the frequency at which this alert is sent when rule criteria are
met. Cannot be modified.
Recipients Specify the recipients who will receive the triggered alert email
message.
5-8
Alerts and Reports
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Note
For explanations about available message tokens in each alert, see Alert
Notification Message Tokens on page 5-24.
5-9
Deep Discovery Analyzer 7.6 Administrator's Guide
Tip
If you are accessing the management console from Apex
Central using single sign-on, verify the password setting in Apex
Central before you attempt to log on again.
Alert frequency Shows the frequency at which this alert is sent when rule criteria are
met. Cannot be modified.
Recipients Specify the recipients who will receive the triggered alert email
message.
5-10
Alerts and Reports
Parameter Description
Submissions Specify the submissions threshold that will trigger the alert.
Tip
Refer to the red line of the Queued Samples widget to see
the estimated number of samples Virtual Analyzer can analyze
within 5 minutes. For details, see Queued Samples on page 3-8.
Alert frequency Select the frequency at which this alert is sent when rule criteria are
met.
Recipients Specify the recipients who will receive the triggered alert email
message.
5-11
Deep Discovery Analyzer 7.6 Administrator's Guide
Parameter Description
Alert frequency Select the frequency at which this alert is sent when rule criteria are
met.
Recipients Specify the recipients who will receive the triggered alert email
message.
Average CPU usage Specify the average CPU usage threshold that will trigger the alert.
Alert frequency Select the frequency at which this alert is sent when rule criteria are
met.
Check interval Specify the amount of time to wait between each check.
5-12
Alerts and Reports
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Average memory Specify the average memory usage threshold that will trigger the alert.
usage
Alert frequency Select the frequency at which this alert is sent when rule criteria are
met.
Check interval Specify the amount of time to wait between each check.
5-13
Deep Discovery Analyzer 7.6 Administrator's Guide
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Disk usage Specify the disk usage threshold that will trigger the alert.
Alert frequency Select the frequency at which this alert is sent when rule criteria are
met.
Check interval Specify the amount of time to wait between each check.
5-14
Alerts and Reports
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Alert frequency Shows the frequency at which this alert is sent when rule criteria are
met. Cannot be modified.
5-15
Deep Discovery Analyzer 7.6 Administrator's Guide
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Alert frequency Select the frequency at which this alert is sent when rule criteria are
met.
5-16
Alerts and Reports
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Objects Specify the objects threshold that will trigger the alert.
Note
Specifying a low threshold may result in frequent generation of
alerts, but each alert covers a unique set of detections.
Alert frequency Shows the frequency at which this alert is sent when rule criteria are
met. Cannot be modified.
5-17
Deep Discovery Analyzer 7.6 Administrator's Guide
Parameter Description
Time period Specify the time period threshold that will trigger the alert.
Note
Specifying a low threshold may result in frequent generation of
alerts, but each alert covers a unique set of detections.
Recipients Specify the recipients who will receive the triggered alert email
message.
Alert frequency Select the frequency at which this alert is sent when rule criteria are
met.
5-18
Alerts and Reports
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Alert frequency Select the frequency at which this alert is sent when rule criteria are
met.
Process time Specify the process time threshold that will trigger the alert.
5-19
Deep Discovery Analyzer 7.6 Administrator's Guide
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Alert frequency Select the frequency at which this alert is sent when rule criteria are
met.
5-20
Alerts and Reports
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Note
For explanations about available message tokens in each alert, see Alert
Notification Message Tokens on page 5-24.
Alert frequency Select the frequency at which this alert is sent when rule criteria are
met.
5-21
Deep Discovery Analyzer 7.6 Administrator's Guide
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Alert frequency Select the frequency at which this alert is sent when rule criteria are
met.
5-22
Alerts and Reports
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Alert frequency Shows the frequency at which this alert is sent when rule criteria are
met. Cannot be modified.
5-23
Deep Discovery Analyzer 7.6 Administrator's Guide
Parameter Description
Recipients Specify the recipients who will receive the triggered alert email
message.
Note
Not every alert notification can accept every message token. Review the alert's
parameter specifications before using a message token. For details, see Alert
Notification Parameters on page 5-7.
5-24
Alerts and Reports
5-25
Deep Discovery Analyzer 7.6 Administrator's Guide
%ApplianceName% The host name of the Deep All except the following:
Discovery Analyzer appliance
• High Availability
Examples: Restored
• DDAN-A • High Availability
Suspended
• DDAN-123
• Passive Primary
Appliance Activated
5-26
Alerts and Reports
5-27
Deep Discovery Analyzer 7.6 Administrator's Guide
5-28
Alerts and Reports
5-29
Deep Discovery Analyzer 7.6 Administrator's Guide
5-30
Alerts and Reports
5-31
Deep Discovery Analyzer 7.6 Administrator's Guide
Reports
All reports generated by Deep Discovery Analyzer are based on an
operational report template.
Report Tasks
The following table describe tasks you can perform on the Generated
Reports screen.
Task Steps
Download a report To download a report, go to the last column in the table and click the
icon. Generated reports are available as PDF files.
Send a report Select a report and then click Send Report. You can send only one
report at a time.
Delete selected Select one or more reports and then click Delete.
reports
Sort the report table Click a column title to sort the data below it.
Adjust the pagination The panel at the bottom of the screen shows the total number
controls to view of reports. If all reports cannot display at the same time, use the
reports pagination controls to view the reports that are hidden from view.
5-32
Alerts and Reports
Generating Reports
Procedure
1. Go to Alerts / Reports > Reports > Generated Reports.
The Generated Reports screen appears.
2. Click Generate New.
The Generate Report window appears.
3. Configure report settings.
Option Description
Send to all Select the checkbox to send the generated report to all contacts.
contacts
Recipients Select a contact from the drop-down list, or type an email address
and press ENTER.
5-33
Deep Discovery Analyzer 7.6 Administrator's Guide
Option Description
You can type a maximum of 100 email addresses, typing them one
at a time.
Note
You must press ENTER after each email address. Do not type
multiple email addresses separated by commas.
Note
Deep Discovery Analyzer generates reports approximately five
minutes after Send is clicked.
4. Click Generate.
Schedules Tab
The Schedules tab, in Alerts / Reports > Reports , shows all the report
schedules created from report templates. Each schedule contains settings for
reports, including the template that will be used and the actual schedule.
Note
This screen does not contain any generated reports. To view the reports,
navigate to Alerts / Reports > Reports > Generated Reports.
Add Schedule Click Add Schedule to add a new report schedule. This opens the Add
Report Schedule window, where you specify settings for the report
schedule. For details, see Add Report Schedule Window on page 5-35.
5-34
Alerts and Reports
Task Steps
Edit Select a report schedule and then click Edit to edit its settings. This
opens the Edit Report Schedule window, which contains the same
settings in the Add Report Schedule window. For details, see Add
Report Schedule Window on page 5-35.
Only one report schedule is edited at a time.
Delete Select one or several report schedules to delete and then click Delete.
Sort Column Data Click a column title to sort the data below it.
Records and The panel at the bottom of the screen shows the total number of
Pagination Controls report schedules. If all report schedules cannot be displayed at the
same time, use the pagination controls to view the schedules that are
hidden from view.
5-35
Deep Discovery Analyzer 7.6 Administrator's Guide
Field Steps
Note
If the report is set to generate on the 29th, 30th, or 31st day of
a month and a month does not have this day, Deep Discovery
Analyzer starts to generate the report on the first day of the
next month at the time you specified.
Send to all contacts Select the checkbox to send the generated report to all contacts.
Recipients Select a contact from the drop-down list, or type a valid email address
to which to send reports and then press ENTER. You can type up to 100
email addresses, typing them one at a time. It is not possible to type
multiple email addresses separated by commas.
Before specifying recipients, verify that you have specified SMTP
settings in the SMTP tab located at Administration > System
Settings.
5-36
Alerts and Reports
Customization Tab
The Customization tab, in Alerts / Reports > Reports, allows you to
customize items in the Deep Discovery Analyzer reports.
This screen includes the following options:
Table 5-27. Cover Page
Option Task Display Area
Title Type a title that does not exceed 40 characters. Report cover
Divider color To change the default color, click in the box and Notification
use the color pick specify a new value.
Footer text Type a footer that does not exceed 60 characters. Notification
5-37
Chapter 6
Administration
The features of Administration are discussed in this chapter.
6-1
Deep Discovery Analyzer 7.6 Administrator's Guide
Updates
Use the Updates screen, in Administration > Updates, to configure
component and product update settings.
An Activation Code is required to use and update components. For details,
see License on page 6-103.
Components Tab
The Components tab shows the security components currently in use.
Advanced Threat The Advanced Threat Correlation Pattern contains a list of file
Correlation Pattern features that are not relevant to any known threats.
Advanced Threat Scan The Advanced Threat Scan Engine protects against viruses,
Engine malware, and exploits to vulnerabilities in software such as Java
and Flash. Integrated with the Trend Micro Virus Scan Engine, the
for Deep Discovery Advanced Threat Scan Engine employs signature-based, behavior-
(Linux, 64-bit) based, and aggressive heuristic detection.
Contextual Intelligence The Contextual Intelligence Query Handler processes the behaviors
Query Handler identified by the Contextual Intelligence Engine and sends the
report to the Predictive Machine Learning engine.
(Linux, 64-bit)
Deep Discovery Malware The Deep Discovery Malware Pattern contains information that
Pattern helps Deep Discovery Analyzer identify the latest malware and
mixed threat attacks. Trend Micro creates and releases new
versions of the pattern several times a week, and any time after
the discovery of a particularly damaging virus/malware.
IntelliTrap Exception The IntelliTrap Exception Pattern contains detection routines for
Pattern safe compressed executable (packed) files to reduce the amount of
false positives during IntelliTrap scanning.
IntelliTrap Pattern The IntelliTrap Pattern contains the detection routines for
compressed executable (packed) file types that are known to
commonly obfuscate malware and other potential threats.
6-2
Administration
Component Description
Network Content The Network Content Inspection Engine is used to perform network
Inspection Engine scanning.
(Linux, User mode, 64-
bit)
Network Content The Network Content Inspection Pattern is used by the Network
Inspection Pattern Content Inspection Engine to perform network scanning.
Script Analyzer Pattern The Script Analyzer Pattern is used during analysis of web page
scripts to identify malicious code.
(Deep Discovery)
Virtual Analyzer Sensors The Virtual Analyzer Sensors are a collection of utilities used to
execute and detect malware and to record behavior in Virtual
Virtual Analyzer Sensors Analyzer (for Windows and Linux).
(Linux)
Option Task
Update Now Select one or more components, and click Update Now to manually
update the selected components.
Rollback Select one or more components, and click Rollback to revert the
selected components to a previous version.
6-3
Deep Discovery Analyzer 7.6 Administrator's Guide
Option Task
Sync Version Click to retrieve the component version from the update source, and
Information review if any of the components need updates.
Update any component where the version displayed on the Version on
Update Source column is greater than the current version. Additionally,
Deep Discovery Analyzer displays the version numbers of components
with available updates in a red font.
Setting Description
Automatic updates Select Automatically check for updates to set Deep Discovery
Analyzer to check for updates every 15 minutes. You may also specify
the update to run at a specific time.
Update source Select one of the following options and configure the require settings:
• Select Trend Micro ActiveUpdate server to download
components directly from the Trend Micro. Verify that Deep
Discovery Analyzer has Internet connection.
To authenticate the ActiveUpdate server, select Enable HTTPS
authentication.
Note
If you select Enable HTTPS authentication and enable
HTTPS decryption on your network (for example, on a
secure gateway), it is recommended that you include the
ActiveUpdate server URL in the approved list.
6-4
Administration
Setting Description
To verify the integrity of the update packages from other update
sources, select Enable component update package integrity
check. If you select this option, verify that the signature file is
available on the update server for Deep Discovery Analyzer to
verify the integrity of a component update package.
If you need assistance setting up an update source, contact your
support provider.
Note
6-5
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
A new hotfix may include previous hotfixes until Trend Micro
releases a patch.
Security patch A security patch focuses on security issues suitable for deployment
to all customers. Non-Windows patches commonly include a setup
script.
Patch A patch is a group of hotfixes and security patches that solve multiple
program issues. Trend Micro makes patches available on a regular
basis. Non-Windows patches commonly include a setup script.
Your vendor or support provider may contact you when these items become
available. Check the Trend Micro website for information on new hotfix and
patch releases:
http://downloadcenter.trendmicro.com/
6-6
Administration
Procedure
1. Obtain the product update file from Trend Micro.
• If the file is an official patch, download it from the download center.
http://downloadcenter.trendmicro.com/
• If the file is a hotfix, send a request to Trend Micro support.
2. On the logon page of the management console, select Enable extended
session timeout and then log on using a valid user name and password.
Important
Do not close or refresh the browser, navigate to another page, perform
tasks on the management console, or power off the appliance until
updating is complete.
6-7
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
The rollback process automatically restarts Deep Discovery Analyzer, so make
sure that all tasks on the management console have been completed before
rollback.
Procedure
1. Go to Administration > Updates > Hotfixes / Patches.
2. In the History section, click Roll Back.
Deep Discovery Analyzer will automatically restart after the rollback is
complete.
3. Log on to the management console.
4. Go back to the Administration > Updates > Hotfixes / Patches screen.
5. Verify that the hotfix / patch no longer displays in the History section.
Firmware Tab
Use the Firmware tab to apply an upgrade to Deep Discovery Analyzer.
Trend Micro prepares a readme file for each upgrade. Read the
accompanying readme file before applying an upgrade for feature
information and for special installation instructions.
6-8
Administration
Note
After applying the firmware update on hardware models 1100 and 1200, Deep
Discovery Analyzer automatically migrates the settings of a Deep Discovery
Analyzer 7.2 installation to 7.5.
Perform the following tasks when using Deep Discovery Analyzer in a high
availability cluster configuration.
1. Detach the passive primary appliance.
2. On the active primary appliance, perform the tasks as described in the
main task section below.
3. On the passive primary appliance, perform the tasks as described in the
main task section below.
4. Add the passive primary appliance to the cluster again.
Perform the following steps to install the upgrade.
Procedure
1. On the logon page of the management console, select Enable extended
session timeout and then log on using a valid user name and password.
Important
Do not close or refresh the browser, navigate to another page, perform
tasks on the management console, or power off the appliance until
updating is complete.
6-9
Deep Discovery Analyzer 7.6 Administrator's Guide
5. Clear the browser cache before you access the management console.
Integrated Products/Services
The Integrated Products/Services screen, in Administration > Integrated
Products/Services, includes the following tabs:
• Trend Vision One Tab on page 6-10
• Deep Discovery Director Tab on page 6-15
• Sandbox as a Service Tab on page 6-21
• Smart Protection Tab on page 6-23
• ICAP Tab on page 6-28
• Microsoft Active Directory Tab on page 6-34
• SAML Authentication Tab on page 6-35
• Email Submission Tab on page 6-45
• Syslog Tab on page 6-47
6-10
Administration
• Receive samples from Trend Vision One (through the Sandbox Analysis
app) for analysis
• Upload analysis reports to Trend Vision One
You can configure Deep Discovery Analyzer to use the Service Gateway as an
alternative source for ActiveUpdate or Smart Protection Services.
Note
Note
You can only integrate Deep Discovery Analyzer with Sandbox as a Service or
Trend Vision One, but not both at the same time.
6-11
Deep Discovery Analyzer 7.6 Administrator's Guide
You can integrate Deep Discovery Analyzer with Trend Vision One for threat
intelligence sharing through a Service Gateway and receive samples for
analysis through the Sandbox Analysis app.
Procedure
1. On the Trend Vision One console, go to Workflow and Automation >
Service Gateway Management. If available, click the Service Gateway
Management 2.0 tab.
2. If you do not have an existing Service Gateway deployed, install a Service
Gateway.
a. Click Download Virtual Appliance to open the Service Gateway
Virtual Appliance panel.
b. Select either VMware ESXi (OVA) or Microsoft Hyper-V (VHD) as
the image type you want to use.
c. Select I agree to the End User License Agreement and click
Download Disk Image.
d. Record the Registration Token that you need to apply during
deployment.
e. Install the Service Gateway virtual appliance.
For detailed deployment instructions, see Deploying a Service
Gateway Virtual Appliance.
3. Click the Service Gateway name.
4. Click Manage Services.
5. Click the install icon to install and then enable the following services.
6-12
Administration
Service Description
Forward proxy Required for the Sandbox Analysis integration function that allows
Deep Discovery Analyzer to perform the following:
• Receive samples from Trend Vision One
• Send analysis reports (for only samples received from Trend
Vision One) to Trend Vision One
Suspicious Object Required for the Suspicious Objects synchronization function that
list synchronization allows Deep Discovery Analyzer to perform the following:
• Synchronize the centralized Suspicious Object List and
Exception List from Trend Vision One
• Send analysis reports (for detected samples with a risk level)
to Trend Vision One
6. Record the Service Gateway IP address and the API key that are needed
for connection settings on the Deep Discovery Analyzer console.
• IP address: Click the Service Gateway name and record the IPv4
address or IPv6 address.
• API key: Click the Manage API Key button and record the API key.
7. On the Deep Discovery Analyzer web console, go to Administration >
Integrated Products/Services and click Trend Vision One.
8. Select Enable Service Gateway connection and type the IPv4 or IPv6
address of the Service Gateway in the Service Gateway IP address field.
9. To connect to Trend Vision One through the Service Gateway for threat
intelligence data sharing, do the following:
a. Select Enable Suspicious Object Synchronization.
b. Specify the API key you obtained from the Trend Vision One
console.
c. If a certificate is required for Deep Discovery Analyzer to
communicate with the Service Gateway, select Use certificate and
click Select to locate the certificate file.
d. Click Test Connection to verify.
6-13
Deep Discovery Analyzer 7.6 Administrator's Guide
e. Click Save.
f. Wait until synchronization with the Service Gateway completes.
10. To have Deep Discovery Analyzer receive and analyze samples from
Trend Vision One, do the following:
Note
Sandbox Analysis integration requires Service Gateway 2.0 or later.
6-14
Administration
Important
After unregistering the Sandbox Analysis service on Deep Discovery Analyzer,
you must obtain a new enrollment token to register to Trend Vision One again.
Procedure
1. Go to Administration > Integrated Products/Services.
The Trend Vision One tab appears.
2. In the Sandbox Analysis Integration section, click Unregister.
A warning screen appears.
3. Click Unregister to confirm.
6-15
Deep Discovery Analyzer 7.6 Administrator's Guide
Important
• Before deploying updates or upgrades, ensure that the appliances are not
executing any task.
6-16
Administration
Note
6-17
Deep Discovery Analyzer 7.6 Administrator's Guide
Last connected The last time this appliance connected to Deep Discovery Director.
Use the system proxy Select to use the system proxy settings to connect to Deep Discovery
settings Director.
Synchronize Select this option synchronize suspicious objects from Deep Discovery
suspicious objects Director.
from Deep Discovery
Director
6-18
Administration
Procedure
1. Go to Administration > Integrated Products/Services > Deep Discovery
Director.
2. Under Connection Settings, do the following:
a. Type the Server address for Deep Discovery Director.
b. Type the Port number for Deep Discovery Director. The default port
number is 443.
c. Type the API key for Deep Discovery Director.
Note
You can find this information on the Help screen on the
management console of Deep Discovery Director.
Note
This setting can be changed after registering to Deep Discovery Director.
6-19
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
5. Click Register.
The Status changes to Registered | Connected.
Note
6-20
Administration
Procedure
1. Go to Administration > Integrated Products/Services > Deep Discovery
Director
2. Click Unregister.
The Status changes to Not registered.
Note
When you unregister Deep Discovery Analyzer from Deep Discovery
Director, Deep Discovery Analyzer automatically removes all
synchronized suspicious objects.
Note
You can only integrate Deep Discovery Analyzer with Sandbox as a Service or
Trend Vision One, but not both at the same time.
The following table describes the tasks you can perform on the Sandbox as a
Service screen.
Task Description
Register to a new Click Register to integrate Deep Discovery Analyzer with a new
server Sandbox as a Service server.
For more information, see Integrating Deep Discovery Analyzer with
Sandbox as a Service on page 6-22.
Unregister from a Select an entry and click Unregister to disconnect Deep Discovery
server Analyzer from the selected Sandbox as a Service server.
6-21
Deep Discovery Analyzer 7.6 Administrator's Guide
Task Description
Test the connection Select an entry and click Test Connection to test the connection to
to a server the integrated Sandbox as a Service server.
Disable Sandbox as a To stop Deep Discovery Analyzer from receiving and analyzing samples
Service integration from Sandbox as a Service without unregistration, toggle to turn on
the Maintenance mode switch.
Note
Disabling Sandbox as a Service integration does not affect
samples that Deep Discovery Analyzer has already received
and is currently analyzing.
Note
You can only integrate Deep Discovery Analyzer with Sandbox as a Service or
Trend Vision One, but not both at the same time.
If you integrate Deep Discovery Analyzer with Trend Vision One, this screen is
not configurable.
Procedure
1. Go to Administration > Integrated Products/Services > Sandbox as a
Service.
2. Click Register.
3. Type the server name or IP address.
4. Type the group ID.
5. (Optional) If you have configured proxy settings for Deep Discovery
Analyzer and want to use these settings for Sandbox as a Service
connections, select Use system proxy.
6-22
Administration
6. Click Register.
You can test the connection and check the activation status on the
Sandbox as a Service screen.
6-23
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
The Dynamic URL Scanning
service is only available
on the Smart Protection
Network.
6-24
Administration
Usage Use if you do not plan to install Use as primary source and the
Smart Protection Server Smart Protection Network as an
alternative source
To configure Smart Protection
Network as source, see Configuring For guidelines on setting up Smart
Smart Protection Settings on page Protection Server and configuring
6-26. it as source, see Setting Up Smart
Protection Server on page 6-25.
Deployment If you have previously installed a Smart Protection Server for use
with another Trend Micro product, you can use the same server for
Deep Discovery Analyzer. While several Trend Micro products can send
queries simultaneously, the Smart Protection Server may become
overloaded as the volume of queries increases. Make sure that the
Smart Protection Server can handle queries coming from different
products. Contact your support provider for sizing guidelines and
recommendations.
IP Address Smart Protection Server and the VMware ESX/ESXi server (which hosts
the Smart Protection Server) require unique IP addresses. Check the
IP addresses of the VMware ESX/ESXi server and Deep Discovery
Analyzer to make sure that these IP addresses are not assigned to
the Smart Protection Server.
6-25
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
• Smart Protection Server may not have reputation data for all URLs
because it cannot replicate the entire Smart Protection Network
database. When updated infrequently, Smart Protection Server may
also return outdated reputation data.
• Disabling this option reduces the time and bandwidth to obtain the
data.
Procedure
1. Go to Administration > Integrated Products/Services > Smart
Protection.
2. Select Enabled.
3. Select a Smart Protection source:
• Trend Micro Smart Protection Network™
Trend Micro Smart Protection Network is a globally-scaled,
cloud-based infrastructure providing reputation services to Trend
Micro products that integrate Smart Protection technology. Deep
Discovery Analyzer connects to the Smart Protection Network using
HTTPS. Select this option if you do not plan to set up a Smart
Protection Server.
• Smart Protection Server
Smart Protection Server does the following:
6-26
Administration
Tip
Trend Vision One that can also act as a local Smart Protection
Server for Deep Discovery Analyzer. In this case, specify the Service
Gateway address.
Note
If proxy settings are disabled, Smart Protection Server will connect
to Deep Discovery Analyzer directly.
6-27
Deep Discovery Analyzer 7.6 Administrator's Guide
Important
Deep Discovery Analyzer supports connection to global services only if
Smart Protection Server version 3.3 is used.
Note
When Smart Protection Server is selected as Smart Protection source,
the following services and the ability to test their connectivity are
enabled:
5. Click Save.
ICAP Tab
Deep Discovery Analyzer supports integration with Internet Content
Adaptation Protocol (ICAP) clients. An ICAP client can be a proxy server
or network storage that submits samples to Deep Discovery Analyzer for
analysis. The ICAP client performs an action (pass or block) on the sample
based on the analysis result from Deep Discovery Analyzer .
After ICAP integration, Deep Discovery Analyzer can perform the following
functions:
6-28
Administration
RESPMOD icaps://<DDAN_IP>:11344/response
6-29
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
When ICAP integration is enabled, Deep Discovery Analyzer automatically
reduces Virtual Analyzer throughput to conserve system resources.
Procedure
1. Go to Administration > Integrated Products/Services > ICAP.
2. Select Enable ICAP.
3. Type the ICAP port number.
The default value is 1344.
4. To connect the ICAP client over a secure connection, select Enable ICAP
over SSL and specify the following details:
• ICAPS port number: Default value is 11344
• Certificate: Certificates must use base64-encoding
• Private key: Private keys must use base64-encoding
Important
Only encrypted private keys are supported.
• Passphrase
• Confirm Passphrase
5. (Optional) In the Header Settings section, specify how Deep Discovery
Analyzer handles ICAP headers.
a. Under ICAP headers from Deep Discovery Analyzer, select the
ICAP headers Deep Discovery Analyzer sends to ICAP clients.
For details, see ICAP Header Responses on page 4-12.
6-30
Administration
b. Under ICAP headers from ICAP clients, select the ICAP headers to
save when Deep Discovery Analyzer receives the headers from ICAP
clients.
6. (Optional) Under Scan Settings, select one or more of the following
options:
• Bypass URL scanning in RESPMOD mode
• Scan samples using YARA rules
• Scan samples using the selected suspicious objects list
Note
6-31
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
• HTTP compression
Note
This setting allows Deep Discovery Analyzer to display a custom page
whenever an ICAP client blocks network traffic for specific events. The
ICAP client may override this setting. If the setting is enabled and the
custom page are not displayed, verify that there are no conflicts with the
ICAP client configuration.
6-32
Administration
• File upload
• File download
Note
Use any text editor to create the pages, and save as plain text. HTML tags
may be used to apply formatting. Ensure that files are smaller than 5 MB.
Note
By default, all ICAP clients can submit samples to Deep Discovery
Analyzer.
6-33
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
Deep Discovery Analyzer supports integration with the Microsoft Active
Directory 2012, 2016, and 2019 versions only.
Procedure
1. Go to Administration > Integrated Products/Services > Microsoft
Active Directory.
2. Select Use Microsoft Active Directory server.
3. Specify a server type.
4. For the primary Microsoft Active Directory server, specify the following
details:
• Server address
• Access protocol
• Port
5. (Optional) Select Enable secondary server.
6-34
Administration
6-35
Deep Discovery Analyzer 7.6 Administrator's Guide
• Okta
To connect Deep Discovery Analyzer to your organization environment for
single-sign-on, complete the following:
1. Access the Deep Discovery Analyzer management console to obtain the
service provider metadata file.
You can also update the certificate in Deep Discovery Analyzer.
For more information, see Service Provider Metadata and Certificate on
page 6-36.
2. In your identity provider:
a. Configure the required settings for single sign-on.
b. Obtain the federation metadata file.
For more information, see the documentation that comes with your
identity provider.
3. In Deep Discovery Analyzer:
a. Import the federation metadata file for your identity provider.
For more information, see Configuring Identity Provider Settings on
page 6-37.
b. Create SAML user groups.
6-36
Administration
• Single Sign Off URL: The endpoint URL responsible for initiating the
SAML logout process
• Certificate: The encryption certificate (verification certificate) in X.509
format
You can click the following in the Service Provide section:
• Download Metadata: Downloads the Deep Discovery Analyzer metadata
file. You can import the metadata file on an Active Directory Federal
Services (ADFS) identity provider.
• Download Certificate: Downloads the Deep Discovery Analyzer
certificate file. You can import the certificate file on an OKTA identity
provider.
• Update Certificate: Uploads a new certificate on Deep Discovery
Analyzer.
Deep Discovery Analyzer supports certificates in X.509 PEM format.
Note
• Before you add an identity provider, obtain the federation metadata file
from your identity provider.
• You can add up to two identity providers in Deep Discovery Analyzer, one
each for AD FS and Okta.
Procedure
1. Go to Administration > Integrated Products/Services > SAML
Authentication.
2. In the Identity Provider section, do one of the following:
• Click Add to add a new entry.
• Click an identity provider name to change the settings.
6-37
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
Deep Discovery Analyzer displays the name in the drop-down list on the
Log On screen.
For more information, see Logging On With Single Sign-On on page 2-3.
5. Type a description.
6. Click Select or Update and choose the federation metadata file obtained
from your identity provider.
After importing the federation metadata file, the system displays the
identity provider information.
7. Click Save.
Configuring Okta
Okta is a standards-compliant OAuth 2.0 authorization server that provides
cloud identity solutions for your organization. Okta is a single sign-on
provider that allows you to manage user access to Deep Discovery Analyzer.
This section describes how to configure Okta as a SAML (2.0) identity
provider for Deep Discovery Analyzer to use.
Before you begin configuring Okta, make sure that:
• You have a valid subscription with Okta that handles the sign-in process
and that eventually provides the authentication credentials to the Deep
Discovery Analyzer management console.
• You are logged on to the management console as a Deep Discovery
Analyzer administrator.
6-38
Administration
Procedure
1. Log in to your Okta organization as a user with administrative privileges.
2. Click Admin in the upper right, and then navigate to Applications >
Applications.
3. Click Add Application, and then click Create New App.
The Create a New Application Integration screen appears.
4. Select Web as the Platform and SAML 2.0 as the Sign on method, and
then click Create.
5. On the General Settings screen, type a name for Deep Discovery
Analyzer in App name, for example, "Deep Discovery Analyzer", and
click Next.
6. On the Configure SAML screen, specify the following:
a. Type the Deep Discovery Analyzer address in the Single sign on
URL field.
b. Select Use this for Recipient URL and Destination URL.
c. Specify the Audience URI in Audience URI (SP Entity ID) based on
your serving site:
d. For Assertion Encryption, select Encrypted.
e. For Encryption Certificate, click Browse files to select the
certificate file that you obtained from Deep Discovery Analyzer.
For more information, see Service Provider Metadata and Certificate
on page 6-36.
f. In the Group Attribute Statements (Optional) section, specify the
following:
• Name: DDAN_groups
• Filter: Matches regex ^(.*)*$
g. Click Next.
6-39
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
Import this metadata file to Deep Discovery Analyzer.
6-40
Administration
Note
Deep Discovery Analyzer supports connecting to the federation server using
AD FS 4.0 and 5.0.
Active Directory Federation Services (AD FS) provides support for claims-
aware identity solutions that involve Windows Server and Active Directory
technology. AD FS supports the WS-Trust, WS-Federation, and Security
Assertion Markup Language (SAML) protocols.
Before you begin configuring AD FS, make sure that:
• You have a Windows Server installed with AD FS 4.0 or AD FS 5.0 to serve
as a federation server.
• You are logged on to the management console as a Deep Discovery
Analyzer administrator.
• You have obtained the metadata file from Deep Discovery Analyzer.
• You have configured web browser settings on each endpoint to trust
Deep Discovery Analyzer and the federation server.
For more information, see Configuring Endpoints for Single Sign-on
through AD FS on page 6-44.
Procedure
1. Go to Start > All Programs > Administrative Tools to open the AD FS
management console.
2. Click AD FS in the left navigation, and under the Action area on the
right, click Add Relying Party Trust....
3. Complete settings on each tab of the Add Relying Party Trust Wizard
screen.
6-41
Deep Discovery Analyzer 7.6 Administrator's Guide
6-42
Administration
6. Configure settings for each AD group that you permitted in step 3d and
to which you want to grant access to Deep Discovery Analyzer.
Note
6-43
Deep Discovery Analyzer 7.6 Administrator's Guide
Procedure
1. On an endpoint, open the Control Panel from the Start menu.
2. Click Network and Internet > Internet Options.
The Internet Properties screen appears.
3. Click the Security tab.
4. Select Local intranet and click Sites.
5. Click Advanced.
6. In the Add this website to the zone field, type FQDN or IP address of the
account federation server and click Add.
7. Repeat Step 6 to add the FQDN or IP address of Deep Discovery Analyzer
to the Websites list.
6-44
Administration
8. Click Close.
9. Click OK.
10. Click OK.
Procedure
1. Go to Administration > Integrated Products/Services and click the
Email Submission tab.
2. Select Enable Email Submission.
Note
If you disable the email submissions feature, Deep Discovery Analyzer
stops sending email notifications with analysis results for samples that
Virtual Analyzer is currently processing.
6-45
Deep Discovery Analyzer 7.6 Administrator's Guide
3. In the General section, specify the email address that Deep Discovery
Analyzer uses to receive email messages and send analysis result
notifications. The default setting is 911@ddan.com.
4. In the Email Senders section, specify the permitted user domains
and SMTP servers that are allowed to send email messages to Deep
Discovery Analyzer for analysis.
• Permitted domains: Type a domain and press [Enter]. You can add
up to five domains.
• Permitted SMTP servers: Type an SMTP server address and press
[Enter]. You can specify up to five server addresses.
Configure the following settings for the SMTP server in Deep
Discovery Analyzer:
• Port: Type the server port number. The default is 25. This
setting is required.
• SSL/TLS: Select Enable SSL/TLS to establish a secure
connection to the servers. Then, select the required certificate
and private key files and the passphrase.
5. In the Email Notifications section, configure the SMTP server that
Deep Discovery Analyzer uses to send email notifications with analysis
results.
a. Type the SMTP server host name, IPv4 address, or IPv6 address.
b. Type the port number used by the SMTP server.
c. Select the type of security used for the connection.
d. If the server requires authentication, select SMTP server requires
authentication and specify a user name and password.
e. (Optional) Click Test Connection to test the connection to the SMTP
server.
6. Specify the email subject and message content for the email notification
template.
6-46
Administration
Tip
You can use the "%RiskLevel%" and "%Subject%" tokens in the
notification email.
7. Click Save.
Syslog Tab
Deep Discovery Analyzer maintains system logs that provide summaries of
the following:
• Virtual Analyzer analysis logs
• Integrated product detection logs
• ICAP pre-scan logs
• System events
• Alert events
Use the Syslog tab, in Administration > Integrated Products/Services >
Syslog, to configure Deep Discovery Analyzer to send logs to multiple syslog
servers.
Note
• Only logs saved after enabling this setting are forwarded. Previous logs
are excluded.
6-47
Deep Discovery Analyzer 7.6 Administrator's Guide
Procedure
1. Go to Administration > Integrated Products/Services > Syslog.
The Syslog Settings screen appears.
2. Perform one of the following:
• To add a new syslog server, click Add.
• To update the details of an existing syslog server, click the name of
the syslog server to be updated.
3. On the screen that appears, specify the Status for the profile.
4. Type the Profile name and Server address of the syslog server.
5. Type the port number.
Note
Trend Micro recommends using the following default syslog ports:
• UDP: 514
• TCP: 601
• SSL: 443
6-48
Administration
System Settings
The System Settings screen, in Administration > System Settings, includes
the following tabs:
• Network Tab on page 6-50
• Network Interface Tab on page 6-52
• Proxy Tab on page 6-54
• SMTP Tab on page 6-55
• Time Tab on page 6-57
• SNMP Tab on page 6-58
• Password Policy Tab on page 6-62
• Session Timeout Tab on page 6-62
• Cluster Tab on page 6-62
• High Availability Tab on page 6-78
6-49
Deep Discovery Analyzer 7.6 Administrator's Guide
Network Tab
Use this screen to configure the host name, the IPv4 and IPv6 addresses
of the Deep Discovery Analyzer appliance, and other network settings
(including the enforcement of TLS 1.2 or above ).
An IPv4 address is required and the default is 192.168.252.2. Modify the
IPv4 address immediately after completing all deployment tasks.
Deep Discovery Analyzer uses the specified IP addresses to connect to the
Internet when accessing Trend Micro hosted services, including the Smart
Protection Network, the ActiveUpdate server, and Threat Connect. The IP
addresses also determine the URLs used to access the management console.
You can select Always use TLS 1.2 or above to enhance data security for
inbound and outbound connections on Deep Discovery Analyzer.
6-50
Administration
Note
• Before you can configure this option, verify that the Deep Discovery
Analyzer appliance is not in a high availability cluster. Detach passive
primary appliances from the cluster at Administration > System Settings
> Cluster.
• Ensure that the integrated products and services are using the latest
version that supports TLS 1.2 or above. For details, see TLS Support for
Integrated Products/Services on page C-1.
• Verify that the following products/services are configured to use TLS 1.2
or above.
• The SMTP server at Administration > System Settings > SMTP must
use SSL/TLS or STARTTLS.
6-51
Deep Discovery Analyzer 7.6 Administrator's Guide
Procedure
1. Go to Administration > System Settings > Network Interface.
2. Configure the settings under the Port List section.
• To set the Management Port on the selected interface, select
an option from the drop-down list. By default, Deep Discovery
Analyzer uses the eth0 interface as the management port.
• To configure the port settings for the interface used for sandbox
analysis, click Edit.
6-52
Administration
Procedure
1. Go to Administration > System Settings > Network Interface.
2. Under the NIC Teaming section, do the following:
a. Toggle the status button to enable a NIC team.
b. Select a connection mode (Active/Backup or LACP).
Note
If you select LACP, you must also configure the required settings
on the target switch to enable communication using LACP (Link
Aggregation Control Protocol).
6-53
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
3. Click Save.
4. When prompted to restart the network service, click Yes.
The system restarts the network service. This may take some time. Wait
for the process to complete before you can access the management
console again.
Proxy Tab
Specify proxy settings if Deep Discovery Analyzer connects to the Internet or
management network through a proxy server.
Configure the following settings.
Table 6-8. Proxy Tab Tasks
Task Steps
Server name or IP Type the proxy server host name or IPv4 address, or IPv6 address.
address
The management console does not support host names with double-
byte encoded characters. If the host name includes such characters,
type its IP address instead.
Port Type the port number that Deep Discovery Analyzer uses to connect to
the proxy server.
6-54
Administration
Task Steps
Proxy server requires Select this option if the connection to the proxy server requires
authentication authentication. Deep Discovery Analyzer supports the following
authentication methods:
• No authentication
• Basic authentication
• Digest authentication
• NTLMv1 authentication
Note
This option is only available if Proxy server requires
authentication is enabled.
Note
This option is only available if Proxy server requires
authentication is enabled.
SMTP Tab
Deep Discovery Analyzer uses SMTP settings when sending notifications
through email.
Procedure
1. Go to Administration > System Settings and click the SMTP tab.
2. Specify the following details:
6-55
Deep Discovery Analyzer 7.6 Administrator's Guide
Server address Type the SMTP server host name, IPv4 address, or IPv6 address.
The management console does not support host names with
double-byte encoded characters. If the host name includes such
characters, type its IP address instead.
Connection security Specify the type of security used for the connection.
Available values are: None, STARTTLS, SSL/TLS.
SMTP server If the server requires authentication, select SMTP server requires
requires authentication and specify a user name and password.
authentication
WARNING!
Ensure that the user name and password to be specified
is valid for the SMTP server. Connections made using an
incorrect user name and password may cause some SMTP
servers to reject all network request originating from the
Deep Discovery Analyzer server.
Note
Deep Discovery Analyzer does not send a test email message to the
recipient.
6-56
Administration
4. Click Save.
Time Tab
Configure date and time settings immediately after installation.
Procedure
1. Go to Administration > System Settings and click the Time tab.
The Time screen appears.
2. Click Set date and time.
The settings panel appears.
3. Select one of the following methods and configure the applicable
settings.
• Select Connect to an NTP server and type the host name, IPv4
address, or IPv6 address of the NTP server.
• Select Set manually and configure the time.
4. Click Save.
5. Click Set time zone.
The settings panel appears.
6. Select the applicable time zone.
Note
Daylight Saving Time (DST) is used when applicable.
7. Click Save.
8. Click Set format.
The settings panel appears.
9. Select the preferred date and time format.
6-57
Deep Discovery Analyzer 7.6 Administrator's Guide
SNMP Tab
Simple Network Management Protocol (SNMP) is a protocol that supports
monitoring of devices attached to a network for conditions that merit
administrative attention.
A Simple Network Management Protocol (SNMP) trap is a method of sending
notifications to network administrators who use management consoles that
support this protocol.
On Deep Discovery Analyzer, use the Administration > System Settings >
SNMP tab to perform the following tasks:
• Configure the appliance to send trap messages
For details, see Configuring Trap Messages on page 6-58.
• Configure the appliance to listen for manager requests
For details, see Configuring Manager Requests on page 6-60.
Procedure
1. Go to Administration > System Settings > SNMP.
2. Under Trap Messages, select Send SNMP trap messages.
3. Specify the trap message settings.
Option Description
6-58
Administration
Option Description
Note
Before configuring the appliance, set up the SNMP server first using
the same SNMP version, community name, security model, user name,
password, and privacy passphrase.
4. Click Save.
5. (Optional) Click Download MIB to download the Management
Information Database (MIB) files.
6-59
Deep Discovery Analyzer 7.6 Administrator's Guide
• Users can open the MIB files to view all network objects that can be
monitored and managed using the SNMP protocol, or import them
into management consoles that support this protocol.
• For a list of Deep Discovery Analyzer supported SNMP object
identifiers (OID), see SNMP Object Identifiers on page B-1.
Procedure
1. Go to Administration > System Settings > SNMP.
2. Under Manager Requests, select Listen for requests from SNMP
managers.
3. Specify the manager request settings.
Option Description
6-60
Administration
Option Description
Note
Before configuring the appliance, set up the SNMP server first using
the same SNMP version, community name, security model, user name,
password, and privacy passphrase.
4. Click Save.
5. (Optional) Click Download MIB to download the Management
Information Database (MIB) files.
• Users can open the MIB files to view all network objects that can be
monitored and managed using the SNMP protocol, or import them
into management consoles that support this protocol.
• For a list of Deep Discovery Analyzer supported SNMP object
identifiers (OID), see SNMP Object Identifiers on page B-1.
6-61
Deep Discovery Analyzer 7.6 Administrator's Guide
Cluster Tab
Multiple standalone Deep Discovery Analyzer appliances can be deployed
and configured to form a cluster that provides fault tolerance, improved
performance, or a combination thereof.
Depending on your requirements and the number of Deep Discovery
Analyzer appliances available, you may deploy the following cluster
configurations:
6-62
Administration
High availability cluster In a high availability cluster, one appliance acts as the active
primary appliance, and one acts as the passive primary appliance.
The passive primary appliance automatically takes over as the
new active primary appliance if the active primary appliance
encounters an error and is unable to recover.
Note
For all Deep Discovery Analyzer functions to operate
properly in a load-balancing environment, make sure the
primary and secondary appliances can communicate with
each other.
High availability cluster In a high availability cluster with load balancing, one appliance
with load balancing acts as the active primary appliance, one acts as the passive
primary appliance, and any additional appliances act as secondary
appliances. The passive primary appliance takes over as the active
primary appliance if the active primary appliance encounters
an error and is unable to recover. The secondary appliances
process submissions allocated by the active primary appliance for
performance improvement.
For details, see the Deep Discovery Analyzer Installation and Deployment Guide.
The following table lists the available configuration modes and associated
appliance behavior.
6-63
Deep Discovery Analyzer 7.6 Administrator's Guide
6-64
Administration
Configuration
Description
Mode
6-65
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
In environments that use a load-balancing cluster or a High Availability
cluster with load balancing, Deep Discovery Analyzer automatically slows
down Virtual Analyzer throughput on the active primary appliance to prevent
exhaustion of system resources
Nodes List
The Nodes list is displayed on the active primary appliance.
The Nodes list contains the following information:
Table 6-12. Nodes List Columns
Column Description
Last Connected Date and time that the appliance last connected to the active primary
appliance.
Note
No data (indicated by a dash) if the appliance is a passive
primary appliance.
6-66
Administration
Column Description
• Fully synced: The passive primary appliance is fully synced
to the active primary appliance.
• Syncing n%: The passive primary appliance is syncing
settings from the active primary appliance.
• Sync error: The passive primary appliance is unable to
connect to the active primary appliance. Verify that the
appliances are directly connected using eth3, and that eth3
is not used for sandbox analysis.
Tip
This field also displays the connection latency and
throughput information.
Action Actions that can be executed depending on the appliance mode and
status.
• For active primary appliance:
6-67
Deep Discovery Analyzer 7.6 Administrator's Guide
Column Description
• Swap: Swap the roles of the primary appliances. Sets the
current passive primary appliance to primary mode (active)
and the current active primary appliance to primary mode
(passive). Appears when the passive primary appliance has
synced all settings from the active primary appliance. For
details, see Swapping the Active Primary Appliance and the
Passive Primary Appliance on page 6-72
• For passive primary appliance:
• Detach: Detach the passive primary appliance. Disables high
availability and allows the passive primary appliance to be
used as a standalone appliance. Appears when the passive
primary appliance has synced all settings from the active
primary appliance. For details, see Detaching the Passive
Primary Appliance from the Cluster on page 6-72
• Remove: Remove inaccessible passive primary appliance.
Disables high availability. Appears when the active primary
appliance is unable to reach the passive primary appliance
through eth3. For details, see Removing the Passive Primary
Appliance from the Cluster on page 6-72
• For secondary appliances:
• Remove: Remove inaccessible secondary appliance. Affects
object processing capacity. Secondary appliances attempt to
connect to the active primary appliance every 10 seconds.
Appears when the active primary appliance does not receive
a heartbeat from the secondary appliance within one
minute. For details, see Removing a Secondary Appliance
from the Cluster on page 6-75
6-68
Administration
Important
When using high availability, eth3 is used to connect the two
identical appliances and cannot be used for other purposes
(for example, as the management port, external network
connection, or as a memeber port in a NIC team).
Note
6-69
Deep Discovery Analyzer 7.6 Administrator's Guide
Requirement Description
NIC teaming If configured, must use the same NIC teaming ports and connection
type
Note
• If your network has Trend Micro Apex Central, only register the active
primary appliance to Apex Central.
Procedure
1. Perform the installation and deployment tasks as described in the Deep
Discovery Analyzer Installation and Deployment Guide.
6-70
Administration
Important
While the appliance is syncing, it cannot:
6-71
Deep Discovery Analyzer 7.6 Administrator's Guide
Procedure
1. On the management console of the active primary appliance, go to
Administration > System Settings and click the Cluster tab.
2. Click Swap to swap the primary appliances.
Important
Detaching the passive primary appliance does not reset the appliance settings.
Trend Micro recommends reinstalling the appliance if you want to use it as a
standalone appliance.
Procedure
1. On the management console of the active primary appliance, go to
Administration > System Settings and click the Cluster tab.
2. Click Detach to detach the passive primary appliance from the cluster.
6-72
Administration
Procedure
1. On the management console of the active primary appliance, go to
Administration > System Settings and click the Cluster tab.
2. Wait for Remove to appear next to the passive primary appliance in the
nodes list.
3. Click Remove to remove the passive primary appliance from the cluster.
Note
The passive primary appliance automatically rejoins the cluster if it
reconnects to the active primary appliance.
Note
• If your network has Trend Micro Apex Central, only register the active
primary appliance to Apex Central.
Procedure
1. Perform the installation and deployment tasks as described in the Deep
Discovery Analyzer Installation and Deployment Guide.
2. Configure the secondary appliance.
6-73
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
If you are using high availability, type the IPv4 virtual address or
IPv6 virtual address.
Tip
Secondary appliances can test their connection to the active
primary appliance at any time. Click Test Connection to get detailed
information about any connectivity problems.
f. Click Save.
3. (Optional) Configure additional settings on the secondary appliance.
a. Configure the sandbox network connection setting.
For details, see Enabling External Connections on page 4-65.
Note
Trend Micro recommends using the external network connection
setting of the active primary appliance.
6-74
Administration
d. Add accounts.
For details, see Accounts Tab on page 6-84.
Note
Secondary appliances automatically deploy sandbox instances based on the
sandbox allocation ratio of the active primary appliance. The following table
lists a configuration example:
Procedure
1. On the management console of the active primary appliance, go to
Administration > System Settings and click the Cluster tab.
2. Wait for Remove to appear next to the secondary appliance in the nodes
list.
6-75
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
Secondary appliances attempt to connect to the active primary appliance
every 10 seconds. If the active primary appliance does not receive a
heartbeat within one minute, Remove appears next to the secondary
appliance in the Nodes list.
Tip
Trend Micro recommends deployment of a passive primary appliance for high
availability. For details, see Adding a Passive Primary Appliance to the Cluster on
page 6-68.
Important
Submissions do not have a result if they were being analyzed on the active
primary appliance when it becomes unresponsive.
Procedure
1. Power off the active primary appliance.
2. Select a secondary appliance from the same cluster and configure it as
the new active primary appliance.
6-76
Administration
Note
Trend Micro recommends using the same IP address as the original
active primary appliance. This allows secondary appliances and
integrated products to connect without reconfiguration.
Note
Settings take up to one day to propagate to secondary appliances.
Important
If you need to move high availability cluster appliances to another location,
the passive node must always be powered off first and powered on last.
Procedure
1. Power off the passive primary appliance.
2. Power off the active primary appliance on the Administration > System
Maintenance > Power Off/Restart tab.
3. Move both appliances to the new location.
4. Connect each appliance to the management network using eth0.
6-77
Deep Discovery Analyzer 7.6 Administrator's Guide
Procedure
1. Detach the passive primary appliance.
2. On active primary appliance UI, delete the virtual IP address, and then
configure the management IP address and virtual IP address to match
the IP address in the new network segment.
3. On passive primary appliance UI, configure the management IP address
to match the IP address in the new network segment
4. Add the passive primary appliance to the cluster again.
6-78
Administration
6-79
Deep Discovery Analyzer 7.6 Administrator's Guide
6-80
Administration
Item Description
Issuer Entity that verified the information and issued the certificate
Public key The 2048-bit or higher public key used for encryption
You can use the HTTPS Certificate screen to perform the following tasks:
• Generate a certificate signing request (CSR) to obtain a new certificate
from a certificate authority (CA)
For more information, see Generating a Certificate Signing Request on page
6-81.
• Import a new certificate to replace the existing certificate in Deep
Discovery Analyzer
For more information, see Importing and Replacing a Certificate on page
6-83.
Note
Deep Discovery Analyzer supports certificates in X.509 PEM format.
6-81
Deep Discovery Analyzer 7.6 Administrator's Guide
Procedure
1. Go to Administration > System Settings and click the HTTPS Certificate
tab.
2. Click Generate Certificate Signing Request.
3. Configure the certificate signing request settings.
The following table describes the fields.
Field Description
Common name (CN) Specify a domain name or the server host name.
Subject alternative Specify one or more domain names to associate with the
names generated certificate.
Organization unit Specify the name of your department within your company.
(OU)
Country (C) Specify the 2-character code for the country where your company
is located.
State/Region (ST) Specify the state or region where your company is located.
6-82
Administration
Important
Importing a certificate replaces the exiting certificate in Deep Discovery
Analyzer.
Note
Procedure
1. Go to Administration > System Settings and click the HTTPS Certificate
tab.
2. Click Import and Replace Certificate.
3. Select the certificate file.
4. Click Import and Replace.
After the process is complete, you can view the information for the new
certificate on the HTTPS Certificate screen.
Accounts / Contacts
The Accounts / Contacts screen, in Administration > Accounts / Contacts,
includes the following tabs:
• Accounts Tab on page 6-84
• SAML Tab on page 6-88
• Contacts Tab on page 6-90
6-83
Deep Discovery Analyzer 7.6 Administrator's Guide
Accounts Tab
Use the Accounts tab to create and manage user accounts.
Note
Procedure
1. Go to Administration > Accounts / Contacts.
2. Click the Accounts tab.
3. Use the following options to manage user accounts:
• To add a new user account, click Add .
The Add Account window opens. For details, see Configuring User
Accounts on page 6-85.
• To delete an account, select one or more user accounts and click
Delete.
Important
6-84
Administration
Procedure
1. Go to Administration > Accounts / Contacts, and then go to the
Account tab.
2. Do one of the following:
• Click Add to create a new user account.
6-85
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
The user name is case insensitive for new account creation and
management console logon process.
Note
6-86
Administration
Note
If a new local user account is used to log into the management console
for the first time, the system will prompt the user to change the account
password.
Note
To quickly locate a specific user name or group, type a few
characters in the text box and click Search.
Note
6-87
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
Contacts receive email alert notifications by default.
• Email address
• (Optional) Phone number
8. Click Save.
SAML Tab
Once Deep Discovery Analyzer and the identity provider have established
a trust relationship, Deep Discovery Analyzer can access the user identities
on the identity provider's directory server. However, before Deep Discovery
Analyzer can actually perform user authentication and authorization using
the user identity information, you need to configure account types and SAML
groups using groups, roles and claims.
The following provides a configuration overview to map a SAML account
from identity provider to a user role in Deep Discovery Analyzer:
1. Create user accounts.
a. Create user accounts.
b. Create user groups and assign user accounts to the groups.
For more information, see the documentation that comes with your
identity provider.
6-88
Administration
Procedure
1. Go to Administration > Accounts / Contacts and click the SAML tab.
2. Do one of the following:
• Click Add to create a SAML group.
• Click the name of a SAML group to configure the settings.
3. Select a status option to enable or disable the SAML group.
4. Type the group name for Deep Discovery Analyzer as the claim value.
Important
A claim value is case insensitive when you configure a new SAML group
on the SAML screen. During the single sign-on process, SAML group
mapping is also case insensitive.
6-89
Deep Discovery Analyzer 7.6 Administrator's Guide
Note
You cannot delete a SAML group with a logged-on account.
Contacts Tab
Use the Contacts tab, in Administration > Accounts / Contacts, to maintain
a list of contacts who are interested in the data that your logs collect.
This screen includes the following options.
Table 6-17. Contacts Tasks
Task Steps
Add Contact Click Add Contact to add a new account. This opens the Add Contact
window, where you specify contact details. For details, see Add
Contact Window on page 6-91.
Edit Select a contact and then click Edit to edit contact details. This opens
the Edit Contact window, which contains the same settings as the
Add Contact window. For details, see Add Contact Window on page
6-91.
Only one contact can be edited at a time.
Delete Select one or more contacts to delete and then click Delete.
Sort Column Data Click a column title to sort the data below it.
Search If there are many entries in the table, type some characters in the
Search text box to narrow down the entries. As you type, the entries
that match the characters you typed are displayed. Deep Discovery
Analyzer searches all cells in the table for matches.
Records and The panel at the bottom of the screen shows the total number of
Pagination Controls contacts. If all contacts cannot be displayed at the same time, use the
pagination controls to view the contacts that are hidden from view.
6-90
Administration
Field Details
System Logs
Deep Discovery Analyzer maintains system logs that provide summaries
about user access, component updates, setting changes, and other
configuration modifications that occurred using the management console.
Deep Discovery Analyzer stores system logs in the appliance hard drive.
Procedure
1. Go to Administration > System Logs.
2. Select a type.
• All
• System Setting
• Account Logon/Logoff
• System Update
6-91
Deep Discovery Analyzer 7.6 Administrator's Guide
3. Select a period or specify a custom range using the calendar and sliders.
4. (Optional) Type a keyword in the User name field and click the Loupe
icon to only display system logs whose user names contain the keyword.
5. Click Export All to export the system log to a .csv file.
System Maintenance
The System Maintenance screen, in Administration > System Maintenance,
includes the following tabs:
• Back Up Tab on page 6-92
• Restore Tab on page 6-96
• Configuring Storage Maintenance Settings on page 6-97
• Network Services Diagnostics Tab on page 6-98
• Power Off / Restart Tab on page 6-99
• Debug Tab on page 6-99
Back Up Tab
The Back Up tab contains the following sections:
• Configuration Settings Backup on page 6-93
• Data Backup on page 6-94
• Data Backup Status on page 6-95
Note
The Data Backup Status section displays on the Data Backup screen if
you configure Deep Discovery Analyzer to back up data on both primary
and secondary nodes in a cluster.
6-92
Administration
Virtual Analyzer > Submissions Custom column and advanced filter settings
Scan Settings
Interactive Mode
Smart Feedback
YARA Rules
Customization
6-93
Deep Discovery Analyzer 7.6 Administrator's Guide
Screen Tab
ICAP
Email Submission
Syslog
Proxy
SMTP
SNMP
Password Policy
Session Timeout
SAML
Contacts
Storage Maintenance
Data Backup
Deep Discovery Analyzer automatically exports submission records, analysis
results, and objects to a remote server you specify on the Storage
Maintenance screen.
Investigation package data is periodically purged based on available storage
space. To ensure availability of the data, Trend Micro recommends backing
up the data to an external server. For details, see Investigation Package Data
Retention on page 4-37.
6-94
Administration
Procedure
1. On the Administration > System Maintenance screen, click the Back Up
tab.
2. Select Automatically back up to remote server.
3. Select the server type.
• SFTP server
• FTP server
4. Type the following information.
a. Host name or IP address: The host name, IPv4 address, or IPv6
address of the backup server.
b. Port: The port number of the backup server.
c. (Optional) Folder: The backup folder path. The default value is the
root folder.
d. User name: The user name used for authentication.
e. Password: The password used for authentication.
5. Click Test Server Connection to verify the connection to the primary
backup server.
6. Select the scope of the data to back up.
• All submissions
• High/Medium/Low risk
• High risk only
7. Click Save.
6-95
Deep Discovery Analyzer 7.6 Administrator's Guide
Field Description
Mode This field displays the cluster configuration mode associated with the
appliance.
Host name This field displays the host name of the appliance.
Last backup This field displays the data backup status or the time the appliance
last updated data from the primary node.
Restore Tab
The Restore tab restores configuration settings from a backup file.
For information on creating a backup file of the configuration settings, see
Back Up Tab on page 6-92.
Important
If the Deep Discovery Analyzer license is not activated, the Sandbox for
macOS setting is not restored.
Procedure
1. Click Choose File or Browse.
2. Select the backup file.
3. Select one of the following restore options:
• Restore all configuration settings
• Restore all configuration settings except network share settings
6-96
Administration
Procedure
1. Go to Administration > System Maintenance and click the Storage
Maintenance tab.
2. In the Analysis Results section, select the node location to store analysis
results.
• Primary node: Select this option to store all analysis results (for
samples analyzed on both the primary and secondary nodes) on the
primary node
Note
Selecting this option may increase storage utilization on the
primary node.
Note
You can view the data backup status for secondary nodes on the
Data Backup screen.
6-97
Deep Discovery Analyzer 7.6 Administrator's Guide
• Delete logs older than: Specify the number of days to keep logs
Note
The specified value must be between 1 and 100.
• Delete logs when the total free disk space is lower than: Specify
the disk space threshold for automatic log deletion and select the
type of logs to delete (all logs or prioritize log deletion based on
detection risk)
Note
4. Click Save.
Procedure
1. Select one or more enabled services and click Test.
Wait for the connection test to complete. The time required depends on
the network environment and the number of services selected. View the
connection test result in the Result column.
6-98
Administration
Debug Tab
You can use the Debug tab to generate and configure debug logs for
troubleshooting.
Procedure
1. Specify how events will be shown in the debug logs.
a. Under the Debug Level Settings section, review the default debug
levels assigned to the following events:
• Virtual Analyzer Sensor
• Virtual Analyzer
• Scan Flow
• Cluster
• Notification
• Trend Micro Apex Central
• SNMP
6-99
Deep Discovery Analyzer 7.6 Administrator's Guide
6-100
Administration
Note
For debug logs of the passive primary appliance, go to the management
console of the active primary appliance.
Tools
Use the Tools screen, in Administration > Tools, to view and download
special tools for Deep Discovery Analyzer.
Each tool displayed on this screen has the following two options:
• Usage Instructions: This links to a relevant page in the online help with
instructions about how to use the tool.
• Download: This links to the relevant page in the download center that
has the tool.
6-101
Deep Discovery Analyzer 7.6 Administrator's Guide
Procedure
1. Record the following information to use with the Manual Submission
Tool.
a. API key: This is available on the Deep Discovery Analyzer
management console, in Help > About.
b. Deep Discovery Analyzer IP address: If unsure of the IP address,
check the URL used to access the Deep Discovery Analyzer
management console. The IP address is part of the URL.
2. In Administration > Tools, click the Download link for the Manual
Submission Tool.
The Trend Micro Software Download Center window appears.
3. Click the download icon next to the latest version.
A window providing different download options appears.
4. Click Use HTTP Download.
5. Extract the tool package.
6. In the folder where the tool was extracted, open config.ini.
6-102
Administration
8. Submit the samples. For details, see Manually Submitting Objects on page
4-27.
License
Use the License screen, in Administration > License, to view, activate, and
renew the Deep Discovery Analyzer license.
The Deep Discovery Analyzer license includes product updates (including
ActiveUpdate) and basic technical support (“Maintenance”) for one (1)
year from the date of purchase. The license allows you to upload threat
samples for analysis, and to access Trend Micro Threat Connect from Virtual
Analyzer. In addition, the license allows you to send samples to the Trend
Micro cloud sandboxes for analysis.
After the first year, Maintenance must be renewed on an annual basis at the
current Trend Micro rate.
A Maintenance Agreement is a contract between your organization and
Trend Micro. It establishes your right to receive technical support and
product updates in return for the payment of applicable fees. When you
purchase a Trend Micro product, the License Agreement you receive with the
product describes the terms of the Maintenance Agreement for that product.
The Maintenance Agreement has an expiration date. Your License
Agreement does not. If the Maintenance Agreement expires, you will no
longer be entitled to receive technical support from Trend Micro or access
Trend Micro Threat Connect.
Typically, 90 days before the Maintenance Agreement expires, you will start
to receive email notifications, alerting you of the pending discontinuation.
You can update your Maintenance Agreement by purchasing renewal
6-103
Deep Discovery Analyzer 7.6 Administrator's Guide
maintenance from your Reseller, Trend Micro sales, or on the Trend Micro
Customer Licensing Portal at:
https://clp.trendmicro.com/fullregistration
The License screen includes the following information and options.
Table 6-20. Product Details
Field Details
License agreement Displays a link to the Trend Micro License Agreement. Click the link
to view or print the license agreement.
Activation Code View the Activation Code in this section. If your license has expired,
obtain a new Activation Code from Trend Micro. To renew the license,
click New Activation Code, and type the new Activation Code.
The License screen reappears displaying the number of days left
before the product expires.
Expiration date View the expiration date of the license. Renew the license before it
expires.
The following table describes the consequences when the product license
expires.
6-104
Administration
About Screen
Use the About screen in Help > About to view the firmware version, API key,
and other product details.
Note
The API key is used by Trend Micro products to register and send samples to
Deep Discovery Analyzer. For a list of products and supported versions, see
Integration with Trend Micro Products on page 2-6.
6-105
Chapter 7
Technical Support
Learn about the following topics:
• Troubleshooting Resources on page 7-2
• Contacting Trend Micro on page 7-3
• Sending Suspicious Content to Trend Micro on page 7-4
• Other Resources on page 7-5
7-1
Deep Discovery Analyzer 7.6 Administrator's Guide
Troubleshooting Resources
Before contacting technical support, consider visiting the following Trend
Micro online resources.
Procedure
1. Go to https://success.trendmicro.com.
2. Select from the available products or click the appropriate button to
search for solutions.
3. Use the Search Support box to search for available solutions.
4. If no solution is found, click Contact Support and select the type of
support needed.
Tip
To submit a support case online, visit the following URL:
https://success.trendmicro.com/smb-new-request
Threat Encyclopedia
Most malware today consists of blended threats, which combine two or
more technologies, to bypass computer security protocols. Trend Micro
combats this complex malware with products that create a custom defense
strategy. The Threat Encyclopedia provides a comprehensive list of names
and symptoms for various blended threats, including known malware, spam,
malicious URLs, and known vulnerabilities.
7-2
Technical Support
Go to https://www.trendmicro.com/vinfo/us/threat-encyclopedia/#malware
to learn more about:
• Malware and malicious mobile code currently active or "in the wild"
• Correlated threat information pages to form a complete web attack story
• Internet threat advisories about targeted attacks and security threats
• Web attack and online trend information
• Weekly malware reports
Website https://www.trendmicro.com
7-3
Deep Discovery Analyzer 7.6 Administrator's Guide
https://docs.trendmicro.com
7-4
Technical Support
Other Resources
In addition to solutions and support, there are many other helpful resources
available online to stay up to date, learn about innovations, and be aware of
the latest security trends.
Download Center
From time to time, Trend Micro may release a patch for a reported known
issue or an upgrade that applies to a specific product or service. To find out
whether any patches are available, go to:
https://www.trendmicro.com/download/
If a patch has not been applied (patches are dated), open the Readme file to
determine whether it is relevant to your environment. The Readme file also
contains installation instructions.
7-5
Deep Discovery Analyzer 7.6 Administrator's Guide
Documentation Feedback
Trend Micro always seeks to improve its documentation. If you have
questions, comments, or suggestions about this or any Trend Micro
document, please go to the following site:
https://docs.trendmicro.com/en-us/survey.aspx
7-6
Appendices
Appendices
1
Appendix A
A-1
Deep Discovery Analyzer 7.6 Administrator's Guide
ddan7-5-en-backup-
t0.url.trendmicro.com
A-2
Service Addresses and Ports
A-3
Appendix B
B-1
Deep Discovery Analyzer 7.6 Administrator's Guide
Item Description
OID .1.3.6.1.2.1.1
Description System
Item Description
OID .1.3.6.1.2.1.1.1
Description A textual description of the entity. This value should include the
full name and version identification of the system's hardware type,
software operating-system, and networking software. It is mandatory
that this only contain printable ASCII characters.
Item Description
OID .1.3.6.1.2.1.1.2
Item Description
OID .1.3.6.1.2.1.1.3
B-2
SNMP Object Identifiers
Item Description
Description The time (in hundredths of a second) since the network management
portion of the system was last re-initialized.
OID .1.3.6.1.2.1.1.4
Description The textual identification of the contact person for this managed node,
together with information on how to contact this person. If no contact
information is known, the value is the zero-length string.
OID .1.3.6.1.2.1.1.5
OID .1.3.6.1.2.1.1.6
Description The physical location of this node (e.g., 'telephone closet, 3rd floor'). If
the location is unknown, the value is the zero-length string.
B-3
Deep Discovery Analyzer 7.6 Administrator's Guide
OID .1.3.6.1.2.1.1.7
Description A value which indicates the set of services that this entity may
potentially offer. The value is a sum. This sum initially takes the value
zero. Then, for each layer, L, in the range 1 through 7, that this node
performs transactions for, 2 raised to (L - 1) is added to the sum. For
example, a node which performs only routing functions would have
a value of 4 (2^(3-1)). In contrast, a node which is a host offering
application services would have a value of 72 (2^(4-1) + 2^(7-1)). Note
that in the context of the Internet suite of protocols, values should be
calculated accordingly:
layer functionality
1 physical (e.g., repeaters)
2 datalink/subnetwork (e.g., bridges)
3 internet (e.g., supports the IP)
4 end-to-end (e.g., supports the TCP)
7 applications (e.g., supports the SMTP)
For systems including OSI protocols, layers 5 and 6 may also be
counted.
OID .1.3.6.1.2.1.1.8
Description The value of sysUpTime at the time of the most recent change in state
or value of any instance of sysORID.
B-4
SNMP Object Identifiers
Item Description
OID .1.3.6.1.2.1.2
Description Interfaces
Item Description
OID .1.3.6.1.2.1.2.1
Item Description
OID .1.3.6.1.2.1.2.2
Description A list of interface entries. The number of entries is given by the value of
ifNumber.
Item Description
OID .1.3.6.1.4.1.2021.4.1
Item Description
OID .1.3.6.1.4.1.2021.4.2
B-5
Deep Discovery Analyzer 7.6 Administrator's Guide
Item Description
Description Bogus Name. This should always return the string 'swap'.
OID .1.3.6.1.4.1.2021.4.3
Description The total amount of swap space configured for this host.
OID .1.3.6.1.4.1.2021.4.4
OID .1.3.6.1.4.1.2021.4.5
OID .1.3.6.1.4.1.2021.4.6
B-6
SNMP Object Identifiers
OID .1.3.6.1.4.1.2021.4.11
Description The total amount of memory free or available for use on this host.
This value typically covers both real memory and swap space or virtual
memory.
OID .1.3.6.1.4.1.2021.4.12
OID .1.3.6.1.4.1.2021.4.13
Description The total amount of real or virtual memory currently allocated for
use as shared memory. This object will not be implemented on hosts
where the underlying operating system does not explicitly identify
memory as specifically reserved for this purpose.
OID .1.3.6.1.4.1.2021.4.14
B-7
Deep Discovery Analyzer 7.6 Administrator's Guide
Item Description
Description The total amount of real or virtual memory currently allocated for
use as memory buffers. This object will not be implemented on hosts
where the underlying operating system does not explicitly identify
memory as specifically reserved for this purpose.
OID .1.3.6.1.4.1.2021.4.15
Description The total amount of real or virtual memory currently allocated for
use as cached memory. This object will not be implemented on hosts
where the underlying operating system does not explicitly identify
memory as reserved for this purpose.
OID .1.3.6.1.4.1.2021.4.100
Description Indicates whether the amount of available swap space (as reported
by 'memAvailSwap(4)') is less than the minimum (specified by
'memMinimumSwap(12)').
OID .1.3.6.1.4.1.2021.4.101
Description Describes whether the amount of available swap space (as reported
by 'memAvailSwap(4)') is less than the minimum (specified by
'memMinimumSwap(12)').
B-8
SNMP Object Identifiers
Item Description
OID .1.3.6.1.4.1.2021.9.1.1
Description Integer reference number (row number) for the disk mib.
Item Description
OID .1.3.6.1.4.1.2021.9.1.2
Item Description
OID .1.3.6.1.4.1.2021.9.1.3
Item Description
OID .1.3.6.1.4.1.2021.9.1.4
Description Minimum space required on the disk (in kBytes) before the errors are
triggered. Either this or dskMinPercent is configured via the agent's
snmpd.conf file.
Item Description
OID .1.3.6.1.4.1.2021.9.1.5
B-9
Deep Discovery Analyzer 7.6 Administrator's Guide
Item Description
Description Percentage of minimum space required on the disk before the errors
are triggered. Either this or dskMinimum is configured via the agent's
snmpd.conf file.
Item Description
OID .1.3.6.1.4.1.2021.9.1.9
Item Description
OID .1.3.6.1.4.1.2021.9.1.10
Item Description
OID .1.3.6.1.4.1.2021.9.1.11
Item Description
OID .1.3.6.1.4.1.2021.9.1.12
B-10
SNMP Object Identifiers
Item Description
OID .1.3.6.1.4.1.2021.9.1.13
Description Available disk space (kByte). Together with dskAvailHigh forms a 64-bit
number.
OID .1.3.6.1.4.1.2021.9.1.14
Description Available disk space (kByte). Together with dskAvailLow forms a 64-bit
number.
OID .1.3.6.1.4.1.2021.9.1.15
Description Disk space used (kByte). Together with dskUsedHigh forms a 64-bit
number.
OID .1.3.6.1.4.1.2021.9.1.16
B-11
Deep Discovery Analyzer 7.6 Administrator's Guide
Item Description
Description Disk space used (kByte). Together with dskUsedLow forms a 64-bit
number.
OID .1.3.6.1.4.1.2021.9.1.100
Description Error flag indicating that the disk or partition is under the minimum
required space configured for it.
OID .1.3.6.1.4.1.2021.9.1.101
Description A text description providing a warning and the space left on the disk.
OID .1.3.6.1.4.1.2021.10
OID .1.3.6.1.4.1.2021.11.1
B-12
SNMP Object Identifiers
OID .1.3.6.1.4.1.2021.11.2
Description Bogus Name. This should always return the string 'systemStats'.
OID .1.3.6.1.4.1.2021.11.3
Description The average amount of memory swapped in from disk, calculated over
the last minute.
OID .1.3.6.1.4.1.2021.11.4
Description The average amount of memory swapped out to disk, calculated over
the last minute.
OID .1.3.6.1.4.1.2021.11.5
Description The average amount of data written to disk or other block devices,
calculated over the last minute. This object has been deprecated in
favour of 'ssIORawSent(57)', which can be used to calculate the same
metric, but over any desired time period.
B-13
Deep Discovery Analyzer 7.6 Administrator's Guide
OID .1.3.6.1.4.1.2021.11.6
Description The average amount of data read from disk or other block devices,
calculated over the last minute. This object has been deprecated in
favour of 'ssIORawReceived(58)', which can be used to calculate the
same metric, but over any desired time period.
OID .1.3.6.1.4.1.2021.11.7
OID .1.3.6.1.4.1.2021.11.8
Description The average rate of context switches, calculated over the last minute.
This object has been deprecated in favour of 'ssRawContext(60)',
which can be used to calculate the same metric, but over any desired
time period.
OID .1.3.6.1.4.1.2021.11.9
B-14
SNMP Object Identifiers
Item Description
OID .1.3.6.1.4.1.2021.11.10
OID .1.3.6.1.4.1.2021.11.11
OID .1.3.6.1.4.1.2021.11.50
B-15
Deep Discovery Analyzer 7.6 Administrator's Guide
OID .1.3.6.1.4.1.2021.11.51
OID .1.3.6.1.4.1.2021.11.52
OID .1.3.6.1.4.1.2021.11.53
B-16
SNMP Object Identifiers
OID .1.3.6.1.4.1.2021.11.54
Description The number of 'ticks' (typically 1/100s) spent waiting for IO. This
object will not be implemented on hosts where the underlying
operating system does not measure this particular CPU metric. This
time may also be included within the 'ssCpuRawSystem(52)' counter.
On a multi-processor system, the 'ssCpuRaw*' counters are cumulative
over all CPUs, so their sum will typically be N*100 (for N processors).
OID .1.3.6.1.4.1.2021.11.55
OID .1.3.6.1.4.1.2021.11.56
B-17
Deep Discovery Analyzer 7.6 Administrator's Guide
Item Description
OID .1.3.6.1.4.1.2021.11.57
Item Description
OID .1.3.6.1.4.1.2021.11.58
Item Description
OID .1.3.6.1.4.1.2021.11.59
Item Description
OID .1.3.6.1.4.1.2021.11.60
Item Description
OID .1.3.6.1.4.1.2021.11.61
B-18
SNMP Object Identifiers
Item Description
OID .1.3.6.1.4.1.2021.11.62
OID .1.3.6.1.4.1.2021.11.63
OID .1.3.6.1.4.1.2021.11.64
Description The number of 'ticks' (typically 1/100s) spent by the CPU to run a
virtual CPU (guest).
This object will not be implemented on hosts where the underlying
operating system does not measure this particular CPU metric.
On a multi-processor system, the 'ssCpuRaw*' counters are cumulative
over all CPUs, so their sum will typically be N*100 (for N processors).
B-19
Deep Discovery Analyzer 7.6 Administrator's Guide
OID .1.3.6.1.4.1.2021.11.65
Description The number of 'ticks' (typically 1/100s) spent by the CPU to run a
virtual CPU (guest).
This object will not be implemented on hosts where the underlying
operating system does not measure this particular CPU metric.
On a multi-processor system, the 'ssCpuRaw*' counters are cumulative
over all CPUs, so their sum will typically be N*100 (for N processors).
OID .1.3.6.1.4.1.2021.11.66
Description The number of 'ticks' (typically 1/100s) spent by the CPU to run a
virtual CPU (guest).
This object will not be implemented on hosts where the underlying
operating system does not measure this particular CPU metric.
On a multi-processor system, the 'ssCpuRaw*' counters are cumulative
over all CPUs, so their sum will typically be N*100 (for N processors).
OID .1.3.6.1.4.1.6101.3005.1.1.1
B-20
SNMP Object Identifiers
Item Description
OID .1.3.6.1.4.1.6101.3005.1.1.2
Item Description
OID .1.3.6.1.4.1.6101.3005.1.1.3
Item Description
OID .1.3.6.1.4.1.6101.3005.1.2
Item Description
OID .1.3.6.1.4.1.6101.3005.1.2.1.1
Item Description
OID .1.3.6.1.4.1.6101.3005.1.2.1.2
B-21
Deep Discovery Analyzer 7.6 Administrator's Guide
Item Description
OID .1.3.6.1.4.1.6101.3005.1.2.1.3
OID .1.3.6.1.4.1.6101.3005.1.2.1.4
OID .1.3.6.1.4.1.6101.3005.1.3
OID .1.3.6.1.4.1.6101.3005.1.3.1.1
B-22
SNMP Object Identifiers
Item Description
OID .1.3.6.1.4.1.6101.3005.1.3.1.2
Item Description
OID .1.3.6.1.4.1.6101.3005.1.3.1.3
Item Description
OID .1.3.6.1.4.1.6101.3005.1.3.1.4
Item Description
OID .1.3.6.1.4.1.6101.3005.1.3.1.5
Item Description
OID .1.3.6.1.4.1.6101.3005.1.4.1
B-23
Deep Discovery Analyzer 7.6 Administrator's Guide
Item Description
OID .1.3.6.1.4.1.6101.3005.1.4.2
OID .1.3.6.1.4.1.6101.3005.1.4.3.1
OID .1.3.6.1.4.1.6101.3005.1.4.3.2
OID .1.3.6.1.4.1.6101.3005.1.4.3.3
B-24
SNMP Object Identifiers
Item Description
OID .1.3.6.1.4.1.6101.3005.1.4.3.4
Item Description
OID .1.3.6.1.4.1.6101.3005.1.4.4
Item Description
OID .1.3.6.1.4.1.6101.3005.1.4.5
Description Returns the number of samples that were processed completely in the
past 24 hours
Item Description
OID .1.3.6.1.4.1.6101.3005.1.4.6
Description Returns the number of samples that were processed by ICAP pre-scan
in the past 24 hours
Item Description
OID .1.3.6.1.4.1.6101.3005.1.4.7.1
B-25
Deep Discovery Analyzer 7.6 Administrator's Guide
Item Description
Description Returns the number of submissions with high risk in the past 24 hours
OID .1.3.6.1.4.1.6101.3005.1.4.7.2
Description Returns the number of submissions with medium risk in the past 24
hours
OID .1.3.6.1.4.1.6101.3005.1.4.7.3
Description Returns the number of submissions with low risk in the past 24 hours
OID .1.3.6.1.4.1.6101.3005.1.4.7.4
Description Returns the number of submissions with no risk in the past 24 hours
OID .1.3.6.1.4.1.6101.3005.1.4.7.5
B-26
SNMP Object Identifiers
Item Description
SNMP Traps
Table B-98. coldStart
Item Description
OID .1.3.6.1.6.3.1.1.5.1.0
OID .1.3.6.1.6.3.1.1.5.3.0
Description A linkDown trap signifies that the SNMP entity, acting in an agent role,
has detected that the ifOperStatus object for one of its communication
links is about to enter the down state from some other state (but
not from the notPresent state). This other state is indicated by the
included value of ifOperStatus.
OID .1.3.6.1.6.3.1.1.5.4.0
B-27
Deep Discovery Analyzer 7.6 Administrator's Guide
Item Description
Description A linkUp trap signifies that the SNMP entity, acting in an agent role,
has detected that the ifOperStatus object for one of its communication
links left the down state and transitioned into some other state (but
not into the notPresent state). This other state is indicated by the
included value of ifOperStatus.
OID .1.3.6.1.4.1.8072.4.0.2
Description An indication that the agent is in the process of being shut down.
OID .1.3.6.1.4.1.6101.3005.2.1.0.1
OID .1.3.6.1.4.1.6101.3005.2.1.0.2
OID .1.3.6.1.4.1.6101.3005.2.1.0.3
B-28
SNMP Object Identifiers
Item Description
Description A notification for when the number of Virtual Analyzer submissions has
exceeded the threshold.
Item Description
OID .1.3.6.1.4.1.6101.3005.2.1.0.4
Item Description
OID .1.3.6.1.4.1.6101.3005.2.1.0.5
Description A notification for when the average CPU usage in the last 5 minutes
has exceeded the threshold.
Item Description
OID .1.3.6.1.4.1.6101.3005.2.1.0.6
Description A notification for when the average memory usage in the last 5
minutes has exceeded the threshold.
Item Description
OID .1.3.6.1.4.1.6101.3005.2.1.0.7
B-29
Deep Discovery Analyzer 7.6 Administrator's Guide
Item Description
Description A notification for when disk usage has exceeded the threshold.
OID .1.3.6.1.4.1.6101.3005.2.1.0.8
OID .1.3.6.1.4.1.6101.3005.2.1.0.9
OID .1.3.6.1.4.1.6101.3005.2.1.0.10
OID .1.3.6.1.4.1.6101.3005.2.1.0.11
B-30
SNMP Object Identifiers
Item Description
Item Description
OID .1.3.6.1.4.1.6101.3005.2.1.0.12
Item Description
OID .1.3.6.1.4.1.6101.3005.2.1.0.13
Description A notification for when the passive primary appliance has recovered
and high availability has been restored.
Item Description
OID .1.3.6.1.4.1.6101.3005.2.1.0.14
Description A notification for when the number of new high-risk objects identified
during the last TimeRange has reached the threshold.
Item Description
OID .1.3.6.1.4.1.6101.3005.2.1.0.15
B-31
Deep Discovery Analyzer 7.6 Administrator's Guide
OID .1.3.6.1.4.1.6101.3005.2.1.0.16
OID .1.3.6.1.4.1.6101.3005.2.1.0.17
Description A notification for when the license is about to expire or has expired.
OID .1.3.6.1.4.1.6101.3005.2.1.0.18
Registration Objects
OID Description
.1.3.6.1.4.1.2021 UC Davis
.1.3.6.1.4.1.8072 NET-SNMP-AGENT-MIB
B-32
Appendix C
C-1
Deep Discovery Analyzer 7.6 Administrator's Guide
C-2
Index
A management console, 2-2
account, 6-85 contact management, 6-90
Active Directory, 6-85 CPU usage alert, 5-4
add, 6-85 critical alerts, 5-3, 5-7
change password, 6-85 customized alerts and reports, 5-37
edit, 6-85 D
local, 6-85
account management, 6-84 dashboard, 3-3, 3-4
Activation Code, 6-103 dashboard
Active Directory Federation Services tabs, 3-2
(AD FS), 6-41 overview, 3-2
add account, 6-85 tabs, 3-2
AD FS, 6-41 widgets, 3-2–3-4
administration, 4-63 Deep Discovery Malware Pattern, 5-26,
file passwords, 4-63 6-2
Advanced Threat Scan Engine, 5-26, 6-2 detected message alert, 5-4
alerts, 5-3–5-5, 5-7, 5-10–5-18, 5-21 detection surge alert, 5-5
critical alerts, 5-3 disk space alert, 5-4
important alerts, 5-4 documentation feedback, 7-6
informational alerts, 5-5
E
notification parameters, 5-7,
5-10–5-18, 5-21 edit account, 6-85
Analysis reports, 6-10 email scanning
analysis results, 6-97 file passwords, 4-63
API key, 6-105 email submission, 6-45
ATSE, 5-26, 6-2 exceptions, 4-48
average Virtual Analyzer queue time
F
alert, 5-4
file passwords, 4-64
C
G
C&C list, 4-40
change password, 2-5, 6-85 generated reports, 5-32
components, 6-2 getting started
configuration management console, 2-2
IN-1
Deep Discovery Analyzer 7.6 Administrator's Guide
IN-2
Index
IN-3
Deep Discovery Analyzer 7.6 Administrator's Guide
U
unreachable relay MTA alert, 5-3
update completed surge, 5-5
update failed alert, 5-4
updates, 6-2
components, 6-2
firmware, 6-8
update settings, 6-4
IN-4
Item Code: APEM769913/240703