Ddan 7.0 Idg
Ddan 7.0 Idg
Chapter 1: Introduction
About Deep Discovery Analyzer ........................................... 1-2
What's New ........................................................................ 1-2
Features and Benefits .......................................................... 1-4
Enable Sandboxing as a Centralized Service ................... 1-5
Custom Sandboxing ...................................................... 1-5
Broad File Analysis Range ............................................. 1-5
YARA Rules .................................................................. 1-6
Document Exploit Detection .......................................... 1-6
Automatic URL Analysis ................................................ 1-6
Detailed Reporting ........................................................ 1-6
Alert Notifications ........................................................ 1-6
Clustered Deployment .................................................. 1-6
Trend Micro Product Integration ................................... 1-7
Web Services API and Manual Submission ..................... 1-7
Custom Defense Integration .......................................... 1-7
ICAP Integration ........................................................... 1-7
i
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
ii
Table of Contents
Appendix A: Appendices
The Management Console .................................................. A-2
Logging On Using Local Accounts ................................. A-2
Logging On With Single Sign-On ................................... A-8
Getting Started Tasks .......................................................... A-8
License ...................................................................... A-10
Network Tab .............................................................. A-12
Proxy Tab ................................................................... A-14
Time Tab ................................................................... A-16
SMTP Tab .................................................................. A-18
Images Tab ................................................................ A-20
Enabling External Connections ................................... A-23
Cluster Tab ................................................................. A-25
Resetting the Administrator Password ............................... A-39
Index
Index ............................................................................... IN-1
iii
Preface
Preface
Welcome to the Trend Micro™ Deep Discovery™ Analyzer Installation and
Deployment Guide. This guide contains information about the requirements
and procedures for deploying, installing and migrating Deep Discovery
Analyzer.
v
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Documentation
The documentation set for Deep Discovery Analyzer includes the following:
Table 1. Product Documentation
Document Description
Quick Start Card The Quick Start Card provides user-friendly instructions on
connecting Deep Discovery Analyzer to your network and on
performing the initial configuration.
vi
Preface
Document Description
View and download product documentation from the Trend Micro Online
Help Center:
https://docs.trendmicro.com/en-us/home.aspx
Audience
The Deep Discovery Analyzer documentation is written for IT administrators
and security analysts. The documentation assumes that the reader has an in-
depth knowledge of networking and information security, including the
following topics:
• Network topologies
• Database management
• Antivirus and content security protection
The documentation does not assume the reader has any knowledge of
sandbox environments or threat event correlation.
Document Conventions
The documentation uses the following conventions:
vii
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Convention Description
Monospace Sample command lines, program code, web URLs, file names,
and program output
Configuration notes
Note
Recommendations or suggestions
Tip
Terminology
Terminology Description
viii
Preface
Terminology Description
Active primary appliance Clustered appliance with which all management tasks are
performed. Retains all configuration settings and allocates
submissions to secondary appliances for performance
improvement.
High availability cluster In a high availability cluster, one appliance acts as the active
primary appliance, and one acts as the passive primary
appliance. The passive primary appliance automatically takes
over as the new active primary appliance if the active primary
appliance encounters an error and is unable to recover.
Passive primary appliance Clustered appliance that is on standby until active primary
appliance encounters an error and is unable to recover.
Provides high availability.
ix
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Terminology Description
Standalone appliance Appliance that is not part of any cluster. Clustered appliances
can revert to being standalone appliances by detaching the
appliance from its cluster.
YARA YARA rules are malware detection patterns that are fully
customizable to identify targeted attacks and security threats
specific to your environment.
x
Preface
xi
Chapter 1
Introduction
This chapter introduces Deep Discovery Analyzer 7.0 and the new features in
this release.
1-1
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
What's New
Table 1-1. What's New in Deep Discovery Analyzer 7.0
Feature/Enhancement Details
Network share scanning You can configure Deep Discovery Analyzer to perform a
scheduled or on-demand scan on files in specified network
share locations.
1-2
Introduction
Feature/Enhancement Details
Enhanced Virtual Analyzer The internal Virtual Analyzer has been enhanced. This release
adds the following features:
• Windows 10 20H1 and CentOS 7.8 (64-bit) image support
• New OpenDocument (ODF) file types (.odt, .odp,
and .ods) for Microsoft Office or LibreOffice in Windows
images
• New archive file types (.alz and .egg)
Support for CentOS 7.8 (64-bit) images in Virtual Analyzer
enables the following:
• ELF and shell (.sh) file analysis
• Custom or pre-defined Linux image (Trend Micro
Download Center) import
1-3
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Feature/Enhancement Details
Enhanced failover support in You can enable the failover option in high availability
high availability clustering configuration to have Deep Discovery Analyzer switch to the
passive primary appliance when the external connection for
Virtual Analyzer becomes unavailable.
Deep Discovery Director Deep Discovery Analyzer integrates with Deep Discovery
integration Director 5.3 to enable the following:
• Synchronize suspicious object lists from Deep Discovery
Director
• Option to use the synchronized suspicious object list for
ICAP pre-scan and Virtual Analyzer analysis
• Deployment of Linux images from Deep Discovery
Director
Inline migration from Deep On hardware models 1100 and 1200, Deep Discovery Analyzer
Discovery Analyzer 6.8 and can automatically migrate the settings of a Deep Discovery
6.9 Analyzer 6.8 or 6.9 installation to 7.0.
1-4
Introduction
Custom Sandboxing
Deep Discovery Analyzer performs sandbox simulation and analysis in
environments that match the desktop software configurations attackers
expect in your environment and ensures optimal detection with low false-
positive rates.
1-5
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
YARA Rules
Deep Discovery Analyzer uses YARA rules to identify malware. YARA rules
are malware detection patterns that are fully customizable to identify
targeted attacks and security threats specific to your environment.
Detailed Reporting
Deep Discovery Analyzer delivers full analysis results including detailed
sample activities and C&C communications via central dashboards and
reports.
Alert Notifications
Alert notifications provide immediate intelligence about the state of Deep
Discovery Analyzer.
Clustered Deployment
Multiple standalone Deep Discovery Analyzer appliances can be deployed
and configured to form a cluster that provides fault tolerance, improved
performance, or a combination thereof.
1-6
Introduction
ICAP Integration
Deep Discovery Analyzer supports integration with Internet Content
Adaptation Protocol (ICAP) clients. After integration, Deep Discovery
Analyzer can perform the following functions:
• Serve User Configuration Pages to the end user when the specified
network behavior (URL access / file upload / file download) is blocked
• Control which ICAP clients can submit samples by configuring the ICAP
Client list
1-7
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
• Filter sample submissions based on the file types that Virtual Analyzer
can process.
1-8
Chapter 2
2-1
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Deployment Overview
Product Specifications
Standard Deep Discovery Analyzer appliances have the following
specifications.
Contact Trend Micro if the appliance you are using does not meet these
hardware specifications.
Feature Specifications
Note
The Deep Discovery Analyzer hard drives support hot-
swapping.
Dimensions (WxDxH) 48.2 cm (18.98 in) x 75.58 cm (29.75 in) x 8.73 cm (3.44 in)
2-2
Preparing to Deploy Deep Discovery Analyzer
Feature Specifications
Note
The Deep Discovery Analyzer hard drives support hot-
swapping.
Dimensions (WxDxH) 48.2 cm (18.98 in) x 75.13cm (29.58 in) x 8.68 cm (3.42 in)
Deployment Considerations
Any Deep Discovery Analyzer appliance can be deployed and configured as a
standalone appliance. A standalone appliance processes all submitted
objects without the assistance of other Deep Discovery Analyzer appliances.
It cannot provide continued scanning and analysis services when it
encounters an error and is unable to recover.
Multiple standalone Deep Discovery Analyzer appliances can be deployed
and configured to form a cluster that provides fault tolerance, improved
performance, or a combination thereof.
Depending on your requirements and the number of Deep Discovery
Analyzer appliances available, you may deploy the following cluster
configurations:
2-3
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Cluster
Description
Configuration
High availability cluster In a high availability cluster, one appliance acts as the active
primary appliance, and one acts as the passive primary appliance.
The passive primary appliance automatically takes over as the new
active primary appliance if the active primary appliance
encounters an error and is unable to recover.
For details, see High Availability Cluster on page 2-4.
High availability cluster In a high availability cluster with load balancing, one appliance
with load balancing acts as the active primary appliance, one acts as the passive
primary appliance, and any additional appliances act as secondary
appliances. The passive primary appliance takes over as the active
primary appliance if the active primary appliance encounters an
error and is unable to recover. The secondary appliances process
submissions allocated by the active primary appliance for
performance improvement.
For details, see High Availability Cluster with Load Balancing on
page 2-7.
2-4
Preparing to Deploy Deep Discovery Analyzer
Note
• Trend Micro recommends updating the firmware on a Deep Discovery
Analyzer appliance to the latest version before deployment in a high
availability cluster.
• The active primary appliance and the passive primary appliance must be
connected using eth3.
• Trend Micro recommends using a Category 6 or higher Ethernet cable to
directly connect the active primary appliance and passive primary
appliance using eth3.
• Trend Micro recommends directly connecting the active primary
appliance and the passive primary appliance to minimize potential points
of failures.
• If the active primary appliance is not connected to the passive primary
appliance directly (for example, if they are in different data centers), the
following requirements must be met:
• The appliances must be Deep Discovery Analyzer 1100 or 1200
• The connections between the appliances must meet the following
conditions:
• Network latency is less than 15 ms
• Packet loss ratio is less than 0.000001%
• Network bandwidth is greater than 240Mbps
2-5
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Load-Balancing Cluster
In a load-balancing cluster, one appliance acts as the active primary
appliance, and any additional appliances act as secondary appliances. The
secondary appliances process submissions allocated by the active primary
appliance for performance improvement.
Deploy this cluster configuration if you require improved object processing
performance.
The following figure shows Deep Discovery Analyzer appliances deployed in
a load-balancing cluster configuration and how integrating products
communicate with Deep Discovery Analyzer.
2-6
Preparing to Deploy Deep Discovery Analyzer
2-7
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Note
• Trend Micro recommends updating the firmware on a Deep Discovery
Analyzer appliance to the latest version before deployment in a high
availability cluster.
• The active primary appliance and the passive primary appliance must be
connected using eth3.
• Trend Micro recommends using a Category 6 or higher Ethernet cable to
directly connect the active primary appliance and passive primary
appliance using eth3.
• Trend Micro recommends directly connecting the active primary
appliance and the passive primary appliance to minimize potential points
of failures.
• If the active primary appliance is not connected to the passive primary
appliance directly (for example, if they are in different data centers), the
following requirements must be met:
• The appliances must be Deep Discovery Analyzer 1100 or 1200
• The connections between the appliances must meet the following
conditions:
• Network latency is less than 15 ms
• Packet loss ratio is less than 0.000001%
• Network bandwidth is greater than 240Mbps
2-8
Preparing to Deploy Deep Discovery Analyzer
2-9
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
2-10
Preparing to Deploy Deep Discovery Analyzer
Network Settings
Ports are found at the back of the appliance, as shown in the following
image.
• Custom port (a port that is not used as the management port or for high
availability): Connects the appliance to custom networks that are
reserved for sandbox analysis
Note
2-11
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
you to specify static addresses. For more information, see the Deep Discovery
Analyzer Administrator's Guide.
Deployment Requirements
Requirement Details
Monitor and VGA cable Connects to the VGA port of the appliance
Ethernet cables • One cable connects the management port of the appliance
to the management network.
• One cable connects a custom port to an isolated network
that is reserved for sandbox analysis.
• If using high availability, one cable connects eth3 to eth3
on an identical appliance.
2-12
Preparing to Deploy Deep Discovery Analyzer
Requirement Details
Pre-requisites for product If integrating with another product, verify that all integration
integration requirements have been met.
• Some integrating products require additional
configuration (for example: host names, IP addresses, SSL
ports, etc) to integrate with Deep Discovery Analyzer
properly. See the product documentation for details.
• Some integrating products require an API key provided by
Deep Discovery Analyzer. If the Deep Discovery Analyzer
API key changes after registering with the integrated
product, remove Deep Discovery Analyzer from the
integrated product and add it again.
• Internet Content Adaptation Protocol (ICAP) clients must
comply with RFC 3507.
Logon Credentials
Default Your
Console Purpose
Credentials Information
• Password:
Admin1234!
2-13
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Default Your
Console Purpose
Credentials Information
• Password:
Admin1234!
22 TCP Listening and Deep Discovery Analyzer uses this port to:
outbound
• Access the preconfiguration console with
a computer through SSH
• Send backup data to an SFTP server
• Send debug logs to an SFTP server
2-14
Preparing to Deploy Deep Discovery Analyzer
123 UDP Listening and Deep Discovery Analyzer connects to the NTP
outbound server to synchronize time.
443 TCP Listening Deep Discovery Analyzer uses this port to:
• Access the management console with a
computer through HTTPS
• Communicate with other Deep Discovery
Analyzer appliances in a cluster
environment
• Communicate with Trend Micro Apex
Central
• Receive files from a computer via the
Manual Submission Tool
• Receive samples from integrated
products
2-15
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
2-16
Preparing to Deploy Deep Discovery Analyzer
2-17
Chapter 3
3-1
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Installation Tasks
Procedure
1. Prepare the appliance for installation. For details, see Setting Up the
Hardware on page 3-2.
2. Install Deep Discovery Analyzer. For details, see Installing Deep Discovery
Analyzer on page 3-5.
3. Configure the IP address of the appliance on the preconfiguration
console. For details, see Configuring Network Addresses on the
Preconfiguration Console on page 4-5.
Procedure
1. Mount the appliance in a standard 19-inch 4-post rack, or on a free-
standing object, such as a sturdy desktop.
Note
When mounting the appliance, leave at least two inches of clearance on all
sides for proper ventilation and cooling.
3-2
Installing the Appliance
3. Connect the monitor to the VGA port at the back of the appliance.
4. Connect the keyboard and mouse to the USB ports at the back of the
appliance.
5. Connect the Ethernet cables to the management and custom ports.
• Management port: A hardware port that connects the appliance to
the management network
Note
eth0 is the default management port. You can set the management
port on a custom port.
For more information, see Configuring the Management Port on page
4-10.
3-3
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Note
When using high availability, eth3 is used to connect the two identical
appliances and cannot be used for sandbox analysis.
3-4
Installing the Appliance
Note
For example, if NIC1 is installed in slot1 and NIC2 in slot2, you cannot
switch NIC1 to slot2 and NIC2 to slot1. However, you can switch NIC1
to slot2 and NIC2 to slot3.
Note
The power button is found on the front panel of the appliance, behind the
bezel.
Procedure
Note
The power button is found on the front panel of the appliance, behind the
bezel.
3-5
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
3-6
Installing the Appliance
3-7
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
6. Click Accept.
3-8
Installing the Appliance
7. Select the disk on which to install the Deep Discovery Analyzer software.
8. Click Continue.
3-9
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
9. Click Continue.
WARNING!
Installation involves repartitioning of the disks. All data on the disks are
lost.
3-10
Installing the Appliance
Note
It is recommended that you configure iDRAC (Integrated Dell Remote
Access) on the appliance to allow remote system management and
troubleshooting.
3-11
Chapter 4
4-1
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
The following table describes the tasks you can perform on the
preconfiguration console.
4-2
Using the Preconfiguration Console
Task Procedure
Configuring network addresses Specify the appliance IP address, subnet mask, gateway,
for the appliance and DNS. For details, see Configuring Network Addresses
on the Preconfiguration Console on page 4-5.
Viewing high availability details View the active and passive appliance host names, IP
addresses, and sync status.
Note
High availability cannot be configured on the
preconfiguration console. Use the management
console to configure high availability. For details
see the High Availability Tab and Cluster Tab topics
in the Deep Discovery Analyzer Administrator’s
Guide.
Pinging a remote host Type a valid IP address or FQDN and click Ping.
Changing the preconfiguration Type the old password and type the new password twice;
console password then, select Save.
Collecting and uploading debug Collect debug logs from Deep Discovery Analyzer and
logs upload debug logs to the SFTP server.
4-3
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Task Procedure
Powering off On the Main Menu, select Power off, and press ENTER.
On the next screen, select OK and press ENTER.
Logging off On the Main Menu, select Log off, and press ENTER.
On the next screen, select OK and press ENTER.
Important
Disable scroll lock (using the SCROLL LOCK key on the keyboard) to perform
the following operations.
Note
An alternative way of moving to an item is by typing the item
number.
Left and Right Move between buttons. Buttons are enclosed in angle brackets <>.
arrows
Move between characters in a text box.
4-4
Using the Preconfiguration Console
TAB Move between screen sections, where one section requires using a
combination of arrow keys (Up, Down, Left, and Right keys).
Procedure
1. Type valid logon credentials. The default credentials are:
• User name: admin
• Password: Admin1234!
Note
None of the characters you type appear on the screen.
This password is the same as the password used to log on to the web-based
management console. For more information, see Logon Credentials on page
2-13.
4-5
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
4-6
Using the Preconfiguration Console
Item Guidelines
Note
Changing the IP address changes the management console URL.
The Main Menu screen appears after the settings are successfully saved.
4-7
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Note
On a passive primary appliance, this screen can be used to detach the appliance
from the cluster.
Procedure
1. Type valid logon credentials. The default credentials are:
• User name: admin
• Password: Admin1234!
Note
None of the characters you type appear on the screen.
This password is the same as the password used to log on to the web-based
management console. For more information, see Logon Credentials on page
2-13.
4-8
Using the Preconfiguration Console
4-9
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
The following table shows the on-screen labels and high availability
configuration details.
Table 4-1. High Availability Screen
Label Detail
IPv4 virtual address IPv4 virtual address of the active primary appliance.
IPv6 virtual address IPv6 virtual address of the active primary appliance.
Note
Detaching the passive primary appliance disables high availability.
Procedure
4-10
Using the Preconfiguration Console
• Password: Admin1234!
Note
None of the characters you type appear on the screen.
This password is the same as the password used to log on to the web-based
management console. For more information, see Logon Credentials on page
2-13.
4-11
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
3. Press TAB to navigate to the interface that you want to use as the
management port, and then press ENTER.
Note
• The port list includes the default management port eth0.
• If eth0 is in a NIC team and you select eth0 as the management port,
the NIC team is automatically disabled.
4-12
Chapter 5
5-1
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Note
After applying the firmware update on hardware models 1100 and 1200, Deep
Discovery Analyzer automatically migrates the settings of a Deep Discovery
Analyzer 6.8 and 6.9 installation to 7.0.
You can upgrade the firmware on Deep Discovery Analyzer using one of the
following methods:
Important
If you have multiple Deep Discovery Analyzer appliances deployed and
configured to form a cluster, see the migration tasks in Upgrading Firmware on
Appliances in a Cluster on page 5-4.
Note
Ensure that you have finished all management console tasks before proceeding.
The upgrade process may take some time to complete.
5-2
Upgrading Deep Discovery Analyzer
Procedure
http://downloadcenter.trendmicro.com
b. Click Export.
5. Click Choose File or Browse, and then select the firmware upgrade file.
6. Click Install.
Important
Do not close or refresh the browser, navigate to another page, perform
tasks on the management console, or power off the appliance until
updating is complete.
7. Clear the browser cache before you access the management console.
5-3
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Cluster
Tasks
Configuration
5-4
Chapter 6
Technical Support
Learn about the following topics:
• Troubleshooting Resources on page 6-2
• Contacting Trend Micro on page 6-3
• Sending Suspicious Content to Trend Micro on page 6-4
• Other Resources on page 6-5
6-1
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Troubleshooting Resources
Before contacting technical support, consider visiting the following Trend
Micro online resources.
Procedure
1. Go to https://success.trendmicro.com.
2. Select from the available products or click the appropriate button to
search for solutions.
3. Use the Search Support box to search for available solutions.
4. If no solution is found, click Contact Support and select the type of
support needed.
Tip
To submit a support case online, visit the following URL:
https://success.trendmicro.com/smb-new-request
Threat Encyclopedia
Most malware today consists of blended threats, which combine two or more
technologies, to bypass computer security protocols. Trend Micro combats
this complex malware with products that create a custom defense strategy.
6-2
Technical Support
Go to https://www.trendmicro.com/vinfo/us/threat-encyclopedia/#malware
to learn more about:
• Malware and malicious mobile code currently active or "in the wild"
Website https://www.trendmicro.com
https://www.trendmicro.com/us/about-us/contact/index.html
6-3
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
https://docs.trendmicro.com
6-4
Technical Support
https://success.trendmicro.com/solution/1112106
Other Resources
In addition to solutions and support, there are many other helpful resources
available online to stay up to date, learn about innovations, and be aware of
the latest security trends.
Download Center
From time to time, Trend Micro may release a patch for a reported known
issue or an upgrade that applies to a specific product or service. To find out
whether any patches are available, go to:
https://www.trendmicro.com/download/
6-5
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
If a patch has not been applied (patches are dated), open the Readme file to
determine whether it is relevant to your environment. The Readme file also
contains installation instructions.
Documentation Feedback
Trend Micro always seeks to improve its documentation. If you have
questions, comments, or suggestions about this or any Trend Micro
document, please go to the following site:
https://docs.trendmicro.com/en-us/survey.aspx
6-6
Appendix A
Appendices
This section includes the following topics:
• The Management Console on page A-2
• Getting Started Tasks on page A-8
• Resetting the Administrator Password on page A-39
A-1
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Note
Make sure Javascript is enabled in the web browser.
To log on, open a browser window and type the following URL:
https://<Appliance IP Address>/pages/login.php
You can log on to the Deep Discovery Analyzer management console using
one of the following methods:
• Logging On Using Local Accounts on page A-2
• Logging On With Single Sign-On on page A-8
Procedure
1. On the Log On screen, type the logon credentials (user name and
password) for the management console.
Use the default administrator logon credentials when logging on for the
first time:
A-2
Appendices
• Password: Admin1234!
Note
Depending on your account, provide one of the following information in
the User name field:
• User name
• UPN
• Email address
4. If this is the first time you log on, change the account password before
you can access the management console.
Accounts Tab
Use the Accounts tab to create and manage user accounts.
Note
A-3
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Procedure
1. Go to Administration > Accounts / Contacts.
2. Click the Accounts tab.
3. Use the following options to manage user accounts:
• To add a new user account, click Add .
The Add Account window opens. For details, see Configuring User
Accounts on page A-5.
• To delete an account, select one or more user accounts and click
Delete.
Important
A-4
Appendices
• Select an account type from the Type drop down to show only the
accounts for a specific type.
• Click the Name column to sort names alphabetically.
• Type a few characters in the Search text box to narrow down the
entries. As you type, the entries that match the characters you typed
are displayed. Deep Discovery Analyzer searches all cells in the
current page for matches.
• The panel at the bottom of the screen shows the total number of
user accounts. If all user accounts cannot be displayed at the same
time, use the pagination controls to view the accounts that are
hidden from view.
Procedure
1. Go to Administration > Accounts / Contacts, and then go to the
Account tab.
2. Do one of the following:
• Click Add to create a new user account.
• Click the name of an existing user account to change the account
settings.
3. To add a local account, select Local user as the account Type and
provide the following details.
• Name: Name of the account owner.
• User name: User name supports a maximum of 40 characters.
Note
The user name is case insensitive for new account creation and
management console logon process.
A-5
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Note
Note
If a new local user account is used to log into the management console for
the first time, the system will prompt the user to change the account
password.
Note
To quickly locate a specific user name or group, type a few characters
in the text box and click Search.
A-6
Appendices
Note
Note
Contacts receive email alert notifications by default.
• Email address
8. Click Save.
A-7
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Procedure
1. On the Log On screen, select a service name from the drop-down list.
2. Click Single Sign-on (SSO).
The system automatically navigates to the logon page for your
organization.
3. Follow the on-screen instructions and provide your account credentials
to access the Deep Discovery Analyzer management console.
Procedure
1. Activate the product license using a valid Activation Code. For details,
see License on page A-10.
2. Specify the Deep Discovery Analyzer host name and IP address. For
details, see Network Tab on page A-12.
3. Configure proxy settings if Deep Discovery Analyzer connects to the
management network or Internet through a proxy server. For details,
see Proxy Tab on page A-14.
4. Configure date and time settings to ensure that Deep Discovery Analyzer
features operate as intended. For details, see Time Tab on page A-16.
A-8
Appendices
A-9
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
License
Use the License screen, in Administration > License, to view, activate, and
renew the Deep Discovery Analyzer license.
After the first year, Maintenance must be renewed on an annual basis at the
current Trend Micro rate.
A-10
Appendices
Field Details
License agreement Displays a link to the Trend Micro License Agreement. Click the link
to view or print the license agreement.
A-11
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Field Details
Activation Code View the Activation Code in this section. If your license has expired,
obtain a new Activation Code from Trend Micro. To renew the license,
click New Activation Code, and type the new Activation Code.
Expiration date View the expiration date of the license. Renew the license before it
expires.
Network Tab
Use this screen to configure the host name, the IPv4 and IPv6 addresses of
the Deep Discovery Analyzer appliance, and other network settings
(including TLS 1.2 enforcement).
A-12
Appendices
Note
You can also use the Preconfiguration Console to modify the network settings.
For details, see the Configuring Network Addresses on the Preconfiguration Console
on page 4-5.
Note
To be compliant with the Payment Card Industry Data Security Standard (PCI-
DSS) v3.2, the appliance should use only TLS 1.2 for all inbound and outbound
connections.
Ensure that the integrated products and services are using the latest version
that supports TLS 1.2. For details, see the Deep Discovery Analyzer
Adminstrator's Guide.
Verify that the following products/services are configured to use TLS 1.2.
• The ActiveUpdate server source at Administration > Updates >
Component Update Settings must use HTTPS.
• The ICAP settings at Administration > Integrated Products/Services >
ICAP must use ICAP over SSL.
• The syslog servers at Administration > Integrated Products/Services >
Syslog must use SSL.
• The SMTP server at Administration > System Settings > SMTP must use
SSL/TLS or STARTTLS.
A-13
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Field Limitation
Proxy Tab
Specify proxy settings if Deep Discovery Analyzer connects to the Internet or
management network through a proxy server.
A-14
Appendices
Task Steps
Server name or IP Type the proxy server host name or IPv4 address, or IPv6 address.
address
The management console does not support host names with double-
byte encoded characters. If the host name includes such characters,
type its IP address instead.
Port Type the port number that Deep Discovery Analyzer uses to connect to
the proxy server.
Proxy server requires Select this option if the connection to the proxy server requires
authentication authentication. Deep Discovery Analyzer supports the following
authentication methods:
• No authentication
• Basic authentication
• Digest authentication
• NTLMv1 authentication
Note
This option is only available if Proxy server requires
authentication is enabled.
Note
This option is only available if Proxy server requires
authentication is enabled.
A-15
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Time Tab
Configure date and time settings immediately after installation.
Procedure
A-16
Appendices
• Select Connect to an NTP server and type the host name, IPv4
address, or IPv6 address of the NTP server.
• Select Set manually and configure the time.
4. Click Save.
5. Click Set time zone.
The settings panel appears.
Note
Daylight Saving Time (DST) is used when applicable.
7. Click Save.
8. Click Set format.
The settings panel appears.
A-17
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
SMTP Tab
Deep Discovery Analyzer uses SMTP settings when sending notifications
through email.
Procedure
1. Go to Administration > System Settings and click the SMTP tab.
2. Specify the following details:
A-18
Appendices
Field Steps
Server address Type the SMTP server host name, IPv4 address, or IPv6 address.
The management console does not support host names with
double-byte encoded characters. If the host name includes such
characters, type its IP address instead.
Connection security Specify the type of security used for the connection.
Available values are: None, STARTTLS, SSL/TLS.
SMTP server If the server requires authentication, select SMTP server requires
requires authentication and specify a user name and password.
authentication
WARNING!
Ensure that the user name and password to be specified is
valid for the SMTP server. Connections made using an
incorrect user name and password may cause some SMTP
servers to reject all network request originating from the
Deep Discovery Analyzer server.
c. Click OK.
Note
Deep Discovery Analyzer does not send a test email message to the
recipient.
A-19
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
4. Click Save.
Images Tab
Virtual Analyzer does not contain any images by default. To analyze samples,
you must prepare and import at least one image in the Open Virtual
Appliance (OVA) format.
You can use existing VirtualBox or VMware images, or create new images
using VirtualBox. For details, see Chapters 2 and 3 of the Virtual Analyzer
Image Preparation User's Guide at http://docs.trendmicro.com/en-us/
enterprise/virtual-analyzer-image-preparation.aspx.
Before importing, validate and configure images using the Virtual Analyzer
Image Preparation Tool. For details, see Chapter 4 of the Virtual Analyzer
Image Preparation User's Guide.
The following table describes the tasks that you can perform on the Images
screen.
Task Description
A-20
Appendices
Task Description
Importing an Image
You can import up to four images (one Linux and three Windows images).
The hardware specifications of your product determine the number of
images that you can import and the number of instances that you can deploy
per image.
Important
Virtual Analyzer stops analysis and keeps all samples in the queue whenever an
image is added or deleted, or when instances are modified.
Procedure
2. Click Import.
A-21
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Note
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the Images
tab.
2. Click Import.
3. Select a Platform option.
4. For Source, select Image import tool.
5. Click Download to download the image import tool.
6. Open the file VirtualAnalyzerImageImportTool.exe.
7. Type the IP address for Deep Discovery Analyzer.
A-22
Appendices
Procedure
1. Go to Virtual Analyzer > Sandbox Management and click the Network
Connection tab.
The Network Connection screen appears.
2. Select Enable external connections.
A-23
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Important
Trend Micro recommends using an environment isolated from the
management network.
WARNING!
Enabling connections to the management network may result in
malware propagation and other malicious activity in the network.
A-24
Appendices
Cluster Tab
Multiple standalone Deep Discovery Analyzer appliances can be deployed
and configured to form a cluster that provides fault tolerance, improved
performance, or a combination thereof.
Depending on your requirements and the number of Deep Discovery
Analyzer appliances available, you may deploy the following cluster
configurations:
A-25
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Cluster
Description
Configuration
High availability cluster In a high availability cluster, one appliance acts as the active
primary appliance, and one acts as the passive primary appliance.
The passive primary appliance automatically takes over as the new
active primary appliance if the active primary appliance
encounters an error and is unable to recover.
High availability cluster In a high availability cluster with load balancing, one appliance
with load balancing acts as the active primary appliance, one acts as the passive
primary appliance, and any additional appliances act as secondary
appliances. The passive primary appliance takes over as the active
primary appliance if the active primary appliance encounters an
error and is unable to recover. The secondary appliances process
submissions allocated by the active primary appliance for
performance improvement.
The following table lists the available configuration modes and associated
appliance behavior.
Table A-7. Cluster Configuration Modes
Configuration
Description
Mode
A-26
Appendices
Configuration
Description
Mode
A-27
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Configuration
Description
Mode
A-28
Appendices
Nodes List
The Nodes list is displayed on the active primary appliance.
Column Description
Last Connected Date and time that the appliance last connected to the active primary
appliance.
Note
No data (indicated by a dash) if the appliance is a passive
primary appliance.
A-29
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Column Description
Tip
This field also displays the connection latency and
throughput information.
Action Actions that can be executed depending on the appliance mode and
status.
• For active primary appliance:
• Swap: Swap the roles of the primary appliances. Sets the
current passive primary appliance to primary mode (active)
and the current active primary appliance to primary mode
(passive). Appears when the passive primary appliance has
synced all settings from the active primary appliance. For
details, see Swapping the Active Primary Appliance and the
Passive Primary Appliance on page A-33
• For passive primary appliance:
A-30
Appendices
Column Description
• Detach: Detach the passive primary appliance. Disables high
availability and allows the passive primary appliance to be
used as a standalone appliance. Appears when the passive
primary appliance has synced all settings from the active
primary appliance. For details, see Detaching the Passive
Primary Appliance from the Cluster on page A-34
• Remove: Remove inaccessible passive primary appliance.
Disables high availability. Appears when the active primary
appliance is unable to reach the passive primary appliance
through eth3. For details, see Removing the Passive Primary
Appliance from the Cluster on page A-34
• For secondary appliances:
• Remove: Remove inaccessible secondary appliance. Affects
object processing capacity. Secondary appliances attempt to
connect to the active primary appliance every 10 seconds.
Appears when the active primary appliance does not receive
a heartbeat from the secondary appliance within one
minute. For details, see Removing a Secondary Appliance
from the Cluster on page A-37
Requirement Description
A-31
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Requirement Description
Note
• If your network has Trend Micro Apex Central, only register the active
primary appliance to Apex Central.
Procedure
A-32
Appendices
Important
While the appliance is syncing, it cannot:
• Take over as active primary appliance
• Switch to another mode
Procedure
1. On the management console of the active primary appliance, go to
Administration > System Settings and click the Cluster tab.
A-33
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Important
Detaching the passive primary appliance does not reset the appliance settings.
Trend Micro recommends reinstalling the appliance if you want to use it as a
standalone appliance.
Procedure
1. On the management console of the active primary appliance, go to
Administration > System Settings and click the Cluster tab.
2. Click Detach to detach the passive primary appliance from the cluster.
Procedure
1. On the management console of the active primary appliance, go to
Administration > System Settings and click the Cluster tab.
2. Wait for Remove to appear next to the passive primary appliance in the
nodes list.
3. Click Remove to remove the passive primary appliance from the cluster.
A-34
Appendices
Note
The passive primary appliance automatically rejoins the cluster if it
reconnects to the active primary appliance.
To view the appliance firmware, hotfix, and patch version, see the Deep
Discovery Analyzer Administrator's Guide.
Note
• If your network has Trend Micro Apex Central, only register the active
primary appliance to Apex Central.
Procedure
A-35
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Note
If you are using high availability, type the IPv4 virtual address or IPv6
virtual address.
Tip
Secondary appliances can test their connection to the active primary
appliance at any time. Click Test Connection to get detailed
information about any connectivity problems.
f. Click Save.
Note
Trend Micro recommends using the external network connection
setting of the active primary appliance.
d. Add accounts.
A-36
Appendices
Note
Secondary appliances automatically deploy sandbox instances based on the
sandbox allocation ratio of the active primary appliance. The following table
lists a configuration example:
Table A-10. Example Configuration Using Two Images
Procedure
1. On the management console of the active primary appliance, go to
Administration > System Settings and click the Cluster tab.
2. Wait for Remove to appear next to the secondary appliance in the nodes
list.
Note
Secondary appliances attempt to connect to the active primary appliance
every 10 seconds. If the active primary appliance does not receive a
heartbeat within one minute, Remove appears next to the secondary
appliance in the Nodes list.
Secondary appliances automatically rejoin the cluster if they reconnect to
the active primary appliance.
A-37
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Tip
Trend Micro recommends deployment of a passive primary appliance for high
availability. For details, see Adding a Passive Primary Appliance to the Cluster on
page A-31.
Important
Submissions do not have a result if they were being analyzed on the active
primary appliance when it becomes unresponsive.
Procedure
1. Power off the active primary appliance.
2. Select a secondary appliance from the same cluster and configure it as
the new active primary appliance.
a. On the management console of the secondary appliance, go to
Administration > System Settings and click the Cluster tab.
b. Select Primary mode (active).
c. Click Save.
3. Configure the IP address of the new active primary appliance.
For details, see Network Tab on page A-12.
A-38
Appendices
Note
Trend Micro recommends using the same IP address as the original active
primary appliance. This allows secondary appliances and integrated
products to connect without reconfiguration.
Note
Settings take up to one day to propagate to secondary appliances.
Procedure
1. On the front of your Deep Discovery Analyzer appliance, pull out the
information tag and copy the last 5 alphanumeric characters of the
service tag.
2. Verify that the Deep Discovery Analyzer appliance is powered on.
3. Connect the serial port on your computer to the serial port on the rear
panel of the Deep Discovery Analyzer appliance.
4. In Control Manager, identify the communication port number (for
example, COM1) for the serial connection.
A-39
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
Parameter Setting
Data bits 8
Stop bits 1
Parity None
6. Press ENTER.
Note
For information on using the preconfiguration console, see
Preconfiguration Console Basic Operations on page 4-4.
7. If you are already logged into the preconfiguration console, select Log
Off and press ENTER.
A-40
Appendices
A-41
Index
A getting started tasks, A-8
account, A-5
Active Directory, A-5 I
add, A-5 ICAP, 1-7
change password, A-5 ICAP integration, 1-7
edit, A-5 image import tool, A-22
local, A-5 images, A-20–A-22
account management, A-3 import image, A-22
Activation Code, A-10 installation tasks, 3-2
add account, A-5 Internet Content Adaptation Protocol
(ICAP), 1-7
C
IP addresses (for product), 2-11
change password, A-5
configuration L
management console, A-2 license, A-10
custom network, 2-9
custom port, 2-11 M
management console, A-2
D management console accounts, A-3
deployment tasks management network, 2-9
hardware setup, 3-2
management port, 2-11
installation, 3-7
documentation feedback, 6-6 N
Download Center, 5-2, 5-3 network environment, 2-9
E P
edit account, A-5 port, 2-11
Ethernet cables, 2-12 ports, 2-14
F power supply, 3-2
firmware upgrade, 5-2, 5-4 preconfiguration console, 4-2
form factor, 2-2 operations, 4-4
product specifications, 2-2
G
getting started R
management console, A-2 reset administrator password, A-39
IN-1
Deep Discovery Analyzer 7.0 Installation and Deployment Guide
S
sandbox images, A-20–A-22
sandbox management
images, A-20
importing, A-21, A-22
network connection, A-23
support
resolve issues faster, 6-4
system maintenance
cluster tab
primary appliance, A-38
remove, A-37
secondary appliance, A-35,
A-37, A-38
test connection, A-35
nodes list, A-29
system settings
Network Tab, A-12
Proxy Tab, A-14
Time Tab, A-16
U
upgrade, 5-2, 5-4
upgrading firmware, 5-2, 5-4
V
Virtual Analyzer
image import tool, A-22
import image, A-21, A-22
IN-2