|
|
|
- Jared Lang
- 10 years ago
- Views:
Transcription
1
2 Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: Trend Micro, the Trend Micro t-ball logo, and Control Manager are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright Trend Micro Incorporated. All rights reserved. Document Part No.: APEM56312/ Release Date: April 2014 Protected by U.S. Patent No.: Patents pending.
3 This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product. Detailed information about how to use specific features within the product may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Evaluate this documentation on the following site:
4
5 Table of Contents Preface Preface... v Documentation... vi Audience... vii Document Conventions... vii Terminology... viii About Trend Micro... ix Chapter 1: Introduction About Deep Discovery Analyzer New in this Release Chapter 2: Deploying Deep Discovery Analyzer Deployment Overview Product Specifications Recommended Network Environment Network Settings Deployment Requirements and Checklists Items to Obtain from Trend Micro Items to Prepare Logon Credentials Ports Used by Deep Discovery Analyzer Deployment Tasks Setting Up the Hardware Installing Deep Discovery Analyzer Chapter 3: Getting Started The Preconfiguration Console Preconfiguration Console Basic Operations i
6 Deep Discovery Analyzer 5.0 Administrator's Guide Configuring Network Addresses on the Preconfiguration Console The Management Console Management Console Navigation Getting Started Tasks Integration with Trend Micro Products and Services For Sandbox Analysis For C&C List For Updates Chapter 4: Dashboard Dashboard Overview Tabs Tab Tasks New Tab Window Widgets Widget Tasks Virtual Analyzer Widgets Submissions Over Time Virtual Analyzer Summary Suspicious Objects Added Chapter 5: Virtual Analyzer Virtual Analyzer Submissions Submissions Tasks Submitting Samples Detailed Information Screen Manually Submitting Samples Suspicious Objects Suspicious Objects Tasks Exceptions Exceptions Tasks ii
7 Table of Contents Sandbox Management Status Tab Network Connection Tab Images Tab Archive File Passwords Chapter 6: Reports Reports Generated Reports Report Settings Chapter 7: Administration Updates Components Update Settings Product Updates System Settings Host Name and IP Address Tab Proxy Settings Tab SMTP Settings Tab Date and Time Tab Password Policy Tab Session Timeout Tab Power Off / Restart Tab Log Settings Configuring Syslog Settings Account Management Add User Window Contact Management Add Contact Window Tools Manual Submission Tool Licensing About Deep Discovery Analyzer iii
8 Deep Discovery Analyzer 5.0 Administrator's Guide Chapter 8: Technical Support Troubleshooting Resources Trend Community Using the Support Portal Security Intelligence Community Threat Encyclopedia Contacting Trend Micro Speeding Up the Support Call Sending Suspicious Content to Trend Micro File Reputation Services Reputation Services Web Reputation Services Other Resources TrendEdge Download Center TrendLabs Appendix A: Additional Resources Creating a Custom Virtual Analyzer Image... A-2 Downloading and Installing VirtualBox... A-2 Preparing the Operating System Installer... A-3 Creating a Custom Virtual Analyzer Image... A-4 Installing the Required Software on the Image... A-16 Modifying the Image Environment... A-18 Packaging the Image as an OVA File... A-24 Importing the OVA File Into Deep Discovery Analyzer... A-28 Troubleshooting... A-28 Categories of Notable Characteristics... A-29 Deep Discovery Inspector Rules... A-36 Index Index... IN-1 iv
9 Preface Preface Welcome to the Deep Discovery Analyzer Administrator s Guide. This guide contains information about product settings and service levels. v
10 Deep Discovery Analyzer 5.0 Administrator's Guide Documentation The documentation set for Deep Discovery Analyzer includes the following: TABLE 1. Product Documentation DOCUMENT Administrator's Guide Quick Start Guide Readme Online Help Support Portal DESCRIPTION PDF documentation provided with the product or downloadable from the Trend Micro website. The Administrator s Guide contains detailed instructions on how to configure and manage Deep Discovery Analyzer, and explanations on Deep Discovery Analyzer concepts and features. The Quick Start Guide provides user-friendly instructions on connecting Deep Discovery Analyzer to your network and on performing the initial configuration. The Readme contains late-breaking product information that is not found in the online or printed documentation. Topics include a description of new features, known issues, and product release history. Web-based documentation that is accessible from the Deep Discovery Analyzer management console. The Online Help contains explanations of Deep Discovery Analyzer components and features, as well as procedures needed to configure Deep Discovery Analyzer. The Support Portal is an online database of problemsolving and troubleshooting information. It provides the latest information about known product issues. To access the Support Portal, go to the following website: View and download product documentation from the Trend Micro Documentation Center: vi
11 Preface Audience The Deep Discovery Analyzer documentation is written for IT administrators and security analysts. The documentation assumes that the reader has an in-depth knowledge of networking and information security, including the following topics: Network topologies Database management Antivirus and content security protection The documentation does not assume the reader has any knowledge of sandbox environments or threat event correlation. Document Conventions The documentation uses the following conventions: TABLE 2. Document Conventions CONVENTION UPPER CASE Bold Italics Monospace Navigation > Path Note DESCRIPTION Acronyms, abbreviations, and names of certain commands and keys on the keyboard Menus and menu commands, command buttons, tabs, and options References to other documents Sample command lines, program code, web URLs, file names, and program output The navigation path to reach a particular screen For example, File > Save means, click File and then click Save on the interface Configuration notes vii
12 Deep Discovery Analyzer 5.0 Administrator's Guide Tip CONVENTION DESCRIPTION Recommendations or suggestions Important Information regarding required or default configuration settings and product limitations WARNING! Critical actions and configuration options Terminology TERMINOLOGY ActiveUpdate Administrator Custom port Dashboard Management console Management port Sandbox image Sandbox instance DESCRIPTION A component update source managed by Trend Micro. ActiveUpdate provides up-to-date downloads of virus pattern files, scan engines, program, and other Trend Micro component files through the Internet. The person managing Deep Discovery Analyzer A hardware port that connects Deep Discovery Analyzer to an isolated network dedicated to sandbox analysis UI screen on which widgets are displayed A web-based user interface for managing a product. A hardware port that connects to the management network. A ready-to- use software package (operating system with applications) that require no configuration or installation. Virtual Analyzer supports only image files in the Open Virtual Appliance (OVA) format. A single virtual machine based on a sandbox image. viii
13 Preface TERMINOLOGY Threat Connect Virtual Analyzer Widget DESCRIPTION A Trend Micro service that correlates suspicious objects in your environment and threat data from the Trend Micro Smart Protection Network. By providing ondemand access to Trend Micro intelligence databases, Threat Connect enables you to identify and investigate potential threats to your environment. A secure virtual environment used to manage and analyze samples submitted by Trend Micro products. Sandbox images allow observation of file and network behavior in a natural setting. A customizable screen to view targeted, selected data sets. About Trend Micro As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With over 20 years of experience, Trend Micro provides top-ranked client, server, and cloud-based solutions that stop threats faster and protect data in physical, virtual, and cloud environments. As new threats and vulnerabilities emerge, Trend Micro remains committed to helping customers secure data, ensure compliance, reduce costs, and safeguard business integrity. For more information, visit: Trend Micro and the Trend Micro t-ball logo are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies. ix
14
15 Chapter 1 Introduction This chapter introduces Trend Micro Deep Discovery Analyzer 5.0 and the new features in this release. 1-1
16 Deep Discovery Analyzer 5.0 Administrator's Guide About Deep Discovery Analyzer Trend Micro Deep Discovery Analyzer is an open, scalable sandboxing analysis platform that provides on-premise, on-demand analysis of file and URL samples. Deep Discovery Analyzer supports out-of-the-box integration with Trend Micro products such as InterScan Messaging Security, InterScan Web Security, ScanMail for Microsoft Exchange, ScanMail for IBM Domino, and Deep Discovery Inspector. The Deep Discovery Analyzer also processes samples manually submitted by threat researchers and incident response professionals. An open Web Services Interface enables any product or process to submit samples and obtain detailed results in a timely manner. Custom sandboxing supports environments that precisely match target desktop software configurations resulting in more accurate detections and fewer false positives. New in this Release TABLE 1-1. New in Deep Discovery Analyzer 5.0 FEATURE/ ENHANCEMENT Scalable sandboxing services Custom sandboxing Broad file analysis range DETAILS Optimized performance across an array of sandbox instances enables keeping pace with , network, endpoint, and other sample sources. Deep Discovery Analyzer conducts sample simulation and analysis using environments that precisely match your desktop operating system and application configurations. Deep Discovery Analyzer examines samples using multiple detection engines as well as dynamic analysis methods. Supported file types include a wide range of Windows executable files, Microsoft Office and Adobe PDF documents, web content, and archive files. 1-2
17 Introduction FEATURE/ ENHANCEMENT Advanced and file analysis Detailed reporting Open IOC intelligence sharing DETAILS Deep Discovery Analyzer analyzes URL references using web reputation, page analysis, and web sandboxing. Heuristics and customer-supplied keywords are used when decompressing files. Deep Discovery Analyzer provides full analysis results that include detailed sample activities and C&C communications. The results are also available from the central dashboard and are included in reports. Deep Discovery Analyzer automatically shares new detection intelligence including C&C and other IOC information with other security products. 1-3
18
19 Chapter 2 Deploying Deep Discovery Analyzer This chapter discusses the tasks you need to perform to successfully deploy Deep Discovery Analyzer and connect it to your network. If Deep Discovery Analyzer has already been deployed on your network and you have a patch, service pack, or hotfix to apply to it, refer to Product Updates on page 7-4 for detailed information about how to apply the update. 2-1
20 Deep Discovery Analyzer 5.0 Administrator's Guide Deployment Overview Product Specifications The standard Deep Discovery Analyzer appliance has the following specifications. FEATURE Rack size Availability Storage size 2U 19-inch standard rack Raid 5 configuration 2 TB free storage SPECIFICATIONS Connectivity Network: 2 x 1 GB/100/10Base copper Management: 1 x 1 GB/100/10Base copper Dimensions (WxDxH) Maximum weight Operating temperature Power 48.2 cm (18.98 in) x cm (29.75 in) x 8.73 cm (3.44 in) 32.5kg (71.65lb) 10 C to 35 C at 10% to 80% relative humidity (RH) 750W, VAC 50/60 HZ Contact Trend Micro if the appliance you are using does not meet these hardware specifications. Recommended Network Environment Deep Discovery Analyzer requires connection to a management network, which usually is the organization s intranet. After deployment, administrators can perform configuration tasks from any computer on the management network. Trend Micro Trend Micro recommends using a custom network for sample analysis. Custom networks ideally are connected to the Internet but do not have proxy settings, proxy authentication, and connection restrictions. 2-2
21 Deploying Deep Discovery Analyzer The networks must be independent of each other so that malicious samples in the custom network do not affect hosts in the management network. 2-3
22 Deep Discovery Analyzer 5.0 Administrator's Guide Network Settings Ports are found at the back of the appliance, as shown in the following image. Network interface ports include: Management port (eth0): Connects the appliance to the management network Custom ports (eth1, eth2, eth3): Connect the appliance to isolated networks that are reserved for sandbox analysis Deep Discovery Analyzer requires one available static IP address in the management network. If sandbox instances require Internet connectivity during sample analysis, Trend Micro recommends allocating one extra IP address for Virtual Analyzer. The Sandbox Management > Network Connection screen allows you to specify static or DHCP addresses. For more information, see Enabling External Connections on page Deployment Requirements and Checklists Items to Obtain from Trend Micro 1. Deep Discovery Analyzer appliance 2. Deep Discovery Analyzer installation CD 2-4
23 Deploying Deep Discovery Analyzer 3. Activation Code Items to Prepare REQUIREMENT Monitor and VGA cable USB keyboard USB mouse DETAILS Connects to the VGA port of the appliance Connects to the USB port of the appliance Connects to the USB port of the appliance Ethernet cables One cable connects the management port of the appliance to the management network. One cable connects a custom port to an isolated network that is reserved for sandbox analysis. Internet-enabled computer A computer with the following software installed: Microsoft Internet Explorer 9 or 10, or Mozilla Firefox Adobe Flash 10 or later IP addresses One static IP address in the management network If sandbox instances require Internet connectivity, one extra IP address for Virtual Analyzer 2-5
24 Deep Discovery Analyzer 5.0 Administrator's Guide Logon Credentials CONSOLE PURPOSE DEFAULT CREDENTIALS YOUR INFORMATION Preconfiguratio n console Perform initial configuration tasks. See Configuring Network Addresses on the Preconfiguration Console on page 3-4. Deep Discovery Analyzer login (not configurable ): admin Password: Password: admin Management console Configure product settings View and download reports See The Management Console on page 3-7. User name (not configurable ): admin Password: Admin1234! Password: Other user accounts (configured on the management console, in Administration > Account Management) User account 1: User name: Password: User account 2: User name: Password: Ports Used by Deep Discovery Analyzer The following table shows the ports that are used with Deep Discovery Analyzer and why they are used. 2-6
25 Deploying Deep Discovery Analyzer PORT PROTOCOL FUNCTION PURPOSE 25 TCP Outbound Deep Discovery Analyzer sends reports through SMTP. 53 TCP/UDP Outbound Deep Discovery Analyzer uses this port for DNS resolution. 67 UDP Outbound Deep Discovery Analyzer sends requests to the DHCP server if IP addresses are assigned dynamically. 68 UDP Inbound Deep Discovery Analyzer receives responses from the DHCP server. 80 TCP Inbound and outbound Deep Discovery Analyzer connects to other computers and integrated Trend Micro products and hosted services through this port. In particular, it uses this port to: Update components by connecting to the ActiveUpdate server Connect to the Smart Protection Network when analyzing file samples Receive requests from integrated products to download the C&C list Note The C&C list is a subset of the Suspicious Objects list. 2-7
26 Deep Discovery Analyzer 5.0 Administrator's Guide PORT PROTOCOL FUNCTION PURPOSE 443 TCP Inbound and outbound Deep Discovery Analyzer uses this port to: Receive samples from integrated products for sandbox analysis Access the management console with a computer through HTTPS Receive files from a computer with the Manual Submission Tool Deployment Tasks Procedure 1. Prepare the appliance for installation. For more information. see Setting Up the Hardware on page Install Deep Discovery Analyzer. For more information, see Installing Deep Discovery Analyzer on page Configure the IP address of the appliance on the preconfiguration console. For more information, see Configuring Network Addresses on the Preconfiguration Console on page 3-4. Setting Up the Hardware Procedure 1. Mount the appliance in a standard 19-inch 4-post rack, or on a free-standing object, such as a sturdy desktop. 2-8
27 Deploying Deep Discovery Analyzer Note When mounting the appliance, leave at least two inches of clearance on all sides for proper ventilation and cooling. 2. Connect the appliance to a power source. Deep Discovery Analyzer includes two 750-watt hot-plug power supply units. One acts as the main power supply and the other as a backup. The corresponding AC power slots are located at the back of the appliance, as shown in the following image. 3. Connect the monitor to the VGA port at the back of the appliance. 4. Connect the keyboard and mouse to the USB ports at the back of the appliance. 5. Connect the Ethernet cables to the management and custom ports. Management port: A hardware port that connects Deep Discovery Analyzer to the management network Custom port: A hardware port that connects Deep Discovery Analyzer to an isolated network dedicated to sandbox analysis 6. Power on the appliance. Note The power button is found on the front panel of the appliance, behind the bezel. 2-9
28 Deep Discovery Analyzer 5.0 Administrator's Guide The power-on self-test (POST) screen appears. 7. Insert the CD containing the Deep Discovery Analyzer installation package. 8. Restart the appliance. The POST screen appears. 9. Press F
29 Deploying Deep Discovery Analyzer The Boot Manager screen appears. 10. Under Boot Manager Main Menu, select BIOS Boot Menu and press ENTER. The BIOS Boot Manager screen appears. 11. Select PLDS DVD-ROM DS-8D3SH and press ENTER. 2-11
30 Deep Discovery Analyzer 5.0 Administrator's Guide The Deep Discovery Analyzer Installation screen appears. Installing Deep Discovery Analyzer Procedure 1. On the Deep Discovery Analyzer Installation screen, select 1. Install Appliance and press ENTER. 2-12
31 Deploying Deep Discovery Analyzer The Welcome screen appears. 2. Press F
32 Deep Discovery Analyzer 5.0 Administrator's Guide The installation program checks for available installation media. If installation media is located, the Trend Micro License Agreement screen appears. 3. Click Accept. 2-14
33 Deploying Deep Discovery Analyzer The Select Drive screen appears. 4. Select at least one drive on which the Deep Discovery Analyzer software is to be installed. WARNING! Installation involves repartitioning of the storage device. All data on the device will be lost. 2-15
34 Deep Discovery Analyzer 5.0 Administrator's Guide A confirmation message appears. 5. Click Yes to continue. The program checks if the minimum hardware requirements are met, and then displays the hardware summary screen. 2-16
35 Deploying Deep Discovery Analyzer Note Deep Discovery Analyzer requires at least: 8 GB RAM 400 GB available disk space At least two CPUs One Ethernet network interface card 6. Click Next. The Installation Summary screen appears. 7. Review the installation summary. 2-17
36 Deep Discovery Analyzer 5.0 Administrator's Guide 8. Click Next. WARNING! Installation involves repartitioning of the storage device. All data on the storage device will be lost. You can change the host name, IP address, and date/time settings on the management console after all deployment tasks are completed. If you are unable to access the default IP address , use the preconfiguration console to modify the host name and IP address. A confirmation message appears. 9. Click Continue. The installation program formats the storage device and prepares the environment for installation. Upon completion, the appliance is restarted and the Deep Discovery Analyzer software is installed. 2-18
37 Chapter 3 Getting Started This chapter describes how to get started with Deep Discovery Analyzer and configure initial settings. 3-1
38 Deep Discovery Analyzer 5.0 Administrator's Guide The Preconfiguration Console The preconfiguration console is a Bash-based (Unix shell) interface used to configure network settings and ping remote hosts. The following table describes the tasks performed on the preconfiguration console. TASK PROCEDURE Logging on Type valid logon credentials. The default credentials are: User name: admin Password: admin Configuring network addresses for the appliance Pinging a remote host Specify the appliance IP address, subnet mask, gateway, and DNS. For more information, see Configuring Network Addresses on the Preconfiguration Console on page 3-4 Type a valid IP address or FQDN and click Ping. 3-2
39 Getting Started TASK Changing the preconfiguration console password Logging off PROCEDURE Type the new password twice and click Save. On the Main Menu, click Log off. Preconfiguration Console Basic Operations Use the following keyboard keys to perform basic operations on the preconfiguration console. Important Disable scroll lock (using the Scroll Lock key on the keyboard) to perform the following operations. KEYBOARD KEY Up and Down arrows Move between fields. OPERATION Move between items in a numbered list. Note An alternative way of moving to an item is by typing the item number. Move between text boxes. Left and Right arrows Move between buttons. Buttons are enclosed in angle brackets <>. Move between characters in a text box. 3-3
40 Deep Discovery Analyzer 5.0 Administrator's Guide KEYBOARD KEY Enter OPERATION Click the highlighted item or button. Tab Move between screen sections, where one section requires using a combination of arrow keys (Up, Down, Left, and Right keys). Configuring Network Addresses on the Preconfiguration Console Procedure 1. Type valid logon credentials. The default credentials are: User name: admin Password: admin Note None of the characters you typed will appear on the screen. This password is different from the password used to log on to the web-based management console. For more information, see Deep Discovery Analyzer Logon Credentials on page
41 Getting Started The Main Menu screen appears. 2. Select Configure device IP address and press Enter. The Management Server Static IP Settings screen appears. 3. Specify the following: 3-5
42 Deep Discovery Analyzer 5.0 Administrator's Guide Item IP address Guidelines Must not conflict with the following addresses: Sandbox network: Configured in Virtual Analyzer > Sandbox Management > Network Connection Virtual Analyzer: Broadcast: Multicast: Link local: Class E: Localhost: /8 Note Changing the IP address changes the management console URL. Subnet mask Must not be any of the following addresses: Gateway DNS 1 DNS 2 (Optional) Must be in the same subnet as the IP address Same as IP address Same as IP address 4. Press the Tab key to navigate to Save, and then press Enter. The Main Menu screen appears after the settings are successfully saved. 3-6
43 Getting Started The Management Console Deep Discovery Analyzer provides a built-in management console for configuring and managing the product. Open the management console from any computer on the management network with the following resources: Internet Explorer 9 and 10 Firefox Adobe Flash 10 or later To log on, open a browser window and type the following URL: Discovery Analyzer IP Address>/pages/login.php This opens the logon screen, which shows the following options: 3-7
44 Deep Discovery Analyzer 5.0 Administrator's Guide TABLE 3-1. Management Console Logon Options OPTION User name Password DETAILS Type the logon credentials (user name and password) for the management console. Use the default administrator logon credentials when logging on for the first time: User name: admin Password: Admin1234! Trend Micro recommends changing the password after logging on to the management console for the first time. Configure user accounts to allow other users to access the management console without using the administrator account. For more information, see Account Management on page Session duration Choose how long you would like to be logged on. Default: 10 minutes Extended: 1 day To change these values, navigate to Administration > System Settings and click the Session Timeout tab. Log On Click Log On to log on to the management console. Management Console Navigation The management console consists of the following elements: 3-8
45 Getting Started TABLE 3-2. Management Console Elements Banner SECTION Main Menu Bar Scroll Up and Arrow Buttons Context-sensitive Help DETAILS The management console banner contains: Product logo and name: Click to go to the dashboard. For more information, see Dashboard Overview on page 4-2. Name of the user currently logged on to the management console Log Off link: Click to end the current console session and return to the logon screen. The main menu bar contains several menu items that allow you to configure product settings. For some menu items, such as Dashboard, clicking the item opens the corresponding screen. For other menu items, submenu items appear when you click or mouseover the menu item. Clicking a submenu item opens the corresponding screen. Use the Scroll up option when a screen s content exceeds the available screen space. Next to the Scroll up button is an arrow button that expands or collapses the bar at the bottom of the screen. Use Help to find more information about the screen that is currently displayed. Getting Started Tasks Procedure 1. Activate the product license using a valid Activation Code. For more information, see Licensing on page Specify the Deep Discovery Analyzer host name and IP address. For more information, see Host Name and IP Address Tab on page Configure proxy settings if Deep Discovery Analyzer connects to the management network or Internet through a proxy server. For more information, see Proxy Settings Tab on page
46 Deep Discovery Analyzer 5.0 Administrator's Guide 4. Configure date and time settings to ensure that Deep Discovery Analyzer features operate as intended. For more information, see Date and Time Tab on page Configure SMTP Settings to enable sending of notifications through . For more information, see SMTP Settings Tab on page Import sandbox instances to Virtual Analyzer. For more information, see Importing an Image on page Configure Virtual Analyzer network settings to enable sandbox instances to connect to external destinations. For more information, see Enabling External Connections on page Integration with Trend Micro Products and Services Deep Discovery Analyzer integrates with the Trend Micro products and services listed in the following tables. For Sandbox Analysis Products that can send samples to Deep Discovery Analyzer Virtual Analyzer for sandbox analysis: Note All samples display on the Deep Discovery Analyzer management console, in the Submissions screen (Virtual Analyzer > Submissions). Deep Discovery Analyzer administrators can also manually send samples from this screen. 3-10
47 Getting Started PRODUCT/SUPPORTED VERSIONS Deep Discovery Inspector ScanMail for Microsoft Exchange 11.0 ScanMail for IBM Domino 5.6 InterScan Messaging Security Virtual Appliance (IMSVA) 8.2 Service Pack InterScan Web Security Virtual Appliance (IWSVA) 6.0 INTEGRATION REQUIREMENTS AND TASKS On the management console of the integrating product, go to the appropriate screen (see the product documentation for information on which screen to access) and specify the following information: API key. This is available on the Deep Discovery Analyzer management console, in Administration > About Deep Discovery Analyzer. Deep Discovery Analyzer IP address. If unsure of the IP address, check the URL used to access the Deep Discovery Analyzer management console. The IP address is part of the URL. Deep Discovery Analyzer SSL port 443. This is not configurable. Note Some integrating products require additional configuration to integrate with Deep Discovery Analyzer properly. See the product documentation for more information. For C&C List Products that retrieve the C&C list from Deep Discovery Analyzer Virtual Analyzer: Note Products use the C&C list to detect C&C callback events. The C&C list is a subset of the Suspicous Objects list available in the Deep Discovery Analyzer management console, in Virtual Analyzer > Suspicious Objects. 3-11
48 Deep Discovery Analyzer 5.0 Administrator's Guide PRODUCT/SUPPORTED VERSIONS Deep Discovery Inspector Standalone Smart Protection Server 2.6 with the latest patch OfficeScan Integrated Smart Protection Server 10.6 Service Pack 2 Patch 1 InterScan Web Security Virtual Appliance (IWSVA) 6.0 INTEGRATION REQUIREMENTS AND TASKS On the management console of the integrating product, go to the appropriate screen (see the product documentation for information on which screen to access) and specify the following information: API key. This is available on the Deep Discovery Analyzer management console, in Administration > About Deep Discovery Analyzer. Deep Discovery Analyzer IP address. If unsure of the IP address, check the URL used to access the Deep Discovery Analyzer management console. The IP address is part of the URL. Deep Discovery Analyzer SSL port 443. This is not configurable. Note Some of the integrating products require additional configuration to integrate with Deep Discovery Analyzer properly. See the product documentation for more information. For Updates Services which Deep Discovery Analyzer can use to obtain pattern, engine, and other component updates: SERVICE Trend Micro ActiveUpdate server SUPPORTED VERSIONS Not applicable INTEGRATION REQUIREMENTS AND TASKS Configure the ActiveUpdate server as update source. See Updates on page
49 Chapter 4 Dashboard This chapter describes the Trend Micro Deep Discovery Analyzer dashboard. 4-1
50 Deep Discovery Analyzer 5.0 Administrator's Guide Dashboard Overview Monitor your network integrity with the dashboard. Each management console user account has an independent dashboard. Any changes to a user account s dashboard does not affect other user accounts' dashboards. The dashboard consists of the following user interface elements: Tabs provide a container for widgets. For more information, see Tabs on page 4-3. Widgets represent the core dashboard components. For more information, see Widgets on page 4-4. Note The Add Widget button appears with a star when a new widget is available. Click Play Tab Slide Show to show a dashboard slide show. 4-2
51 Dashboard Tabs Tabs provide a container for widgets. Each tab on the dashboard can hold up to 20 widgets. The dashboard itself supports up to 30 tabs. Tab Tasks The following table lists all the tab-related tasks: TASK Add a tab Edit tab settings Move tab Click the plus icon ( STEPS ) on top of the dashboard. The New Tab window displays. For more information, see New Tab Window on page 4-3. Click Tab Settings. A window similar to the New Tab window opens, where you can edit settings. Use drag-and-drop to change a tab s position. Delete tab Click the delete icon ( ) next to the tab title. Deleting a tab also deletes all the widgets in the tab. New Tab Window The New Tab window opens when you add a new tab in the dashboard. 4-3
52 Deep Discovery Analyzer 5.0 Administrator's Guide This window includes the following options: TABLE 4-1. New Tab Options TASK STEPS Title Layout Type the name of the tab. Choose from the available layouts. Widgets Widgets are the core components of the dashboard. Widgets contain visual charts and graphs that allow you to track threats and associate them with the logs accumulated from one or several log sources. 4-4
53 Dashboard Widget Tasks The following table lists widget-related tasks: TASK Add a widget STEPS Open a tab and then click Add Widgets at the top right corner of the tab. The Add Widgets screen displays. For more information, see Adding Widgets to the Dashboard on page 4-6. Refresh widget data Click the refresh icon ( ). Delete a widget Click the delete icon ( ). This action removes the widget from the tab that contains it, but not from the other tabs that contain it or from the widget list in the Add Widgets screen. Change time period If available, click the dropdown box on top of the widget to change the time period. 4-5
54 Deep Discovery Analyzer 5.0 Administrator's Guide TASK Move a widget Resize a widget STEPS Use drag-and-drop to move a widget to a different location within the tab. To resize a widget, point the cursor to the right edge of the widget. When you see a thick vertical line and an arrow (as shown in the following image), hold and then move the cursor to the left or right. Only widgets on multi-column tabs can be resized. These tabs have any of the following layouts and the highlighted sections contain widgets that can be resized. Adding Widgets to the Dashboard The Add Widgets screen appears when you add widgets from a tab on the dashboard. Do any of the following: 4-6
55 Dashboard Procedure To reduce the widgets that appear, click a category from the left side. To search for a widget, specify the widget name in the search text box at the top. To change the widget count per page, select a number from the Records dropdown menu. To switch between the Detailed and Summary views, click the display icons ( ) at the top right. To select the widget to add the dashboard, select the check box next to the widget's title. To add selected widgets, click Add. Virtual Analyzer Widgets 4-7
56 Deep Discovery Analyzer 5.0 Administrator's Guide Submissions Over Time This widget plots the number of samples submitted to Virtual Analyzer over a period of time. The default time period is Last 24 Hours. Change the time period according to your preference. Click View Submissions to open the Submissions screen and view detailed information. For more information, see Submissions on page
57 Dashboard Virtual Analyzer Summary This widget shows the total number of samples submitted to Virtual Analyzer and how much of these samples have risks. The default time period is Last 24 Hours. Change the time period according to your preference. Click a number to open the Submissions screen and view detailed information. For more information, see Submissions on page
58 Deep Discovery Analyzer 5.0 Administrator's Guide Suspicious Objects Added This widget plots the number of objects (IP addresses, URLs, and SHA-1) added to the suspicious objects list on the current day and on all the previous 30 days. Click View Suspicious Objects to open the Suspicious Objects screen and view detailed information. 4-10
59 Chapter 5 Virtual Analyzer This chapter describes the Virtual Analyzer. 5-1
60 Deep Discovery Analyzer 5.0 Administrator's Guide Virtual Analyzer Virtual Analyzer tracks and analyzes samples submitted by users or other Trend Micro products. It works in conjunction with Threat Connect, the Trend Micro service that correlates suspicious objects in your environment and threat data from the Smart Protection Network. Submissions The Submissions screen, in Virtual Analyzer > Submissions, includes a list of samples processed by Virtual Analyzer. Samples are files and URLs submitted automatically by Trend Micro products or manually by Deep Discovery Analyzer administrators. The Submissions screen organizes samples into the following tabs: Completed: Samples that Virtual Analyzer has analyzed Samples that have gone through the analysis process but do not have analysis results due to errors Processing: Samples that Virtual Analyzer is currently analyzing Queued: Samples that are pending analysis 5-2
61 Virtual Analyzer On the tabs in the screen, check the following columns for basic information about the submitted samples: TABLE 5-1. Submissions Columns COLUMN NAME AND TAB WHERE SHOWN FILE/ MESSAGE SAMPLE INFORMATION URL SAMPLE Risk Level (Completed tab only) Virtual Analyzer performs static analysis and behavior simulation to identify a sample s characteristics. During analysis, Virtual Analyzer rates the characteristics in context and then assigns a risk level to the sample based on the accumulated ratings. Red icon ( ): risk. The sample exhibited highly suspicious characteristics that are commonly associated with malware. Examples: Malware signatures; known exploit code Disabling of security software agents Connection to malicious network destinations Self-replication; infection of other files Dropping or downloading of executable files by documents Orange icon ( ): Medium risk. The sample exhibited moderately suspicious characteristics that are also associated with benign applications. Modification of startup and other important system settings Connection to unknown network destinations; opening of ports 5-3
62 Deep Discovery Analyzer 5.0 Administrator's Guide COLUMN NAME AND TAB WHERE SHOWN INFORMATION FILE/ MESSAGE SAMPLE Unsigned executable files Memory residency Self-deletion URL SAMPLE Yellow icon ( ): Low risk. The sample exhibited mildly suspicious characteristics that are most likely benign. Green icon ( ): No risk. The sample did not exhibit suspicious characteristics. Gray icon ( ): Not analyzed For possible reasons why Virtual Analyzer did not analyze a file, see Table 5-2: Possible Reasons for Analysis Failure on page 5-7. Note If a sample was processed by several instances, the icon for the most severe risk level displays. For example, if the risk level on one instance is yellow and then red on another instance, the red icon displays. Mouseover the icon for more information about the risk level. Completed (Completed tab only) Event Logged (All tabs) Elapsed Time (Processing tab only) Date and time that sample analysis was completed For samples submitted by other Trend Micro products, the date and time the product dispatched the sample For manually submitted samples, the date and time Deep Discovery Analyzer received the sample How much time has passed since processing started 5-4
63 Virtual Analyzer COLUMN NAME AND TAB WHERE SHOWN FILE/ MESSAGE SAMPLE INFORMATION URL SAMPLE Time in Queue (Queued tab only) How much time has passed since Virtual Analyzer added the sample to the queue Source / Sender (All tabs) Destination / Recipient (All tabs) Protocol (Completed tab only) File Name / Subject / URL (All tabs) Where the sample originated IP address for network traffic or address for No data (indicated by a dash) if manually submitted Where the sample is sent IP address for network traffic or address for No data (indicated by a dash) if manually submitted Protocol used for sending the sample, such as SMTP for or HTTP for network traffic Manual Submission if manually submitted File name or subject of the sample N/A N/A N/A URL Note Deep Discovery Analyzer may have normalized the URL. Submitter (Completed tab only) Name of the Trend Micro product that submitted the sample "Manual Submission" 5-5
64 Deep Discovery Analyzer 5.0 Administrator's Guide COLUMN NAME AND TAB WHERE SHOWN FILE/ MESSAGE SAMPLE "Manual Submission" if manually submitted INFORMATION Note URL SAMPLE Trend Micro products currently do not send URLs as samples. Submitter Name / IP (All tabs) Threat Name (Completed tab only) SHA-1 / Message ID (All tabs) Host name or IP address of the Trend Micro product that submitted the sample "Manual Submission" if manually submitted Name of threat as by Trend Micro pattern files and other components Unique identifier for the sample SHA-1 value if the sample is a file Message ID if the sample is an message "Manual Submission" N/A Note Trend Micro products currently do not send URLs as samples. SHA-1 value of the URL If the Risk Level column generates a gray icon ( ), Virtual Analyzer has not analyzed the file. The following table lists possible reasons for analysis failure and identifies actions you can take. 5-6
65 Virtual Analyzer TABLE 5-2. Possible Reasons for Analysis Failure REASON Unsupported file type ACTION To request a list of supported file types, contact Trend Micro support. Note If a file has multiple layers of encrypted compression (for example, encrypted compressed files within a compressed file), Virtual Analyzer will be unable to analyze the file, and displays the "Unsupported File Type" error. Microsoft Office 2007/2010 not installed on the sandbox image Unable to simulate sample on the operating system Unable to extract archive content using the userdefined password list Internal error (with error number) occurred Verify that Microsoft Office 2007 or 2010 has been installed on the sandbox by going to Virtual Analyzer > Sandbox Management. For more information, see Sandbox Management on page Verify that Deep Discovery Analyzer supports the operating system installed on the sandbox image. For more information, see Creating a Custom Virtual Analyzer Image on page A-2. Check the password list in Virtual Analyzer > Sandbox Management > Archive Passwords tab. Please contact your support provider. Submissions Tasks The following table lists all the Suspicious Objects tab tasks: 5-7
66 Deep Discovery Analyzer 5.0 Administrator's Guide TABLE 5-3. Submissions Tasks TASK Submit Samples Detailed Information Screen Data Filters STEPS Click Submit when you are done and then check the status in the Processing or Queued tab. When the sample has been analyzed, it appears in the Completed tab. For more information, see Submitting Samples on page 5-9. To manually submit multiple files at once, use the Manual Submission Tool. See Manually Submitting Samples on page On the Completed tab, click anywhere on a row to view detailed information about the submitted sample. A new section below the row shows the details. For more information, see Detailed Information Screen on page If there are too many entries in the table, limit the entries by performing these tasks: Select a risk level in the Risk level dropdown box. Select a column name in the Search column dropdown box, type some characters in the Search keyword text box next to it, and then press Enter. Deep Discovery Analyzer searches only the selected column in the table for matches. The Time range dropdown box limits the entries according to the specified timeframe. If no timeframe is selected, the default configuration of 24 hours is used. This information only appears on the Completed tab. All timeframes indicate the time used by Deep Discovery Analyzer. 5-8
67 Virtual Analyzer TASK Records and Pagination Controls STEPS The panel at the bottom of the screen shows the total number of samples. If all samples cannot be displayed at the same time, use the pagination controls to view the samples that are hidden from view. Submitting Samples Procedure 1. Go to Virtual Analyzer > Submissions. 2. Click Submit Samples. 5-9
68 Deep Discovery Analyzer 5.0 Administrator's Guide The Submit Samples screen appears. 3. Select a sample type: Sample Type File Single URL URL list Details and Instructions Click Browse and then locate the sample. Type the URL in the text box provided. Prepare a TXT or CSV file with a list of URLs (HTTP or HTTPS) in the first column of the file. When the file is ready, drag and drop the file in the Select file field or click Browse and then locate the file. 4. Click Submit. Note To manually submit multiple files at once, use the Manual Submission Tool. For more information, see Manually Submitting Samples on page
69 Virtual Analyzer Detailed Information Screen On the Completed tab, click anywhere on a row to view detailed information about the submitted sample. A new section below the row shows the details. The following fields are displayed on this screen: 5-11
70 Deep Discovery Analyzer 5.0 Administrator's Guide FIELD NAME FILE/ MESSAGE SAMPLE INFORMATION URL SAMPLE Submission details Basic data fields (such as Logged and FileName) extracted from the raw logs Sample ID (FileHash) The following is a preview of the fields: Child files, if available, contained in or generated from the submitted sample The See full submission log... link that shows all the data fields in the raw logs URL Note Deep Discovery Analyzer may have normalized the URL. Notable characteristics The categories of notable characteristics that the sample exhibits, which can be any or all of the following: Anti-security, self-preservation Autostart or other system reconfiguration Deception, social engineering File drop, download, sharing, or replication Hijack, redirection, or data theft Malformed, defective, or with known malware traits Process, service, or memory object change Rootkit, cloaking Suspicious network or messaging activity Other notable characteristic A number link that, when opened, shows the actual notable characteristics For more information about, see Categories of Notable Characteristics on page A
71 Virtual Analyzer FIELD NAME FILE/ MESSAGE SAMPLE INFORMATION URL SAMPLE Other submission logs A table that shows the following information about other log submissions: Logged Protocol Direction Source IP Source Host Name Destination IP Destination Host Name Reports Links to interactive HTML reports for a particular sample Note An unclickable link means there are errors during simulation. Mouseover the link to view details about the error. Operational Report link: Click this link to view a high-level, summarized report about the sample and the analysis results. Comprehensive reports: Click the Consolidated link to access a detailed report. If there are several environments (sandboxes) used for simulation, the detailed report combines the results from all environments. Investigation package A Download package link to a password-protected investigation package that you can download to perform additional investigations The package includes files in OpenIOC format that describe Indicators of Compromise (IOC) identified on the affected host or network. IOCs help administrators and investigators analyze and interpret threat data in a consistent manner. 5-13
72 Deep Discovery Analyzer 5.0 Administrator's Guide FIELD NAME FILE/ MESSAGE SAMPLE INFORMATION URL SAMPLE Global intelligence A View in Threat Connect link that opens Trend Micro Threat Connect The page contains detailed information about the sample. Manually Submitting Samples The Manual Submission Tool can be used along with Deep Discovery Analyzer to remotely submit samples from locations on users' computers to Virtual Analyzer. This feature allows users to submit multiple samples at once, which will be added to the Virtual Analyzer Submissions queue. Procedure 1. Record the following information to use with the Manual Submission Tool: API key: This is available on the Deep Discovery Analyzer management console, in Administration > About Deep Discovery Analyzer. Deep Discovery Analyzer IP address: If unsure of the IP address, check the URL used to access the Deep Discovery Analyzer management console. The IP address is part of the URL. 2. Download the Manual Submission Tool from the Trend Micro Software Download Center. The tool can be found here: index.php?regs=nabu&clk=latest&clkval=4538&lang_loc=1. Under File Name, click on submission-v zip, and then click Use HTTP Download in the popup window. 5-14
73 Virtual Analyzer 3. Extract the tool package. 4. In the folder where the tool had been extracted to, open config.ini. 5. Next to Host, type the Deep Discovery Analyzer IP address. Next to ApiKey, type the Deep Discovery Analyzer API Key. Save config.ini. 6. Return to the tool package folder, open the work folder, and then place all of the sample files into the indir folder. 7. Run cmd.exe, and change the directory (cd) to the tool package folder. 5-15
74 Deep Discovery Analyzer 5.0 Administrator's Guide 8. Execute dtascli -u to upload all of the files in the work/indir folder to Virtual Analyzer. Tip Execute dtascli -h for help. After executing dtascli -u, cmd.exe shows the following, along with all of the files that were uploaded from the work/indir folder. 9. After uploading the files to Virtual Analyzer, confirm that they are being analyzed in the Management Console. Click Virtual Analyzer > Submissions to locate the files. Shortly after submitting the files, before they have been analyzed, they appear in the Processing or Queued tab. When the samples have been analyzed, they appear in the Completed tab. Suspicious Objects Suspicious objects are known or potentially malicious IP addresses, domains, URLs, and SHA-1 values found during sample analysis. Each object remains in the Suspicious Objects tab for 30 days. 5-16
75 Virtual Analyzer Note The C&C server list obtained by other products from Virtual Analyzer is a subset of the suspicious objects list. Products use the C&C list to detect C&C callback events. The following columns show information about objects added to the suspicious objects list: TABLE 5-4. Suspicious Objects Columns COLUMN NAME Last Found Expiration Risk Level INFORMATION Date and time Virtual Analyzer last found the object in a submitted sample Date and time Virtual Analyzer will remove the object from the Suspicious Objects tab If the suspicious object is: IP address or domain: The risk rating that typically shows is either or Medium (see risk rating descriptions below). This means that high- and medium-risk IP addresses/ domains are treated as suspicious objects. Note An IP address or domain with the Low risk rating is also displayed if it is associated with other potentially malicious activities, such as accessing suspicious host domains. URL: The risk rating that shows is, Medium, or Low. SHA-1 value: The risk rating that shows is always. Risk rating descriptions: : Known malicious or involved in high-risk connections Medium: IP address/domain/url is unknown to reputation service Low: Reputation service indicates previous compromise or spam involvement 5-17
76 Deep Discovery Analyzer 5.0 Administrator's Guide Type Object COLUMN NAME Latest Related Sample All Related Samples INFORMATION IP address, domain, URL, or SHA-1 The IP address, domain, URL, or SHA-1 value SHA-1 value of the sample where the object was last found Clicking the SHA-1 value opens the Submissions screen, with the SHA-1 value as the search criteria. The total number of samples where the object was found Clicking the number shows a pop-up window. In the pop-up window, click the SHA-1 value to open the Submissions screen with the SHA-1 value as the search criteria. Suspicious Objects Tasks The following table lists all the Suspicious Objects tab tasks: TABLE 5-5. Suspicious Objects Tasks TASK Export/Export All Add to Exceptions Never Expire Expire Now STEPS Select one or several objects and then click Export to save the objects to a CSV file. Click Export All to save all the objects to a CSV file. Select one or several objects that you consider harmless and then click Add to Exceptions. The objects move to the Exceptions tab. Select one or several objects that you always want flagged as suspicious and then click Never Expire. Select one or several objects that you want removed from the Suspicious Objects tab and then click Expire Now. When the same object is in the future, it will be added back to the Suspicious Objects tab. 5-18
77 Virtual Analyzer TASK Data Filters STEPS If there are too many entries in the table, limit the entries by performing these tasks: Select an object type in the Show dropdown box. Select a column name in the Search column dropdown box and then type some characters in the Search keyword text box next to it. As you type, the entries that match the characters you typed are displayed. Deep Discovery Analyzer searches only the selected column in the table for matches. Records and Pagination Controls The panel at the bottom of the screen shows the total number of objects. If all objects cannot be displayed at the same time, use the pagination controls to view the objects that are hidden from view. Exceptions Objects in the exceptions list are automatically considered safe and are not added to the suspicious objects list. Manually add trustworthy objects or go to the Virtual Analyzer Suspicious Objects screen and select suspicious objects that you consider harmless. The following columns show information about objects in the exception list. 5-19
78 Deep Discovery Analyzer 5.0 Administrator's Guide TABLE 5-6. Exceptions Columns COLUMN NAME Added Type Suspicious Object Notes INFORMATION Date and time Virtual Analyzer added the object to the Exceptions tab IP address, domain, URL, or SHA-1 The IP address, domain, URL, or SHA-1 value Notes for the object Click the link to edit the notes. Exceptions Tasks The following table lists all the Suspicious Objects tab tasks: 5-20
79 Virtual Analyzer TABLE 5-7. Suspicious Objects Tasks TASK STEPS Add Click Add to add an object. In the new window that opens, configure the following: Type: Select an object type and then type the object (IP address, domain, URL or SHA-1) in the next field. Notes: Type some notes for the object Add More: Click this button to add more objects. Select an object type, type the object in next field, type some notes, and then click Add to List Below. Click Add when you have defined all the objects that you wish to add. Import Click Import to add objects from a properly-formatted CSV file. In the new window that opens: If you are importing exceptions for the first time, click Download sample CSV, save and populate the CSV file with objects (see the instructions in the CSV file), click Browse, and then locate the CSV file. If you have imported exceptions previously, save another copy of the CSV file, populate it with new objects, click Browse, and then locate the CSV file. 5-21
80 Deep Discovery Analyzer 5.0 Administrator's Guide TASK Delete/Delete All Export/Export All Data Filters STEPS Select one or several objects to remove and then click Delete. Click Delete All to delete all objects. Select one or several objects and then click Export to save the objects to a CSV file. Click Export All to save all the objects to a CSV file. If there are too many entries in the table, limit the entries by performing these tasks: Select an object type in the Show dropdown box. Select a column name in the Search column dropdown box and then type some characters in the Search keyword text box next to it. As you type, the entries that match the characters you typed are displayed. Deep Discovery Analyzer searches only the selected column in the table for matches. Records and Pagination Controls The panel at the bottom of the screen shows the total number of objects. If all objects cannot be displayed at the same time, use the pagination controls to view the objects that are hidden from view. Sandbox Management The Sandbox Management screen includes the following: Status Tab on page 5-23 Network Connections Tab on page 5-25 Images Tab on page 5-27 Archive Passwords Tab on page
81 Virtual Analyzer Note If Virtual Analyzer does not contain images, clicking Sandbox Management displays the Import Image screen. Status Tab The Status tab displays the following information: Overall status of Virtual Analyzer, including the number of samples queued and currently processing Virtual Analyzer displays the following: TABLE 5-8. Virtual Analyzer Statuses STATUS Initializing... Starting... Stopping... Running No images DESCRIPTION Virtual Analyzer is preparing the analysis environment. Virtual Analyzer is starting all sandbox instances. Virtual Analyzer is stopping all sandbox instances. Virtual Analyzer is analyzing samples. No images have been imported into Virtual Analyzer. 5-23
82 Deep Discovery Analyzer 5.0 Administrator's Guide STATUS No active images Disabled Modifying instances Importing images Removing images Unrecoverable error DESCRIPTION None of the imported images are currently active.virtual Analyzer is not analyzing samples. Virtual Analyzer is temporarily unavailable. Virtual Analyzer is increasing or decreasing the number of instances for one or more images. Virtual Analyzer is importing one or more images. Virtual Analyzer is removing one or more images. Virtual Analyzer is unable to recover from an error. Contact your support provider for troubleshooting assistance. Status of imported images TABLE 5-9. Image Information STATUS DESCRIPTION Image Instances Current Status Utilization Permanent image name Number of deployed sandbox instances Distribution of idle and busy sandbox instances Overall utilization (expressed as a percentage) based on the number of sandbox instances currently processing samples 5-24
83 Virtual Analyzer Network Connection Tab Use the Network Connection tab to specify how sandbox instances connect to external destinations. External connections are disabled by default. Trend Micro recommends enabling external connections using an environment isolated from the management network. The environment can be a test network with Internet connection but without proxy settings, proxy authentication, and connection restrictions. When external connections are enabled, any malicious activity involving the Internet and remote hosts actually occurs during sample processing. Enabling External Connections Sample analysis is paused and settings are disabled whenever Virtual Analyzer is being configured. Procedure 1. Go to Virtual Analyzer > Sandbox Management > Network Connection. The Network Connection screen appears. 5-25
84 Deep Discovery Analyzer 5.0 Administrator's Guide 2. Select Enable external connections. The settings panel appears. 3. Select the type of connection to be used by sandbox instances. Custom: Any user-defined network Important Trend Micro recommends using an environment isolated from the management network, such as a test network with Internet connection but without proxy settings, proxy authentication, and connection restrictions. Management network: Default organization Intranet WARNING! Enabling connections to the management network may result in malware propagation and other malicious activity in the network. 4. If you selected Custom, specify the following: Network adapter: Select an adapter with a linked state. IP address: Type an IPv4 address. Subnet mask Gateway DNS 5-26
85 Virtual Analyzer 5. Click Save. Images Tab Virtual Analyzer does not contain any images when enabled. The hardware specifications of your Deep Discovery Analyzer appliance determine the number of images that you can import and the number of instances that you can deploy per image. The standard Deep Discovery Analyzer appliance supports a maximum of three images and 33 instances. Virtual Analyzer supports the following image types: Default: Deep Discovery Analyzer provides two default images that are stored in a USB device. Attach the USB device to the Deep Discovery Analyzer appliance before navigating to the Import Image screen. Custom: Deep Discovery Analyzer supports Open Virtual Appliance (OVA) files. For more information, see Sandbox Image Files on page Note Before importing custom images, verify that you have secured valid licenses for all included platforms and applications. Sandbox Image Files Open Virtualization Format (OVF) is a cross-platform standard for packaging and distributing software to be run in virtual machines. OVF enables the creation of readyto-use software packages (operating systems with applications) that require no configuration or installation. 5-27
86 Deep Discovery Analyzer 5.0 Administrator's Guide An OVF package consists of several files placed in one directory. The files include the following: One OVF descriptor: An XML file that contains all of the metadata about the OVF package and its contents One or more disk images Optional: Certificate files Optional: Other auxiliary files The above files can be packed into a single archive file with the extension.ova. Virtual Analyzer supports only image files in the OVA format. For more information, see Creating a Custom Virtual Analyzer Image on page A-2. Importing an Image The hardware specifications of your Deep Discovery Analyzer appliance determine the number of images that you can import and the number of instances that you can deploy per image. The standard Deep Discovery Analyzer appliance supports a maximum of three images and 33 instances. Virtual Analyzer supports OVA files between 1GB and 10GB in size. For information about creating a new image file, see Creating a Custom Virtual Analyzer Image on page A-2. Procedure Important Virtual Analyzer stops analysis and keeps all samples in the queue whenever an image is added or deleted, or when instances are modified. All instances are also automatically redistributed whenever you add images. 1. Go to Virtual Analyzer > Sandbox Management > Images. The Images screen appears. 5-28
87 Virtual Analyzer 2. Click Import. The Import Image screen appears. 3. Select an image source and configure the applicable settings. Option HTTP or FTP server Procedure a. Type a permanent image name with a maximum of 50 characters. b. Type the URL of the OVA file. c. Optional: Type logon credentials if authentication is required. Default image a. Insert the USB device containing the default images to the Deep Discovery Analyzer appliance. 4. Click Import. Important b. Select an image. Do not remove the USB device during the import process. Virtual Analyzer validates the OVA files before starting the import process. 5-29
88 Deep Discovery Analyzer 5.0 Administrator's Guide Note If you selected HTTP or FTP server, Deep Discovery Analyzer downloads the images first before importing into Virtual Analyzer. The process can only be cancelled before the download completes. Modifying Sandbox Instances The hardware specifications of your Deep Discovery Analyzer appliance determine the number of images that you can import and the number of instances that you can deploy per image. The standard Deep Discovery Analyzer appliance supports a maximum of three images and 33 instances. Important Virtual Analyzer stops all analysis and keeps all samples in the queue whenever an image is added or deleted, or when instances are modified. All instances are also automatically redistributed whenever you add images. Procedure 1. Go to Virtual Analyzer > Sandbox Management > Images. The Images screen appears. 2. Click Modify. 5-30
89 Virtual Analyzer The Modify Sandbox Instances screen appears. 3. Modify the instances allocated to any image. 4. Click Configure. Virtual Analyzer displays a confirmation message. 5. Click OK. Virtual Analyzer configures the sandbox instances. Please wait for the process to finish before navigating away from the screen. Note If configuration is unsuccessful, Virtual Analyzer reverts to the previous settings and displays an error message. 5-31
90 Deep Discovery Analyzer 5.0 Administrator's Guide Archive File Passwords Always handle potentially malicious files with caution. Trend Micro recommends adding such files to a password-protected archive file before transporting the files across the network. Deep Discovery Analyzer can also heuristically discover passwords in messages to extract files. Virtual Analyzer uses user-specified passwords to extract files. For better performance, list commonly used passwords first. Virtual Analyzer supports the following archive file types: bzip rar tar zip If Virtual Analyzer is unable to extract files using any of the listed passwords, Deep Discovery Analyzer displays the error Unsupported file type and removes the archive file from the queue. Note Archive file passwords are stored as unencrypted text. Adding Archive File Passwords Deep Discovery Analyzer supports a maximum of 10 passwords. Procedure 1. Go to Virtual Analyzer > Sandbox Management > Archive Passwords. 5-32
91 Virtual Analyzer The Archive Passwords screen appears. 2. Type a password with only ASCII characters. Note Passwords are case-sensitive and must not contain spaces. 3. Optional: Click Add password and type another password. 4. Optional: Drag and drop the password to move it up or down the list. 5. Optional: Delete a password by clicking the x icon beside the corresponding text box. 6. Click Save. 5-33
92
93 Chapter 6 Reports This chapter describes the features of the Reports. 6-1
94 Deep Discovery Analyzer 5.0 Administrator's Guide Reports All reports generated by Deep Discovery Analyzer are based on an operational report template. Generated Reports The Generated Reports screen, in Reports > Generated Reports, shows all reports generated by Deep Discovery Analyzer. In addition to being displayed as links on the management console, generated reports are also available as attachments to an . Before generating a report, you are given the option to send it to one or several recipients. Report Tasks The Generated Reports screen includes the following options: TABLE 6-1. Generated Reports Tasks TASK STEPS Generate Reports See Generating Reports on page 6-3. Download Report Send Report Delete Sort Column Data Records and Pagination Controls To download a report, go to the last column in the table and click the icon. Generated reports are available as PDF files. Select a report and then click Send Report. You can send only one report at a time. Select one or more reports and then click Delete. Click a column title to sort the data below it. The panel at the bottom of the screen shows the total number of reports. If all reports cannot be displayed at the same time, use the pagination controls to view the reports that are hidden from view. 6-2
95 Reports Generating Reports Procedure 1. Go to Reports > Generated Reports. The Generated Reports screen appears. 2. Click Generate New. The Generate Report window appears. 3. Configure report settings. Option Template Description Range Description Select an operational report template. Type a description that does not exceed 500 characters. Specify the covered date(s) based on the selected report template. 6-3
96 Deep Discovery Analyzer 5.0 Administrator's Guide Option Description Daily operational report: Select any day prior to the current day. The report coverage is from 00:00:00 to 23:59:59 of each day. Weekly operational report: Select the day of the week on which the report coverage ends. For example, if you choose Wednesday, the report coverage is from Wednesday of a particular week at 23:59:59 until Tuesday of the preceding week at 00:00:00. Monthly operational report: Select the day of the month on which the report coverage ends. For example, if you choose the 10th day of a month, the report coverage is from the 10th day of a particular month at 23:59:59 until the 9th day of the preceding month at 00:00:00. Recipients You can type a maximum of 100 addresses, typing them one a time. Note You must press Enter after each address. Do not type multiple addresses separated by commas. Before specifying recipients, configure the SMTP settings in Administration > System Settings > SMTP Settings. Note Deep Discovery Analyzer generates reports approximately five minutes after Send is clicked. 4. Click Generate. 6-4
97 Reports Report Settings Schedules Tab The Report Schedules tab, in Reports > Report Settings, shows all the report schedules created from report templates. Each schedule containsi settings for reports, including the template that will be used and the actual schedule. Note This screen does not contain any generated reports. To view the reports, navigate to Reports > Generated Reports. This tab includes the following options: TABLE 6-2. Schedules Tasks TASK Add schedule Edit Delete STEPS Click Add schedule to add a new report schedule. This opens the Add Report Schedule window, where you specify settings for the report schedule. For more information, see Add Report Schedule Window on page 6-6. Select a report schedule and then click Edit to edit its settings. This opens the Edit Report Schedule window, which contains the same settings in the Add Report Schedule window. For more information, see Add Report Schedule Window on page 6-6. Only one report schedule can be edited at a time. Select one or several report schedules to delete and then click Delete. 6-5
98 Deep Discovery Analyzer 5.0 Administrator's Guide TASK Sort Column Data Records and Pagination Controls STEPS Click a column title to sort the data below it. The panel at the bottom of the screen shows the total number of report schedules. If all report schedules cannot be displayed at the same time, use the pagination controls to view the schedules that are hidden from view. Add Report Schedule Window The Add Report Schedule window appears when you add a report schedule. A report schedule contains settings that Deep Discovery Analyzer will use when generating scheduled reports. This window includes the following options: TABLE 6-3. Add Report Schedule Window Tasks FIELD STEPS Template Description Choose a template. Type a description. 6-6
99 Reports Schedule FIELD STEPS Configure the schedule according to the template you chose. If the template is for a daily report, configure the time the report generates. The report coverage is from 00:00:00 to 23:59:59 of each day and the report starts to generate at the time you specified. If the template is for a weekly report, select the start day of the week and configure the time the report generates. For example, if you choose Wednesday, the report coverage is from Wednesday of a particular week at 00:00:00 until Tuesday of the following week at 23:59:59. The report starts to generate on Wednesday of the following week at the time you specified. If the template is for a monthly report, select the start day of the month and configure the time the report generates. For example, if you choose the 10th day of a month, the report coverage is from the 10th day of a particular month at 00:00:00 until the 9th day of the following month at 23:59:59. The report starts to generate on the 10th day of the following month at the time you specified. Note If the report is set to generate on the 29th, 30th, or 31st day of a month and a month does not have this day, Deep Discovery Analyzer starts to generate the report on the first day of the next month at the time you specified. Format Recipients The file format of the report is PDF only. Type a valid address to which to send reports and then press Enter. You can type up to 100 addresses, typing them one a time. It is not possible to type multiple addresses separated by commas. Before specifying recipients, verify that you have specified SMTP settings in Administration > System Settings > SMTP Settings tab. 6-7
100 Deep Discovery Analyzer 5.0 Administrator's Guide Customization Tab The Reports Customization tab, in Reports > Reports Settings, allows you to customize items in the Deep Discovery Analyzer reports. This screen includes the following options: TABLE 6-4. Header OPTION TASK DISPLAY AREA Company name Type a name that does not exceed 40 characters. Report cover Header logo Browse to the location of the logo and click Upload. The dimensions of the logo are specified in the screen. Notification 6-8
101 Reports OPTION TASK DISPLAY AREA Bar color To change the default color, click it and then pick the color from the color matrix that displays. Notification TABLE 6-5. Footer OPTION TASKS DISPLAY AREA Footer logo Browse to the location of the logo and click Upload. The dimensions of the logo are specified in the screen. Notification Footer note Type a note. Notification 6-9
102
103 Chapter 7 Administration The features of the Administration tab are discussed in this chapter. 7-1
104 Deep Discovery Analyzer 5.0 Administrator's Guide Updates Use the Updates screen, in Administration > Updates, to check the status of security components and manage update settings. An Activation Code is required to use and update components. For more information, see Licensing on page Components The Components tab shows the security components currently in use. COMPONENT Advanced Threat Scan Engine Deep Discovery Malware Pattern IntelliTrap Pattern DESCRIPTION Virtual Analyzer uses the Advanced Threat Scan Engine to check files for less conventional threats, including document exploits. Some files may seem safe but should be further observed and analyzed in a virtual environment. The Deep Discovery Malware Pattern contains information that helps Deep Discovery Analyzer identify the latest virus/malware and mixed threat attacks. Trend Micro creates and releases new versions of the pattern several times a week, and any time after the discovery of a particularly damaging virus/malware. The IntelliTrap Pattern is used for identifying compressed executable file types that commonly hide malware and other potential threats. 7-2
105 Administration COMPONENT IntelliTrap Exception Pattern Network Content Correlation Pattern Spyware Activemonitoring Pattern Virtual Analyzer Sensors DESCRIPTION The IntelliTrap Exception Pattern provides a list of compressed executable file types that are commonly safe from malware and other potential threats. Network Content Correlation Pattern implements detection rules defined by Trend Micro. The Spyware Active-monitoring Pattern identifies unique patterns of bits and bytes that signal the presence of certain types of potentially undesirable files and programs, such as adware and spyware, or other grayware. Virtual Analyzer Sensors is a module on sandboxes used for simulating threats. Update Settings The Update Settings tab allows you to configure automatic updates and the update source. 7-3
106 Deep Discovery Analyzer 5.0 Administrator's Guide SETTING Automatic updates Update source DESCRIPTION Select Automatically check for updates to keep components up-to-date. If you enable automatic updates, Deep Discovery Analyzer runs an update everyday. Specify the time the update runs. Deep Discovery Analyzer can download components from the Trend Micro ActiveUpdate server or from another source. You may specify another source if Deep Discovery Analyzer is unable to reach the ActiveUpdate server directly. If you choose the ActiveUpdate server, verify that Deep Discovery Analyzer has Internet connection. If you choose another source, set up the appropriate environment and update resources for this update source. Also ensure that there is a functional connection between Deep Discovery Analyzer and this update source. If you need assistance setting up an update source, contact your support provider. The update source must be specified in URL format. Verify that proxy settings are correct if Deep Discovery Analyzer requires a proxy server to connect to its update source. For more information, see Proxy Settings Tab on page 7-9. Product Updates Use the Product Updates screen to apply patches, service packs, and hotfixes to Deep Discovery Analyzer. Trend Micro prepares a readme file for each patch, service pack, or hotfix. Read the accompanying readme file before applying an update for feature information and for special installation instructions. Tip When performing a complete deployment of Deep Discovery Analyzer, confirm that you have the latest official build. If you have the latest build when performing complete deployments, then you can skip the following steps to update Deep Discovery Analyzer, unless you have other updates or hotfixes from Trend Micro. 7-4
107 Administration Perform the following steps to deploy the update. Procedure 1. Receive the product update file from Trend Micro. If the product update is an official patch or service pack, download it from the download center. If the product update is a hotfix, request the file from Trend Micro support. 2. On the logon page of the management console, select Extended and then log on using a valid user name and password. 3. Go to Administration > Updates and click the Product Updates tab. 4. Click Browse and select the product update file. 7-5
108 Deep Discovery Analyzer 5.0 Administrator's Guide 5. Click Apply. Important Do not close or refresh the browser, open another page, perform tasks on the management console, or shut down the computer until updating is complete. The Product Updates tab must remain open during update deployment. System Settings The System Settings screen, in Administration > System Settings, includes the following tabs: Host Name and IP Address Tab on page 7-7 Proxy Settings Tab on page 7-9 SMTP Settings Tab on page 7-10 Date and Time Tab on page 7-11 Password Policy Tab on page 7-13 Session Timeout Tab on page 7-14 Power Off / Restart Tab on page
109 Administration Host Name and IP Address Tab Use this screen to configure the host name and IP address of the Deep Discovery Analyzer appliance, and other required network addresses. The default IP address is Modify the IP address immediately after completing all deployment tasks. Note You can also use the Preconfiguration Console to modify the IP address. For more information, see Configuring Network Addresses on the Preconfiguration Console on page 3-4. Deep Discovery Analyzer uses the specified IP address to connect to the Internet when accessing Trend Micro hosted services, including the Smart Protection Network, the ActiveUpdate server, and Threat Connect. The IP address also determines the URL used to access the management console. Procedure 1. Go to Administration > System Settings > Host Name and IP Address. 2. Specify the following: 7-7
110 Deep Discovery Analyzer 5.0 Administrator's Guide Item Host name Guidelines Character limits: Number: 63 Type: Alphanumeric (A to Z; a to z; 0 to 9); hyphen "-" IP address Other: Must not start with a hyphen Must not conflict with the following addresses: Sandbox network: Configured in Virtual Analyzer > Sandbox Management > Network Connection Virtual Analyzer: Broadcast: Multicast: Link local: Class E: Localhost: /8 Note Changing the IP address changes the management console URL. Subnet mask Must not be any of the following addresses: Gateway DNS 1 DNS 2 (Optional) Must be in the same subnet as the IP address Same as IP address Same as IP address 3. Click Save. 7-8
111 Administration A system configuration message appears. Click the provided link to return to the management console. Proxy Settings Tab Specify proxy settings if Deep Discovery Analyzer connects to the Internet or management network through a proxy server. Configure the following settings. TABLE 7-1. Proxy Settings Tasks TASK Use an HTTP proxy server Server name or IP address Port STEPS Select this option to enable proxy settings. Type the proxy server host name or IP address. The management console does not support host names with double-byte encoded characters. If the host name includes such characters, type its IP address instead. Type the port number that Deep Discovery Analyzer will use to connect to the proxy server. 7-9
112 Deep Discovery Analyzer 5.0 Administrator's Guide TASK Proxy server requires authentication User name STEPS Select this option if connection to the proxy server requires authentication. Type the user name used for authentication. Note This option is only available if Proxy server requires authentication is enabled. Password Type the password used for authentication. Note This option is only available if Proxy server requires authentication is enabled. SMTP Settings Tab Deep Discovery Analyzer uses SMTP settings when sending notifications through . Configure the following settings. 7-10
113 Administration TABLE 7-2. SMTP Settings Tasks TASK SMTP Server host name or IP address Sender address SMTP server requires authentication User name STEPS Type the SMTP server host name or IP address. The management console does not support host names with double-byte encoded characters. If the host name includes such characters, type its IP address instead. Type the address of the sender. Select this option if connection to the SMTP server requires authentication. Type the user name used for authentication. Note This option is only available if SMTP server requires authentication is enabled. Password Type the password used for authentication. Note This option is only available if SMTP server requires authentication is enabled. Date and Time Tab Configure date and time settings immediately after installation. Procedure 1. Go to Administration > System Settings > Date and Time. 7-11
114 Deep Discovery Analyzer 5.0 Administrator's Guide The Date and Time screen appears. 2. Click Set Date and Time. The settings panel appears. 3. Select one of the following methods and configure the applicable settings. Connect to NTP server Set time manually 4. Click Save. 5. Click Set time zone. The settings panel appears. 6. Select the applicable time zone. 7-12
115 Administration Note 7. Click Save. Daylight Saving Time (DST) is used when applicable. Password Policy Tab Trend Micro recommends requiring strong passwords. Strong passwords usually contain a combination of both uppercase and lowercase letters, numbers, and symbols, and are at least eight characters in length. When strong passwords are required, a user submits a new password, and the password policy determines whether the password meets your company's established requirements. Strict password policies sometimes increase costs to an organization when they force users to select passwords too difficult to remember. Users call the help desk when they forget their passwords, or record passwords and increase their vulnerability to threats. When establishing a password policy balance your need for strong security against the need to make the policy easy for users to follow. 7-13
116 Deep Discovery Analyzer 5.0 Administrator's Guide Session Timeout Tab Choose default or extended session timeout. A longer session length might be less secure if users forget to log out from the session and leave the console unattended. The default session timeout is 10 minutes and the extended session timeout is one day. You can change these values according to your preference. New values take effect on the next logon. Power Off / Restart Tab You can power off or restart the Deep Discovery Analyzer appliance on the management console. Power Off: All active tasks are stopped, and then the appliance gracefully shuts down. Restart: All active tasks are stopped, and then the appliance is restarted. Powering off or restarting the appliance affects the following: Virtual Analyzer sample analysis: Integrated products may queue samples or bypass submission while the appliance is unavailable. Active configuration tasks initiated by all users: Trend Micro recommends verifying that all active tasks are completed before proceeding. 7-14
117 Administration Log Settings Use the Log Settings screen, in Administration > Log Settings, to maintain, delete, or archive logs. You can also forward all logs to a syslog server. Configuring Syslog Settings Deep Discovery Analyzer can forward logs to a syslog server after saving the logs to its database. Only logs saved after enabling this setting will be forwarded. Previous logs are excluded. Procedure 1. Go to Administration > Log Settings. The Log Settings screen appears. 2. Select Forward logs to a syslog server. 7-15
118 Deep Discovery Analyzer 5.0 Administrator's Guide 3. Select the format in which event logs should be sent to the syslog server. CEF: Common Event Format (CEF) is an open log management standard developed by HP ArcSight. CEF comprises a standard prefix and a variable extension that is formatted as key-value pairs. LEEF: Log Event Extended Format (LEEF) is a customized event format for IBM Security QRadar. LEEF comprises an LEEF header, event attributes, and an optional syslog header. 4. Select the protocol to be used when transporting log content to the syslog server. TCP UDP 5. Type the host name or IP address of the syslog server. 6. Type the port number. Note Trend Micro recommends using the following default syslog ports: UDP: 514 TCP: Click Save. Account Management Use the Account Management screen, in Administration > Account Management, to create and manage user accounts. Users can use these accounts, instead of the default administrator account, to access the management console. Some settings are shared by all user accounts, while others are specific to each account. 7-16
119 Administration This screen includes the following options. TABLE 7-3. Account Management Tasks TASK STEPS Add Edit Delete Unlock Sort Column Data Search Records and Pagination Controls Click Add to add a new user account. This opens the Add Account window, where you specify settings for the account. For more information, see Add User Window on page Select a user account and then click Edit to edit its settings. This opens the Edit Account window, which contains the same settings as the Add Account window. For more information, see Add User Window on page Only one user account can be edited at a time. Select a user account to delete and then click Delete. Only one user account can be deleted at a time. Deep Discovery Analyzer includes a security feature that locks an account in case the user typed an incorrect password five times in a row. This feature cannot be disabled. Accounts locked this way, including administrator accounts, unlock automatically after ten minutes. The administrator can manually unlock accounts that have been locked. Only one user account can be unlocked at a time. Click a column title to sort the data below it. If there are many entries in the table, type some characters in the Search text box to narrow down the entries. As you type, the entries that match the characters you typed are displayed. Deep Discovery Analyzer searches all cells in the table for matches. The panel at the bottom of the screen shows the total number of user accounts. If all user accounts cannot be displayed at the same time, use the pagination controls to view the accounts that are hidden from view. 7-17
120 Deep Discovery Analyzer 5.0 Administrator's Guide Add User Window The Add User window appears when you add a user account from the Account Management screen. This window includes the following options. 7-18
121 Administration TABLE 7-4. Add User Window FIELD User Name and Password DETAILS Type an account name that does not exceed 40 characters. Type a password with at least six characters and then confirm it. If you want to use a stricter password, configure the global password policy in Administration > System Settings > Password Policy tab. The password policy will be displayed in the window and must be satisfied before you can add a user account. When a user exceeds the number of retries allowed while entering incorrect passwords, Deep Discovery Analyzer sets the user account to inactive (locked out). You can unlock the account in the Account Management screen. Tip Record the user name and password for future reference. You can print the checklist in Logon Credentials on page 2-6 and record the user names and password in the printed copy. Name Address Description Type the name of the account owner. Type the account owner s address. (Optional) Type a description that does not exceed 40 characters. Contact Management Use the Contact Management screen, in Administration > Contact Management, to maintain a list of contacts who are interested in the data that your logs collect. 7-19
122 Deep Discovery Analyzer 5.0 Administrator's Guide This screen includes the following options. TABLE 7-5. Contact Management Tasks TASK Add Contact Edit Delete Sort Column Data Search Records and Pagination Controls STEPS Click Add Contact to add a new account. This opens the Add Contact window, where you specify contact details. For more information, see Add Contact Window on page Select a contact and then click Edit to edit contact details. This opens the Edit Contact window, which contains the same settings as the Add Contact window. For more information, see Add Contact Window on page Only one contact can be edited at a time. Select a contact to delete and then click Delete. Only one contact can be deleted at a time. Click a column title to sort the data below it. If there are many entries in the table, type some characters in the Search text box to narrow down the entries. As you type, the entries that match the characters you typed are displayed. Deep Discovery Analyzer searches all cells in the table for matches. The panel at the bottom of the screen shows the total number of contacts. If all contacts cannot be displayed at the same time, use the pagination controls to view the contacts that are hidden from view. Add Contact Window The Add Contact window appears when you add a contact from the Contact Management screen. 7-20
123 Administration This window includes the following options. TABLE 7-6. Add Contact Window FIELD DETAILS Name Address Phone Description Type the contact name. Type the contact s address. (Optional) Type the contact s phone number. (Optional) Type a description that does not exceed 40 characters. Tools Use the Tools screen, in Administration > Tools, to view and download special tools for Deep Discovery Analyzer. Each tool displayed on this screen has the following two options: 7-21
124 Deep Discovery Analyzer 5.0 Administrator's Guide Usage Instructions: This links to a relevant page in the online help with instructions about how to use the tool. Download: This links the relevant page in the download center that has the tool. Manual Submission Tool The Manual Submission Tool can be used along with Deep Discovery Analyzer to remotely submit samples from locations on users' computers to Virtual Analyzer. This feature allows users to submit multiple samples at once, which will be added to the Virtual Analyzer Submissions queue. Refer to Manually Submitting Samples on page 5-14 for more information about using the Manual Submission Tool. Licensing Use the Licensing screen, in Administration > Licensing, to view, activate, and renew the Deep Discovery Analyzer license. 7-22
125 Administration The Deep Discovery Analyzer license includes product updates (including ActiveUpdate) and basic technical support ( Maintenance ) for one (1) year from the date of purchase. In addition, the license allows you to upload threat samples for analysis, and to access Trend Micro Threat Connect from Virtual Analyzer. After the first year, Maintenance must be renewed on an annual basis at the current Trend Micro rate. A Maintenance Agreement is a contract between your organization and Trend Micro. It establishes your right to receive technical support and product updates in return for the payment of applicable fees. When you purchase a Trend Micro product, the License Agreement you receive with the product describes the terms of the Maintenance Agreement for that product. The Maintenance Agreement has an expiration date. Your License Agreement does not. If the Maintenance Agreement expires, you will no longer be entitled to receive technical support from Trend Micro or access Trend Micro Threat Connect. Typically, 90 days before the Maintenance Agreement expires, you will start to receive notifications, alerting you of the pending discontinuation. You can update your Maintenance Agreement by purchasing renewal maintenance from your Reseller, Trend Micro sales, or on the Trend Micro Customer Licensing Portal at: The Licensing screen includes the following information and options. TABLE 7-7. Product Details FIELD Full product name Build number License agreement DETAILS Displays the full name of the product. Displays the full patch and build number for the product. Displays a link to the Trend Micro License Agreement. Click the link to view or print the license agreement. 7-23
126 Deep Discovery Analyzer 5.0 Administrator's Guide TABLE 7-8. License Details FIELD Activation Code DETAILS View the Activation Code in this section. If your license has expired, obtain a new Activation Code from Trend Micro. To renew the license, click Specify New Code, and type the new Activation Code. The Licensing screen reappears displaying the number of days left before the product expires. Status Displays either Activated, Not Activated, Evaluation, or Expired. Click View details online to view detailed license information from the Trend Micro website. If the status changes (for example, after you renewed the license) but the correct status is not indicated in the screen, click Refresh. Type Deep Discovery Analyzer: Provides access to all product features Deep Discovery Analyzer (Trial): Provides access to all product features Expiration date Grace period View the expiration date of the license. Renew the license before it expires. View the duration of the grace period. The grace period varies by region (for example, North America, Japan, Asia Pacific, and so on). Contact your support provider for more information about the grace period for your license. 7-24
127 Administration About Deep Discovery Analyzer Use the About Deep Discovery Analyzer screen in Administration > About Deep Discovery Analyzer to view the product version, API key, and other product details. Note The API key is used by Trend Micro products to register and send samples to Deep Discovery Analyzer. For a list of products and supported versions, see Integration with Trend Micro Products and Services on page
128
129 Chapter 8 Technical Support Topics include: Troubleshooting Resources on page 8-2 Contacting Trend Micro on page 8-3 Sending Suspicious Content to Trend Micro on page 8-5 Other Resources on page
130 Deep Discovery Analyzer 5.0 Administrator's Guide Troubleshooting Resources Before contacting technical support, consider visiting the following Trend Microonline resources. Trend Community To get help, share experiences, ask questions, and discuss security concerns with other users, enthusiasts, and security experts, go to: Using the Support Portal The Trend MicroSupport Portal is a 24x7 online resource that contains the most up-todate information about both common and unusual problems. Procedure 1. Go to 2. Select a product or service from the appropriate drop-down list and specify any other related information. The Technical Support product page appears. 3. Use the Search Support box to search for available solutions. 4. If no solution is found, click Submit a Support Case from the left navigation and add any relevant details, or submit a support case here: A Trend Micro support engineer investigates the case and responds in 24 hours or less. 8-2
131 Technical Support Security Intelligence Community Trend Microcybersecurity experts are an elite security intelligence team specializing in threat detection and analysis, cloud and virtualization security, and data encryption. Go to to learn about: Trend Microblogs, Twitter, Facebook, YouTube, and other social media Threat reports, research papers, and spotlight articles Solutions, podcasts, and newsletters from global security insiders Free tools, apps, and widgets. Threat Encyclopedia Most malware today consists of "blended threats" - two or more technologies combined to bypass computer security protocols. Trend Microcombats this complex malware with products that create a custom defense strategy. The Threat Encyclopedia provides a comprehensive list of names and symptoms for various blended threats, including known malware, spam, malicious URLs, and known vulnerabilities. Go to to learn more about: Malware and malicious mobile code currently active or "in the wild" Correlated threat information pages to form a complete web attack story Internet threat advisories about targeted attacks and security threats Web attack and online trend information Weekly malware reports. Contacting Trend Micro In the United States, Trend Microrepresentatives are available by phone, fax, or 8-3
132 Deep Discovery Analyzer 5.0 Administrator's Guide Address Trend Micro, Inc North De Anza Blvd., Cupertino, CA Phone Toll free: +1 (800) (sales) Voice: +1 (408) (main) Fax +1 (408) Website address Worldwide support offices: Trend Microproduct documentation: Speeding Up the Support Call To improve problem resolution, have the following information available: Steps to reproduce the problem Appliance or network information Computer brand, model, and any additional hardware connected to the endpoint Amount of memory and free hard disk space Operating system and service pack version Endpoint client version Serial number or activation code Detailed description of install environment Exact text of any error message received. 8-4
133 Technical Support Sending Suspicious Content to Trend Micro Several options are available for sending suspicious content to Trend Microfor further analysis. File Reputation Services Gather system information and submit suspicious file content to Trend Micro: Record the case number for tracking purposes. Reputation Services Query the reputation of a specific IP address and nominate a message transfer agent for inclusion in the global approved list: Web Reputation Services Query the safety rating and content type of a URL suspected of being a phishing site, or other so-called "disease vector" (the intentional source of Internet threats such as spyware and malware): If the assigned rating is incorrect, send a re-classification request to Trend Micro. Other Resources In addition to solutions and support, there are many other helpful resources available online to stay up to date, learn about innovations, and be aware of the latest security trends. 8-5
134 Deep Discovery Analyzer 5.0 Administrator's Guide TrendEdge Find information about unsupported, innovative techniques, tools, and best practices for Trend Micro products and services. The TrendEdge database contains numerous documents covering a wide range of topics for Trend Micropartners, employees, and other interested parties. See the latest information added to TrendEdge at: Download Center From time to time, Trend Micromay release a patch for a reported known issue or an upgrade that applies to a specific product or service. To find out whether any patches are available, go to: If a patch has not been applied (patches are dated), open the Readme file to determine whether it is relevant to your environment. The Readme file also contains installation instructions. TrendLabs TrendLabs is a global network of research, development, and action centers committed to 24x7 threat surveillance, attack prevention, and timely and seamless solutions delivery. Serving as the backbone of the Trend Microservice infrastructure, TrendLabs is staffed by a team of several hundred engineers and certified support personnel that provide a wide range of product and technical support services. TrendLabs monitors the worldwide threat landscape to deliver effective security measures designed to detect, preempt, and eliminate attacks. The daily culmination of these efforts is shared with customers through frequent virus pattern file updates and scan engine refinements. Learn more about TrendLabs at: 8-6
135 Technical Support index.html#trendlabs 8-7
136
137 Appendix A Additional Resources This appendix provides additional resources for this product. A-1
138 Deep Discovery Analyzer 5.0 Administrator's Guide Creating a Custom Virtual Analyzer Image This appendix explains how to create a custom Virtual Analyzer image using VirtualBox and how to import the image into Deep Discovery Analyzer. Downloading and Installing VirtualBox Virtual Box is a cross-platform virtualization application that supports a large number of guest operating systems. Use VirtualBox to create a custom Virtual Analyzer image. Procedure 1. Download the latest version of VirtualBox from: 2. Install VirtualBox using English as the default language. 3. If needed, configure language settings after installation by navigating to File > Preferences > Language > English. A-2
139 Additional Resources FIGURE A-1. Language Preferences Window Preparing the Operating System Installer The image must run any of the following operating systems: Windows XP Windows 7 Tip Trend Micro recommends using the English version of the listed operating systems. A-3
140 Deep Discovery Analyzer 5.0 Administrator's Guide Procedure 1. Prepare the operating system installer. 2. Package the installer as an ISO file. 3. Copy the ISO file to the computer on which VirtualBox is installed. Creating a Custom Virtual Analyzer Image Procedure 1. Open VirtualBox. The VirtualBox Manager window opens. FIGURE A-2. VirtualBox Manager 2. Click New. A-4
141 Additional Resources The Create Virtual Machine window opens. FIGURE A-3. Create Virtual Machine 3. Under Name and operating system, specify the following: Item Name Type Version Instruction Type a permanent name for the virtual machine. Select Microsoft Windows as the operating system. Select Windows XP or Windows 7 as the operating system version. 4. Click Next. A-5
142 Deep Discovery Analyzer 5.0 Administrator's Guide The Memory size screen appears. FIGURE A-4. Memory Size 5. Specify the amount of memory to be allocated. Windows XP: 512 MB Windows 7: 1024 MB 6. Click Next. The Hard drive screen appears. FIGURE A-5. Hard Drive 7. Select Create a virtual hard drive now and click Create. A-6
143 Additional Resources The Hard drive file type screen appears. FIGURE A-6. Hard Drive File Type Screen 8. Select one of the following: VDI (VirtualBox Disk Image) VMDK (Virtual Machine Disk) 9. Click Next. A-7
144 Deep Discovery Analyzer 5.0 Administrator's Guide The Storage on physical hard drive screen appears. FIGURE A-7. Storage on Physical Hard Drive 10. Select Dynamically allocated and click Next. The File location and size screen appears. FIGURE A-8. File Location and Size 11. Specify the following: Name of the new virtual hard drive file A-8
145 Additional Resources Size of the virtual hard drive 12. Click Create. Windows XP: 15 GB Windows 7: 25 GB VirtualBox Manager creates the virtual machine. When the process is completed, the virtual machine appears on the left pane of the Virtual Manager window. FIGURE A-9. VirtualBox Manager 13. Click Settings. A-9
146 Deep Discovery Analyzer 5.0 Administrator's Guide The Settings window opens. FIGURE A-10. Settings 14. On the left pane, click System. A-10
147 Additional Resources The System screen appears. FIGURE A-11. System Settings - Motherboard 15. On the Motherboard tab, specify the following: Item Chipset Pointing Device Extended Features Instruction Select ICH9. Select USB Tablet. Select Enable IO APIC. 16. Click the Processor tab. A-11
148 Deep Discovery Analyzer 5.0 Administrator's Guide The Processor screen appears. FIGURE A-12. System Options - Processor Select Enable PAE/NX. 17. Click the Acceleration tab. A-12
149 Additional Resources The Acceleration screen appears. FIGURE A-13. System Options - Acceleration 18. For Hardware Virtualization, select Enable VT-x/AMD-V and Enable Nested Paging. 19. On the left pane, click Storage. A-13
150 Deep Discovery Analyzer 5.0 Administrator's Guide The Storage screen appears. 20. Under Storage Tree, select Controller: IDE. 21. Click the optical disc icon. Under Attributes, verify that CD/DVD Drive is IDE Secondary Master. FIGURE A-14. IDE Secondary Master 22. Click the CD icon next to the CD/DVD Drive dropdown list. A-14
151 Additional Resources A file menu appears. 23. Select Choose a virtual CD/DVD disk file and the ISO file containing the operating system installer. The ISO file is available as a device. 24. On the left pane, click Audio. The Audio screen appears. FIGURE A-15. Audio Options Settings Window 25. Deselect Enable Audio. 26. On the left pane, click Shared Folders. A-15
152 Deep Discovery Analyzer 5.0 Administrator's Guide The Shared Folders screen appears. FIGURE A-16. Shared Folders Settings Window 27. Verify that no shared folders exist, and then click OK. The Settings window closes. 28. On the VirtualBox Manager window, click Start. The installation process starts. 29. Follow the on-screen instructions to complete the installation. Installing the Required Software on the Image The Virtual Analyzer supports Microsoft Office 2003, 2007, and After installing Microsoft Office, start all applications before importing the image. On Microsoft Office 2010, enable all macros. 1. On Microsoft Word, Excel, and Powerpoint, go to File > Options > Trust Center. 2. Under Microsoft Trust Center, click Trust Center Settings. A-16
153 Additional Resources 3. Click Macro Settings. 4. Select Enable all macros. 5. Click OK. The Virtual Analyzer also supports Adobe Acrobat and Adobe Reader. Trend Micro recommends installing the version of Adobe Reader that is widely used in your organization. To download the most current version of Adobe Acrobat reader, go to If Adobe Reader is currently installed on the host: 1. Disable automatic updates to avoid threat simulation issues. To disable automatic updates, read the instructions on acrobat/kb/disable-automatic-updates-acrobat-reader.htm. 2. Install the necessary Adobe Reader language packs so that file samples authored in languages other than those supported in your native Adobe Reader can be processed. For example, if you have the English version of Adobe Reader and you expect samples authored in East Asian languages to be processed, install the Asian and Extended Language Pack. 3. Before exporting the image, start Adobe Reader. If you do not install Acrobat Reader, the Virtual Analyzer: Automatically installs Adobe Reader 8, 9, and 11 on all images. Uses all three versions during analysis. This consumes additional computing resources. If the image runs Windows XP, install.net Framework 3.5 (or later). To download, go to With these software applications, the custom Virtual Analyzer image can provide decent detection rates. As such, there is no need to install additional software applications, including VBoxTool, unless advised by a Trend Micro security expert. A-17
154 Deep Discovery Analyzer 5.0 Administrator's Guide Modifying the Image Environment Modify the custom Virtual Analyzer image environment to run the Virtual Analyzer Sensors, a module used for simulating threats. Modifying the Image Environment (Windows XP) Procedure 1. Open a command prompt (cmd.exe). 2. View all user accounts by typing: net user 3. Delete non built-in user accounts one at a time by typing: net user <username> /delete For example: net user test /delete 4. Set the logon password for the Administrator user account to 1111 by typing: net user Administrator Configure automatic logon. Each time the image starts, the logon prompt is bypassed and the Administrator account is automatically used to log on to the system. a. Type the following commands: REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon" /v DefaultUserName /t REG_SZ /d Administrator /f REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon" /v DefaultPassword /t REG_SZ /d 1111 /f A-18
155 Additional Resources REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon" /v AutoAdminLogon /t REG_SZ /d 1 /f b. Restart the image. A-19
156 Deep Discovery Analyzer 5.0 Administrator's Guide No logon prompt displayed and the Administrator account is automatically used. A-20
157 Additional Resources Modifying the Image Environment (Windows 7) Procedure 1. Open a command prompt (cmd.exe). 2. Enable the Administrator account by typing: net user Administrator /active:yes 3. View all user accounts by typing: net user 4. Delete non built-in user accounts one at a time by typing: net user <username> /delete For example: net user test /delete 5. Set the logon password for the Administrator user account to 1111 by typing: net user Administrator Go to Control Panel > AutoPlay. A-21
158 Deep Discovery Analyzer 5.0 Administrator's Guide 7. Select Install or run program from your media for the setting Software and games. 8. Click Save. 9. Configure automatic logon. Each time the image starts, the logon prompt is bypassed and the Administrator account is automatically used to log on to the system. a. Type the following commands: REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon" /v DefaultUserName /t REG_SZ /d Administrator /f REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon" /v DefaultPassword /t REG_SZ /d 1111 /f REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon" /v AutoAdminLogon /t REG_SZ /d 1 /f b. Restart the image. A-22
159 Additional Resources No logon prompt displayed and the Administrator account is automatically used. A-23
160 Deep Discovery Analyzer 5.0 Administrator's Guide Packaging the Image as an OVA File The image contains many files. These files must be packaged as a single OVA file to avoid issues during importing into Deep Discovery Analyzer. Note Deep Discovery Analyzer supports OVA files that are between 1 GB and 10 GB in size. Procedure 1. Power off the image. 2. Verify that the CD/DVD drive is empty. 3. On the VirtualBox Manager window, go to File > Export Appliance. A-24
161 Additional Resources The Export Virtual Appliance window opens. FIGURE A-17. Appliance Export Wizard 4. Select the image to be exported and click Next. A-25
162 Deep Discovery Analyzer 5.0 Administrator's Guide The Storage settings screen appears. FIGURE A-18. Storage Settings Window 5. Specify the file name and path. 6. For Format, select OVA 1.0. Important 7. Click Next. Deep Discovery Analyzer does not support OVA 2.0. A-26
163 Additional Resources The Appliance settings screen appears. FIGURE A-19. Final Appliance Export Configurations Window 8. Verify the metadata that will be added to the virtual appliance. Important 9. Click Export. The License field must be blank. Deep Discovery Analyzer does not accept the Software License Agreement when importing the image. VirtualBox starts to create the OVA file. A-27
164 Deep Discovery Analyzer 5.0 Administrator's Guide Importing the OVA File Into Deep Discovery Analyzer Upload the OVA file to an HTTP or FTP server before importing it into Deep Discovery Analyzer. Verify that Deep Discovery Analyzer can connect to this server. For an HTTP server, Deep Discovery Analyzer can connect through secure HTTP. When the OVA file has been uploaded to a server: Import the OVA file from the Deep Discovery Analyzer web console. For more information, see Importing an Image on page Configure Virtual Analyzer settings. For more information, see Enabling External Connections on page Troubleshooting ISSUE The Found New Hardware Wizard opens with the image on VirtualBox. The converted VMDK file displays the blue screen Cannot find Operating System when powered on through VirtualBox. An OVA file is experiencing some problems uploading into Deep Discovery Analyzer. The OVA file is too large and cannot upload into Deep Discovery Analyzer. EXPLANATION AND SOLUTION The hardware wizard automatically runs whenever a VMware image is converted to a VirtualBox image. Create images using VirtualBox to avoid issues when importing images to Virtual Analyzer. The chipset ICH9 must be selected and the IP APIC must be enabled. Verify that the OVA file was created from VirtualBox. The OVA file size should be between 1 GB and 10 GB. Try removing unnecessary programs and software on the image and then package the image again as an OVA file. A-28
165 Additional Resources Categories of Notable Characteristics TABLE A-1. Anti-security, Self-preservation CHARACTERISTICS Deletes antivirus registry entry Disables antivirus service Stops or modifies antivirus service Uses suspicious packer Checks for sandbox DESCRIPTION Removal of registry entries associated with security software may prevent these software from running. Disabling of services associated with security software may prevent these software from running. Stopping or modification of services associated with security software may prevent these software from running. Malware are often compressed using packers to avoid detection and prevent reverse engineering. To avoid being analyzed, some malware uses advanced techniques to determine whether they are running in a virtual environment (sandbox). TABLE A-2. Autostart or Other System Reconfiguration CHARACTERISTICS Adds Active Setup value in registry Adds autorun in registry Adds scheduled task Adds startup file or folder Modifies firewall settings DESCRIPTION "Values in the Active Setup registry key are used by Windows components. Malware may add such values to automatically run at startup. Addition of autorun registry keys enables malware to automatically run at startup. Scheduled tasks are used to automatically run components at predefined schedules. Malware may add such tasks to remain active on affected systems. Windows automatically opens files in the startup folder. Malware may add a file or folder in this location to automatically run at startup and stay running. Malware may add a firewall rule to allow certain types of traffic and to evade firewall protection. A-29
166 Deep Discovery Analyzer 5.0 Administrator's Guide CHARACTERISTICS Modifies AppInit_DLLs in registry Modifies important registry entries Modifies system file or folder Modifies IP address Modifies file with infectible type DESCRIPTION Modification of DLLs in the AppInit_DLLs registry value may allow malware to inject its code into another process. Malware may modify important registry entries, such as those used for folder options, browser settings, service configuration, and shell commands. Modification of system files and usage of system folders may allow malware to conceal itself and appear as a legitimate system component. Malware may modify the IP address of an affected system to allow remote entities to locate that system. Certain types of files that are located in non-system folders may be modified by malware. These include shortcut links, document files, dynamic link libraries (DLLs), and executable files. TABLE A-3. Deception, Social Engineering CHARACTERISTICS Uses fake or uncommon signature Uses spoofed version information Creates message box Uses deceiving extension Uses double DOS header Uses double extension with executable tail DESCRIPTION Malware may use an uncommon, fake, or blacklisted file signature. Malware may use spoofed version information, or none at all. A fake message box may be displayed to trick users into construing malware as a legitimate program. A deceiving file extension may be used to trick users into construing malware as a legitimate program. The presence of two DOS headers is suspicious because it usually occurs when a virus infects an executable file. Double file extension names are commonly used to lure users into opening malware. A-30
167 Additional Resources CHARACTERISTICS Drops fake system file Uses fake icon Uses file name associated with pornography DESCRIPTION Files with names that are identical or similar to those of legitimate system files may be dropped by malware to conceal itself. Icons from known applications or file types are commonly used to lure users into opening malware. File names associated with pornography are commonly used to lure users into opening malware. TABLE A-4. File Drop, Download, Sharing, or Replication CHARACTERISTICS Creates multiple copies of a file Copies self Deletes self Downloads executable Drops driver Drops executable Drops file into shared folder DESCRIPTION Multiple copies of a file may be created by malware in one or more locations on the system. These copies may use different names in order to lure the user into opening the file. Malware may create copies of itself in one or more locations on the system. These copies may use different names in order to lure the user into opening the file. Malware may delete itself to remove traces of the infection and to prevent forensic analysis. Downloading of executable files is considered suspicious because this behavior is often only attributed to malware and applications that users directly control. Many drivers run in kernel mode, allowing them to run with high privileges and gain access to core operating system components. Malware often install drivers to leverage these privileges. An executable file may be dropped by malware in one or more locations on the system as part of its installation routine. A file may be dropped by malware in a shared folder as part of its propagation routine, or to enable transmission of stolen data. A-31
168 Deep Discovery Analyzer 5.0 Administrator's Guide CHARACTERISTICS Executes dropped file Shares folder Renames downloaded file Drops file with infectible type Deletes file DESCRIPTION Execution of a dropped file is considered suspicious because this behavior is often only attributed to malware and certain installers. A folder may be shared by malware as part of its propagation routine, or to enable transmission of stolen data. Malware may rename a file that it downloaded to conceal the file and to avoid detection. Certain types of files, such as shortcut links and document files, may be dropped by malware. Shortcut links are often used to lure users into opening malware, while document files may contain exploit payload. Malware may delete a file to compromise the system, to remove traces of the infection, or to prevent forensic analysis. TABLE A-5. Hijack, Redirection, or Data Theft CHARACTERISTICS Installs keylogger Installs BHO Modifies configuration files Accesses data file DESCRIPTION Hooking of user keystrokes may allow malware to record and transmit the data to remote third parties. Browser helper objects (BHO) are loaded automatically each time Internet Explorer is started. BHOs may be manipulated by malware to perform rogue functions, such as redirecting web traffic. System configuration files may be modified by malware to perform rogue functions, such as redirecting web traffic or automatically running at startup. Malware may access a data file used to make detection possible (bait file). This behavior is associated with spyware or data theft programs that attempt to access local and network data files. A-32
169 Additional Resources TABLE A-6. Malformed, Defective, or With Known Malware Traits CHARACTERISTICS Causes document reader to crash Causes process to crash Fails to start Detected as known malware Detected as probable malware Rare executable file DESCRIPTION Many document files that contain exploits are malformed or corrupted. Document readers may crash because of a malformed file that contains a poorly implemented exploit. Malware may crash a process to run shellcode. This may also occur due to poorly constructed code or incompatibility issues. Malware may fail to execute because of poor construction. The file is using an aggressive pattern created for a specific malware variant. The file is using an aggressive generic pattern. This executable file has fewer than ten global detections. It may be a customized application or a file specifically used in targeted attacks. TABLE A-7. Process, Service, or Memory Object Change CHARACTERISTICS Adds service Creates mutex Creates named pipe Creates process Uses heap spray to execute code DESCRIPTION Services are often given high privileges and configured to run at startup. Mutex objects are used in coordinating mutually exclusive access to a shared resource. Because a unique name must be assigned to each mutex, the creation of such objects serves as an effective identifier of suspicious content. Named pipes may be used by malware to enable communication between components and with other malware. Creation of processes is considered suspicious because this behavior is not commonly exhibited by legitimate applications. Malware may perform heap spraying when certain processes are running. Allocation of multiple objects containing exploit code in a heap increases the chances of launching a successful attack. A-33
170 Deep Discovery Analyzer 5.0 Administrator's Guide CHARACTERISTICS Injects memory with dropped files Resides in memory Executes a copy of itself Starts service Stops process Contains exploit code in document Attempts to use document exploit DESCRIPTION Malware may inject a file into another process. Malware may inject itself into trusted processes to stay in memory and to avoid detection. Malware may execute a copy of itself to stay running. An existing service may be started by malware to stay running or to gain more privileges. A process may be stopped by malware to prevent security software and similar applications from running. Documents or SWF files may contain exploits that allow execution of arbitrary code on vulnerable systems. Such exploits are using the Trend Micro document exploit detection engine. A document or SWF file that contains an exploit may pad memory with a sequence of no-operation (NOP) instructions to ensure exploit success. TABLE A-8. Rootkit, Cloaking CHARACTERISTICS Attempts to hide file Hides file Hides registry Hides service DESCRIPTION Malware may attempt to hide a file to avoid detection. Malware may hide a file to avoid detection. Malware may hide a registry key, possibly using drivers, to avoid detection. Malware may hide a service, possibly using drivers, to avoid detection. A-34
171 Additional Resources TABLE A-9. Suspicious Network or Messaging Activity CHARACTERISTICS Creates raw socket Establishes network connection Listens on port Opens IRC channel Queries DNS server Establishes uncommon connection Sends Accesses malicious host Accesses malicious URL Accesses highly suspicious host Accesses highly suspicious URL Accesses suspicious host Accesses suspicious URL DESCRIPTION Malware may create a raw socket to connect to a remote server. Establishing a connection allows malware to check if the server is running, and then receive commands. Network connections may allow malware to receive and transmit commands and data. Malware may create sockets and listen on ports to receive commands. Opening of an Internet Relay Chat (IRC) channel may allow malware to send and receive commands. Querying of uncommon top-level domains may indicate system intrusion and connections to a malicious server. Uncommon connections, such as those using non-standard ports, may indicate system intrusion and connections to a malicious server. Sending of may indicate a spam bot or mass mailer. Hosts that are classified as malicious by the Trend Micro Web Reputation Service (WRS) may be accessed by malware. URLs that are classified as malicious by the Trend Micro Web Reputation Service (WRS) may be accessed by malware. Hosts that are classified as highly suspicious by the Trend Micro Web Reputation Service (WRS) may be accessed by malware. URLs that are classified as highly suspicious by the Trend Micro Web Reputation Service (WRS) may be accessed by malware. Hosts that are classified as suspicious or unrated by the Trend Micro Web Reputation Service (WRS) may be accessed by malware. URLs that are classified as suspicious or unrated by the Trend Micro Web Reputation Service (WRS) may be accessed by malware. A-35
172 Deep Discovery Analyzer 5.0 Administrator's Guide CHARACTERISTICS Accesses known C&C host Exhibits DDOS attack behavior Exhibits bot behavior DESCRIPTION Malware accesses known C&Cs to receive commands and transmit data. Malware exhibit certain network behavior when participating in a distributed denial of service (DDoS) attack. Compromised devices exhibit certain network behavior when operating as part of a botnet. Deep Discovery Inspector Rules RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 1 Suspicious file extension for an executable file 2 Suspicious file extension for a script file 3 Suspicious file extension for an executable file 4 Suspicious filename for a script file 5 Suspicious filename for an executable file 6 An IRC session on a nonstandard Direct Client to Client port sent an executable file 7 An IRC Bot command was 8 A packed executable file was copied to a network administrative shared space A-36
173 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 9 ly suspicious archive file 10 Medium level suspicious archive file 11 ly suspicious archive file 12 ly suspicious archive file 13 ly suspicious archive file Medium 14 File security override Medium OTHERS 15 Too many failed logon attempts 16 Suspicious URL in an instant message 17 Remote command shell 18 DNS query of a known IRC Command and Control Server 19 Failed host DNS A record query of a distrusted domain mail exchanger 20 Malware URL access attempted 22 Uniform Resource Identifier leaks internal IP addresses 23 The name of the downloaded file matches known malware Medium Medium Medium Low OTHERS OTHERS OTHERS SPYWARE A-37
174 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 24 The name of the downloaded file matches known spyware 25 Host DNS IAXFR/IXFR request from a distrusted source 26 IRC session established with a known IRC Command and Control Server 27 Host DNS Mx record query of a distrusted domain 28 Rogue service running on a nonstandard port Low Low Medium SPYWARE OTHERS OTHERS OTHERS 29 Suspicious sent Medium OTHERS 30 Message contains a malicious URL 32 Suspicious file extension for an executable file 33 IRC session is using a nonstandard port 34 Direct Client to Client IRC session sends an executable file 35 An executable file was dropped on a network administrative shared space 36 ly suspicious archive file 37 File transfer of a packed executable file through an Instant Messaging application Medium Medium Medium Medium Medium A-38
175 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 38 Multiple logon attempt failure Low OTHERS 39 Host DNS query to a distrusted DNS server Medium 40 Rogue service Medium OTHERS 41 message matches a known malware subject and contains packed executable files 43 contains a URL with a hard-coded IP address Medium FRAUD 44 Suspicious filename Low 45 File type does not match the file extension 46 Suspicious URL in an instant message 47 Suspicious packed executable files 48 Query of a distrusted domain mail exchanger using the host's DNS A record Low Low Medium Low OTHERS 49 IRC protocol Low 50 Host DNS MX record query of a trusted domain 51 message matches a known malware subject and contains an executable file 52 message sent through a distrusted SMTP server Low Low Low OTHERS A-39
176 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 54 message contains an archive file with packed executable files 55 Suspicious filename 56 Malware user-agent in an HTTP request 57 message sent to a malicious recipient 58 Default account usage Low OTHERS 59 Web request from a malware application 60 ly suspicious Peer-to-Peer activity. Medium OTHERS 61 JPEG Exploit 62 VCalender Exploit 63 Possible buffer overflow attempt Low 64 Possible NOP sled 65 Superscan host enumeration 66 False HTTP response contenttype header 67 Cross-Site Scripting (XSS) Medium Low OTHERS OTHERS 68 Oracle HTTP Exploit OTHERS 70 Spyware user-agent in HTTP request SPYWARE A-40
177 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 71 Embedded executable in a Microsoft Office file 72 contains a suspicious link to a possible phishing site. Medium FRAUD 74 SWF exploit 75 ANI exploit 76 WMF exploit 77 ICO exploit 78 PNG exploit 79 BMP exploit 80 EMF exploit 81 Malicious DNS usage 82 harvesting 83 Browser-based exploit 85 Suspicious file download Low 86 Suspicious file download 87 Exploit payload 88 Downloaded file matches a known malware filename 89 Downloaded file matches a known spyware filename 90 Suspicious packed file transferred through TFTP A-41
178 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 91 Executable file transferred through TFTP Medium 92 Phishing site access attempted Medium 93 Keylogged data uploaded 94 SQL Injection 95 Successful brute-force attack OTHERS 96 message contains a suspicious link to a possible phishing site FRAUD 97 Suspicious HTTP Post OTHERS 98 Unidentified protocol is using the standard service port OTHERS 99 Suspicious IFrame 100 BOT IRC nickname 101 Suspicious DNS Medium 102 Successful logon made using a default account 104 Possible Gpass tunneling 105 Pseudorandom Domain name query Low Low OTHERS OTHERS 106 Info-Stealing malware Low 107 Info-Stealing malware Low 108 Info-Stealing malware Low 109 Malware URL access attempted A-42
179 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 110 Data Stealing malware URL access attempted 111 Malware URL access attempted 112 Data Stealing malware URL access attempted 113 Data Stealing malware sent 114 Data Stealing malware sent 115 Data Stealing malware FTP connection attempted 116 DNS query of a known public IRC C&C domain 117 Data Stealing malware IRC Channel 118 IRC connection established with known public IRC C&C IP address 119 Data Stealing malware sent instant message Medium Medium 120 Malware IP address accessed 121 Malware IP address/port pair accessed 122 Info-Stealing malware Medium 123 Possible malware HTTP request 126 Possible malware HTTP request Low Medium A-43
180 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 127 Malware HTTP request 128 TROJ_MDROPPER HTTP request Low 130 IRC Test pattern Low 131 Malware HTTP request 135 Malware URL access attempted 136 Malware domain queried 137 Malware user-agent in HTTP request 138 Malware IP address accessed 139 Malware IP address/port pair accessed 140 Network based exploit attempt 141 DCE/RPC Exploit attempt 142 Data Stealing malware IRC Channel connection 143 Malicious remote command shell 144 Data Stealing malware FTP connection attempted OTHERS 145 Malicious sent 150 Remote Command Shell Low OTHERS 151 Hacktool ASPXSpy for Webservers Low OTHERS A-44
181 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 153 DOWNAD Encrypted TCP connection Low 155 DHCP-DNS Changing malware 158 FAKEAV URI 159 Possible FakeAV URL access attempted Low 160 ZEUS HTTP request 161 CUTWAIL URI 162 DONBOT SPAM 163 HTTP Suspicious URL Medium 164 PUSHDO URI 165 GOLDCASH HTTP response 167 MYDOOM Encrypted TCP connection 168 VUNDO HTTP request 169 HTTP Meta tag redirect to an executable 170 HTTP ActiveX Codebase Exploit Medium Medium 172 Malicious URL 173 PUBVED URI 178 FAKEAV HTTP response A-45
182 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 179 FAKEAV HTTP response 182 FAKEAV HTTP response 183 MONKIF HTTP response 185 PALEVO HTTP response 189 KATES HTTP request 190 KATES HTTP response 191 BANKER HTTP response 195 DOWNAD HTTP request 196 GUMBLAR HTTP response 197 BUGAT HTTPS connection 199 GUMBLAR HTTP response 200 GUMBLAR HTTP response Medium Medium 206 BANDOK URI 207 RUSTOCK HTTP request 208 CUTWAIL HTTP request A-46
183 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 209 NUWAR URI 210 KORGO URI 211 PRORAT URI 212 NYXEM HTTP request 213 KOOBFACE URI 214 BOT URI 215 ZEUS URI 216 PRORAT SMTP request 217 DOWNLOAD URI 218 SOHANAD HTTP request 219 RONTOKBRO HTTP request 220 HUPIGON HTTP request 221 FAKEAV HTTP request 224 AUTORUN URI 226 BANKER SMTP connection 227 AGENT User Agent 229 HTTPS Malicious Certificate Medium A-47
184 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 230 HTTPS Malicious Certificate 231 HTTPS Malicious Certificate 232 HTTPS Malicious Certificate 233 DAWCUN TCP connection 234 HELOAG TCP connection 235 AUTORUN HTTP request Medium Medium Medium 236 TATERF URI 237 NUWAR HTTP request 238 EMOTI URI 239 FAKEAV HTTP response 240 HUPIGON User Agent 241 HTTP Suspicious response Medium Medium 246 BHO URI 247 ZBOT HTTP request 249 ZBOT URI 250 ZBOT IRC channel 251 KOOBFACE URI A-48
185 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 252 BREDOLAB HTTP request 253 RUSTOCK URI 255 FAKEAV HTTP request 256 SILLY HTTP response 257 KOOBFACE HTTP request 258 FAKEAV HTTP request 259 FAKEAV HTTP request 260 FAKEAV HTTP request 261 FAKEAV HTTP request 262 FAKEAV URI 263 AUTORUN URI 264 ASPORX HTTP request 265 AUTORUN HTTP request 266 GOZI HTTP request 267 AUTORUN URI 268 KOOBFACE HTTP request A-49
186 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 269 AUTORUN IRC nickname 270 VIRUT IRC response 271 AUTORUN HTTP request 272 AUTORUN HTTP request 273 AUTORUN HTTP request 274 CAOLYWA HTTP request 275 AUTORUN FTP connection 276 AUTORUN HTTP request 277 AUTORUN HTTP response 278 AUTORUN HTTP request 279 AUTORUN HTTP request 280 AUTORUN HTTP request 281 BUZUS HTTP request 282 FAKEAV HTTP request 283 FAKEAV HTTP request A-50
187 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 284 AGENT HTTP request 285 AGENT TCP connection 286 KOLAB IRC nickname 287 VB MSSQL Query 288 PROXY URI 289 LDPINCH HTTP request 290 SWISYN URI 291 BUZUS HTTP request 292 BUZUS HTTP request 295 SCAR HTTP request 297 ZLOB HTTP request 298 HTTBOT URI 299 HTTBOTUser Agent 300 HTTBOT HTTP request 301 SASFIS URI 302 SWIZZOR HTTP request 304 PUSHDO TCP connection A-51
188 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 306 BANKER HTTP request 307 GAOBOT IRC channel 308 SDBOT IRC nickname 309 DAGGER TCP connection 310 HACKATTACK TCP connection 312 CODECPAC HTTP request 313 BUTERAT HTTP request 314 FAKEAV HTTP request 315 CIMUZ URI 316 DEMTRANNC HTTP request 317 ENFAL HTTP request 318 WEMON HTTP request 319 VIRTUMONDE URI Medium 320 DROPPER HTTP request 321 MISLEADAPP HTTP request A-52
189 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 322 DLOADER HTTP request 323 SPYEYE HTTP request 324 SPYEYE HTTP response 325 SOPICLICK TCP connection 326 KOOBFACE HTTP request 327 PALEVO UDP connection 328 AGENT Malformed SSL 329 OTLARD TCP connection 330 VUNDO HTTP request 331 HTTP Suspicious User Agent 332 VBINJECT IRC connection 333 AMBLER HTTP request 334 RUNAGRY HTTP request 337 BUZUS IRC nickname Medium A-53
190 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 338 TEQUILA HTTP request 339 FAKEAV HTTP request 340 CUTWAIL SMTP connection 341 MUMA TCP connection 342 MEGAD SMTP response 343 WINWEBSE URI 344 VOBFUS TCP connection 345 BOT IRC nickname 347 BOT IRC nickname 348 TIDISERV HTTP request 349 BOT HTTP request 351 ZLOB HTTP request 352 SOHANAD HTTP request 353 GENETIK HTTP request 354 LEGMIR HTTP request 355 HUPIGON HTTP request A-54
191 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 356 IEBOOOT UDP connection 357 FAKEAV HTTP request 358 FAKEAV HTTP request 359 STRAT HTTP request 360 STRAT HTTP request 361 STRAT HTTP request 362 SALITY URI 363 AUTORUN HTTP response 364 AUTORUN HTTP request 365 CODECPAC HTTP request 366 TRACUR HTTP request 367 KOLAB TCP connection 368 MAGANIA HTTP request 369 PAKES URI 370 POSADOR HTTP request 371 FAKEAV HTTP request A-55
192 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 372 GHOSTNET TCP connection 373 CLICKER HTTP response 374 VIRUT HTTP request 375 FAKEAV HTTP request 376 DLOADER HTTP request 377 FAKEAV HTTP request 378 DLOADER HTTP request 379 GENOME HTTP request 380 GENOME HTTP request 381 GENOME HTTP request 382 GENOME HTTP request 383 GENOME HTTP request 384 GENOME HTTP request 385 FAKEAV URI 386 UTOTI URI A-56
193 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 387 THINSTALL HTTP request 389 GERAL HTTP request 390 UNRUY HTTP request 392 BREDOLAB HTTP request 393 ZAPCHAST URI 395 KOOBFACE HTTP request 396 KOOBFACE URI 397 BIFROSE TCP connection 398 ZEUS HTTP request Medium 399 MUFANOM HTTP request 400 STARTPAGE URI 401 Suspicious File transfer of an LNK file Medium 402 TDSS URI 403 CODECPAC HTTP request 404 DOWNAD TCP connection 405 SDBOT HTTP request A-57
194 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 406 MYDOOM HTTP request 407 GUMBLAR HTTP request 408 POEBOT IRC bot commands 409 SDBOT IRC connection Medium 410 HTTP DLL inject Medium OTHERS 411 DANMEC HTTP request 412 MOCBBOT TCP connection 413 OSCARBOT IRC connection 414 STUXNET SMB connection 415 SALITY SMB connection Medium 416 SALITY URI 417 BUZUS IRC nickname Medium 418 VIRUT IRC channel Medium 419 LICAT HTTP request Medium 420 PROXY HTTP request 421 PROXY HTTP request A-58
195 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 422 QAKBOT HTTP request 423 FAKEAV HTTP request 424 QAKBOT FTP dropsite 425 QAKBOT HTTP request 426 SALITY HTTP request 427 AURORA TCP connection 428 KOOBFACE HTTP request 429 KOOBFACE HTTP request 430 KOOBFACE HTTP request 431 SPYEYE HTTP request 432 KELIHOS HTTP request 433 KELIHOS TCP connection Medium Medium Medium Medium Medium 434 BOHU URI Medium 435 UTOTI HTTP request Medium 436 CHIR UDP connection Medium A-59
196 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 437 REMOSH TCP connection 438 ALUREON URI Medium 439 FRAUDPACK URI Medium 440 FRAUDPACK URI Medium 441 SMB DLL injection exploit 443 QDDOS HTTP request 444 QDDOS HTTP request 445 QDDOS TCP connection 446 OTORUN HTTP request 447 OTORUN HTTP request 448 QAKBOT HTTP request 450 FAKEAV HTTP request Medium Medium Medium Medium OTHERS 451 FAKEAV URI 452 LIZAMOON HTTP response 453 Compromised site with malicious URL 454 Compromised site with malicious URL Medium OTHERS OTHERS A-60
197 Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 455 HTTP SQL Injection OTHERS 456 HTTPS_Malicious_Certificate3 Medium OTHERS 457 FAKEAV HTTP request 994 HTTP_REQUEST_BAD_URL_ HASH 1004 HTTP_REQUEST URL 1321 HTTP_REQUEST_TSPY_ONL INEG Medium Low Low Low 1342 HTTPS_Malicious_Certificate2 Low 1343 HTTPS_Malicious_Certificate2 Low 1344 HTTPS_Malicious_Certificate2 Low 1345 HTTPS_Malicious_Certificate2 Low 1365 REALWIN_LONG_USERNAM E_EXPLOIT 1366 REALWIN_STRING_STACK_ OVERFLOW_EXPLOIT 1367 REALWIN_FCS_LOGIN_STA CK_OVERFLOW_EXPLOIT 1368 REALWIN_FILENAME_STAC K_OVERFLOW_EXPLOIT 1369 REALWIN_MSG_STACK_OVE RFLOW_EXPLOIT 1370 REALWIN_TELEMETRY_STA CK_OVERFLOW_EXPLOIT Low Low Low Low Low Low OTHERS OTHERS OTHERS OTHERS OTHERS OTHERS A-61
198 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 1371 REALWIN_STARTPROG_STA CK_OVERFLOW_EXPLOIT 1372 Interactive_Graphical_SCADA _System_Program_Execution_ Exploit 1373 Interactive_Graphical_SCADA _System_STDREP_Overflow_ Exploit 1374 Interactive_Graphical_SCADA _System_Shmemmgr_Overflo w_exploit 1375 Interactive_Graphical_SCADA _System_RMS_Report_Overfl ow_exploit 1376 Interactive_Graphical_SCADA _System_File_Funcs_Overflow _Exploit Low Low Low Low Low Low OTHERS OTHERS OTHERS OTHERS OTHERS OTHERS A-62
199 Index A account management, 7-16 Activation Code, 7-22 administration, 5-32 archive file passwords, 5-32 API key, 7-25 C C&C list, 5-16 community, 8-2 components, 7-2 updates, 7-2 contact management, 7-19 customized alerts and reports, 6-8 custom network, 2-2 custom port, 2-4 D dashboard, 4-6 dashboard tabs, 4-2 overview, 4-2 widgets, 4-2, 4-6 deployment tasks, 2-8 hardware setup, 2-8 installation, 2-12 E scanning archive file passwords, 5-32 Ethernet cables, 2-5 exceptions, 5-19 F form factor, 2-2 G generated reports, 6-2 getting started tasks, 3-9 H hot fix, 7-4 I images, 5-27, 5-28 integration with other Trend Micro products, 3-10 IP addresses (for product), 2-4 L license, 7-22 log settings, 7-15 syslog server, 7-15 M management console, 3-7 navigation, 3-8 session duration, 7-14 management console accounts, 7-16 management network, 2-2 management port, 2-4 N network environment, 2-2 O on-demand reports, 6-3 online community, 8-2 OVA, 5-27 P patch, 7-4 IN-1
200 Deep Discovery Analyzer 5.0 Administrator's Guide port, 2-4 power supply, 2-9 preconfiguration console, 3-2 operations, 3-3 product integration, 3-10 product specifications, 2-2 R reports, 6-2, 6-3 on demand, 6-3 report schedules, 6-5 S sandbox analysis, 5-2 sandbox images, 5-27, 5-28 sandbox instances, 5-30 sandbox management, 5-22 archive passwords, 5-32 images, 5-27 importing, 5-28 modifying instances, 5-30 image status, 5-23 network connection, 5-25 Virtual Analyzer status, 5-23 service pack, 7-4 session duration (for management console), 3-8 software on sandbox image, A-16 submissions, 5-2 manual submission, 5-14 support knowledge base, 8-2 resolve issues faster, 8-4 TrendLabs, 8-6 suspicious objects, 5-16 syslog server, 7-15 system settings, 7-6 Date and Time Tab, 7-11 Host Name and IP Address Tab, 7-7 Password Policy Tab, 7-13 Power Off / Restart Tab, 7-14 Proxy Settings Tab, 7-9 Session Timeout Tab, 7-14 SMTP Settings Tab, 7-10 T tabs in dashboard, 4-3 third-party licenses, 7-25 tools, 7-21 TrendLabs, 8-6 U updates, 7-2 component updates, 7-2 product updates, 7-4 update settings, 7-3 V Virtual Analyzer, 5-2, 5-32 archive file passwords, 5-32 Virtual Analyzer image, A-16, A-18 Virtual Analyzer Sensors, A-18 W widgets, 4-4 add, 4-6 IN-2
201
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
http://docs.trendmicro.com/en-us/enterprise/cloud-app-encryption-foroffice-365.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the cloud service described herein without notice. Before installing and using the cloud service, review the readme files,
Copyright 2013 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Trend Micro Email Encryption Gateway 5
Trend Micro Email Encryption Gateway 5 Secured by Private Post Quick Installation Guide m Messaging Security Trend Micro Incorporated reserves the right to make changes to this document and to the products
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
http://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme
http://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
http://docs.trendmicro.com/en-us/enterprise/deep-discovery-advisor.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Table of Contents. Preface. Chapter 1: Getting Started with Endpoint Application Control. Chapter 2: Updating Components
Table of Contents Preface Preface... v Endpoint Application Control Documentation... vi Audience... vi Document Conventions... vii Terminology... viii Chapter 1: Getting Started with Endpoint Application
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Online Help StruxureWare Data Center Expert
Online Help StruxureWare Data Center Expert Version 7.2.1 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.
Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
http://docs.trendmicro.com/en-us/home.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
User Guide. Cloud Gateway Software Device
User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
for Small and Medium Business Quick Start Guide
for Small and Medium Business Quick Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described herein without notice. Before using
http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Worry-FreeTM. Business Security Standard and Advanced Editions. Installation and Upgrade Guide. Administrator s Guide
8 Worry-FreeTM Business Security Standard and Advanced Editions Securing Your Journey to the Cloud Administrator s Guide Installation and Upgrade Guide Trend Micro Incorporated reserves the right to make
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
EMC Data Protection Search
EMC Data Protection Search Version 1.0 Security Configuration Guide 302-001-611 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published April 20, 2015 EMC believes
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
How To Set Up A Thermal Cycler With Veritilink Remote Management Software
Installation Guide VeritiLink Remote Management Software Version 1.0 Installation Guide Getting Started VeritiLink Remote Management Software Version 1.0 Setting Up the Veriti Thermal Cyclers Setting
PHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
AV Management Dashboard
LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data
Overview of WebMux Load Balancer and Live Communications Server 2005
AVANU Load Balancing for Microsoft Office Live Communications Server 2005 WebMux Delivers Improved Reliability, Availability and Scalability Overview of WebMux Load Balancer and Live Communications Server
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
USER GUIDE: MaaS360 Services
USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
IBM Security SiteProtector System Configuration Guide
IBM Security IBM Security SiteProtector System Configuration Guide Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 209. This edition
http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
Eucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
Table of Contents. Contents
Contents Copyright 2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed,
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Quick Start Guide. Sendio Email System Protection Appliance. Sendio 5.0
Sendio Email System Protection Appliance Quick Start Guide Sendio 0 Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +949.274375 www.sendio.com QUICK START GUIDE SENDIO This Quick Start
Configuration Guide. Websense Web Security Solutions Version 7.8.1
Websense Web Security Solutions Version 7.8.1 To help you make the transition to Websense Web Security or Web Security Gateway, this guide covers the basic steps involved in setting up your new solution
CTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
IM Security for Microsoft Office Communications Server 1 Instant Protection for Instant Messaging
TM IM Security for Microsoft Office Communications Server 1 Instant Protection for Instant Messaging Installation and Deployment Guide m s Messaging Security Trend Micro Incorporated reserves the right
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
User Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide
IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright
ReadyNAS Setup Manual
ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,
http://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Unified Security Management (USM) 5.2 Vulnerability Assessment Guide
AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
AlienVault. Unified Security Management (USM) 4.8-5.x Initial Setup Guide
AlienVault Unified Security Management (USM) 4.8-5.x Initial Setup Guide Contents USM v4.8-5.x Initial Setup Guide Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault, AlienVault
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
CTERA Agent for Linux
User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
BusinessObjects Enterprise InfoView User's Guide
BusinessObjects Enterprise InfoView User's Guide BusinessObjects Enterprise XI 3.1 Copyright 2009 SAP BusinessObjects. All rights reserved. SAP BusinessObjects and its logos, BusinessObjects, Crystal Reports,
TREND MICRO. InterScan VirusWall 6. SMTP Configuration Guide. Integrated virus and spam protection for your Internet gateway.
TM TREND MICRO TM TM InterScan VirusWall 6 Integrated virus and spam protection for your Internet gateway for Linux TM SMTP Configuration Guide Trend Micro Incorporated reserves the right to make changes
Backup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
Server Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
Trend Micro, Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro, Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
NETWORK PRINT MONITOR User Guide
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Administrator Operations Guide
Administrator Operations Guide 1 What You Can Do with Remote Communication Gate S 2 Login and Logout 3 Settings 4 Printer Management 5 Log Management 6 Firmware Management 7 Installation Support 8 Maintenance
CTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
Client Server Messaging Security3
Client Server Messaging Security3 for Small and Medium Business Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without
CounterACT 7.0 Single CounterACT Appliance
CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment
3.5 EXTERNAL NETWORK HDD. User s Manual
3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
InfoView User s Guide. BusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 InfoView User s Guide BusinessObjects Enterprise XI Release 2 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0
Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
