Views:
Provides specific information about suspicious threats on your network, such as the managed product that detected the suspicious threat, specific information about the source and destination, and the total number of suspicious threats on the network

Detailed Suspicious Threat Information Data View

Data
Description
Received
The date and time Trend Micro Apex Central received the data from the managed product
Generated
The date and time the managed product generated the data
Product Entity
The display name of the managed product server in Trend Micro Apex Central
Product
The name of the managed product or service
Example: Apex One, ScanMail for Microsoft Exchange
Mitigation Host
The host name of the mitigation server (for example, Network VirusWall Enforcer or Threat Mitigator)
Traffic/Connection
The direction of the transmission
Protocol Group
The broad protocol group from which the managed product detected the threat
Example: FTP, HTTP, P2P
Protocol
The protocol from which the managed product detected the suspicious threat
Example: ARP, BitTorrent
Destination IP Address
The IP address that the threat accessed
Destination Host
The display name of the endpoint that the threat accessed
Destination Port
The IP port number that the threat accessed
Destination MAC Address
The MAC address that the threat accessed
Destination OS
The operating system on the endpoint that the threat accessed
Destination User <x>
The name used to log on to the target host
<x> is the user name
Logon (Destination User <x>)
The logon timestamp
<x> represents the number of logon times and the specific timestamp
Source IP Address
The source IP address of the detected threat
Source Host Name
The name of the endpoint from which the security threat originated
Source Port
The source IP address port number of the detected threat
Source MAC Address
The source MAC address of the detected threat
Source OS
The operating system on the endpoint from which the security threat originated
Source User <x>
The name used to log on to the target source host
<x> is the user names
Logon (Source User <x>)
The logon timestamp on the source
<x> represents the number of logon times and the specific timestamp
Source Domain
The domain of the endpoint from which the threat originated
Security Threat Type
The type of security threat
Example: virus, spyware/grayware, fraud
Policy/Rule
The policy or rule that triggered the detection
Recipient
The recipient(s) of the transmission that triggered the detection
Sender
The sender of the transmission that triggered the detection
Subject
The subject of the email message that triggered the detection
Attachment File Name
The file name and extension of the attachment
Attachment File Type
The file type of the attachment
Attachment SHA-1
The SHA-1 hash value of the attachment
URL
The URL considered a suspicious threat
User
The user name logged on to the destination when the managed product detected the threat
IM/IRC User
The instant messaging or IRC user name logged on when Deep Discovery Inspector detects a violation.
Browser/FTP Client
The web browser or FTP endpoint where the suspicious threat originates.
File
The name of the file object or the program that executed the process
File in Compressed File
The name of the affected file object in the compressed archive
Archive SHA-1
The SHA-1 hash value of the archived file object
Archive File Type
The type of archived file object
Shared Folder
Displays whether the suspicious threat originates from a shared folder
SHA-1
The SHA-1 hash value of the file object
Mitigation Action
The action taken by the mitigation server
Example: File cleaned, File dropped, File deleted
Mitigation Result
The result of the action taken by the mitigation server
Source IP Group
The IP address group of the source where the suspicious threat originates
Source Network Zone
The network zone of the source where the suspicious threat originates
Endpoint Group
The IP address group of the endpoint the suspicious threat affects
Endpoint Network Zone
The network zone of the endpoint the suspicious threat affects
Detections
The total number of detections
Example: A managed product detects 10 violation instances of the same type on one computer.
Detections = 10
C&C List Source
The C&C list source that identified the C&C server
  • C&C IP List
  • Global Intelligence List
  • User-defined IP List
  • Virtual Analyzer List
C&C Risk Level
The risk level of the C&C callback
Remarks
Additional information about the event
C&C Server
The name, URL, or IP address of the C&C server
C&C Server Type
The type of C&C server
Malware Type
The type of malware