Views:

Learn about the threat types of security risks and anomalies in Correlated Intelligence that are predefined by Trend Micro.

The following table lists the threat types of security risks and anomalies that Correlated Intelligence can detect.
To view details about the security risks of each threat type and their associated predefined correlation rules and detection signals, go to PoliciesGlobal SettingsCorrelated IntelligenceCorrelation Rules and Detection Signals.
Threat Type
Security Risk or Anomaly
Description
Phishing - Advanced Phishing
Security risk
A type of phishing that uses more sophisticated techniques to evade detection systems. For example, advanced phishing uses anti-bot mechanisms to prevent security solutions from accessing the email content for analysis, or it can redirect to a legitimate web page instead showing a phishing website to security solutions.
Phishing - Data Exfiltration
Security risk
A type of phishing that uses various techniques to steal users' data, such as credentials. For example, it might leverage existing form services to show a fake logon page to users.
Suspicious Email
Anomaly
Email with unusual traits that appear suspicious and may signal potential threats.
Possibly Unwanted Email
Anomaly
Email that may be unsolicited and deemed undesirable or unnecessary by the recipient.