Views:

Define your network topography to help your Network Sensors better detect threats and monitor critical resources.

Network Resources provides a set of lists you can use to define your network topography. Using these lists allows your connected appliances to better identify the source of threats and recognize which critical assets in your environment require additional monitoring. You can add network resources to each list, edit the lists, import files to configure each list, or export the lists to edit them.
Turn on Enable central management of Deep Discovery Inspector resources to sync with connected Deep Discovery Inspector appliances version 6.7 or later.
Important
Important
Before enabling central management of Deep Discovery Inspector resources, Trend Micro recommends you export the Network Resources settings file in Deep Discovery Inspector to backup your systems settings.
Each list provides a specific function and is synchronized across all connected appliances and supported products. You can access Network Resources by navigating to Network SecurityNetwork Analysis ConfigurationNetwork Resources.
Note
Note
Network Resources was formerly called Network Assets in Deep Discovery Director. The names of some lists have also changed.
Table
Description
Supported Products
Trusted Domain List
Domains used by your company for internal purposes or those considered trustworthy.
Identifying trusted domains ensures detection of unauthorized domains.
Click Add Recommendations to view a list of possible trusted domains based on analysis of detection logs and network activity.
Note
Note
Trusted Domain List is called Registered Domains in Deep Discovery Director and Deep Discovery Inspector.
Virtual Network Sensors
Deep Discovery Inspector appliances
Trusted Service Source List
Dedicated servers for specific services that your company uses internally or considers trustworthy.
Identifying trusted services in the network helps ensure detection of unauthorized applications and services.
Click Add Recommendations to view a list of possible trusted service source IP addresses based on analysis of detection logs and network activity.
Note
Note
Trusted Service Source List is called Registered Services in Deep Discovery Director and Deep Discovery Inspector.
Virtual Network Sensors
Network Analytics correlation engine
Deep Discovery Inspector appliances
Important
Important
Deep Discover Inspector does not support the following services:
  • Safe Client
  • Safe Server
Network Group List
Groups of monitored networks based on IP addresses or ranges within your environment.
Identifying network groups helps determine whether attacks originate from within your network or outside.
Note
Note
Network Group List is called Network Groups in Deep Discovery Director and Deep Discovery Inspector.
Virtual Network Sensors
Network Analytics correlation engine
Deep Discovery Inspector appliances
Report Exclusion List
Domains which you consider safe and wish to exclude from the Network Analytics Report screen.
Listed domains are not included in the Network Analytics Report screen. Network Sensors still monitor these domains and record events as normal. You can remove a domain from the list at any time to include the domain and related interactions in reports for both past and future events.
Note
Note
Report Exclusion List is called Domain Exceptions in Deep Discovery Director.
Network Analytics correlation engine
Priority Server List
Servers within your environment which you consider high-priority for event tracking and incident reporting.
Note
Note
Priority Server List is called Priority Watch List in Deep Discovery Director.
Network Analytics correlation engine