Trend Micro Apex Central checks Web Reputation, URL filtering, network content
inspection, and rule-based detection logs received from all managed products and then
compares these logs with its list of suspicious objects.
Procedure
- Go to .The Virtual Analyzer Suspicious Objects screen appears.
- Click the Objects tab.
- Expand the arrow to the left of the Object
you want to view.
-
The At Risk Endpoints list displays all endpoints and users still affected by the suspicious object.
-
For File detections, the Latest Action Result column displays the last action result reported from managed products.
-
For all other detection types, the Latest Action Result column displays
N/A
.
-
-
The At Risk Recipients list displays all recipients still affected by the suspicious object.
-