Detect emerging threats using Threat Intelligence

The Threat Intelligence feature was formerly called Connected Threat Defense. If you were previously using Connected Threat Defense, see Migrating from Connected Threat Defense to Threat Intelligence.

In the modern data center, more and more security breaches are a result of targeted attacks using techniques such as phishing and spear-phishing. In these cases, malware writers can bypass traditional malware scanners by creating malware specifically targeted for your environment. Deep Security provides enhanced malware protection for new and emerging threats through its Threat Intelligence feature.

Threat Intelligence is not available when FIPS mode is enabled. See FIPS 140 support.

In this article:

For an overview of the Anti-Malware module, see About Anti-Malware.

How does Threat Intelligence work?

  1. When all the components are configured properly, the Deep Security Agent uses heuristic detection to analyze files on the protected computer and determines whether they are suspicious.
  2. Optionally, you can manually or automatically send suspicious files from Deep Security to Trend Micro Vision One or Deep Discovery Analyzer, which executes and observes the suspicious file in a sandbox (a secure, isolated virtual environment).
  3. Deep Security Manager gets the sandbox analysis results from Trend Micro Vision One or Deep Discovery Analyzer.

    The sandbox analysis report doesn’t provide protection; it simply provides information on the Trend Micro Vision One or Deep Discovery analysis. For complete protection, this feature requires a connection to Trend Micro Vision One or Trend Micro Apex Central. The report is retrieved from Trend Micro Vision One or Deep Discovery Analyzer every 15 minutes.

  4. You can configure Deep Security to submit suspicious files to other services for further analysis. If submitting suspicious files to Trend Micro Vision One, the analysis results are forwarded to Trend Micro Vision One Threat Intelligence. If submitting suspicious files to Deep Discovery Analyzer, it pushes the analysis results to Trend Micro Apex Central, where an action can be specified for the file based on the analysis. Once the action is specified, a list of emerging threats called a suspicious object list is created or updated. Other Trend Micro products, such as Deep Discovery Inspector or Deep Discovery Email Inspector, may also be connected to Trend Micro Vision One or Trend Micro Apex Central and able to update the list.
  5. Optionally, you can configure Deep Security Manager to receive the list of suspicious objects from Trend Micro Vision One or Trend Micro Apex Central and send the list of suspicious objects to Deep Security Agents.

Check the Threat Intelligence prerequisites

Before connecting Deep Security to Deep Discovery, check that your environment meets these requirements:

  • Deep Security Manager is installed and configured with Deep Security Agents protecting computers.

Optional:

  • To connect to Trend Micro Vision One (XDR):
  • To connect to Deep Discovery Analyzer, ensure that Deep Discovery Analyzer 5.5 is installed and the sandbox virtual machines are provisioned.
  • To connect to Trend Micro Apex Central, ensure that Apex Central 2019 or later is installed.
  • Add Deep Discovery Analyzer to the Trend Micro Apex Central Managed Servers. See the Trend Micro Apex Central documentation for details.

Set up a connection to Trend Micro Vision One

You can configure Deep Security to submit the suspicious files and retrieve the suspected object list from Trend Micro Vision One, share it with protected computers, and compare local objects against the Trend Micro Vision One Threat Intelligence Suspicious Object List.

  1. In Deep Security Manager, go to Administration > System Settings > Threat Intelligence.
  2. Select Submit suspicious files to and then Trend Micro Vision One.
  3. Select Compare objects against Suspicious Object List and then Trend Micro Vision One.

Set up a connection to Deep Discovery Analyzer

If you want Deep Security Manager to send suspicious files to Deep Discovery Analyzer for analysis, you'll need to set up a connection.

Set up a connection to Trend Micro Apex Central

When you configure these settings, Deep Security Manager will be able to retrieve the suspected object list from Trend Micro Apex Central, share it with protected computers, and compare local objects against the Apex Central Suspicious Object List.

Create a malware scan configuration for use with Threat Intelligence

The following configuration allows Deep Security to detect suspicious files, back up the suspicious files, and automatically send them to Sandbox Analysis for further analysis.

  1. In Deep Security Manager, go to Policies > Common Objects > Other > Malware Scan Configurations.
  2. Create a new scan configuration or edit an existing configuration.
  3. On the General tab, under Document Exploit Protection, select Scan documents for exploits and select one of these options:
    • Scan for exploits against known critical vulnerabilities only: Only detects known critical vulnerabilities. The CVE Exploit vulnerability type is associated with this option (See Customize malware remedial actions.)
    • Scan for exploits against known critical vulnerabilities and aggressive detection of unknown suspicious exploits: Detects more issues but may also result in more false positives. If you want to detect suspicious files and submit them to Trend Micro Vision One or Deep Discovery Analyzer, you must select this option. The Aggressive Detection Rule vulnerability type is associated with this option. (See Customize malware remedial actions.)
  4. Configure the other malware scan settings as described in Configure malware scans and exclusions.

Enable Threat Intelligence for your computers

You can enable Threat Intelligence in policies or for individual computers.

  1. In the Computer or Policy editorClosedYou can change these settings for a policy or for a specific computer. To change the settings for a policy, go to the Polices page and double-click the policy that you want to edit (or select the policy and click Details). To change the settings for a computer, go to the Computers page and double-click the computer that you want to edit (or select the computer and click Details)., go to Anti-Malware > General.
  2. Ensure that the Anti-Malware State is On or Inherited (On).
  3. The General tab contains sections for Real-Time Scan, Manual Scan, and Scheduled Scan. (For information on the different types of scans, see Enable and configure anti-malware.) In the appropriate sections, use the Malware Scan Configuration list to select the scan configuration that you created above.
  4. Go to the Threat Intelligence tab and adjust these settings as required:
    • If you want Deep Security to send suspicious files to Trend Micro Vision One or Deep Discovery Analyzer, set the option under Sandbox Analysis to Yes or Inherited (Yes).
    • If you have set up a connection between Deep Security and Trend Micro Apex Central and you want to use the suspicious object list from Apex Central to detect malicious files, set Use Suspicious Object List (under Suspicious Objects List) to Yes or Inherited (Yes).
  5. Select Save.

Manually submit a file to Sandbox Analysis

You can manually submit files that appear on the Events & Reports > Events > Anti-Malware Events > Identified Files page.

  1. Select the file that you want to submit and select the Analyze button.
  2. Follow the steps in the wizard that appears.
  3. After the file is submitted, you can check the progress of its analysis in the Submission Status column on the Identified Files page.
  4. When the analysis is finished, the Submission Status column will display "Results Ready". You can select the Results Ready link to see details.

Allow a file that has raised a false alarm

If a file is identified as malware on the Events & Reports > Events > Anti-Malware Events > Identified Files page but you know it's not malware, you can add it to the Document Exploit Protection Rule Exceptions list on the Anti-Malware > Advanced tab of the Computer or Policy editorClosedYou can change these settings for a policy or for a specific computer. To change the settings for a policy, go to the Polices page and double-click the policy that you want to edit (or select the policy and click Details). To change the settings for a computer, go to the Computers page and double-click the computer that you want to edit (or select the computer and click Details)..

To allow the file, right-click it, select Allow, and follow the steps in the wizard that appears.

Configure the scan action for a suspicious file

You can view the suspicious objects list in the Trend Micro Vision One or Trend Micro Apex Central console and configure the action (log, block, or quarantine) that should be taken when a suspicious object is found. (For details on configuring the actions, see the help for Trend Micro Vision One or Apex Central.) If you have configured Deep Security Manager to obtain the suspicious object list from Trend Micro Vision One or Apex Central, Deep Security will perform the specified action when it finds the suspected object.

Deep Security supports file suspicious objects. It also supports URL suspicious objects if the Web Reputation protection module is configured to use the Trend Micro Smart Protection Server. Deep Security does not support IP and domain suspicious objects.

Update the suspicious objects list in Deep Security

After the analysis of a suspicious object has been completed and the action for the file has been set in Trend Micro Vision One or Trend Micro Apex Central, Deep Security can use the Suspicious Object list from Trend Micro Vision One or Apex Central to protect your computers. To manually update the suspicious file list in Deep Security Manager, go to Administration > Updates > Security and use the controls in the Suspicious Object List Updates column to get the latest list and send it to your protected computers. You can also create a scheduled task that regularly checks for an updated list (see Schedule Deep Security to perform tasks).

In Trend Micro Apex Central, the default suspicious object setting is "Log". You may want to consider changing the default setting to "Quarantine" or "Block".

In Trend Micro Vision One Threat Intelligence Suspicious Object Management, you can select the Default Settings in the upper-right corner, and specify the default actions to take on different types of objects at each risk level and the expiration settings for the objects. In Trend Micro Apex Central, the default suspicious object setting is "Log". You may want to consider changing the default setting to "Quarantine" or "Block".

Once the suspicious object list has been updated in Deep Security and the computer policies have been updated with the action specified, the Deep Security Agent then checks the affected computers and uses this action any time this file is encountered again on a protected computer.

Configure Threat Intelligence in a multi-tenant environment

In a multi-tenant environment, the primary tenant (t0) can choose whether to share their Deep Discovery Analyzer and Trend Micro Apex Central settings with their tenants. The setting that controls this behavior is Administration > System Settings > Tenants > Allow Tenants to use Primary Tenant's Suspicious Object List and Sandbox Analysis settings:

  • When the setting is enabled and a tenant goes to Administration > System Settings > Threat Intelligence, they see an additional Use default server settings check box. When this check box is selected, the tenant uses the primary tenant's settings. When Use default server settings is not selected, the tenant can configure their own Threat Intelligence settings.
  • If the primary tenant chooses Trend Micro Vision One to submit suspicious files and compare objects against the Suspicious Object List, the tenant will connect to their own Trend Micro Vision One account, NOT the primary tenant’s Trend Micro Vision One account. Please be sure the tenants complete their own Trend Micro Vision One registration.

  • When the setting is not enabled, tenants must use their own Trend Micro Vision One, or Trend Micro Apex Central and Deep Discovery Analyzer, if they want to use Threat Intelligence.

Supported file types

Deep Security can send these file types to Deep Discovery Analyzer:

  • doc - Microsoft Word document
  • docx - Microsoft Office Word 2007 document
  • gul - JungUm Global document
  • hwp - Hancom Hangul Word Processor (HWP) document
  • hwpx - Hancom Hangul Word Processor 2014 (HWPX) document
  • jar - Java Applet Java application
  • js - JavaScript file
  • jse - JavaScript encoded script file
  • jtd - JustSystems Ichitaro document
  • lnk - Microsoft Windows Shell Binary Link shortcut
  • mov - Apple QuickTime media
  • pdf - Adobe Portable Document Format (PDF)
  • ppt - Microsoft Powerpoint presentation
  • pptx - Microsoft Office PowerPoint 2007 Presentation
  • ps1 - Microsoft Windows PowerShell script file
  • rtf - Microsoft Rich Text Format (RTF) document
  • swf - Adobe Shockwave Flash file
  • vbe - Visual Basic encoded script file
  • vbs - Visual Basic script file
  • xls - Microsoft Excel spreadsheet
  • xlsx - Microsoft Office Excel 2007 Spreadsheet
  • xml - Microsoft Office 2003 XML file

Migrating from Connected Threat Defense to Threat Intelligence

Threat Intelligence was introduced in Deep Security Manager 20.0.503 (20 LTS Update 2021-09-23). This section provides information about upgrading from earlier versions of Deep Security Manager with Connected Threat Defense to a newer version with Threat Intelligence, and setting up the connection to Trend Micro Vision One (XDR).

  1. Ensure that Deep Security Manager is registered with Trend Micro Vision One (XDR).
  2. In Deep Security Manager, go to Administration > System Settings > Threat Intelligence.
  3. Select Submit suspicious files to and then Trend Micro Vision One.
  4. Select Compare objects against Suspicious Object List and then Trend Micro Vision One.
  5. Select Save. The Connection status will change to "Connected" within 15 minutes.

     

  6. After Deep Security Manager submits a file sample, you can find the analysis summary in Trend Micro Vision One, under Threat Intelligence > Sandbox Analysis. For details, see the Trend Micro Vision One help.
  7. When a suspicious object is found, you can find the generated suspicious object list in Trend Micro Vision One, under Threat Intelligence > Suspicious Object Management. For details, see the Trend Micro Vision One help.

Multi-tenant migration

If you are migrating from Connected Threat Defense to Threat Intelligence in a multi-tenant environment:

  • The primary tenant should not enable the Administration > System Settings > Tenants > Allow Tenants to use Primary Tenant's Suspicious Object List and Sandbox Analysis settings option.
  • After upgrade, all other tenants should open Deep Security Manager, go to Administration > System Settings > Trend Micro Vision One, and ensure that Deep Security Manager is registered with Trend Micro Vision One (XDR). The tenants can then configure their own Threat Intelligence settings in Administration > System Settings > Threat Intelligence.