DeepDiscovery AG
DeepDiscovery AG
to the products described herein without notice. Before installing and using the product,
please review the readme files, release notes, and the latest version of the Administrator’s
Guide, which are available from Trend Micro’s website at:
http://docs.trendmicro.com/
Trend Micro, the Trend Micro logo, MacroTrap, VirusWall, Network VirusWall, and
Trend Micro Control Manager are trademarks or registered trademarks of Trend Micro
Incorporated. All other product or company names may be trademarks or registered
trademarks of their owners.
Copyright © 2007-2012 Trend Micro Incorporated. All rights reserved. No part of this
publication may be reproduced, photocopied, stored in a retrieval system, or transmitted
without the express prior written consent of Trend Micro Incorporated.
Release Date: March 2012
Document Part No: APEM24566/100810
Protected by U. S. Patent No. 7,516,130
i-i
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
The Administrator’s Guide for Trend Micro™ Deep Discovery is intended to introduce
the main features of the product, provide deployment information for your production
environment, and provide information on configuring and using the product. Read
through this document prior to deploying or using the product.
Detailed information about how to use specific features are available in the online help
file and the online Knowledge Base at Trend Micro’s website.
Trend Micro always seeks to improve its documentation. Your feedback is always
welcome. Please evaluate this documentation on the following site:
http://www.trendmicro.com/download/documentation/rating.asp
Table of Contents
Table of Contents
Preface
Terminology and Documentation .................................................................... x
Audience .............................................................................................................. xi
Document Conventions ..................................................................................xii
iii
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
iv
Table of Contents
v
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Chapter 8: Maintenance
Licenses and Activation Codes ..................................................................... 8-2
vi
Table of Contents
vii
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Index
viii
Preface
Preface
Welcome to the Administrator’ Guide for Trend Micro™ Deep Discovery. This manual
contains information about product installation, configuration, use., and maintenance.
This preface discusses the following topics:
Terminology and Documentation on page x
Audience on page xi
Document Conventions on page xii
ix
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TERMINOLOGY D ESCRIPTION
Note: The term appliance is used throughout the documentation to refer to any form of
Deep Discovery.
D OCUMENTATION D ESCRIPTION
To access Help, open the web console and click the help
icon.
Readme file This file contains a list of what is new in the current
release, basic installation steps, any known issues,
and third-party license agreements. It may also contain
the latest product information not found in the Help or
printed documentation.
x
Preface
D OCUMENTATION D ESCRIPTION
The Administrator’s Guide and readme file are available on the Deep Discovery
Solutions CD and online:
http://docs.trendmicro.com/
Audience
The Deep Discovery documentation is written for IT managers and administrators in
medium and large enterprises. The documentation assumes a basic knowledge of
security systems, including:
• Antivirus and content security protection
• Network concepts (IP address, Subnet Mask, LAN settings)
• Network devices and their administration
• Network configuration (use of VLAN, SNMP).
xi
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Document Conventions
To help locate and interpret information, Deep Discovery documentation uses the
following conventions.
C ONVENTION D ESCRIPTION
xii
Chapter 1
1-1
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
1-2
Introducing Deep Discovery
F EATURE D ESCRIPTION
Log storage Logs can be stored for more than 30 days for event
reporting and investigation.
For more information, see Logs on page 7-51.
1-3
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
F EATURE D ESCRIPTION
Note: For a complete list of Trend Micro products and services that integrate with Deep
Discovery, see Integration with Trend Micro Products and Services on page 6-23.
1-4
Introducing Deep Discovery
viruses. Trend Micro regularly releases new virus pattern files when new threats arise. To
take advantage of the latest components, regularly update Deep Discovery (see
Component Updates on page 5-11).
The virus scan engine has the following methods of detection:
• True File Type
• Multi-packed/Multi-layered files
• IntelliTrap
Multi-packed/Multi-layered Files
A multi-packed file is an executable file compressed using more than one packer or
compression tool. For example, an executable file double or triple packed with Aspack,
UPX, then with Aspack again.
A multi-layered file is an executable file placed in several containers or layers. A layer
consists of a document, an archive, or a combination of both. An example of a
multi-layered file is an executable file compressed using Zip compression and placed
inside a document.
These methods hide malicious content by burying them under multiple layers of
compression. Traditional antivirus programs cannot detect these threats because
traditional antivirus programs do not support layered/compressed/packed file scanning.
IntelliTrap
Virus writers often use different file compression schemes to circumvent virus filtering.
IntelliTrap helps Deep Discovery evaluate compressed files that could contain viruses or
other Internet threats.
1-5
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Offline Monitoring
Deep Discovery deploys in offline mode. It monitors the network traffic by connecting
to the mirror port on a switch for minimal or no network interruption.
1-6
Introducing Deep Discovery
1-7
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
1-8
Chapter 2
2-1
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Installation Considerations
Consider the following before installing Deep Discovery.
• Port speeds must match.
The destination port speed should be the same as the source port speed to ensure
equal port mirroring. If the destination port is unable to cope with the information
due to the faster speed of the source port, the destination port might drop some
data.
For Deep Analysis additional considerations apply:
Isolate Network: does not exchange data with Internet.
Specified Network: uses a specified data port to exchange data with Internet.
Management Network: uses a management port to exchange data with
Internet.
• Specified network needs one more data port.
2-2
Planning Deep Discovery Installation
Installation Scenarios
Use the following examples to plan a customized Deep Discovery installation.
2-3
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
2-4
Planning Deep Discovery Installation
Note: If using network taps, ensure that they copy DHCP traffic to Deep Discovery instead
of filtering DHCP traffic.
2-5
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Additionally, use an Intrusion Detection System load balancer for better performance
when deploying several instances of Deep Discovery.
2-6
Planning Deep Discovery Installation
Redundant Networks
Many enterprise environments use redundant networks to provide high availability. Use
this scenario to connect Deep Discovery to redundant switches, when an asymmetric
route is possible.
Specific VLANs
Some enterprise environments limit port scanning to specific VLANs to optimize
bandwidth and resource use. Connect Deep Discovery to switches; the mirror
configuration is VLAN-based.
2-7
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
2-8
Planning Deep Discovery Installation
2-9
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
2-10
Chapter 3
3-1
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Installation Overview
This Deep Discovery version is available as software and only supports fresh
installations. Users who have previously set up a threat discovery device or virtual
appliance can upgrade to this version by performing a fresh installation of the software.
Back up configuration and other settings before upgrading. For details, see
Backup/Restore Appliance Configuration on page 6-26.
The software is packaged as an ISO file, and installs on a purpose-built, hardened,
performance-tuned 64-bit Linux operating system that is included in the package.
Install the software on a bare metal server that meets the requirements listed in System
Requirements on page 3-3. The bare metal installation boots from the Deep Discovery
installation CD (which contains the ISO file) to begin the process.
WARNING! The installation process formats the existing system to install Deep Dis-
covery. Any existing data or partitions are removed during installation.
Back up any existing data on the system before installation.
3-2
Installing Deep Discovery
System Requirements
Deep Discovery requires the following:
R ESOURCES R EQUIREMENTS
3-3
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
R ESOURCES R EQUIREMENTS
Web Console Access to the web console requires any of the following
browsers:
• Microsoft Internet™ Explorer™ 7.0, 8.0, and 9.0
• Mozilla™ FireFox™ 4.0 and 5.0
Note: For all IE versions, ensure that the following options are enabled.
3-4
Installing Deep Discovery
3-5
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: Deep Discovery automatically detects the active link cards (indicated by
Link is UP) available for use as a management port.
a. Verify that the network port status (on the Management Port Selection screen)
and the actual port status match. If there is a status conflict, select Re-detect
and press ENTER to refresh the status.
b. If unsure which active link card is connected to your management domain,
perform the steps indicated on the Management Port Selection screen.
3-6
Installing Deep Discovery
a. Select a device to which to save the logs and press ENTER. When the
installation log file name appears, press ENTER.
3-7
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Tip: Record the file name for your reference. The file name is in the following
format: install.log.YYYY-MM-DD-hh-mm-ss
b. If the preferred device is not listed, verify that the preferred device is
connected to the host machine, navigate to Re-detect, and press ENTER to
refresh the list.
The system automatically restarts and the Preconfiguration Console appears.
8. Perform the necessary preconfiguration tasks for the product to be fully functional.
For details, see The Preconfiguration Console on page 4-2.
3-8
Chapter 4
4-1
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: Do not enable scroll lock on your keyboard when using HyperTerminal or you
will not be able to enter data.
4-2
The Preconfiguration Console
Note: An SSH must be enabled to use PuTTY. See To enable SSH: on page 6-29.
Note: To connect to the software appliance from another computer in your network
(not directly connected to the software appliance), ensure that you access the
computer connected to the management port.
c. Use the following values when accessing the console for the first time:
• IP address (for SSH connection only): the default is 192.168.252.1
• User name: deepdiscovery
• Password: press ENTER
• Port number: 22
From a computer with a serial port:
a. Connect the serial port to the serial port of the software appliance using an
RS232 serial cable.
b. On the computer, open a serial communication application (HyperTerminal).
c. Use the following values if you are accessing the console for the first time:
• Bits per second: 115200
• Data bits: 8
• Parity: None
• Stop bits: 1
• Flow control: None
4-3
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
2. When the Preconfiguration Console screen opens, type the default password
admin and press ENTER twice.
4-4
The Preconfiguration Console
Preconfiguration Menu
Interface Settings View the network speed and duplex mode for the
management port, which Deep Discovery
automatically detects.
4-5
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
View System Logs View logs detailing security risks and incidents.
Log Off with Saving Log off from the Preconfiguration Console after
saving the changes.
Log Off without Saving Log off from the Preconfiguration Console without
saving the changes.
To access a menu item, type the number for the menu item and then press ENTER.
4-6
The Preconfiguration Console
4-7
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
4-8
The Preconfiguration Console
Use the Device Settings screen to configure the management IP address settings and
register Deep Discovery to Trend Micro Control Manager.
4-9
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: You can also use the web console to register to Control Manager.
a. In the Register to Trend Micro Control Manager field, use the space bar to
change the option to [yes].
b. Type the Control Manager IP address.
c. In the Enable two-way communication port forwarding field, use the space
bar to set the option to [no] or [yes].
d. To enable two-way communication between Deep Discovery and Trend Micro
Control Manager, type the IP address and port number of your router or NAT
device in the Port forwarding IP address and Port forwarding port
number fields.
Note: Configuring the NAT device is optional and depends on the network
environment. For more information on NAT, refer to the Trend Micro Control
Manager Administrator’s Guide.
7. Navigate to Return to main menu and press ENTER to return to the main menu.
8. Type 7 and press ENTER to save the settings.
4-10
The Preconfiguration Console
By default, Deep Discovery automatically detects the network speed and duplex mode
for the management port (MGMT); it is unlikely these settings need to be changed.
However, if any connection issues occur, manually configure these settings.
Note: Data ports used by Deep Discovery can be managed from the web console:
Administration > Global Settings > Network Interface Settings. For details, see
Network Interface Settings on page 5-6.
4-11
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Tip: Importing and exporting a configuration file can also be performed from the web
console.
4-12
The Preconfiguration Console
Note: Rolling back to a previous update may require restarting Deep Discovery.
4-13
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
WARNING! Export the current configuration settings before importing the backup
configuration file. For details, see Exporting the Configuration File (HyperTerminal
only) on page 4-17).
4-14
The Preconfiguration Console
Note: The Send File option means sending the file to the software appliance before
you can import it.
4-15
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Tip: Trend Micro recommends exporting the current configuration settings before
importing the backup configuration file.
The device imports the configuration file and uses the settings from the file.
4-16
The Preconfiguration Console
Note: The Receive File option means receiving the file from the software appliance
before exporting.
4-17
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
7. Rename the exported configuration files to keep track of the latest configuration
files.
4-18
The Preconfiguration Console
4-19
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
4-20
The Preconfiguration Console
4-21
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
The log format in the Preconfiguration Console displays the system logs. For more
detailed and configurable, use the Detection Log Query on the web console. See
Detection Logs Query on page 7-52.
To view system logs in the Preconfiguration Console:
1. Log on to the Preconfiguration Console.
The Main Menu appears.
2. Type 5 and press ENTER.
The System log screen appears.
Note: Although a blank screen appears initially, logs will appear as soon as Deep
Discovery detects network activity.
4-22
The Preconfiguration Console
4-23
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: Some tasks, such as changing the password and resetting the product, are
automatically saved and therefore do not require going through this process.
1. After making changes to the configuration settings, return to the main menu.
2. Type 7 and press ENTER.
The Leave Preconfiguration with Saving screen appears.
3. Under Save configuration settings and exit?, navigate to OK and press ENTER.
Log Off without Saving:
1. After making any changes to the configuration settings, return to the main menu.
2. Type 8 and press ENTER.
The Leave Preconfiguration without Saving screen appears.
4-24
The Preconfiguration Console
4-25
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
4-26
Chapter 5
Getting Started
This chapter introduces the web console and the basic settings to be applied after setting
up Deep Discovery.
The topics discussed in this chapter are:
Web Console on page 5-2
Network Settings on page 5-4
Network Interface Settings on page 5-6
System Time on page 5-8
Proxy Settings on page 5-8
Licenses and Activation Codes on page 5-9
Component Updates on page 5-11
5-1
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Web Console
Deep Discovery provides a built-in web console through which you can view system
status, configure threat detection, configure and view logs, run reports, administer Deep
Discovery, and obtain help. The web console includes six tabs:
• Dashboard - See Dashboard on page 7-2
• Detections - See Detections on page 7-37
• Logs - See Logs on page 7-51
• Reports - See Reports on page 7-62
• Administration - See Global Settings on page 6-25
Note: The following browsers and versions are supported: Microsoft™ Internet
Explorer™ 7.0, 8.0, or 9.0, and Mozilla™ FireFox™ 4.0 or 5.0.
5-2
Getting Started
2. Set the Internet Security level to Medium and enable ActiveX Binary and Script
Behaviors, to ensure that tool tips and reports appear.
3. Using the managed port IP address set for the product during initial configuration,
type the following URL exactly as it appears:
https://192.168.252.1/index.html
Note: Change the password immediately after logging on for the first time. See Web Console
Password on page 5-3.
5. Click Login.
Note: After changing Deep Discovery’s IP address, update browser bookmarks to reflect the
new IP address.
5-3
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: Lost passwords cannot be recovered. Contact your support provider for assistance in
resetting the password.
Network Settings
The following format rules apply to Deep Discovery network settings.
P ATH : A DMINISTRATION > G LOBAL S ETTINGS > N ETWORK I NTERFACE S ETTINGS > A PPLIANCE
IP S ETTINGS
IP Address Format
IP addresses must be in the format: XXX.XXX.XXX.XXX, where x is a decimal value
between 0 and 255.
The IP address cannot be in any of the following formats:
• AAA.XXX.XXX.XXX, where A is in the range 223 to 240 [Multicast Address]
• 0.0.0.0 [Local Host name]
5-4
Getting Started
VLAN ID
The VLAN ID is a valid VLAN identifier ranging from 1-4094.
5-5
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: The network speed/duplex mode for the management port can only be configured
from the Preconfiguration Console. For details, see Preconfiguration Menu: Interface Settings
on page 4-11.
5-6
Getting Started
DNS Server 1 (Optional) The IP address of the primary server that resolves host
names to an IP address
DNS Server 2 (Optional) The IP address of the secondary server that resolves host
names to an IP address
4. Click Save.
To manage network interface ports:
P ATH : A DMINISTRATION > G LOBAL S ETTINGS > N ETWORK I NTERFACE S ETTINGS > A PPLIANCE
IP S ETTINGS
Note: It is not possible to run multiple capture sessions. Wait for a session to finish
before starting a new one.
Note: The maximum size for files containing packet data is 30MB.
6. Click View to view data for the particular packet capture session.
7. Click Export to export the data to a log file; specify the target location of the log
file tcpdump.tgz.
Tip: Send the log file to Trend Micro for troubleshooting assistance.
5-7
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
System Time
Synchronize system time with the Network Time Protocol (NTP) server or configure it
manually.
To set the system time:
P ATH : A DMINISTRATION > G LOBAL S ETTINGS > S YSTEM S ETTINGS > S YSTEM TIME
Proxy Settings
Deep Discovery uses the proxy settings configured in the web console when:
• Downloading updates from the Trend Micro ActiveUpdate server or another update
source
• Updating the product license
• Connecting to other Trend Micro products (TMSP, Smart Protection Server, and
Trend Micro Control Manager).
To configure proxy settings:
P ATH : A DMINISTRATION > G LOBAL S ETTINGS > S YSTEM S ETTINGS > P ROXY S ETTINGS
1. Select Use a proxy server for pattern, engine, and license updates.
2. Select HTTP, SOCKS4, or SOCKS5 for the Proxy protocol.
3. Type the Server name or IP address and the Port number.
4. If the proxy server requires authentication, type the User name and Password
under Proxy server authentication.
5-8
Getting Started
Activation Codes
Use a valid Activation Code to enable your Trend Micro product. A product will not be
operable until activation is complete. An Activation Code has 37 characters (including
the hyphens) and appears as follows:
xx-xxxx-xxxxx-xxxxx-xxxxx-xxxxx-xxxxx
If you received a Registration Key instead of an Activation Code, use it to register Deep
Discovery at:
https://olr.trendmicro.com/registration/
A Registration Key has 22 characters (including the hyphens) and appears as follows:
xx-xxxx-xxxx-xxxx-xxxx
After registration, an Activation Code is sent via email.
Product Version
The Activation Code sent by Trend Micro is associated with the product version.
• Evaluation version: Includes all the product features. Upgrade an evaluation
version to the fully licensed version at any time.
• Fully licensed version: Includes all the product features and technical support. A
30-day grace period takes effect after the license expires. Renew the license before it
expires by purchasing a maintenance renewal.
License status is displayed on the Product License screen. If you are renewing a license
and need renewal instructions, click View renewal instructions.
The status includes reminders when a license is about to expire or has expired.
5-9
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
For an evaluation version, a reminder displays when the license expires. The
consequences of not upgrading to the fully licensed version are listed in Table 5-1.
For a fully licensed version, a reminder displays:
• 60 days before expiration ends
• 30 days before grace period ends
• When the license expires and grace period elapses. The result of not renewing
the license are listed in Table 5-1.
Fully Licensed You will not be able to obtain technical support and
(Expired) perform component updates.
Deep Discovery monitors the network using
out-of-date components. These components may not
completely protect your network from the latest
security risks.
1. Click New Activation Code. The New Activation Code screen displays.
2. Type the new Activation Code and click Save. The Trend Micro License Agreement
displays.
3. Read the license agreement and click Agree.
Note: If you activated Deep Discovery, the Setup Guide displays. Follow the steps in
the Setup Guide.
5-10
Getting Started
4. From the Product License Details screen, click Update Information to refresh the
screen with the new license details. This screen also provides a link to your detailed
license available on the Trend Micro website.
Component Updates
Download and deploy product components used to scan for and detect network threats.
Because Trend Micro regularly creates new component versions, perform regular
updates to address the latest Internet threats.
Components to Update
To help protect your network, Deep Discovery uses the components listed in Table 5-2.
C OMPONENT D ESCRIPTION
Virus Scan Engine Enables the product to scan for viruses and Trojans.
5-11
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
C OMPONENT D ESCRIPTION
M ETHOD D ESCRIPTION
5-12
Getting Started
M ETHOD D ESCRIPTION
Update Tasks
To update all components, review these procedures:
• Proxy Settings on page 5-8
• Update Source on page 5-15
• Manual Updates on page 5-13
• Scheduled Updates on page 5-14
• Firmware Update on page 6-29
Manual Updates
Deep Discovery allows you to perform updates on demand. Use this feature during
outbreaks or when updates do not arrive according to a fixed schedule.
The following details appear in the Manual Download screen:
D ETAILS D ESCRIPTION
5-13
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: If the Network Content Inspection Engine and firmware were updated during a
scheduled update, you will receive an email notifying you to restart Deep
Discovery. Restart the product. When Deep Discovery starts, it checks the
integrity of its configuration files. The product console password may reset if the
configuration file containing password information is corrupted. If you are
unable to log on to the console using your preferred password, log on using the
default password admin.
Scheduled Updates
Configuring scheduled updates ensures that your Deep Discovery components are the
most current.
Tip: Trend Micro recommends setting the update schedule to every two hours.
3. Click Save.
5-14
Getting Started
If the Network Content Inspection Engine and firmware were updated during a
scheduled update, you will receive an email notifying you to restart Deep Discovery.
Restart the product. When Deep Discovery starts, it checks the integrity of its
configuration files. The product console password may reset if the configuration file
containing password information is corrupted. If you are unable to log on to the
console using your preferred password, log on using the default password admin.
Update Source
Deep Discovery downloads components from the Trend Micro ActiveUpdate server,
the default update source. Deep Discovery can be configured to download components
from another update source specifically set up in your organization.
Note: Configure Deep Discovery to download directly from Control Manager. See the Trend
Micro Control Manager Administrator’s Guide for more details on how a Control Manager
server can act as an update source.
1. Under Download updates from, select one of the following update sources:
• Trend Micro ActiveUpdate Server: The Trend Micro ActiveUpdate server is
the default source for the latest components.
• Other update source: Select this option to specify an update source different
from the default source. The update source must begin with "http://" or
"https://". For example, http://activeupdate.mycompany.com or
https://activeupdate.mycompany.com.
5-15
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
5-16
Chapter 6
6-1
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Threshold-based Notifications
These notifications are triggered when the configured threshold for certain events is
exceeded. Notifications are sent immediately.
E VENT D ESCRIPTION
6-2
Configuring Product Settings
3. To change the default settings, set the threshold for outbound and inbound traffic.
• Outbound traffic means detections from monitored networks
• Inbound traffic means detections from outside the network
4. Select which types of threat events to detect.
5. Click Save.
6. Verify that the email notification settings are correct. See Delivery Options on page
6-6.
To disable notifications:
P ATH : A DMINISTRATION > N OTIFICATIONS > N OTIFICATION S ETTINGS > T HREAT E VENTS N OTI -
FICATION
6-3
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
3. To change the default settings, set the threshold for number of detections per IP
address.
4. Click Save.
5. Verify that the email notification settings are correct. See Delivery Options on page
6-6.
To disable notifications:
P ATH : A DMINISTRATION > N OTIFICATIONS > N OTIFICATION S ETTINGS > D ETECTION OF H IGH
R ISK H OST
6-4
Configuring Product Settings
3. To change the default settings, set the threshold for number of detections per IP
address.
4. Click Save.
5. Verify that the email notification settings are correct. See Delivery Options on page
6-6.
To disable notifications:
P ATH : A DMINISTRATION > N OTIFICATIONS > N OTIFICATION S ETTINGS > D ETECTION OF S USPI -
CIOUS H OST
3. Click Auto-Detect for Deep Discovery to define the normal traffic threshold or
manually identify the traffic threshold at certain hours of the day.
6-5
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: The amount of network traffic is rounded to the nearest whole number. For
example, 1.2GB displays as 2GB and 2.6GB displays as 3GB.
4. Click Save.
5. Verify that the email notification settings are correct. See Delivery Options on page
6-6.
To disable notifications:
P ATH : A DMINISTRATION > N OTIFICATIONS > N OTIFICATION S ETTINGS > H IGH N ETWORK TRAF -
FIC U SAGE
Delivery Options
Use the Delivery Options screen to configure the default sender, recipients, and settings
of the notifications sent to designated individuals for specific events in the network.
Configure these settings for the recipients to receive the necessary information to
prevent or contain an outbreak.
Email Settings
To configure the email settings:
P ATH : A DMINISTRATION > N OTIFICATIONS > D ELIVERY O PTIONS > E MAIL S ETTINGS
1. Under Notification recipient, type the recipient. Use a semicolon ";" to separate
multiple addresses.
2. Under Sender's email address, type the sender. You can only add one valid email
address.
3. Type the SMTP server name or IP address and port.
4. If the SMTP server requires authentication, specify the user name and password for
the SMTP server. Ensure that you add the Deep Discovery IP address to the SMTP
relay list.
5. Specify the maximum number of notifications and the number of minutes to check
the mail queue.
6-6
Configuring Product Settings
6. Click Save.
Network Configuration
Network configuration defines and establishes the profile of the network Deep
Discovery monitors. Identify monitored networks, services provided, and network
domains to enable the Network Content Correlation Engine to establish its knowledge
of the network.
See the following topics for details:
• Monitored Networks on page 6-7
• Registered Domains on page 6-8
• Registered Services on page 6-10
Network configuration settings can be replicated from one Deep Discovery device to
another by exporting the settings to a file and then importing the settings file to other
Deep Discovery devices. For details, see Export/Import Configuration on page 6-11.
Monitored Networks
Establish groups of monitored networks using IP addresses to allow Deep Discovery to
determine whether attacks originate from within or outside the network.
To add monitored networks:
P ATH : A DMINISTRATION > N ETWORK C ONFIGURATION > M ONITORED N ETWORK
1. Click Add.
The Add Monitored Network Group screen appears.
2. Specify a group name.
Note: Provide specific groups with descriptive names for easy identification of the
network to which the IP address belongs. For example, use Finance network, IT
network, or Administration.
6-7
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
3. Specify an IP address range in the text box (up to 1,000 IP address ranges).
Deep Discovery comes with a monitored network called Default, which contains
the following IP address blocks reserved by the Internet Assigned Numbers
Authority (IANA) for private networks:
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
a. If you did not remove Default, you do not need to specify these IP address
blocks when adding a new monitored network.
b. Use a dash to specify an IP address range.
Example: 192.168.1.0-192.168.1.255.
c. Use a slash to specify the subnet mask for IP addresses.
Example: 192.168.1.0/255.255.255.0 or 192.168.1.0/24.
4. Select the Network zone of network group.
Note: Selecting Trusted means this is a secure network and selecting Untrusted means
there is a degree of doubt about the security of the network.
5. Click Add.
6. Click Save.
To remove monitored networks:
P ATH : A DMINISTRATION > N ETWORK C ONFIGURATION > M ONITORED N ETWORK
Registered Domains
Add domains used by companies for internal purposes or those considered trustworthy
to establish the network profile. Identifying trusted domains ensures detection of
unauthorized domains.
Add only trusted domains (up to 1,000 domains) to ensure the accuracy of your network
profile.
6-8
Configuring Product Settings
Note: Registered domain names appear in the Defined Registered Domains section.
2. (Optional) Click Analyze to display a list of domains that can be added to the list.
3. Click Add.
To remove registered domains:
P ATH : A DMINISTRATION > N ETWORK C ONFIGURATION > R EGISTERED D OMAINS
6-9
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Registered Services
Add different servers for specific services that your organization uses internally or
considers trustworthy to establish the network profile. Identifying trusted services in the
network ensures detection of unauthorized applications and services.
Add only trusted services (up to 1,000 services) to ensure the accuracy of your network
profile.
To add a registered service:
P ATH : A DMINISTRATION > N ETWORK C ONFIGURATION > R EGISTERED S ERVICES
S ERVICE D ESCRIPTION
SMTP Open Relay The network server used as an SMTP Open Relay
server
Note: Registered service names appear in the Defined Registered Services section.
2. (Optional) Click Analyze to display a list of services that can be added to the list.
3. Specify a server name.
6-10
Configuring Product Settings
4. Specify an IP address.
5. Click Add.
To remove registered services:
P ATH : A DMINISTRATION > N ETWORK C ONFIGURATION > R EGISTERED S ERVICES
Export/Import Configuration
Network configuration settings include: monitored networks, registered domains, and
registered services. To replicate these settings from one Deep Discovery device to
another, export the settings to a file and then importing the file to other Deep Discovery
appliances.
The default file name is cav.xml, which can be changed to a preferred file name.
6-11
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
6-12
Configuring Product Settings
Detections
Detections establish filters and exclusions for the product’s network detection features.
Threat Detections
Enable or disable the following features.
F EATURE D ESCRIPTION
6-13
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
To disable detections:
P ATH : A DMINISTRATION > D ETECTIONS > T HREAT D ETECTIONS
Application Filters
Protect the network by enabling Application Filters. Application Filters provide valuable
information to help you quickly identify security risks and prevent the spread of
malicious code.
Enable detection for the following applications:
A PPLICATION D ESCRIPTION
Tip: Use the CTRL key to select one or multiple protocol types.
6-14
Configuring Product Settings
Tip: Use the CTRL key to select one or multiple protocol types.
Tip: Use the CTRL key to select one or multiple protocol types.
Host Identification
When Deep Discovery detects a threat, it logs the IP address in use on the affected
endpoint. If IP addresses are dynamically assigned in your organization, consider
enabling host identification.
Host identification works by determining the NetBIOS name, DNS name, and Active
Directory domain and account name used on the affected endpoint at the time of threat
detection.
Note: These names display on the Detections and Detection Details screens.
To determine the NetBIOS name, Deep Discovery connects to the endpoint through
port 137.
Note: Security software residing on the endpoint may notify the user of the connection on
port 137. If the notification can be disabled, consider disabling it to prevent any
unnecessary disruptions to users.
6-15
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
To determine the DNS domain name, Deep Discovery queries the DNS server.
To determine the Active Directory domain and account name, Deep Discovery analyzes
the Active Directory logon traffic.
To configure host identification settings:
P ATH : D ETECTIONS > H OST I DENTIFICATION
Smart ProtectionTechnology
Trend Micro smart protection technology is a next-generation, in-the-cloud protection
solution providing File and Web Reputation Services. By leveraging the Web Reputation
Service, Deep Discovery can obtain reputation data for websites that users are
attempting to access. Deep Discovery logs URLs that smart protection technology
verifies to be fraudulent or known sources of threats and then uploads the logs for
report generation.
Note: Deep Discovery does not use the File Reputation Service that is part of smart
protection technology.
6-16
Configuring Product Settings
Reputation services are delivered through smart protection sources, namely, Trend
Micro Smart Protection Network and Smart Protection Server. These two sources
provide the same reputation services and can be leveraged individually or in
combination. The following table provides a comparison between these sources.
6-17
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Web Reputation
Deep Discovery leverages Trend Micro smart protection technology, a cloud-based
infrastructure that determines the reputation of websites users are attempting to access.
Web reputation requires smart protection technology, see Setting Up Smart Protection Server
on page 6-17 for setup instructions. Deep Discovery logs URLs that smart protection
technology verifies to be fraudulent or known sources of threats. The product then
uploads the logs for report generation.
Note: Web Reputation logs can be queried using Logs > Detection Logs Query.
For detailed information about smart protection technology and to set up a Smart
Protection Server, see Smart ProtectionTechnology on page 6-16.
6-18
Configuring Product Settings
Note: The Smart Protection Server may not have reputation data for all URLs because
it cannot replicate the entire Smart Protection Network data. When updated
infrequently, the Smart Protection Server may also return outdated reputation
data.
6-19
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: Enabling this option improves the accuracy and relevance of the reputation data.
However, it takes more time and bandwidth to obtain the data. Disabling this
option has the opposite effects.
e. If you enable this option, do the following to optimize web reputation queries:
i. On the Smart Protection Server’s console, navigate to Smart Protection
> Reputation Services > Web Reputation tab > Advanced Settings
section. Disable Use only local resources, do not send queries to
Smart Protection Network. This option prevents the Smart Protection
Server from obtaining data from Smart Protection Network.
ii. Update the Smart Protection Server regularly.
Note: Disable this option if you do not want your organization’s data to be transmitted
externally.
f. Select Connect through a proxy server if you have configured Proxy Settings
for Deep Discovery and want to use these settings for Smart Protection Server
connections.
Note: If you disable proxy settings, Smart Protection Servers that connect
through the proxy server will connect to Deep Discovery directly. Under
the Proxy Connection column, the status is Proxy Unavailable.
g. Click Add.
The Smart Protection Server is added to the Smart Protection Server list.
h. Add more servers.
6-20
Configuring Product Settings
Tip: Trend Micro recommends adding multiple Smart Protection Servers for
failover purposes. If Deep Discovery is unable to connect to a server, it
attempts to connect to the other servers on the list.
i. Use the arrows under the Order column to move servers up and down the list.
4. Click Enable Smart Feedback (recommended) to send threat information to the
Trend Micro Smart Protection Network.
This allows Trend Micro to identify and address new threats.
Your participation in Smart Feedback means you are authorizing Trend Micro to
collect certain information from your network, which is kept in strict confidence.
Information includes:
• This product’s name and version
• URLs suspected to be fraudulent or possible sources of threats
• URLs associated with spam or possibly compromised
• Malware name for URLs that harbor malware.
5. Click Save.
To manage the Smart Protection Server list:
P ATH : A DMINISTRATION > D ETECTIONS > W EB R EPUTATION
1. To verify the connection status with a Smart Protection Server, click Test
Connection.
2. To modify server settings:
a. Click the server address.
b. In the window that appears, modify the server’s IP address, description, and
settings.
c. When you specify a new IP address, click Test Connection to confirm the
connection.
d. Click OK.
3. To remove a server from the list, click Delete.
4. Click Save.
6-21
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
6-22
Configuring Product Settings
5. To remove an entry from the list, select the entry and click Delete.
TABLE 6-6. Trend Micro products and services that integrate with Deep Discovery
6-23
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TABLE 6-6. Trend Micro products and services that integrate with Deep Discovery
(Continued)
Threat Receives logs and data from Deep 2.6 (for the
Management Discovery, and then uses them to on-premise edition
Services generate reports containing security of TMSP)
Portal (TMSP) threats and suspicious network Not applicable for
activities, and Trend Micro the Trend Micro
recommended actions to prevent or hosted service
address them.
For details, see Threat Management
Services Portal on page 6-37.
6-24
Configuring Product Settings
Global Settings
System Settings
The System Settings window allows the basic settings of Deep Discovery to be
configured.
Basic settings include:
• System Time
• Web Console Timeout
• Proxy Settings
• Backup/Restore Appliance Configurations
• Import Custom Sandbox
• System Maintenance
• Firmware Update
• System Update.
System Time
See System Time on page 5-8
1. At Timeout Settings, type the number of minutes (1-30) prior to inactivity logoff.
2. Click Save.
6-25
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Proxy Settings
See Proxy Settings on page 5-8
6-26
Configuring Product Settings
1. Before importing a file, back up the current configurations by performing the steps
under To back up settings to an encrypted file: on page 6-26.
2. Click Browse under Restore Configuration.
The Choose File screen appears.
3. Select the encrypted file to import and click Restore Configuration.
A confirmation message appears.
4. Click OK. Deep Discovery restarts after importing the configuration file.
Note: When Deep Discovery starts, it checks the integrity of its configuration files. The
product console password may reset if the configuration file containing password
information is corrupted. If you are unable to log on to the console using your
preferred password, log on using the default password admin.
Note: When Deep Discovery starts, it checks the integrity of its configuration files. The
product console password may reset if the configuration file containing password
information is corrupted. If you are unable to log on to the console using your
preferred password, log on using the default password admin.
6-27
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
1. On the Import Custom Sandbox screen, type the URL for the image location.
Example:
ftp://***/**OVA or http://**/**OVA
2. Select either a Username/Password combination or check Anonymous Login.
Note: Use Anonymous Login only if the ftp or http site supports this function.
3. Click Import.
The image is imported.
An Import Done message appears.
System Maintenance
Shut down or restart Deep Discovery or its associated services from the System
Maintenance screen on the product console.
When Deep Discovery starts, it checks the integrity of its configuration files. The
product console password may reset if the configuration file containing password
information is corrupted. If you are unable to log on to the console using your preferred
password, log on using the default password admin.
6-28
Configuring Product Settings
1. Click Restart.
a. To restart services, click Service.
b. To restart Deep Discovery, click System.
2. (Optional) Specify a reason for restarting the services, in the Comment field.
3. Click OK.
To enable SSH:
P ATH : A DMINISTRATION > G LOBAL S ETTINGS > S YSTEM S ETTINGS > S YSTEM M AINTENANCE
Firmware Update
Trend Micro may release a new firmware so you can upgrade the product to a new
version or enhance its performance. You can choose to migrate the current settings on
the product after the update is complete so that you do not need to re-configure settings.
Before updating the firmware:
1. Back up configuration settings. For details, see Backup/Restore Appliance Configuration
on page 6-26.
2. If you have registered Deep Discovery to Control Manager, record the Control
Manager registration details.
6-29
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: You need to re-register to Control Manager after the firmware update is
complete.
3. Download the Deep Discovery firmware image from the Trend Micro website or
obtain the image from your Trend Micro reseller or support provider.
4. Save the image to any folder on a computer.
To update the firmware:
P ATH : A DMINISTRATION > G LOBAL S ETTINGS > S YSTEM S ETTINGS > F IRMWARE U PDATE
1. Click Browse and then locate the folder to which you saved the firmware image
(the image file has an .R extension).
2. Click Upload Firmware. The Migration configuration option appears. Enable this
option to retain the current product settings after the update, or disable it to revert
to the product’s default settings after the update.
Note: Performing the next step will restart Deep Discovery. Ensure that you have
finished all your product console tasks before performing this next step.
3. Click Continue. Deep Discovery restarts after the update. The Log on screen
appears after the product restarts.
Note: When Deep Discovery starts, it checks the integrity of its configuration files. The
product console password may reset if the configuration file containing password
information is corrupted. If you are unable to log on to the console using your
preferred password, log on using the default password admin.
System Update
After an official product release, Trend Micro may release system updates to address
issues, enhance product performance, or add new features.
6-30
Configuring Product Settings
S YSTEM D ESCRIPTION
U PDATE
Patch A patch is a group of hot fixes and security patches that solve
multiple program issues. Trend Micro makes patches
available on a regular basis. Non-Windows patches commonly
have a setup script.
Your vendor or support provider may contact you when these items become available.
Check the Trend Micro website for information on new hot fix, patch, and service pack
releases:
http://www.trendmicro.com/download
6-31
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Only the latest system update can be rolled back. After a rollback, none of the other
existing system updates can be rolled back. The rollback function will only become
available again when a new system update is applied.
Before performing a system update:
1. Save the system update file to any folder on a computer.
WARNING! Save the system update file using its original name to avoid problems
applying it.
2. Read the readme file carefully before applying the system update.
Note: All releases include a readme file that contains installation, deployment, and
configuration information.
Tip: The readme file should indicate if a system update requires Deep Discovery to
restart. If a restart is required, ensure that all tasks on the console have been
completed before applying the update.
3. On the computer where you saved the file, access and then log on to the web
console.
To apply system updates:
P ATH : A DMINISTRATION > G LOBAL S ETTINGS > S YSTEM S ETTINGS > S YSTEM U PDATE
WARNING! To avoid problems uploading the file, do not close the browser or
navigate to other screens.
3. If the upload was successful, check the Uploaded System Update Details section.
This section indicates the build number for the system update that you just
uploaded and if a restart is required.
6-32
Configuring Product Settings
Note: You will be redirected to the web console’s logon screen after the update is
applied.
4. If a restart is required, finish all tasks on the web console before proceeding.
5. Click Continue to apply the system update.
WARNING! To avoid problems applying the system update, do not close the
browser or navigate to other screens.
Note: If there are problems applying the system update, details will be available in the
System Update screen, or in the Summary screen if a restart is required.
6-33
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
c. Check the rollback result in the first row of the System update history table.
A rollback does not remove the readme file, so you can refer to it at any time
for details about the system update.
Component Updates
See Component Updates on page 5-11.
Mitigation Settings
Register Deep Discovery with up to 20 mitigation devices. For information on the
device versions compatible with Deep Discovery, see Integration with Trend Micro Products
and Services on page 6-23.
To register Deep Discovery to mitigation devices:
P ATH : A DMINISTRATION > G LOBAL S ETTINGS >M ITIGATION D EVICE S ETTINGS > M ITIGATION
S ETTINGS
1. Under Mitigation Device Registration, type the mitigation device Server name
or IP address.
2. Type a Description for the device.
3. Specify IP address range.
Note: To save network bandwidth, specify IP address ranges for each mitigation device.
Deep Discovery only sends mitigation tasks for specific IP addresses to the
mitigation device. If the IP address range is empty, all mitigation requests will be
sent to the mitigation device.
4. Click Register.
The Cleanup Settings screen appears.
6-34
Configuring Product Settings
Note: This task also triggers the mitigation device to remove Deep Discovery from its
list of data sources.
1. Type a name for the exclusion. Specify a meaningful name for easy identification.
Example: "Lab Computers”.
2. Specify an IP address or IP address range for exclusion from mitigation actions.
Example: 192.1.1.1-192.253.253.253.
3. Click Add.
4. To remove an entry from the list, select the entry and click Delete.
6-35
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
6-36
Configuring Product Settings
Note: URL Filtering logs are not available on the Deep Discovery web console.
Form Factor
Use TMSP as a Trend Micro hosted service and on-premise application installed on a
bare metal server.
6-37
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
1. Select Send logs and data to Threat Management Services Portal to register
Deep Discovery to TMSP.
Note: Disabling this option unregisters Deep Discovery from TMSP. Disable this
option if you have TMSP:
6-38
Configuring Product Settings
Note: The status server receives the following information from Deep Discovery:
6. Type the server authentication credentials (user name and password). TMSP
authenticates Deep Discovery using these credentials and then proceeds to accept
logs and data.
7. Type the registration email address.
Tip: The email address is used for reference purposes. Trend Micro recommends
typing your email address.
8. If you have configured Proxy Settings for Deep Discovery and want to use these
settings for TMSP connections, select Connect through a proxy server.
9. To check whether Deep Discovery can connect to TMSP based on the settings you
configured, click Test Connection.
10. Click Save if the test connection is successful.
SNMP Settings
Simple Network Management Protocol (SNMP) is used to manage distribution
networks. Registering the SNMP server to check system status (system shutdown or
start status), network card link up or link down, and component update status. The
SNMP server has two modes: SNMP Trap and SNMP Agent. SNMP Trap allows a
registered device to report its status to the SNMP Server. The SNMP Agent is an SNMP
6-39
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
server registered to the device. Use SNMP Agent to obtain Deep Discovery system
information (product version, CPU/Memory/Disk related info, Network Interface
throughput).
To configure SNMP Trap settings:
P ATH : A DMINISTRATION > G LOBAL S ETTINGS > N ETWORK I NTERFACE S ETTINGS > SNMP S ET -
TINGS
6-40
Configuring Product Settings
Refer to the Trend Micro Control Manager Administrator’s Guide for more information
about managing products using Control Manager.
C OMPONENT D ESCRIPTION
Control Manager The computer upon which the Control Manager application
server is installed. This server hosts the web-based Control
Manager product console
Use the Control Manager Settings screen on the Deep Discovery console to perform
the following:
• Register to a Control Manager server
• Verify that Deep Discovery can register to a Control Manager server
• Check the connection status between Deep Discovery and Control Manager
6-41
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: Ensure that both Deep Discovery and the Control Manager server belong to the same
network segment. If Deep Discovery is not in the same network segment as Control
Manager, configure the port forwarding settings for Deep Discovery.
1. Under Connection Settings type the name that identifies Deep Discovery in the
Control Manager Product Directory.
Note: Specify a unique and meaningful name to help you quickly identify Deep
Discovery.
6-42
Configuring Product Settings
Note: Deep Discovery uses the Port forwarding IP address and Port forwarding
port number for two-way communication with Control Manager.
Note: Configuring the NAT device is optional and depends on the network
environment.
4. Select Connect through a proxy server if you have configured Proxy Settings for
Deep Discovery and want to use these settings for Control Manager connections.
5. Click Test Connection to check whether Deep Discovery can connect to the
Control Manager server based on the settings you specified,.
6. Click Register if connection was successfully established.
To view the Deep Discovery status on the Control Manager console:
1. Open the Control Manager management console.
a. To open the Control Manager console, on any computer on the network, open
a web browser and type the following:
https://<Control Manager server name>/WebApp/login.aspx
Where <Control Manager server name> is the IP address or host name of the
Control Manager server.
2. On Main Menu, click Products.
3. Select Managed Products from the list.
4. Verify that the Deep Discovery icon is displayed.
To manage the connection with Control Manager after registration:
P ATH : A DMINISTRATION > G LOBAL S ETTINGS > N ETWORK I NTERFACE S ETTINGS > C ONTROL
M ANAGER S ETTINGS
6-43
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
2. To change settings after registration, click Update Settings to notify the Control
Manager server of the changes.
3. To transfer control of Deep Discovery management to another Control Manager
server, click Unregister and register Deep Discovery to the other server.
1. Ensure that the management port can access the Internet; the virtual analyzer may
need to query data through this port.
2. At the Virtual Analyzer Configuration window, check Enable submitting files to
Virtual Analyzer for further analysis.
Note: Highly suspicious files is the File types default setting. Select All executable files is the
recommended setting.
6-44
Configuring Product Settings
Note: For the IPv4 configuration, select an option based on your network
environment. Select the manual option for direct access to the Internet..
O PTION
6-45
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
O PTION
6-46
Configuring Product Settings
Note: The external Sandbox has more analysis capability than the internal Sandbox.
Appliance IP Settings
Deep Discovery uses a management port and several data ports. You can view the status
of these ports, change the network speed/duplex mode for each of the data ports, and
capture packets for debugging and troubleshooting purposes.
See Network Interface Settings on page 5-6 for details on configuring a dynamic IP address,
and managing network interface ports.
6-47
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
6-48
Chapter 7
7-1
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Dashboard
The Deep Discovery Dashboard displays system data, status, data analysis and statistics,
along with summary graphs, based on customizable user-selected widgets.
7-2
Viewing and Analyzing Information
Widgets
Deep Discovery includes the following widgets:
W IDGET D ESCRIPTION
Real-time Scanned Traffic This widget displays the traffic (both safe
and threat) scanned by Deep Discovery.
7-3
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
W IDGET D ESCRIPTION
Top Hosts with Events This widget displays hosts which triggered
Detected most events within the past 24 hours/7
days/30 days.
7-4
Viewing and Analyzing Information
W IDGET D ESCRIPTION
Malicious Scanned Traffic This widget displays the total traffic and
malicious traffic scanned within the past 24
hours.
7-5
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
W IDGET D ESCRIPTION
7-6
Viewing and Analyzing Information
7-7
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
2. At the New Tab window, type a tab title and select layout, and auto-fit option.
3. Click Save.
The new tab appears on the Dashboard.
To change tab settings:
P ATH : D ASHBOARD > TAB S ETTINGS
1. On the Dashboard, select a tab to be changed and click the Tab Settings icon.
The Tab Settings window appears.
7-8
Viewing and Analyzing Information
2. At the Tab Settings window, change tab title, layout, and auto-fit option.
3. Click Save.
The updated tab appears on the Dashboard.
To close a tab:
P ATH : D ASHBOARD
1. On the Dashboard, select a tab you wish to close and click the "X" in the top right
corner of the tab.
The tab is closed and removed from view.
Note: Closing the tab removes it from view; it is still available for use again by selecting
Tab Settings.
7-9
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
To move a tab:
P ATH : D ASHBOARD
Using Widgets
Your Deep Discovery Dashboard can be customized, using 23 available widgets, to
provide timely and accurate information about your system status. To analyze detections
on the Deep Discovery widgets, go to Detections on page 7-37.
There are several controls in the top right corner of each widget:
• Click the ? icon to get help information about the widget. This includes an overview
of the widget, widget data, and configuration or editable options.
• Click the Refresh icon to display the latest information on the screen. Each widget
view automatically refreshes.
7-10
Viewing and Analyzing Information
• Click the Edit icon to change the title of a widget or to modify some widget-specific
information such as the type of graph displayed, the time range or some datapoints.
• Most widgets have an Export icon. Use this to download a .csv file containing
information about widget’s data.
For all widgets displaying threat data, threat types include:
Widget options are divided into five categories and are displayed on corresponding tabs:
• Threat Geographic Map
• Real-time Monitoring
• Deep Analysis
7-11
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
• Top Threats
• System Status.
Deep Discovery widgets are designed to provide an overview of threats affecting your
network. They include:
This tab displays the Threat Geographic Map widget, a graphical representation of
affected hosts on a virtual world map. All affected hosts in different countries within a
selected time frame are displayed based on these five questions:
• Where is malware coming from?
• Where are network exploits coming from?
• Where are document exploits coming from?
• Where is malicious email coming from?
• Where is malware being directed (indicative of a C&C)?
The Threat Geographic Map displays regions with affected hosts as a solid red circle and
the Deep Discovery location being analyzed as a concentric red circle.
7-12
Viewing and Analyzing Information
Note: The larger the circle, the more threats have been identified.
7-13
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
A table populated with details about all threats (related to the indicated threat and
the country or city selected) appears.
Note: The right pane displays information about affected hosts organized by country.
7-14
Viewing and Analyzing Information
This widget displays all threats affecting network hosts within a 24-hour period as a
circle, grouped within its network. The size of the circle represents the total number of
threats. Hovering over a circle displays recent threat events. High-risk hosts are
highlighted in red.
Clicking a circle opens a screen that displays detailed threat information. Data is
displayed by: known malware, malicious behavior, suspicious behaviors, exploits,
grayware, web reputation, and disruptive applications. See Table 7-2.
This widget displays all malicious traffic detected by Deep Discovery, in a line graph
format, filtered by traffic type:
• All traffic
• HTTP
• SMTP
• Other
Traffic size is displayed with the time scale moving from right to left in seconds. Hover
over a point on the graph to learn about the traffic size.
Click Edit to control whether data is displayed using traffic size or percent. You can also
choose whether to display all scanned traffic data.
7-15
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
This widget displays total traffic monitored by Deep Discovery, in a line graph based on
all real-time HTTP, SMTP, or other traffic information. The time scale moves from right
to left in seconds. Hover over a point on the graph to learn about the traffic size.
This widget displays all real-time scanned traffic in a line graph based on all real-time
HTTP, SMTP, or other traffic information. The time scale moves from right to left in
seconds. Hover over a point on the graph to learn about the traffic size.
7-16
Viewing and Analyzing Information
Threat Summary
This widget displays total threats within the past 24 hours, 7 days or 30 days.
Information is displayed in a bar graph relating time and total threats. The type of threat
is distinguishable by color.
The time range is editable from the top left dropdown.
Click Edit to filter the types of threats displayed in the graph.
7-17
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Watch List
The widget’s left pane contains two tabs: Watch List and High Risk Hosts. Each tab
contains a list of hosts. Click a host in either tab to investigate the threats on that host.
See To investigate threats: on page 7-20.
Note: This widget shows only those hosts with threats categorized as "High Severity".
7-18
Viewing and Analyzing Information
The High Risk Hosts tab shows all high risk hosts, in the last 7 days, and can be sorted
by IP address, hostname, event total, and last detected event time.
Click the plus icon to view high risk host data.
2. Click the button, type a note for that host and click Save & Watch.
7-19
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
2. Edit the note for this hosts or remove it from the Watch List by modifying and
saving the note, or clicking Delete.
To investigate threats:
1. Go to either the Watch List or High Risk Hosts tab and click on the host to be
investigated.
The time-series line graph to the right plot is populated with the threat count on
that host by threat type and for a particular time period (Past 24 hours, Past 7 days,
and Past 30 days).
Note: Threat types include known malware, malicious behavior, suspicious behavior,
exploit, and grayware. See Table 7-2 for threat descriptions. For known malware
and exploits, all detections are counted in the graph. For malicious behavior,
suspicious behavior, and grayware, only those that are considered high risk are
counted in the graph.
Tip: If you choose Past 24 hours and the current time is 4:15pm, the graph shows
the threat count for each threat type from 5:00pm of the previous day to
4:00pm of the current day.
7-20
Viewing and Analyzing Information
D ATA D ESCRIPTION
Deep Discovery widgets are designed to show any Advanced Persistent Threats detected
by Deep Discovery and analyzed by Deep Analysis. They include:
• Top Affected Hosts
• Top Malicious Sites
• Top Suspicious Files
Using this summary data gives administrators insight into what type of threat file types
are affecting the network, which hosts are affected, and which malicious sites are
attempting network access.
7-21
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
This widget displays the top affected hosts as analyzed by Deep Analysis (internal
analyzer as detections per IP address.
Viewing hosts attacked in the past 24 hours, 7 days, or 30 days and the type of detected
attack allows users (typically system or network administrators) to take appropriate
action (blocking network access, isolating computers according to IP address) in order
to prevent malicious operations from affecting hosts.
Click Edit to change whether data is displayed in a chart, graph or table. You can also
control the total number of affected hosts displayed (up to 20).
7-22
Viewing and Analyzing Information
This widget displays the top malicious sites analyzed by Deep Analysis (internal
analyzer) as detections per affected host. Deep Discovery, combined with Trend Micro
Smart Protect Service, queries the level of security of destinations.
Viewing the top malicious sites mounting attacks against system hosts within the past 24
hours/7 days/30 days. allows users (typically system or network administrators) to take
appropriate action (blocking network access to these malicious destinations by proxy or
DNS server) in order to prevent malicious operations from affecting hosts.
All malicious sites within a chosen time frame are shown in a table. Click any cell to
obtain additional details about the site. See Table 7-2 for a description of the types of data
being analyzed.
7-23
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
This widget displays top suspicious files (attached to HTTP traffic, FTP traffic or email.)
as analyzed by Deep Analysis, along with the following information:
• The file count as detected by Deep Discovery
• The hosts affected by the suspicious file.
Viewing suspicious files affecting hosts within the past 24 hours, 7 days or 30 days in a
graphical format allows users (typically system or network administrators) to take
appropriate action by adding email block lists, changing http or ftp servers, modifying
system files, or writing registry keys) in order to remove malicious operations from
affecting hosts.
Data gathered about the affected hosts includes:
7-24
Viewing and Analyzing Information
Click Edit to change whether data is displayed in a chart, graph or table. You can also
control the total number of top suspicious files displayed (up to 20).
This widget displays disruptive application threats within the past 24 hours, 7 days, or 30
days. For a description of disruptive applications, seeTable 7-2. Clicking on a table cell
provides additional details.
Click Edit to change whether data is displayed in a chart, graph or table. You can also
control the total number of top disruptive applications displayed (up to 20).
7-25
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
This widget shows which hosts on your network(s) have been most affected by exploit
attempts within the past 24 hours, 7 days, or 30 days. For a description of exploits,
seeTable 7-2. By default, all exploited hosts within the selected time frame are shown in a
bar graph relating the IP addresses of the top exploited hosts and total detections.
Mouseover an area on the graph to see the exact number of exploits on a host. Clicking
this point will open a detection list with details about the type and severity of a threat,
the hostname, the timestamps, and the total detected exploits.
Click Edit to change whether data is displayed in a chart, graph or table. You can also
control the total number to exploited hosts displayed (up to 20).
7-26
Viewing and Analyzing Information
This widget displays the most detected grayware on your network(s) within the past 24
hours, 7 days, or 30 days. For a description of grayware, seeTable 7-2.
Note: This widget shows only those hosts with threats categorized as "High Severity".
By default, all known malware detections within the selected time frame are shown in a
pie chart. Mouseover an area to see the name of the top grayware-infected hosts.
Clicking this point opens a detection list with details about the date, type,
source/destination IP, protocol, direction or file name.
Click Edit to change whether data is displayed in a chart, graph or table. You can also
control the total number of grayware-infected hosts displayed (up to 20).
7-27
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
This widget displays events affecting hosts within the past 24 hours, 7 days, or 30 days.
By default, all events within the selected time frame are shown in a bar graph relating the
IP addresses of the top exploited hosts and total detections.
Mouseover an area on the graph to see the exact number of hosts with events detected.
Clicking this point opens a detection list with details about the severity and type of
threat, the hostname, the timestamps, and the total detections.
Click Edit to change whether data is displayed in a chart, graph or table. You can also
control the total number to hosts displayed (up to 20).
7-28
Viewing and Analyzing Information
This widget displays the most-detected known malware on your network(s) within the
past 24 hours, 7 days, or 30 days. For a description of known malware, seeTable 7-2.
By default, all known malware detections within the selected time frame are shown in a
pie chart. Mouseover an area to see the name of the malware detected on a host.
Clicking the malware name opens a detection list with details about the date, type,
source/destination IP, protocol, direction or file name.
Click Edit to change whether data is displayed in a chart, graph or table. You can also
control the total number of exploited hosts displayed (up to 20).
7-29
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
This widget displays the most malware-infected hosts on your network(s) within the past
24 hours, 7 days, or 30 days. For a description of malware, seeTable 7-2.
Note: This widget shows only those hosts with malware categorized as "High Severity".
By default, all malware-infected hosts within the selected time frame are shown in a bar
graph relating the IP addresses of the infected hosts and total detections.
Mouseover an area on the graph to see the exact number of malware-infected hosts.
Clicking this point opens a detection list with details about the type and severity of a
threat, the hostname, the timestamps, and the total detected infections.
Click Edit to change whether data is displayed in a chart, graph or table. You can also
control the total number to malware-infected hosts displayed (up to 20).
7-30
Viewing and Analyzing Information
This widget displays the most detected suspicious behavior on your network(s) within
the past 24 hours, 7 days, or 30 days. For a description of suspicious behavior, seeTable
7-2.
Note: This widget shows only those hosts with behavior categorized as "High Severity".
Click Edit to change whether data is displayed in a chart, graph or table. You can also
control the total number to suspicious behaviors displayed (up to 20).
7-31
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
This widget displays the most web reputation detections within the past 24 hours, 7
days, or 30 days. For a description of web reputation, seeTable 7-2.
By default, all detections within the selected time frame are shown in a table relating
URL and total detections. Clicking any data point opens a detection list with details
about the threat, timestamp, source/destination IP, and the malicious URL hostname.
Click Edit to change whether data is displayed in a chart, graph or table. You can also
control the total number to hosts displayed (up to 20).
7-32
Viewing and Analyzing Information
This widget displays all scanned traffic for the past 24 hours and can be filtered by traffic
type:
• All traffic
• HTTP
• SMTP
• Other
7-33
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
CPU Usage
Disk Usage
This widget displays how much disk space is available for your appliance.
7-34
Viewing and Analyzing Information
This widget displays malicious traffic as a subset of all scanned traffic, in a line graph
format, for a 24-hour time period. This data can be filtered by traffic type:
• All traffic
• HTTP
• SMTP
• Other
Memory Usage
7-35
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
2. At the Add Widgets Screen, select which widgets to display in each tab.
3. Click Add. The selected widget(s) appear on the Dashboard.
To close a widget:
P ATH : D ASHBOARD
1. Select a tab on the Dashboard that displays the widget you wish to close.
• Click the "X" at the top right corner of the widget display.
Note: Closing the widget removes it from the tab; it is still available for use again by
selecting Add Widget.
7-36
Viewing and Analyzing Information
To move a widget:
P ATH : D ASHBOARD
1. Select a tab on the Dashboard that displays the widget you wish to move.
2. Hover the mouse over the widget title bar until a four-headed arrow appears.
3. Left-click the mouse and drag the widget to its desired location within the tab.
Detections
The Detections tab contains a list of hosts experiencing an event (threat behavior with
potential security risks, known threats, or malware) for a 24-hour/7-day/30-day time
period. Deep Discovery tags these events as security risks/threats and makes a copy of
the files for assessment.
The Detections tab displays hosts affected by different threat types. For each host, its
hostname, network group, and number of times it was affected by the specific threat
type is displayed.
Clicking on any column title sorts that column in either ascending or descending order.
To view detection details, click any of the links within the table.
Data shown on the Detections window is not real-time.; it is aggregated from raw log
data every 10 minutes.
7-37
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Total Detections Clicking this link, allows the user to view the total
detections for all types of threats. See To view Total
Detections Details:.
7-38
Viewing and Analyzing Information
Detection Details
Deep Discovery logs the details of each Internet threat it identifies.
To searching for hostname or IP addresses:
P ATH : D ETECTIONS
1. Type a hostname or IP address in the search field and click the Search button.
The requested information is displayed.
7-39
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Select a time range for which to view threat data. Data is sorted based on selection.
Note: Select the Open option to view the file. Select the Save option to store the file for
future reference and analysis.
To customize columns:
P ATH : D ETECTIONS > C USTOMIZE C OLUMNS ICON
1. Select a page to view by typing the page number in the Page: field.
2. Select the number of entries per page (25, 50, or 100).
7-40
Viewing and Analyzing Information
7-41
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
3. Click a link under Total Detections to view threat details. The Detections Details
window appears.
7-42
Viewing and Analyzing Information
4. Click on the Other Hosts tab to view other hosts affected by the same threat.
7-43
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
4. Click on threat name link to view the latest information on this threat
The Threat Connect Summary screen appears.
7-44
Viewing and Analyzing Information
5. Click on the Other Hosts tab to view other hosts affected by the same threat.
To view Malicious Behavior Details:
P ATH : D ETECTIONS
7-45
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
4. Click the Other Hosts tab to view other hosts affected by the same threat.
To view Suspicious Behavior Details:
P ATH : D ETECTIONS
7-46
Viewing and Analyzing Information
4. Click on the Other Hosts tab to view other hosts affected by the same threat.
To view Exploit Details:
P ATH : D ETECTIONS > D ETECTIONS L IST
7-47
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
4. Click on the Other Hosts tab to view other hosts affected by the same threat.
To view Grayware Details:
P ATH : D ETECTIONS > D ETECTIONS L IST
7-48
Viewing and Analyzing Information
4. Click on the Other Hosts tab to view other hosts affected by the same threat.
To view Web Reputation Details:
P ATH : D ETECTIONS > D ETECTIONS L IST
7-49
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
4. Click on the Other Hosts tab to view other hosts affected by the same threat.
Viewing Disruptive Applications Details
P ATH : D ETECTIONS > D ETECTIONS L IST
7-50
Viewing and Analyzing Information
3. Click on the Other Hosts tab to view other hosts affected by the same threat.
Logs
Deep Discovery maintains comprehensive logs about security risk incidents, events, and
updates. Queries can be used to gather information and create reports from the log
database.
These logs are stored in the Deep Discovery database, in the Trend Micro Control
Manager (TMCM) database or on a Syslog server.
7-51
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TYPE D ESCRIPTION
7-52
Viewing and Analyzing Information
To query detections:
P ATH : L OGS > D ETECTIONS L OG Q UERY
7-53
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: Computer name, Active Directory domain name and account queries support
partial matching.
O PTION D ESCRIPTION
Group name Select from one of the group names in the list.
Not in group Select this option for groups that do not fall under
any of the other categories.
O PTION D ESCRIPTION
7-54
Viewing and Analyzing Information
O PTION D ESCRIPTION
Malicious URLs Select this option to generate logs about all websites
that try to perform malicious activities. Malicious
URLs include Trojan Horse programs, spyware,
adware, Pharming and other malware.
7-55
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
5. To start a new query, click the Clear result and start new query link.
Note: Do not use the browser’s back button the start a new query. Using the browsers
back button returns user to the Deep Discovery Dashboard.
6. Obtain additional details about detections on the log, as needed. See Detection
Details.
7-56
Viewing and Analyzing Information
Detection Details
Deep Discovery logs the details of each threat it identifies. The Detection Details screen
on the product console may contain any of the following information, depending on the
protocol, file and other factors:
To view detection details:
P ATH : D ETECTIONS L OG Q UERY RESULTS
1. On the detections log query results screen, click on the Date link.
The Detection Details screen appears, divided into two sections:
• Header
name
severity
type
• Connections Details (based on search criteria) may include
Detection direction
Host
Protocol Details
File Details
Additional Details
7-57
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
7-58
Viewing and Analyzing Information
Protocol Details
N AME D ESCRIPTION
File Details
N AME D ESCRIPTION
File name in archive Name of the file in the archive tagged as poten-
tial/known risk
7-59
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Additional Details
N AME D ESCRIPTION
7-60
Viewing and Analyzing Information
Using Logs
Log query results are designed to assist the administrator determine what action to take
depending on various criteria (affected host, type of threat). Use log data to manage the
network environment.
7-61
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Reports
Deep Discovery provides various reports to assist in mitigating threats and optimizing
system settings. Reports can scheduled for daily, weekly, and executive summary
generation. The web console Reports screen contains two tabs:
• Scheduled Reports
• On-Demand Reports
Scheduled Reports
P ATH : R EPORTS > S CHEDULED R EPORTS
The Scheduled Reports tab allows user to receive reports on a regular basis.
1. On the Scheduled Reports tab click a date from which to view reports.
The available reports are displayed.
Calendar icons include:
D = daily report
W = weekly report
7-62
Viewing and Analyzing Information
M = monthly report
2. Select a report to view or save.
On-Demand Reports
P ATH : R EPORTS > O N -D EMAND R EPORTS
Using Reports
Reports use forensic analysis and threat correlations to in-depth analyze Deep
Discovery event logs to identify the threats more precisely. Reports are designed to assist
the administrator determine the types of threat incidents affecting the network. Daily
administrative reports enable IT administrators to track the status of threats, while
weekly and monthly executive reports keep executives informed about the overall
security posture of the organization.
7-63
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
7-64
Chapter 8
Maintenance
This chapter explains how to perform maintenance tasks for Deep Discovery.
The topics discussed in this chapter are:
Licenses and Activation Codes on page 8-2
Log/Report Maintenance on page 8-2
Appliance Rescue on page 8-3
8-1
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Log/Report Maintenance
Deep Discovery maintains logs and reports in the product’s hard disk. To set criteria and
view logs go to Detection Logs Query on page 7-52 and System Logs Query on page 7-60.
Manually delete logs and reports on a regular basis to keep them from occupying too
much space on the hard disk. The deletion schedule will depend on your environment
and the quantity of logs and reports to be retained.
If the disk size is not enough for log and report storage, and the default disk limitation is
1 GB, Deep Discovery automatically deletes logs beginning with the oldest, by date. If
deleting earlier logs does not provide enough disk space, Deep Discovery automatically
deletes subsequent logs until the disk size is sufficient to hold the latest logs.
Note: Deep Discovery can send logs to a Syslog Server or Trend Micro Control Manager.
For details, see Syslog Server Settings on page 7-61 and Control Manager Settings on page
6-40.
View the status of the Deep Discovery database and repair any corrupted database files
on the Log /Report Maintenance screen.
To configure log maintenance settings:
P ATH : A DMINISTRATION > L OG /R EPORT M AINTENANCE
8-2
Maintenance
Appliance Rescue
Rescuing the software appliance means reinstalling Deep Discovery and reverting to
saved or default settings. As an alternative, update the firmware to rescue the software
appliance. See Firmware Update on page 6-29.
Use appliance rescue if Deep Discovery files become corrupted. Rescuing the software
appliance reinstalls the Deep Discovery feature that monitors traffic and creates logs.
Note: Unplug external USB storage devices before continuing with appliance rescue.
Rescuing the software appliance is not the same as applying a system update:
• Rescuing: Replaces application files and keeps or restores the default settings.
• Applying a system update: Updates the existing application files to enhance
features.
WARNING! Before rescuing the software appliance, create a backup of your settings.
For details, see Backup/Restore Appliance Configuration on page 6-26.
8-3
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: Using a monitor connected to a VGA port is the recommended method for rescue
operations.
4. Select OK.
The software appliance restarts.
5. When the Press the ESC button message appears in the boot screen, press [Esc]
immediately.
The boot menu appears.
8-4
Maintenance
6. Type 4 and press ENTER. The Deep Discovery rescue mode screen appears.
8-5
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
7. Copy the Deep Discovery Rescue Tool (DDRescue.exe) from the Solution CD to
the host.
WARNING! Ensure Deep Disovery appliance is in rescue mode before using the
rescue tool.
Note: In rescue mode, the Deep Discovery IP address is 192.168.252.1 and the subnet
mask is 255.255.255.0.
Note: Ensure that host running the rescue tool is on the same network segment
(192.168.252.0/24) as Deep Discovery.
8-6
Maintenance
Note: Do not turn off or reset the appliance during the update process.
.
FIGURE 8-4. Configuration File Migration Screen
8-7
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
14. After migration, open the Preconfiguration Console and configure the Deep
Discovery network settings. See Preconfiguration Menu: Device Settings on page 4-9.
8-8
Chapter 9
Getting Help
This chapter answers questions you might have about Deep Discovery and describes
how to troubleshoot problems that may arise.
The topics discussed in this chapter are:
Frequently Asked Questions (FAQs) on page 9-2
Before Contacting Technical Support on page 9-6
Contacting Trend Micro on page 9-8
9-1
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Installation
Will the Deep Discovery installation disrupt network traffic?
No. Deep Discovery installation should not disrupt the network traffic since the product
connects to the mirror port of the switch and not directly to the network.
Activation
Do I need to activate Deep Discovery after installation?
Yes. Use a valid Activation Code to enable the Deep Discovery features. Additionally,
you can register to TMSP and get daily and weekly threat analysis reports.
Configuration
How many seconds of inactivity does the Preconfiguration Console accept
before logging off ?
After five minutes of inactivity, Deep Discovery logs out of the inactive session.
Can I register Deep Discovery to more than one Control Manager server?
No, you cannot register Deep Discovery to more than one Control Manager server. To
register Deep Discovery to a Control Manager server, refer to Control Manager Settings on
page 6-40.
Will changing the Deep Discovery IP address prevent it from communicating
with the Control Manager server?
Yes, changing the Deep Discovery IP address through the Preconfiguration Console or
product console will cause temporary disconnection (30 seconds). During the time the
Management Communication Protocol (MCP) agent is disconnected from Control
Manager, the MCP agent logs off from Control Manager and then logs on to provide
Control Manager with the updated information.
9-2
Getting Help
I typed the wrong password three times when logging on to the Preconfiguration
Console. Then, I could no longer log on to the Preconfiguration Console. What
should I do?
If you typed the wrong password three consecutive times, the product will lock for 30
seconds before you can try to log on again. Wait for 30 seconds and try to log on again
Is there anything that the administrator needs to configure in the firewall
settings?
If you use Deep Discovery only for monitoring the network, you do not need to
configure the firewall settings. However, if Deep Discovery connects to the Internet for
updates or to TMSP, you need to configure the firewall to allow Ports 80, 22 or 443
traffic from Deep Discovery.
I am unable to register to TMSP, what can I do?
Ensure that:
• The TMSP logon details are correct.
• The firewall settings are configured to allow port 22 or 443 traffic.
• The proxy settings are correct.
If the problem persists, consult your support provider.
Do I need to reconfigure the Syslog Server settings after importing the
configuration file exported from TDA 2.6 (or another previous version)?
Yes, reconfigure the Syslog Server settings after ever fresh Deep Discovery installation,
if you need to import the configuration file from TDA 2.6 (or previous version).
What can I do when the email notification sent from Deep Discovery is blocked
by our security product as a phishing URL?
This may be due to your network’s security policies. Add Deep Discovery to your
network security product’s white list.
After a fresh installation, Deep Discovery is unable to obtain a dynamic IP
address. What do I do?
Restart the appliance and verify that it is able to obtain an IP address. Next, connect an
ethernet cable from the management port to a known good ethernet connection and
restart the appliance.
9-3
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
If I navigate away from the Appliance IP Settings page or log off the web console
after capturing network packets, my network packet capture are lost. How do I
avoid this?
Be sure to export the network packet capture result to your local hard drive before
navigating away from the Appliance IP Settings page or logging off of Deep Discovery.
Detections
Why does no data appear on the Detections page after I activate Deep Discovery
but it does appear if I do a Detections Log Query?
It takes up to 10 minutes to aggregate Detections data.
Widgets
Why are widget heights inconsistent, even though Auto-fit is enabled in the Tab
Settings?
The Auto-fit function depends on the layout option selected and how many widgets are
added. Auto-fit is enabled only when the selected widgets can be arranged one widget per
field.
Logs
I tried to export the logs from the web console, but was unable to select a file
extension. What should I do?
If you are using IE9 as your browser, this happens when the Do not save encrypted pages to disk
option is enabled. To change this, in an IE9 browser window go to Tools > Internet
Options > Advanced tab > Security section > uncheck Do not save encrypted pages to disk
and click OK to apply changes. Open a new browser window and re-export the logs.
How can I cancel the export window while exporting Deep Discovery logs using
IE9?
Open IE9 and go to Tools > Internet Options > Advanced tab > Security section >
uncheck Do not save encrypted pages to disk. Click OK to apply changes. Open a new
browser window and export logs.
9-4
Getting Help
Why is there a blank area beside the Connection Details section (in the
Detection Details page) when opening the Deep Discovery web console with
IE8?
This is caused by the Chrome plug-in being install in IE8. Currently Deep Discovery
doesn’t support this plug-in. Remove the Chrome plug-in and try again.
Why does the Log Query screen display no result or takes a long time before the
results appear?
When Deep Discovery queries the database, you may experience some slight delay
before the query results appear, especially if there is heavy network traffic. Please wait
for the query results to be displayed. If you click Search again before the query results
appear Deep Discovery re-queries the logs.
Internal Analyzer
I imported the virtual analyzer image into Deep Discovery. When I tried to
import the same image again, it failed. What can I do?
This happens because Deep Discovery records each image’s unique identification. An
image with the same unique identification cannot be imported twice consecutively if the
first import was successful, due to a known VirtualBox issue. Create a new image and go
to Appendix A to re-import a new image.
Troubleshooting
During Deep Discovery rescue operation I get an error message with random
text. Now what?
Remove any USB storage devices connected to Deep Discovery and try again.
Product Updates
By default, where does Deep Discovery download updated components from?
Deep Discovery receives updated components from the Trend Micro ActiveUpdate
server by default. If you want to receive updates from other sources, configure an update
source for both scheduled and manual updates.
9-5
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Documentation
What documentation is available with this version of Deep Discovery?
This version of Deep Discovery includes the following documentation:
• Administrator's Guide
• Readme file
• Help
9-6
Getting Help
Trend Community
Get help, share your experiences, ask questions, and discuss security concerns with other
fellow users, enthusiasts, and security experts.
http://community.trendmicro.com/
9-7
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Technical Support
Trend Micro provides technical support, pattern downloads, and program updates for
one year to all registered users, after which you must purchase renewal maintenance. If
you need help or just have a question, please feel free to contact us. We also welcome
your comments.
Trend Micro Incorporated provides worldwide support to all registered users.
Get a list of the worldwide support offices at:
http://www.trendmicro.com/support
Get the latest Trend Micro product documentation at:
http://downloadcenter.trendmicro.com/
In the United States, you can reach the Trend Micro representatives through phone, fax,
or email:
Trend Micro, Inc.
10101 North De Anza Blvd., Cupertino, CA 95014
Toll free: +1 (800) 228-5651 (sales)
Voice: +1 (408) 257-1500 (main)
Fax: +1 (408) 257-2003
Web address:
http://www.trendmicro.com
Email: [email protected]
9-8
Getting Help
TrendLabs
TrendLabsSM is the global antivirus research and support center of Trend Micro. Located
on three continents, TrendLabs has a staff of more than 250 researchers and engineers
who operate around the clock to provide you, and every Trend Micro customer, with
service and support.
You can rely on the following post-sales service:
• Regular virus pattern updates for all known "zoo" and "in-the-wild" computer
viruses and malicious codes
• Emergency virus outbreak support
• Email access to antivirus engineers
• Knowledge Base, the Trend Micro online database of technical support issues
TrendLabs has achieved ISO 9002 quality assurance certification.
9-9
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
[email protected]
You can also use the web submission form at:
http://subwiz.trendmicro.com/subwiz
Documentation Feedback
Trend Micro always seeks to improve its documentation. If you have questions,
comments, or suggestions about this or any Trend Micro document, please go to the
following site:
http://www.trendmicro.com/download/documentation/rating.asp
9-10
Appendix 10
Glossary
This glossary describes terms related to Deep Discovery use.
TERM D EFINITION
10-1
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TERM D EFINITION
ActiveX malicious Hackers and virus writers use ActiveX malicious code
code as a vehicle to attack the system. Changing your
browser's security settings to "high" is a proactive
approach to keep ActiveX controls from executing.
10-2
Glossary
TERM D EFINITION
10-3
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TERM D EFINITION
Boot sector virus A boot sector virus is a virus targeted at the boot
sector (the operating system) of a computer.
Computer systems are most vulnerable to attack by
boot sector viruses when you boot the system with an
infected disk from an external drive - the boot attempt
does not have to be successful for the virus to infect
the hard drive.
Command and Control The central server (s) for a botnet or entire network
(C&C) server of compromised devices used by a malicious bot to
propagate malware and infect a host.
10-4
Glossary
TERM D EFINITION
10-5
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TERM D EFINITION
10-6
Glossary
TERM D EFINITION
DNS resolution When a DNS host requests host name and address
data from a DNS server, the process is called
resolution.
Basic DNS configuration results in a server that
performs default resolution. Example: a remote
server queries another server for computer data in
the current zone. Client software in the remote server
queries the resolver, which answers the request from
its database files.
Domain name The full name of a system, consisting of its local host
name and its domain name. Example: tellsitall.com. A
domain name should be sufficient to determine a
unique Internet address for any host in the Internet.
This process, called "name resolution", uses the
Domain Name System (DNS).
10-7
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TERM D EFINITION
10-8
Glossary
TERM D EFINITION
File type Any data stored in a file. Most operating systems use
the file name extension to determine file type. The
file type used to select an appropriate icon to
represent the file in a user interface, and the correct
application with which to view, edit, run, or print the
file.
File name extension The portion of a file name (.dll or .xml) which
indicates the application used to create the file.
10-9
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TERM D EFINITION
Hard disk (hard drive) One or more rigid magnetic disks rotating about a
central axle used to read and write hard disks and to
store data. Hard disks can be permanently connected
to the drive (fixed disks) or external to an endpoint.
10-10
Glossary
TERM D EFINITION
Java malicious code Virus code written or embedded in Java. Also see
Java file.
10-11
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TERM D EFINITION
Listening port A port utilized for host connection requests for data
exchange.
Macro virus code Macro virus code is contained in part of the template
that travels with many documents (.dot in Microsoft
Word documents).
10-12
Glossary
TERM D EFINITION
Management (web) The user interface for your Trend Micro product.
console
Mass mailer (Worm) A malicious program that has high damage potential,
due to the large amounts of network traffic it
generates.
10-13
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TERM D EFINITION
Network virus A type of virus that uses network (TCP, FTP, UDP,
HTTP) and email protocols to replicate.
10-14
Glossary
TERM D EFINITION
Outbreak Containment Detects both known and unknown malware that can
Service (OCS) potentially start an outbreak .
10-15
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TERM D EFINITION
Pattern file (Official The pattern file, as referred to as the Official Pattern
Pattern Release) Release (OPR), is the latest compilation of patterns
for identified viruses.
POP3 server A server which hosts POP3 email, from which clients
on your network retrieve POP3 messages.
10-16
Glossary
TERM D EFINITION
10-17
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TERM D EFINITION
10-18
Glossary
TERM D EFINITION
10-19
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
TERM D EFINITION
10-20
Glossary
TERM D EFINITION
Web The World Wide Web, also called the web or the
Internet.
10-21
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
10-22
Appendix A
A-1
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: Uninstall the VMware Converter Tool before creating the image.
Installing Applications
Verify that all needed applications have been configured on the virtual machine prior to
converting a VMware image. See Installing Applications on page A-20.
A-2
Creating a Custom Sandbox
2. Click Login.
The Welcome to VMware vCenter Converter Standalone window appears.
A-3
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
A-4
Creating a Custom Sandbox
5. Click Next.
The Conversion Source Destination window appears.
6. At the Conversion Source Destination window, use the following settings:
Select destination type: VMware Workstation or other VMware virtual machine
Select VMware product: VMware Workstation 6.5.x
Virtual machine details:
Name: Use default or type a name.
Select a location for the virtual machine: Type a destination.
7. Click Next.
The Conversion Options window appears. See Figure A-4 for options.
8. Click Edit to updated options.
A-5
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
9. Click Edit for Data to copy to verify that the type for VirtualDisk1 is set to Not
pre-allocated.
A-6
Creating a Custom Sandbox
A-7
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
A-8
Creating a Custom Sandbox
A-9
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
A-10
Creating a Custom Sandbox
A-11
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: The Deep Discovery sandbox currently only supports English versions of Windows
XP and Windows 7.
4. Click Next.
The Memory window appears.
A-12
Creating a Custom Sandbox
6. Click Next.
The Virtual Hard Disk window appears. Select Create new hard disk.
A-13
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
7. Click Next.
The Virtual Disk Creation Wizard window appears.
8. At Virtual Disk Creation Wizard window, select VMDK (Virtual Machine Disk).
A-14
Creating a Custom Sandbox
9. Click Next.
The Virtual disk storage details window appears.
10. At Virtual disk storage details window > Storage details, select Dynamically
allocated.
A-15
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
A-16
Creating a Custom Sandbox
16. Right-click the virtual machine created in step 15 and navigate to: Settings >
Storage > Empty.
17. Under Attributes, click the CD icon (to the right of CD/DVD Drive).
A file menu appears.
A-17
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
18. Select Choose a virtual CD/DVD disk file… and the OS ISO to install.
The disk file is available as a device.
19. Click OK. To install Windows, open the virtual machine and select which CD drive
to boot.
The virtual machine boots into the Windows Setup menu.
Note: If the Auto capture keyboard turned on message appears, click OK.
A-18
Creating a Custom Sandbox
20. After the Windows Setup has finished, stop the virtual machine.
21. Highlight the virtual machine, click Snapshots, followed by the camera icon.
A snapshot pop-up appears.
22. Type a name for the snapshot and click OK.
A-19
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Installing Applications
After installing the following applications, open them and accept any license agreements.
Microsoft Office
Microsoft Office 2003, 2007 and 2010 are supported.
Note: Microsoft Office 2003 is the environment best suited for virtual analysis.
.Net Framework
For Windows XP images install .Net Framework 3.5 or later.
Download the most current version of the .Net Framework 3.5:
http://www.microsoft.com/download/en/details.aspx?id=21.
Windows 7
1. Enable Administrator account:
a. Run cmd
b. Type: net user administrator /active: yes.
A-20
Creating a Custom Sandbox
2. Delete all other user accounts so that there is only one administrator account.
a. Type: net user "<USERNAME>" delete.
3. Set the Administrator login password to ‘1111’.
4. Setup Automatic login
a. REG ADD “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon” /v DefaultUserName /t REG_SZ
/d Administrator /f
b. REG ADD “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon” /v DefaultPassword /t REG_SZ
/d 1111 /f
c. REG ADD “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon” /v AutoAdminLogon /t REG_SZ
/d 1 /f
5. Reboot the virtual machine.
6. The virtual machine logs in automatically.
7. If auto login is unsuccessful, repeat step 4.
Windows XP
1. Delete all other user accounts so that there is only one administrator account.
a. Type: net user "<USERNAME>" delete.
2. Set the Administrator login password to ‘1111’.
3. Setup Automatic login
a. REG ADD “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon” /v DefaultUserName /t REG_SZ
/d Administrator /f
b. REG ADD “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon” /v DefaultPassword /t REG_SZ
/d 1111 /f
c. REG ADD “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon” /v AutoAdminLogon /t REG_SZ
/d 1 /f
4. Reboot the virtual machine.
5. The virtual machine logs in automatically.
A-21
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
Note: To be imported into Deep Discovery, the exported OVA file size must be
between 10 GB and 15 GB.
4. Click Next.
The Appliance Export Setting window appears.
5. Select a filename and location for the OVA image export.
A-22
Creating a Custom Sandbox
6. Click Next.
The last Appliance Export Settings window appears.
7. Double-click the description for additional configuration changes.
A-23
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
8. Click Export.
The OVA image export starts.
A-24
Creating a Custom Sandbox
4. Type the name of the VMDK along with its software and hardware configuration.
5. Click Next.
The Memory window appears.
6. At the Memory window, use the slider to select 512 MB base memory size.
A-25
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
7. Click Next.
The Virtual Hard Disk window appears.
8. Select Use existing hard disk and the converted VMDK image.
9. Click Next.
The Create New Virtual Machine Summary window appears.
A-26
Creating a Custom Sandbox
A-27
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
A-28
Creating a Custom Sandbox
A-29
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
A-30
Creating a Custom Sandbox
Note: The OVA/VMDK must be uploaded to an HTTP or FTP server prior to configuring
Deep Discovery virtual analyzer settings. Deep Discovery can also connect via secure
HTTP.
Note: An OVA/VMDK disk image can only be imported once into Deep Discovery.
For every sandbox in Deep Discovery, you must create a new image file using
VirtualBox because each UUID must be unique.
Note: If the HTTP server does not require a username/password, leave these
fields empty; do not enable Anonymous Login.
4. Click Import.
The import completes.
A-31
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
A-32
Creating a Custom Sandbox
Troubleshooting
The Found New Hardware Wizard opens with the image on VirtualBox
The hardware wizard automatically runs whenever an image is transferred from one
machine to another. It will not affect the sandbox.
The converted VMware VMDK displays the blue screen “Cannot find Operating
System” when powered on via VirtualBox
The Chipset ICH9 must be selected and the IP APIC must be enabled.
A VMware OVA is experiencing some problems uploading into Deep Discovery
Use the VMware Converter Tool to convert the image using VirtualBox. See
Converting VMware Image with VMware Converter on page A-3.
The OVA is too large and cannot upload into Deep Discovery.
The OVA/VMDK image should be between 10 GB and 15 GB.
A-33
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
A-34
Index
A dual port 2-4
ActiveUpdate server 5-15 mirroring trunk links 2-9
application filters 6-14 network TAP 2-5
instant messaging 6-14 redundant networks 2-7
peer-to-peer 6-14 remote port 2-8
streaming media 6-14 single port 2-3
specific VLAN 2-7
B VLAN mirroring 2-8
backup detection exclusion list 6-22
device configuration settings 6-26 about 6-22
network configuration 6-11 detection log query 7-52
bare metal server 3-2 device configuration settings
about 6-26
C device information and status 4-6
change password 4-23 diagnostic test 4-20
components documentation
firmware 5-12 conventions xii
IntelliTrap Exception Pattern 5-11 FAQs 9-6
IntelliTrap Pattern 5-11 documentation feedback 9-10
Network Content Correlation Engine 1-6, 5-12 dual port monitoring 2-4
Network Content Correlation Pattern 5-12 duplex mode 4-11
Network Content Inspection Engine 1-6, 5-11
Network Content Inspection Pattern 5-11 F
Spyware Active-monitoring Pattern 5-11 FAQs 9-2
Virus Pattern 5-11 firmware 5-12
Virus Scan Engine 1-4, 5-11
configuration settings H
device 6-26 heartbeat message
network 6-11 Threat Discovery Appliance 6-37
console timeout 6-25 high network traffic usage notifications 6-5
Control Manager 6-40 high risk client notifications 6-2–6-4
console 6-43 high risk clients 7-63
Control Manager registration 4-10 host name 5-4
D I
default gateway 5-5 IM 6-14
deployment indicators
considerations 2-2 about 7-2
IX-1
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
IX-2
Index
IX-3
Trend Micro™ Deep Discovery 3.0 Administrator’s Guide
IX-4