Solved

Trend Micro Deep Security IPS mailing list & docs

Posted on 2014-02-06
3
456 Views
Last Modified: 2014-02-24
Just been tasked to review Trend Micro Deep Security
IPS (Intrusion Protection/Prevention System?) events
 / logs for non-legitimate cases.

Appreciate if anyone can point me to
a) mailing lists that actively discuss this
b) any links out there that has documentation on this
0
Comment
Question by:sunhux
  • 2
3 Comments
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 39840734
Tm has a knowledgebase and forum, the search in those can be useful

http://esupport.trendmicro.com/en-us/business/fastsearch.aspx?q=log%20analysis&p=Deep%20Security&t=7

you can also create support case for assistance to intepret specific log or they can share more insight
http://esupport.trendmicro.com/srf/srfmain.aspx

if I will see any of the DP manual they will have section on the log analysis and rule description e.g. in PDF (can be old but can grab latest one from kb) see Options for Log Inspection Rules and Creating Custom Log Inspection Rules in the Reference section

http://docs.trendmicro.com/all/ent/dsm/v7.5/en-us/dsm_7.5_sp1_ug.pdf

for http decoding can catch
http://esupport.trendmicro.com/solution/en-us/1098016.aspx

in case you needed some wp for quick summary (can see "LOG INSPECTION")
http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_protecting-the-dynamic-datacenter.pdf
0
 

Author Comment

by:sunhux
ID: 39844283
Think the 1st link doesn't load:
http://esupport.trendmicro.com/en-us/business/fastsearch.aspx?q=log%20analysis&p=Deep%20Security&t=7

Do you have the correct link for the above?
0
 
LVL 62

Assisted Solution

by:btan
btan earned 500 total points
ID: 39844684
As I mentioned you can use the kb search and if you clickt hat first link, you will see that log analysis in the keyword and deep security as the product category.  The list can gove you an overall summary and probably hit the needed. Pls do see if it helps.  Try using the supporting online for more leverage
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Kaspersky Anti-Ransomware Tool for Business 10 119
Security Permissions Issues 10 74
SIEM traffic 5 43
Propagate Applocker rules to all laptops/PCs in the domain 10 30
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now