Event_Details

Event Details

Threat Discovery Appliance logs the details of each Internet threat it identifies. The Event Details screen on the product console may contain any of the following information, depending on the protocol, file and other factors:

Security Risk Details

Security risk details

Name

Description

Date

Date and time the incident occurred

VLAN ID

Virtual local area network ID

Detection name

Name of the known threat

Detection by

Scan engine that detected the threat

Traffic direction

File/detection direction

Type

Type of Internet threat

Detection Type

Type of detection, such as Potential threat, Known threat, or Outbreak Containment Service

Severity

Degree of potential risk of the threat

Protocol

Protocol used by the threat

Intelligent rule ID

Network Content Correlation Engine rule number triggered by the file

Suspicious behavior

Network Content Correlation Engine rule reason triggered by the session data or network traffic

Mitigation

Status of mitigation (Mitigated or Un-Mitigated)

Outbreak Containment Services

Status of block action (Blocked or Un-Blocked)

Host name

Host or product name

Source IP address

IP address and host name of the source of the threat

Source port

Port number of the source of the threat

Source MAC address

MAC address and vendor name of the source of the threat

Source group

Group name of the source of the threat

Source network zone

Network zone of the source of the threat

Source Active Directory Domain\Account

Active Directory domain name and account used to log on to the source of the threat and the corresponding timestamp

Destination IP address

IP address and host name of the threat destination

Destination port

Port number of the threat destination

Destination MAC address

MAC address of the threat destination

Destination group

Group name of the threat destination

Destination network zone

Network zone of the threat destination

Destination Active Directory Domain\Account

Active Directory domain name and account used to log on to the destination of the threat

<Protocol> Details

Event details for traffic through various protocols

Name

Description

User name

Name of the logged on user

Sender

Email address that sent the suspicious file

Recipient

Email address of the suspicious file recipient

Subject

Subject of the suspicious email

User agent

Client application used with a particular network protocol

Target share

Shared folder where the malicious file is dropped

Channel name

Name of the IRC channel

File Details

File details

Name

Description

File name

Name of the file tagged as a potential/known risk

File size

Size of the file tagged as a potential/known risk

File extension

Extension of the file tagged as potential/known risk

File name in archive

Name of the file in the archive tagged as potential/known risk

Additional Details

Additional event details

Name

Description

Authentication

Whether the protocol requires authentication

URL

Link included in the email or the instant message content

BOT command

Command used in IRC for BOTs

BOT URL

URL used in IRC for BOTs

Constraint Type

Reasons Threat Discovery Appliance stops scanning files in the network

See also: