Views:
Provides detailed information about the impact of Virtual Analyzer suspicious objects
Data
Description
Type
The type of suspicious object
Object
The name of the suspicious object
Scan Action
The scan action taken by the managed product that detected the suspicious object (for example, Log, Bock)
Risk Level
The risk level of the security threat
Expiration
The date and time the suspicious object is set to expire
First Submission Time
The date and time the managed product first submitted the suspicious object to Virtual Analyzer
First Submission Product Name
The name of the managed product that first submitted the suspicious object to Virtual Analyzer
First Submission Host Name
The display name of the managed server that first submitted the suspicious object to Virtual Analyzer
First Submission IP Address
The IP address of the managed server that first submitted the suspicious object to Virtual Analyzer
First Submission File Name
The file name of the suspicious object that the managed product first submitted to Virtual Analyzer
First Submission File Type
The file type of the suspicious object that the managed product first submitted to Virtual Analyzer
First Submission Source
The source of the suspicious object that the managed product first submitted to Virtual Analyzer
First Submission Destination
The destination of the suspicious object that the managed product first submitted to Virtual Analyzer
Latest Submission Time
The date and time the managed product last submitted the suspicious object to Virtual Analyzer
Latest Submission Product Name
The name of the managed product that last submitted the suspicious object to Virtual Analyzer
Latest Submission Host Name
The display name of the managed product that last submitted the suspicious object to Virtual Analyzer
Latest Submission IP Address
The IP address of the last managed server that last submitted the suspicious object to Virtual Analyzer
Latest Submission File Name
The file name of the suspicious object that the managed product last submitted to Virtual Analyzer
Latest Submission File Type
The file type of the suspicious object that the managed product last submitted to Virtual Analyzer
Latest Submission File SHA-1
The file SHA-1 of the suspicious object that the managed product last submitted to Virtual Analyzer
Latest Submission Detection Name
The detection name of the suspicious object that the managed product last submitted to Virtual Analyzer
Latest Submission Source
The source of the suspicious object that the managed product last submitted to Virtual Analyzer
Latest Submission Destination
The destination of the suspicious object that the managed product last submitted to Virtual Analyzer
Endpoint Domain Name
The domain name of the endpoint that triggered the detection
Endpoint Host Name
The display name of the endpoint that triggered the detection
Endpoint User Domain Name
The domain name of the user logged on to the endpoint at the time of the detection
Endpoint User Domain Account
The domain account of the user logged on to the endpoint at the time of the detection
Endpoint User Name
The logged on user name at the time of the event
Endpoint IP Address
The IP address of the endpoint
Endpoint First Found Time
The date and time the suspicious object was first detected on the endpoint
Endpoint First Product Detection
The name of the managed product that first detected the suspicious object on the endpoint
Endpoint First Action Taken
The first action taken on the endpoint by the managed product
Endpoint Last Found Time
The date and time the suspicious object was last detected on the endpoint
Endpoint Last Product Detection
The name of the managed product that last detected the suspicious object on the endpoint
Endpoint Last Action Taken
The last action taken on the endpoint by the managed product
Endpoint Last Action Result
The result of the last action taken on the endpoint by the managed product