Historical Investigations assess historical events and analysis chains based on
specified criteria. The results can be viewed as a root cause analysis map showing
the execution
flow of any suspicious activity. This facilitates the analysis of the enterprise-wide
chain of
events involved in a targeted attack.
Historical Investigations use the following object types for its
investigation:
-
DNS record
-
IP address
-
File name
-
File path
-
SHA-1 hash values
-
MD5 hash values
-
User account
Historical Investigations query a normalized database containing an endpoint's
historical events. Compared to a traditional log file, this method uses less disk
space and
consumes fewer resources.