Procedure
- Go to .
- To display Affected Hosts - Host Details, do one of the
following:
-
Click any detection link associated with an affected host.
-
Click the IP address of an affected host.
Details about the host are displayed.Affected Hosts - Host Details -
- Set the detection severity level by dragging the Detection severity slider.
- Select a time period.
- To select columns for display, click Customize Columns,
select one or more columns, then click Apply to return to
the modified Affected Hosts screen.
Affected Hosts - Host Details Columns
ColumnsPreselectedStatusXTimestampXSource HostDestination HostInterested HostPeer HostXSenderRecipientsEmail SubjectUser AccountThreat DescriptionXDetection NameXDetection TypeProtocolXDetection SeverityXAttack PhaseXDirectionXNotable ObjectX
Note
The default Timestamp and Threat Description columns cannot be removed. - (Optional) Click Mark Displayed as Resolved to mark all
the detections displayed on the current page as resolved.In the Status column, the
icon changes to
.
Note
After marking all displayed detections as resolved, detections can only be individually marked as unresolved. - To run a basic search, do one of the following:
-
Type an IP address or host name in the search text box and press Enter.
-
Click the
icon.
By default, Deep Discovery Inspector searches Affected Hosts - Host Details by Peer Host. -
- Mark the affected peer host as one of the following:
-
Network Group
-
Registered Domains
-
Registered Services
Do one of the following to open the drop-down menu and mark the host:-
Beside the IP address, click the
icon. -
In the Peer Host column, click the
icon.
-
- To run a saved search, open the drop-down menu of the search box, and click a
saved search.Deep Discovery Inspector provides the following preset saved searches on the Affected Host - Host Details screen.
Preset Saved Searches
NameFilter OptionsThreatsDetection type options include the following:-
Malicious Content
-
Malicious Behavior
-
Suspicious Behavior
-
Exploit
-
Grayware
-
Malicious URL
Known ThreatsFile Detection Types: Known MalwarePotential Threats- Virtual Analyzer Result: Has analysis results
-
File Detection type options include the following:
-
Highly Suspicious File
-
Heuristic Detection
-
RansomwareDetection name options include the following:-
Ransomware-related detections
-
- To create and apply an advanced search filter, click
Advanced.For details, see About affected hosts - host details advanced search filter.
- Click Export.A zip archive with the following files downloads:
-
threats.csv
-
malicious_urls.csv
-
application_filters.csv
-
correlated_incidents.csv
-
