Views:

Displays specific information about application activities that violate network security policies

Table 1. Detailed Application Activity Data View

Data

Description

Received

The date and time Apex Central received the data from the managed product

Generated

The date and time the managed product generated the data

Product Entity

The display name of the managed product server in Apex Central

Product

The name of the managed product or service

Example: Apex One, ScanMail for Microsoft Exchange

VLAN ID

The VLAN ID (VID) of the source from which the suspicious threat originates

Detected By

The filter, scan engine, or managed product which detects the suspicious threat

Traffic/Connection

The direction of network traffic or the position on the network the suspicious threat originates

Protocol Group

The broad protocol group from which a managed product detects the suspicious threat

Example: FTP, HTTP, P2P

Protocol

The protocol from which a managed product detects the suspicious threat

Example: ARP, Bearshare, BitTorrent

Description

Detailed description of the incident by Trend Micro

Endpoint Host

The host name of the computer in compliance of the policy/rule

Source IP

The IP address of the source from which the suspicious threat originates

Source MAC

The MAC address of the source from which the suspicious threat originates

Source Port

The port number of the source from which the suspicious threat originates

Source IP Group

The IP address group of the source where the violation originates

Source Network Zone

The network zone of the source where the violation originates

Endpoint IP

The IP address of the endpoint the suspicious threat affects

Endpoint Port

The port number of the endpoint the suspicious threat affects

Endpoint MAC

The MAC address of the endpoint the suspicious threat affects

Endpoint Group

The IP address group of the endpoint the suspicious threat affects

Endpoint Network Zone

The network zone of the endpoint the suspicious threat affects

Detections

The total number of detections

Example: Apex One detects 10 virus instances of the same virus on one computer.

Detections = 10

Threat Type

The specific type of security threat managed products detect

Detection Severity

The severity level of the incident

IP Address (Interested)

The IP address of the target endpoint (source or destination)

For an exchange occurring within the network, the Interested IP is the source IP address. If the traffic is an external traffic, the Interested IP is the destination IP address.

IP Address (Peer)

The IP address opposite of the Interested IP

For example, if the Interested IP is the source IP address, then the Peer IP is the destination IP address.

Matching Classified Events

The log count matching the same aggregated rule

Aggregated Matching Classified Events

The aggregated log count matching the same rule

Network Group

The name of the group

Host Severity

The host severity

Log ID

The log ID