Provides specific information about detailed threat analyses and remediation recommendations
|
Data |
Description |
|---|---|
|
Generated |
The date and time the managed product generated the data |
|
IP Address |
The IP address of the endpoint |
|
Network Group |
The monitored network group |
|
Protocol |
The broad protocol group from which the managed product detected the threat |
|
Threat Type |
The type of security threat Example: virus, spyware/grayware, fraud |
|
Severity |
The severity level of the event |
|
Detection |
The type of detection based on the correlation rules |
|
Details |
Remarks or comments related to the detection |
|
MAC Address |
The MAC address of the endpoint |
|
Host Name |
The name of the endpoint |
|
Correlation Rule ID |
The rule ID of the correlation rule |
