Views:

Provides detailed information about the impact of Virtual Analyzer suspicious objects

Data

Description

Type

The type of suspicious object

Object

The name of the suspicious object

Scan Action

The scan action taken by the managed product that detected the suspicious object (for example, Log, Bock)

Risk Level

The risk level of the security threat

Expiration

The date and time the suspicious object is set to expire

First Submission Time

The date and time the managed product first submitted the suspicious object to Virtual Analyzer

First Submission Product Name

The name of the managed product that first submitted the suspicious object to Virtual Analyzer

First Submission Host Name

The display name of the managed server that first submitted the suspicious object to Virtual Analyzer

First Submission IP Address

The IP address of the managed server that first submitted the suspicious object to Virtual Analyzer

First Submission File Name

The file name of the suspicious object that the managed product first submitted to Virtual Analyzer

First Submission File Type

The file type of the suspicious object that the managed product first submitted to Virtual Analyzer

First Submission Source

The source of the suspicious object that the managed product first submitted to Virtual Analyzer

First Submission Destination

The destination of the suspicious object that the managed product first submitted to Virtual Analyzer

Latest Submission Time

The date and time the managed product last submitted the suspicious object to Virtual Analyzer

Latest Submission Product Name

The name of the managed product that last submitted the suspicious object to Virtual Analyzer

Latest Submission Host Name

The display name of the managed product that last submitted the suspicious object to Virtual Analyzer

Latest Submission IP Address

The IP address of the last managed server that last submitted the suspicious object to Virtual Analyzer

Latest Submission File Name

The file name of the suspicious object that the managed product last submitted to Virtual Analyzer

Latest Submission File Type

The file type of the suspicious object that the managed product last submitted to Virtual Analyzer

Latest Submission File SHA-1

The file SHA-1 of the suspicious object that the managed product last submitted to Virtual Analyzer

Latest Submission Detection Name

The detection name of the suspicious object that the managed product last submitted to Virtual Analyzer

Latest Submission Source

The source of the suspicious object that the managed product last submitted to Virtual Analyzer

Latest Submission Destination

The destination of the suspicious object that the managed product last submitted to Virtual Analyzer

Endpoint Domain Name

The domain name of the endpoint that triggered the detection

Endpoint Host Name

The display name of the endpoint that triggered the detection

Endpoint User Domain Name

The domain name of the user logged on to the endpoint at the time of the detection

Endpoint User Domain Account

The domain account of the user logged on to the endpoint at the time of the detection

Endpoint User Name

The logged on user name at the time of the event

Endpoint IP Address

The IP address of the endpoint

Endpoint First Found Time

The date and time the suspicious object was first detected on the endpoint

Endpoint First Product Detection

The name of the managed product that first detected the suspicious object on the endpoint

Endpoint First Action Taken

The first action taken on the endpoint by the managed product

Endpoint Last Found Time

The date and time the suspicious object was last detected on the endpoint

Endpoint Last Product Detection

The name of the managed product that last detected the suspicious object on the endpoint

Endpoint Last Action Taken

The last action taken on the endpoint by the managed product

Endpoint Last Action Result

The result of the last action taken on the endpoint by the managed product