Provides detailed information about the impact of Virtual Analyzer suspicious objects
Data |
Description |
---|---|
Type |
The type of suspicious object |
Object |
The name of the suspicious object |
Scan Action |
The scan action taken by the managed product that detected the suspicious object (for example, Log, Bock) |
Risk Level |
The risk level of the security threat |
Expiration |
The date and time the suspicious object is set to expire |
First Submission Time |
The date and time the managed product first submitted the suspicious object to Virtual Analyzer |
First Submission Product Name |
The name of the managed product that first submitted the suspicious object to Virtual Analyzer |
First Submission Host Name |
The display name of the managed server that first submitted the suspicious object to Virtual Analyzer |
First Submission IP Address |
The IP address of the managed server that first submitted the suspicious object to Virtual Analyzer |
First Submission File Name |
The file name of the suspicious object that the managed product first submitted to Virtual Analyzer |
First Submission File Type |
The file type of the suspicious object that the managed product first submitted to Virtual Analyzer |
First Submission Source |
The source of the suspicious object that the managed product first submitted to Virtual Analyzer |
First Submission Destination |
The destination of the suspicious object that the managed product first submitted to Virtual Analyzer |
Latest Submission Time |
The date and time the managed product last submitted the suspicious object to Virtual Analyzer |
Latest Submission Product Name |
The name of the managed product that last submitted the suspicious object to Virtual Analyzer |
Latest Submission Host Name |
The display name of the managed product that last submitted the suspicious object to Virtual Analyzer |
Latest Submission IP Address |
The IP address of the last managed server that last submitted the suspicious object to Virtual Analyzer |
Latest Submission File Name |
The file name of the suspicious object that the managed product last submitted to Virtual Analyzer |
Latest Submission File Type |
The file type of the suspicious object that the managed product last submitted to Virtual Analyzer |
Latest Submission File SHA-1 |
The file SHA-1 of the suspicious object that the managed product last submitted to Virtual Analyzer |
Latest Submission Detection Name |
The detection name of the suspicious object that the managed product last submitted to Virtual Analyzer |
Latest Submission Source |
The source of the suspicious object that the managed product last submitted to Virtual Analyzer |
Latest Submission Destination |
The destination of the suspicious object that the managed product last submitted to Virtual Analyzer |
Endpoint Domain Name |
The domain name of the endpoint that triggered the detection |
Endpoint Host Name |
The display name of the endpoint that triggered the detection |
Endpoint User Domain Name |
The domain name of the user logged on to the endpoint at the time of the detection |
Endpoint User Domain Account |
The domain account of the user logged on to the endpoint at the time of the detection |
Endpoint User Name |
The logged on user name at the time of the event |
Endpoint IP Address |
The IP address of the endpoint |
Endpoint First Found Time |
The date and time the suspicious object was first detected on the endpoint |
Endpoint First Product Detection |
The name of the managed product that first detected the suspicious object on the endpoint |
Endpoint First Action Taken |
The first action taken on the endpoint by the managed product |
Endpoint Last Found Time |
The date and time the suspicious object was last detected on the endpoint |
Endpoint Last Product Detection |
The name of the managed product that last detected the suspicious object on the endpoint |
Endpoint Last Action Taken |
The last action taken on the endpoint by the managed product |
Endpoint Last Action Result |
The result of the last action taken on the endpoint by the managed product |