Procedure
- Go to one of the following:
-
- In the agent tree, click the root domain icon () to include all agents or select specific domains or agents.
- Go to the Suspicious Connection Log Criteria
screen:
-
From the Security Risk Logs screen, click.
-
From the Agent Management screen, click.
-
- Specify the log criteria and then click Display Logs.
- View logs. Logs contain the following information:ItemDescriptionDate/TimeThe time the detection occurredEndpointThe endpoint on which the detection occurredDomainThe domain of the endpoint on which the detection occurredProcessThe process through which the contact was attempted (path\application_name)Local IP and PortThe IP address and port number of the source endpointRemote IP and PortThe IP address and port number of the destination endpointResultThe result of the action takenList SourceThe C&C list source that identified the C&C serverTraffic DirectionThe direction of the transmission
- To save logs to a comma-separated value (
CSV
) file, click Export to All to CSV. Open the file or save it to a specific location.