Views:
The Analysis Chain displays object types and object relationships using the following icons:

Object Rating

Icon
Name
Description
l-object-first-ob.png
First Observed Object
The first object in the Analysis Chain, suspected to be responsible for introducing the security threat to the target endpoint
This is often the entry point of a targeted attack.
icon-detection.jpg
Detection
Marks the detected threat that Worry-Free Services uses to create the Noteworthy Event
l-object-normal.png
Normal Object
Marks objects that have been verified to not pose a threat
These are usually common system files.
l-object-unrated.png
Unrated Object
Marks objects that have not yet been rated
l-object-suspicious.png
Suspicious Object
Marks objects that exhibit behaviors that are similar to known threats
l-object-malicious.png
Malicious Object
Marks objects that match a known threat

Object Type

Icon
Name
Description
l-type-browser.png
Browser
Objects that are capable of displaying web pages, usually a web browser
l-type-email.png
Email client
Objects that can send and receive email messages, usually an email client or server
icon-emailmsg.png
Email message
Objects identified through use of the Cloud App Security integration email correlation feature
l-type-file.png
File
Objects that are files on the disk
l-type-network.png
Network
Objects related to network connections or the Internet
l-type-process.png
Process
Objects that are processes running during the time of execution
l-type-registry.png
Registry
Objects that are registry keys, entries or data

Object Interaction

Icon
Name
Description
l-action-event.png
Event
Indicates actions done by the object
l-action-association.png
Association
Indicates relationships between two objects

Action/Result

Icon
Name
Description
deleted-icon.jpg
Deleted
Indicates that the threat was removed from the system
blocked-terminated-q.jpg
Blocked/Terminated/Quarantined
Indicates that an object was blocked, a process was terminated, or a file was quarantined
action-unsuccessful-.jpg
Action Unsuccessful
Indicates that the action taken on a malicious object was not successful
cleaned-icon.jpg
Cleaned
Indicates that an infected file was restored to normal and no longer poses a threat