|
Field Name
|
Information
|
|||
|---|---|---|---|---|
|
File/Email Message Sample
|
URL Sample
|
|||
|
Submission details
|
Basic data fields (such as Logged, File name, and Type) extracted from the raw logs
|
Basic data fields (such as Logged, URL, Source IP and port, and Destination IP and
port) extracted from the raw logs
|
||
|
||||
|
Notable characteristics
|
|
|||
|
Other submission logs
|
A table that shows the following information about other log submissions:
|
|||
|
Report
|
The PDF icon (
|
|||
|
Investigation package
|
Download links to a password-protected investigation
package that you can download to perform additional investigations.
For details, see Investigation Package.
|
|||
|
Global intelligence
|
View in Threat Connect is a link that opens Trend Micro Threat Connect
The page contains detailed information about the sample.
|
|||