Malware activity list

Click any of the items in the Malicious programs and exploits panel, or the Malicious programs and exploits section in the Classification of all programs run and scanned panel, to view a list of all the threats found on the computers protected with Adaptive Defense 360.

There, select Malicious programs.

The top of the window displays a search tool:

Filter (1) restricts the search indicated in text box (2):

Filter (3) shows those threats that match the selected criteria:

The table fields are as follows:

Detailed information

Click the arrow after the Date column to display additional information about the detection, for example dwell time, detection technology, infection source computer IP address and user, as well as other details regarding the malware life cycle and the number of times it has been seen on the network.

Also, this panel will allow you to:

Use the activity graph to view a graphical representation of the actions performed by the threat.

Click the icon in the Action column to display the command line and execution parameters used in the attack. You can copy this data by selecting the text and using the Copy-Paste option in the context (right-click) menu.

You can also export this information. Use the option to export the malware life cycle to .CSV format. You'll find it in the upper-right corner of the window.