PUP (Potentially Unwanted Programs) list

 

Click any of the items in the Potentially Unwanted Programs panel to view a list of the threats found on the computers protected with Adaptive Defense 360.

The information on the list will be already filtered based on the counter that you clicked (Accessed data, Made external connections, etc.).

At the top of the window there is a search tool:

Filter (1) restricts the search indicated in the text box (2) to its right:

Filter (3) shows the potentially unwanted programs that match the selected criteria:

The table fields are as follows:

 

Detailed information

Click the arrow after the Date column to display additional information about the item, for example, detection technology, infection source user and IP address, as well as other details regarding the item's life cycle and the number of times it has been seen on the network.

Also, this panel will allow you to disinfect the computer, restore the item so that it's never detected again, and use the activity graph to view a graphical representation of the actions performed by the threat.

Click the icon in the Action column to display the command line and execution parameters used in the attack. You can copy this data by selecting the text and using the Copy-Paste option in the context (right-click) menu.

 

You can also export this information. Use the option to export the PUP life cycle to .CSV format. You'll find it in the upper-right corner of the window.