Introduction

 

Click the different panels in the Activity section to display reports and detailed lists of the malware and software under analysis found on the customer's network.

The purpose of these lists is to provide administrators with the necessary information to find the source of a problem, assess the severity of an incident and, if required, take the necessary remediation measures and update the company's security policies.

All of these lists have the same structure:

 

  1. List name.

  2. Number of excluded items: files in the process of being classified, blocked items, and items classified as malware/PUP by Adaptive Defense 360 allowed to run by the administrator.

  3. Time interval drop-down menu and list export tool. The time period menu allows the administrator to apply the following time filters to the list: last 24 hours, last day, and last month. The export tool allows the administrator to export the list to Excel and .CSV format, and the life cycle to .CSV format.

  4. Filter tool. Each list incorporates its own filters based on the data it contains. These are explained in the relevant sections.

  5. You can sort the data in the tables by clicking the column headers.

  6. Click a computer's name for extended information.

  1. Extended information about the actions taken by the malware. Refer to chapter Forensic analysis for more information about the actions performed by the detected malware. Refer to chapter Remediation actions for more information about the remediation tools provided by Adaptive Defense 360.

  2. Pagination controls for easier navigation.