Forensic analysis using the action tables

 

The Status window lets you access different lists of threats detected on the network by clicking the panels available in the Activity section. Click any of the threats to obtain a table with detailed information about its activity.

The fields included to generally describe a threat are:

Additionally, there are two buttons to search for further information on the Internet using Google and the VirusTotal website.

 

Action table

This table includes only the most relevant events, because the amount of actions triggered by a process is so high that it would prevent the extraction of useful information for a forensic analysis.

The table content is initially sorted by date, making it easier to follow the development of the threat.

The fields included in the action table are detailed below:

The table header contains a series of filters to help you locate the actions of most interest in the list.

Some fields allow you enter text while others are drop-down menus. The text searches are flexible and do not require the use of wildcards to search within the text string.


Related topics

Subject and predicate in the actions