Provides detailed information about the impact of
Virtual Analyzer suspicious objects
Data
|
Description
|
Type
|
The type of suspicious object
|
Object
|
The name of the suspicious object
|
Scan Action
|
The scan action taken by the managed product that detected the
suspicious object (for example, Log, Bock)
|
Risk Level
|
The risk level of the security
threat
|
Expiration
|
The date and time the suspicious object is set to expire
|
First Submission Time
|
The date and time the managed product first submitted the suspicious
object to Virtual Analyzer
|
First Submission Product Name
|
The name of the managed product that first submitted the suspicious
object to Virtual Analyzer
|
First Submission Host Name
|
The display name of the managed server that first submitted the
suspicious object to Virtual Analyzer
|
First Submission IP Address
|
The IP address of the managed server that first submitted the
suspicious object to Virtual Analyzer
|
First Submission File Name
|
The file name of the suspicious object that the managed product first
submitted to Virtual Analyzer
|
First Submission File Type
|
The file type of the suspicious object that the managed product first
submitted to Virtual Analyzer
|
First Submission Source
|
The source of the suspicious object that the managed product first
submitted to Virtual Analyzer
|
First Submission Destination
|
The destination of the suspicious object that the managed product
first submitted to Virtual Analyzer
|
Latest Submission Time
|
The date and time the managed product last submitted the suspicious
object to Virtual Analyzer
|
Latest Submission Product Name
|
The name of the managed product that last submitted the suspicious
object to Virtual Analyzer
|
Latest Submission Host Name
|
The display name of the managed product that last submitted the
suspicious object to Virtual Analyzer
|
Latest Submission IP Address
|
The IP address of the last managed server that last submitted the
suspicious object to Virtual Analyzer
|
Latest Submission File Name
|
The file name of the suspicious object that the managed product last
submitted to Virtual Analyzer
|
Latest Submission File Type
|
The file type of the suspicious object that the managed product last
submitted to Virtual Analyzer
|
Latest Submission File SHA-1
|
The file SHA-1 of the suspicious object that the managed product last
submitted to Virtual Analyzer
|
Latest Submission Detection Name
|
The detection name of the suspicious object that the managed product
last submitted to Virtual Analyzer
|
Latest Submission Source
|
The source of the suspicious object that the managed product last
submitted to Virtual Analyzer
|
Latest Submission Destination
|
The destination of the suspicious object that the managed product last
submitted to Virtual Analyzer
|
Endpoint Domain Name
|
The domain name of the endpoint that triggered the detection
|
Endpoint Host Name
|
The display name of the endpoint that triggered the detection
|
Endpoint User Domain Name
|
The domain name of the user logged on to the endpoint at the time of
the detection
|
Endpoint User Domain Account
|
The domain account of the user logged on to the endpoint at the time
of the detection
|
Endpoint User Name
|
The logged on user name at the time of the event
|
Endpoint IP Address
|
The IP address of the endpoint
|
Endpoint First Found Time
|
The date and time the suspicious object was first detected on the
endpoint
|
Endpoint First Product Detection
|
The name of the managed product that first detected the suspicious
object on the endpoint
|
Endpoint First Action Taken
|
The first action taken on the endpoint by the managed product
|
Endpoint Last Found Time
|
The date and time the suspicious object was last detected on the
endpoint
|
Endpoint Last Product Detection
|
The name of the managed product that last detected the suspicious
object on the endpoint
|
Endpoint Last Action Taken
|
The last action taken on the endpoint by the managed product
|
Endpoint Last Action Result
|
The result of the last action taken on the endpoint by the managed
product
|