This widget displays information about endpoints
with security threat detections.
NoteThis widget displays only the top 10 endpoints with the highest risk scores and security
threat detections. To view more affected endpoints, go to the User/Endpoint Directory
screen.
|
Use the Range drop-down to select the time
period for the data that displays.
Click the Important
Endpoints or Other Endpoints tabs to switch between
the different views.
-
For more information about defining important users or endpoints, see User or Endpoint Importance.
The table lists affected endpoints in order by critical
threat type severity first, and then by the number of threat detections for the
endpoint.
-
Click the number in the Threats column for the endpoint you want to view.Fore more information, see Security Threats on Endpoints.
The Most Critical Threat
column displays the following threat types.
Threat Type
|
Description
|
C&C callback
|
Attempts to communicate with a command-and-control (C&C) server
to deliver information, receive instructions, and download other malware
|
Known Advanced Persistent Threat (APT)
|
Intrusions by attackers that aggressively pursue and compromise
chosen targets, often conducted in campaigns—a series of failed and successful
attempts over time to get deeper and deeper into a target network—and not isolated
incidents
|
Lateral movement
|
Searches for directories, email, and administration servers,
and other assets to map the internal structure of a network, obtain credentials to
access these systems, and allow the attacker to move from system to system
|
Ransomware
|
Malware that prevents or limits users from accessing their
system unless a ransom is paid
|
Social engineering attack
|
Malware or hacker attacks that exploits a security
vulnerability found in documents, such as a PDF file
|
Unknown threats
|
Suspicious objects (IP addresses, domains, file
SHA-1 hash values, email messages) with the "high" risk level, as detected by Deep
Discovery Inspector, endpoint security products, or other products with Virtual
Analyzer
|
Vulnerability attack
|
Malware or hacker attacks that exploits a security
weakness typically found in programs and operating systems
|