In Deep Discovery Inspector, host severity is the impact on a host as determined from
aggregated detections by Trend Micro products and services.
Investigating beyond event security, the host severity numerical scale exposes the
most
vulnerable hosts and allows you to prioritize and quickly respond.
Host severity is based on the aggregation and correlation of the severity of the events
that affect a host. If several events affect a host and have no detected connection,
the
host severity will be based on the highest event severity of those events. However,
if the
events have a detected correlation, the host severity level will increase accordingly.
For example: Of five events affecting a host, the highest risk level is moderate.
If the
events have no correlation, the host severity level will be based on the moderate
risk level
of that event. However, if the events are correlated, then the host severity level
will
increase based on the detected correlation.
The host severity scale consolidates threat information from multiple detection
technologies and simplifies the interpretation of overall severity. You can prioritize
your
responses based on this information and your related threat response policies.
Host Severity Scale
Category
|
Level
|
Description
|
Critical
Host exhibits behavior that definitely indicates host is compromised
|
10
|
Host shows evidence of compromise including but not limited to the following:
|
9
|
Host exhibits an indication of compromise from APTs including but not limited to
the following:
|
|
8
|
Host may exhibit the following:
|
|
Major
Host is targeted by a known malicious behavior or attack and exhibits behavior
that likely indicates host is compromised
|
7
|
Host may exhibit the following:
|
6
|
Host may exhibit the following:
|
|
5
|
Host may exhibit the following:
|
|
4
|
Host may exhibit the following:
|
|
Minor
Host exhibits anomalous or suspicious behavior that may be benign or indicate a
threat
|
3
|
Host may exhibit the following:
|
2
|
Host may exhibit the following:
|
|
Trivial
Host exhibits normal behavior that may be benign or indicate a threat in future
identification of malicious activities
|
1
|
Host may exhibit the following:
|