After adding suspicious objects or properly formatted IOC (STIX or OpenIOC) files to Apex Central, you can perform an impact analysis by selecting specific file, file SHA-1, IP address, or domain objects to determine if the threat exists within your network and take mitigation steps to prevent the spread of the threat to other endpoints.
For more information, see the following topics:
-
Adding OpenIOC Objects to the User-Defined Suspicious Object List
-
Adding STIX Objects to the User-Defined Suspicious Object List
-
Impact analysis requires a valid Apex One Endpoint Sensor license. Ensure that you have a valid Apex One Endpoint Sensor license and enable the Enable Sensor feature for the appropriate Apex One Security Agent or Apex One (Mac) policies.
For more information, see the Apex Central Widget and Policy Management Guide.
-
Endpoint isolation requires that you install Apex One Security Agents on the target endpoints.