Provides specific information about detailed threat analyses and remediation recommendations
Data |
Description |
---|---|
Generated |
The date and time the managed product generated the data |
IP Address |
The IP address of the endpoint |
Network Group |
The monitored network group |
Protocol |
The broad protocol group from which the managed product detected the threat |
Threat Type |
The type of security threat Example: virus, spyware/grayware, fraud |
Severity |
The severity level of the event |
Detection |
The type of detection based on the correlation rules |
Details |
Remarks or comments related to the detection |
MAC Address |
The MAC address of the endpoint |
Host Name |
The name of the endpoint |
Correlation Rule ID |
The rule ID of the correlation rule |