Provides specific information about detailed threat analyses and remediation recommendations
| 
 Data  | 
 Description  | 
|---|---|
| 
 Generated  | 
 The date and time the managed product generated the data  | 
| 
 IP Address  | 
 The IP address of the endpoint  | 
| 
 Network Group  | 
 The monitored network group  | 
| 
 Protocol  | 
 The broad protocol group from which the managed product detected the threat  | 
| 
 Threat Type  | 
 The type of security threat Example: virus, spyware/grayware, fraud  | 
| 
 Severity  | 
 The severity level of the event  | 
| 
 Detection  | 
 The type of detection based on the correlation rules  | 
| 
 Details  | 
 Remarks or comments related to the detection  | 
| 
 MAC Address  | 
 The MAC address of the endpoint  | 
| 
 Host Name  | 
 The name of the endpoint  | 
| 
 Correlation Rule ID  | 
 The rule ID of the correlation rule  | 
		