Configure the following event notification to notify administrators when Virtual Analyzer detects highly suspicious objects.
-
Go to Detections > Notifications > Event Notifications.
The Event Notifications screen appears.
-
Click Advanced Threat
Activity.
A list of events appears.
-
In the Event column, click High risk Virtual Analyzer
detections.
The High Risk Virtual Analyzer Detections screen appears.
-
Specify the following notification settings.
Settings
Description
Trigger an alert for each detection
Select to send an event notification for each detection.
Specify the alert threshold that applies to a single endpoint
Select to send event notifications only for detections that match the specified criteria.
-
Detections: Specify the number of detections
-
Period: Specify the time period in hours
Attach logs in CSV format
Select to send event notification recipients a *.csv file containing log data about the detections.
-
-
Select recipients for the notification.
- From the Available Users and Groups list, select contact groups or user accounts.
-
Click >.
The selected contact groups or user accounts appear in the Selected Users and Groups list.
-
Enable one or more of the following notification methods.
Method
Description
Email message
To customize the email notification template, use supported token variables or modify the text in the Subject and Message fields.
For more information, see Standard Token Variables and Advanced Threat Activity Token Variables.
- To test if recipients can receive the event notification, click Test.
- Click Save.