The analysis chain shows object types using the following
icons:
Icon
|
Name
|
Description
|
|
First Observed Object
|
Marks an object that most likely created the matched
object
|
|
Matched Criteria
|
Marks objects matching the investigation criteria
|
|
Normal Object
|
Marks objects that have been verified to not pose a
threat
These are usually common system files.
|
|
Unrated Object
|
Marks objects that have not yet been rated
|
|
Suspicious Object
|
Marks objects that exhibit behaviors that are similar to known
threats
|
|
Malicious Object
|
Marks objects that match a known threat
|
|
Boot
|
Objects that launch during system startup
|
|
Browser
|
Objects that are capable of displaying web pages, usually
a web browser
|
|
Email client
|
Objects that can send and receive email messages, usually
an email client or server
|
Email message
|
Objects identified through use of the Cloud App Security
integration email correlation feature
|
|
|
File
|
Objects that are files on the disk
|
|
Network
|
Objects related to network connections or the Internet
|
|
Process
|
Objects that are processes running during the time of
execution
|
|
Registry
|
Objects that are registry keys, entries or data
|
|
Event
|
Indicates actions done by the object
|
|
Association
|
Indicates relationships between two objects
|