Threats by Hosts - level 2
Double-click an entry in the table or click the View Jobs icon to view the second level.
The following information is displayed:
Back |
Click Back button to return to the main landing page. |
|
Threat Timeline Chart |
This chart displays the number of threats and types of threats which occurred to the threat target during the period of time. Hover the mouse pointer over the dots in the chart and more detailed threat information will be displayed. |
|
Summary of |
The following fields are displayed: Device, Threat Target, Time Period, Total Files, number of: Malicious Files, Suspicious Files, and Network Events. |
|
Details |
|
|
Malicious Files |
Malicious file information including malware name, Threat Source, and number of detection times. The options are:
|
|
Suspicious Files |
Suspicious file information including file name, file type, rating, the malware hosting address and number of detection times. Click the View Jobs icon to drill down the entry. |
|
Attacker Events |
Attacker event information including backdoor name, attack origin address and port, attack destination address and port, and number of detection times. |
|
Botnet Events |
Botnet event information including botnet name, user IP address, user port, destination IP address, destination IP port and number of detection times. |
|
URL Events |
Suspicious URL event information including site category, host or IP address, URL, type, user IP address, user port and number of detection times. |