OVERVIEW
GENERAL
General Details
Reputation Details
ENTRY POINT
Summary
Complete
REMEDIATION
BUSINESS IMPACT
SUSPICIOUS ACTIVITY
Suspicious Events
Uncorrelated Events
Network Events
INCIDENT DETAILS
Tree
Tree Timeline
Table Timeline Summary
Table Timeline Complete
status
malware family
MEDIUM
severity
triggered by
trigger
protection name
user
ATTACK STATS
What sort of connections and processes were involved?
No known malicious elements
Malicious
Connections
Suspicious
Connections
Unclassified
Connections
Malicious
Processes
Suspicious
Processes
Unclassified
Processes
Malicious
Files
Suspicious
Files
Unsigned
Processes
Script
Processes
ATTACK TYPES
What were the attacks types seen or prevented?
No known attack type
ENTRY POINT
How did it enter the system?
BUSINESS IMPACT
What was the potential damage done?
No damage detected
0
Credential
Theft
0
Data
Changes
0
Data
Loss
0
Data
Ransom
0
Key
Logger
0
Lateral
Movement
0
Mouse
Logger
0
Privacy
Violation
0
USB
Tampering
0
Security
Tampering
0
DNS
Tampering
REMEDIATION
Were all incident created elements removed?
No remediation needed
terminated processes
quarantined/deleted files
restored files
INCIDENT DETAILS
How do I analyze further?
NETWORK CONNECTIONS MAP
Where were the untrusted connections being made?
Country
SUSPICIOUS ACTIVITY
What happened in the system?
SEVERITY
EVENT CATEGORY