Process
Security
Reputation
Content
File Ops
Network Ops
Registry Ops
Injection/Hook Ops
Suspicious Events
Damage