Details of blocked programs
Advanced EDR provides extended details of programs blocked by any of the advanced detection technologies it incorporates:
Malware and PUP detection
Accessing the Malware Details and PUP Details pages
-
From the top menu, select Status. From the side menu, click the Add link. A dialog box opens that shows all available lists.
-
Select the Malware and PUP activity list.
-
Set the filters and click the Launch query button. A list opens that shows all items classified as malware or PUP.
-
From the list, select an item. The Malware detection or PUP detection page opens.
Or:
-
From the top menu, select Status. From the side panel, select Security. A page opens that shows all widgets associated with the security module.
-
Click the Malware activity or PUP activity widget.
-
Set the filters and click the Launch query button. A list opens that shows all items classified as malware or PUP.
-
From the list, select an item. The Malware detection or PUP detection page opens.
The details page is divided into several sections:
-
Overview.
-
Affected computer.
-
Threat impact on the computer.
-
Infection source.
-
Occurrences on other computers.
Overview
Field | Description | Values |
---|---|---|
Threat |
Name of the threat and hash that identifies it. |
|
Action |
Action taken by Advanced EDR on the item.
|
Enumeration For more information about how to manage detected threats blocked, see Allowing blocked items to run. |
Affected computer 
For more information about the actions you can take on the items found, see Managing threats, items in the process of classification, and quarantine.
Threat impact on the computer 
Field | Description |
---|---|
Threat |
Name of the detected threat and file identification string (hash). Two buttons appear to search for additional information on Google and the VirusTotal website. If the threat is newly discovered, the text New threat appears. |
Activity |
Summary of the most important actions taken by the malware:
|
Detection date |
Date when Advanced EDR detected the threat on the customer network. |
Time during which the threat was on the customer network without being classified. |
|
Infection source 
Field | Description |
---|---|
Threat source computer |
Name of the computer, if the infection attempt originated from another computer on the customer network. |
Threat source IP address |
IP address of the computer, if the infection attempt originated from another computer on the customer network. |
Threat source user |
User that was logged in to the computer the infection originated from. |
Occurrences on other computers 
This section shows all computers on the network where the malware was seen.
Fields | Description |
---|---|
Computer |
Computer name. |
File path |
Name and path of the file that contains the malware. |
First seen |
Date when the threat was first detected on the relevant computer. |
Exploit detection
Accessing the Exploit Details page
-
From the top menu, select Status. From the side menu, click the Add link. A dialog box opens that shows all available lists.
-
Select the Exploit activity list.
-
Set the filters and click the Launch query button. A list opens that shows all items classified as exploits.
-
From the list, select an item. The Exploit detection page opens.
Or:
-
From the top menu, select Status. From the side panel, select Security. A page opens that shows all widgets associated with the security module.
-
Click the Exploit activity widget.
-
Set the filters and click the Launch query button. A list opens that shows all items classified as exploits.
-
From the list, select an item. The Exploit detection page opens.
The details page is divided into several sections:
-
Overview.
-
Affected computer.
-
Exploit impact on the computer.
Overview
Field | Description | Values |
---|---|---|
Compromised program |
Name of the program affected by the vulnerability exploit attempt and hash that identifies it. |
|
Identifier of the technique used to exploit the program vulnerability. |
Link to a description of the technique used by the exploit. |
|
Action |
Shows the action taken by Advanced EDR on the program affected by the exploit.
|
Enumeration For more information about how to manage detected threats blocked, see Allowing blocked items to run. |
Affected computer 
Field | Description |
---|---|
Computer |
Name of the computer where the threat was detected, IP address, and folder in the group tree to which the computer belongs. |
Logged-in user |
Operating system user under which the threat was loaded and run. |
Path of the compromised program |
Path of the program affected by the vulnerability exploit attempt. |
Exploit impact on the computer 
Field | Description |
---|---|
Compromised program |
Path and name of the program file associated with the incident. If Advanced EDR detects that the program is not updated to the latest available version, it shows a warning: |
Activity |
|
Detection date |
Date when Advanced EDR detected the exploit on the customer network. |
Possible source of the exploit |
Name and path of the program from which the exploit possibly originated. |
Vulnerable driver
Accessing the Driver Details page
To access the Driver Details page, follow the steps described in Exploit detection. From the Exploit activity list, select an item whose exploit technique is vulnerable driver.
The details page is divided into several sections:
-
Overview.
-
Affected computer.
-
Vulnerable driver.
Overview
Field | Description | Values |
---|---|---|
Vulnerable driver |
Name of the driver that was prevented from loading. |
|
Technique |
Identifier of the technique used to exploit the program vulnerability. |
Vulnerable driver |
Action |
Action taken by Advanced EDR on the exploit.
|
Enumeration For more information about how to manage detected threats blocked, see Allowing blocked items to run. |
Affected computer 
Field | Description |
---|---|
Computer |
Name of the computer where the threat was detected, IP address, and folder in the group tree to which the computer belongs. |
Logged-in user |
Operating system user under which the threat was loaded and run. |
Driver path |
Path of the driver the security software prevented from loading. |
Vulnerable driver 
Field | Description |
---|---|
Name |
Name of the driver the security software prevented from loading. |
Activity |
|
Detection date |
Date when Advanced EDR detected the exploit on the customer network. |
MD5 |
MD5 hash of the blocked driver. |
SHA-256 |
SHA-256 hash of the blocked driver. |
Block by advanced security policy
Accessing the Block by Advanced Security Policy page
-
From the top menu, select Status. From the side menu, click the Add link. A dialog box opens that shows all available lists.
-
Select the Blocks by advanced security policies list.
-
Set the filters and click the Launch query button. A list opens that shows all items blocked by advanced security policies.
-
From the list, select an item. The Block by advanced security policy page opens.
Or:
-
From the top menu, select Status. From the side panel, select Security. A page opens that shows all widgets associated with the security module.
-
Click the Detections by advanced security policies widget.
-
Set the filters and click the Launch query button. A list opens that shows all items blocked by advanced security policies.
-
From the list, select an item. The Block by advanced security policy page opens.
The details page is divided into several sections:
-
Overview.
-
Computer.
-
Blocked program.
Overview
Field | Description |
---|---|
Blocked program |
Name of the blocked program. |
Policy applied |
Name of the advanced security policy that blocked the program. See Advanced security policies. |
Action |
|
Computer 
Field | Description |
---|---|
Computer |
Name of the computer where the threat was detected, IP address, and folder in the group tree to which the computer belongs. When you click the computer name, the computer details page opens. See Computer details |
Logged-in user |
Operating system user under which the threat was loaded and run. |
Blocked program 
Field | Description |
---|---|
Name |
Name of the blocked program. |
MD5 |
MD5 hash of the blocked file. |
SHA-256 |
If included in the detection, SHA-256 hash of the blocked program. |
Path |
Folder where the blocked program is located on the user computer. |
Activity |
|
Detection date |
Date when Advanced EDR blocked the program from running. |
Block of unknown programs in the process of classification and history of blocked programs
Accessing the Blocked Program Details page
-
From the top menu, select Status. From the side menu, click the Add link. A dialog box opens that shows all available lists.
-
Select the Currently blocked programs being classified list.
-
Set the filters and click the Launch query button. A list opens that shows all unknown items in the process of classification.
-
From the list, select an item. The Blocked program details page opens.
-
To open the history of unknown programs blocked, click the View history of blocked items link.
Or:
-
From the top menu, select Status. From the side panel, select Security. A page opens that shows all widgets associated with the security module.
-
Click the Currently blocked programs being classified widget.
-
Set the filters and click the Launch query button. A list opens that shows all unknown items in the process of classification.
-
From the list, select an item. The Blocked program details page opens.
The details page is divided into several sections:
-
Overview.
-
Computer.
-
Program activity on the computer.
-
Source.
Overview
Field | Description |
---|---|
Program |
Name of the blocked program. Point the mouse to the |
Action |
|
Likelihood of being malicious |
Appears only if the item has not yet been classified.
|
Classification technique |
|
Reclassification completed |
Date the item was classified. |
Reclassification time |
Time it took Advanced EDR to classify the item. When you point the mouse to the |
Status |
Status of the classification process and source of the error if the investigation process could not be completed. |
Unblock |
Allows the program to run before it is classified. For more information about how to manage detected threats blocked, see Allowing blocked items to run. |
Computer 
Program activity on the computer 
Field | Description |
---|---|
Program |
Name of the blocked program. |
Activity |
Summary of the most important actions taken by the malware:
|
Detection date |
Date when Advanced EDR blocked the program from running. |
Dwell time |
Time during which the threat was on the customer network without being classified. |
Source 
Field | Description |
---|---|
Source computer |
If the file came from another computer on the customer network, this field shows the computer name. |
Source IP address |
If the file came from another computer on the customer network, this field shows the computer IP address. |
Source user |
The user who was logged in on the computer the file came from. |