Details of blocked programs
Advanced EDR provides extended details of programs blocked by any of the advanced detection technologies it incorporates:
-
Exploits detected.
-
Programs blocked by advanced security policies.
-
Unknown programs blocked which are in the process of classification.
Malware detection
Access to the Malware Details and PUP Details pages
-
In the top menu, select Status. In the side menu, click the Add link. A window opens with all available lists.
-
Select the Malware and PUP activity list.
-
Set the filters and click the Launch query button. A list of items classified as malware or PUP appears.
-
Select an item in the list. The Malware detection or PUP detection page opens.
Or:
-
In the top menu, select Status. In the side panel, select Security. All widgets associated with the security module are shown.
-
Click the Malware activity or PUP activity widget.
-
Set the filters and click the Launch query button. A list of items classified as malware or PUP appears.
-
Select an item in the list. The Malware detection or PUP detection page opens.
The details page is divided into several sections:
-
Overview.
-
Affected computer.
-
Threat impact on the computer.
-
Infection source.
-
Occurrences on other computers.
Overview
Field | Description | Values |
---|---|---|
Threat |
Name of the threat and hash that identifies it. |
|
Action |
Action taken by Advanced EDR on the item.
|
Enumeration For more information about how to manage detected threats blocked, See Allowing and preventing items to run. |
Affected computer 
For more information about the actions you can take on the items found, see Managing threats, items in the process of classification, and quarantine.
Threat impact on the computer 
Field | Description |
---|---|
Threat |
Name of the detected threat and file identification string (hash). Two buttons are available to search for additional information on Google and the VirusTotal website. If the threat is newly discovered, the text New threat is shown |
Activity |
Summary of the most important actions taken by the malware:
|
Detection date |
Date when Advanced EDR detected the threat on the customer network. |
Time during which the threat was on the customer network without being classified. |
|
Infection source 
Field | Description |
---|---|
Threat source computer |
Name of the computer, if the infection attempt originated from another computer on the customer network. |
Threat source IP address |
IP address of the computer, if the infection attempt originated from another computer on the customer network. |
Threat source user |
User that was logged in on the computer the infection originated from. |
Occurrences on other computers 
Shows all computers on the network where the malware has been seen.
Fields | Description |
---|---|
Computer |
Computer name. |
File path |
Name and path of the file that contains the malware. |
First seen |
Date when the threat was first detected on the relevant computer. |
Exploit detection
Access to the Exploit Details page
-
In the top menu, select Status. In the side menu, click the Add link. A window opens with all available lists.
-
Select the Exploit activity list.
-
Set the filters and click the Launch query button. A list of items classified as exploits appears.
-
Select an item in the list. The Exploit detection page opens.
Or:
-
In the top menu, select Status. In the side panel, select Security. All widgets associated with the security module are shown.
-
Click the Exploit activity widget.
-
Set the filters and click the Launch query button. A list of items classified as exploits appears.
-
Select an item in the list. The Exploit detection page opens.
The details page is divided into several sections:
-
Overview.
-
Affected computer.
-
Threat impact on the computer.
Overview
Field | Description | Values |
---|---|---|
Compromised program |
Name of the program affected by the vulnerability exploit attempt and hash that identifies it. |
|
Identifier of the technique used to exploit the program vulnerability. |
Link to a description of the technique used by the exploit. |
|
Action |
Shows the action taken by Advanced EDR on the program affected by the exploit.
|
Enumeration For more information about how to manage detected threats blocked, See Allowing and preventing items to run. |
Affected computer 
Field | Description |
---|---|
Computer |
Name of the computer where the threat was detected, IP address, and folder it belongs to in the group tree. |
Logged-in user |
Operating system user under which the threat was loaded and run. |
Path of the compromised program |
Path of the program affected by the vulnerability exploit attempt. |
Exploit impact on the computer 
Field | Description |
---|---|
Compromised program |
Name and path of the program that was hit by the exploit attempt. If Advanced EDR detects that the program is not updated to the latest available version, it shows a warning message: |
Activity |
|
Detection date |
Date when Advanced EDR detected the exploit on the customer network. |
Possible source of the exploit |
Name and path of the program from which the exploit possibly originated. |
Block by advanced security policy
Access to the Block by Advanced Security Policy page
-
In the top menu, select Status. In the side menu, click the Add link. A window opens with all available lists.
-
Select the Blocks by advanced security policies list.
-
Set the filters and click the Launch query button. A list of items blocked by advanced security policies appears.
-
Select an item in the list. The Block by advanced security policy page opens.
Or:
-
In the top menu, select Status. In the side panel, select Security. All widgets associated with the security module are shown.
-
Click the Detections by advanced security policies widget.
-
Set the filters and click the Launch query button. A list of items blocked by advanced security policies appears.
-
Select an item in the list. The Block by advanced security policy page opens.
The details page is divided into several sections:
-
Overview.
-
Computer.
-
Blocked program.
Overview
Field | Description |
---|---|
Blocked program |
Name of the program blocked by the administrator. |
Policy applied |
Name of the advanced security policy that blocked the program. See Advanced security policies. |
Action |
|
Computer 
Field | Description |
---|---|
Computer |
Name of the computer where the threat was detected, IP address, and folder it belongs to in the group tree. |
Logged-in user |
Operating system user under which the threat was loaded and run. |
Blocked program 
Field | Description |
---|---|
Name |
Name of the blocked program. |
MD5 |
Hash of the blocked file. |
Path |
Device and folder where the blocked program is located on the user computer. |
Activity |
|
Detection date |
Date when Advanced EDR blocked the program from running. |
Blocking of unknown programs in the process of classification and history of blocked programs
Access to the Blocked Program Details page
-
In the top menu, select Status. In the side menu, click the Add link. A window opens with all available lists.
-
Select the Currently blocked programs being classified list.
-
Set the filters and click the Launch query button. A list of unknown items in the process of classification appears.
-
Select an item in the list. The Blocked program details page opens.
-
To open the history of unknown programs blocked, click the View history of blocked items link.
Or:
-
In the top menu, select Status. In the side panel, select Security. All widgets associated with the security module are shown.
-
Click the Currently blocked programs being classified widget.
-
Set the filters and click the Launch query button. A list of unknown items in the process of classification appears.
-
Select an item in the list. The Blocked program details page opens.
The details page is divided into several sections:
-
Overview.
-
Computer.
-
Program activity on the computer.
-
Source.
Overview
Field | Description |
---|---|
Program |
Name of the blocked program. |
Action |
Blocked |
Likelihood of being malicious |
|
Status |
Status of the classification process and source of the error if the investigation process could not be completed. |
Unblock |
Allows the program to run before it is classified. For more information about how to manage detected threats blocked, See Allowing and preventing items to run. |
Computer 
Program activity on the computer 
Field | Description |
---|---|
Program |
Name of the blocked program. |
Activity |
Summary of the most important actions taken by the malware:
|
Detection date |
Date when Advanced EDR blocked the program from running. |
Dwell time |
Time during which the threat was on the customer network without being classified. |
Source 
Field | Description |
---|---|
Source computer |
If the file came from another computer on the customer network, this field indicates the computer name. |
Source IP address |
If the file came from another computer on the customer network, this field indicates the computer IP address. |
Source user |
The user who was logged in on the computer the file came from. |