Security module lists
The security lists show the information collected by Advanced EDR in connection with computer protection activities. They provide highly detailed information because they contain the raw data used to generate the widgets.
There are two ways to access the security lists:
-
From the top menu, select Status. From the side panel, select Security. Click any of the available widgets to access its associated list. Depending on the item you click on the widget, you access different lists with predefined filters.
Or
-
From the top menu, select Status. From the My lists side panel, click Add. A dialog box opens that shows all lists available in Advanced EDR.
-
Select any of the lists in the Security section. The list opens with no filters applied.
Select any of the entries on the list to open a new page with more details about that particular item.
Computer protection status
This list shows all computers on the network, with filters that enable you to search for computers and mobile devices that are unprotected for some specific reason.
To ensure correct operation of the security software, the computers on the network must communicate with the Cytomic cloud. For the list of URLs that must be accessible from your computers, see section Access to service URLs.
Field | Description | Values |
---|---|---|
Computer |
Computer name. |
Character string |
Computer status |
Agent reinstallation:
Protection reinstallation:
Computer isolation status:
“RDP attack containment” mode:
Verbose mode: |
Icon |
Folder in the Advanced EDR folder tree that the computer belongs to. |
Character string |
|
Advanced protection status. |
|
|
Updated protection |
Indicates whether or not the installed protection module is updated to the latest version released. Point the mouse to the field to see the version of the installed protection. |
|
Knowledge |
Indicates whether or not the signature file found on the computer is updated to the latest version. Point the mouse to the field to see the date that the file was last updated. |
|
Connection to knowledge |
Indicates whether the computer can communicate with the Cytomic cloud to send monitored events and download security intelligence. |
|
Last connection |
Date when the Advanced EDR status was last sent to the Cytomic cloud. |
Date |
Fields displayed in the exported file
Field | Description | Values |
---|---|---|
Client |
Customer account the service belongs to. |
Character string |
Computer type |
Type of device. |
|
Computer |
Computer name. |
Character string |
The computer primary IP address. |
Character string |
|
Windows domain the computer belongs to. |
Character string |
|
Description |
Description assigned to the computer. |
Character string |
Group |
Folder in the Advanced EDR folder tree that the computer belongs to. |
Character string |
Agent version |
Internal version of the Cytomic agent module. |
Character string |
Installation date |
Date when the Advanced EDR software was successfully installed on the computer. |
Date |
Last update on |
Date the agent was last updated. |
Date |
Platform |
Operating system installed on the computer. |
|
Operating system |
Operating system installed on the computer, internal version, and patch status. |
Character string |
Updated protection |
Indicates whether or not the installed protection module is updated to the latest version released. |
Binary value |
Protection version |
Internal version of the protection module. |
Character string |
Updated knowledge |
Indicates whether or not the signature file found on the computer is the latest version. |
Binary value |
Last update on |
Date the signature file was last updated. |
Date |
Advanced protection File antivirus Program blocking |
Status of the associated protection. |
|
Advanced protection mode (Windows) |
Current configuration of the advanced protection module. Operating mode. |
|
Advanced protection mode (Linux) |
Current configuration of the advanced protection module. Malicious activity detection. |
|
Isolation status |
Indicates whether or not the computer is isolated from the rest of the network. |
|
Error date |
If an error occurred installing Advanced EDR, date and time of the error. |
Date |
Installation error |
If an error occurred installing Advanced EDR, error description. |
Character string |
Installation error code |
Shows codes that identify the installation error occurred. |
Codes are separated by “;”:
|
Other security products |
Name of any third-party antivirus product found on the computer at the time of installing Advanced EDR. |
Character string |
Shows the status of the connection between the computer and the servers that store signature files and security intelligence. |
|
|
Connection for sending events |
Shows the status of the connection between the computer and the servers that receive the events monitored on protected computers. |
|
“RDP attack containment” mode |
Status of the “RDP attack containment” mode. |
|
Filter tool
Field | Description | Values |
---|---|---|
Computer type |
Type of device. |
|
Search computer |
Computer name. |
Character string |
Last connection |
Date when the Advanced EDR status was last sent to the Cytomic cloud. |
|
Updated protection |
Indicates whether or not the installed protection is updated to the latest version released. |
|
Platform |
Operating system installed on the computer. |
|
Updated knowledge |
Indicates whether or not the signature file found on the computer is the latest version. |
Binary value |
Connection to knowledge servers |
Indicates whether the computer can communicate with the Cytomic cloud to send monitored events and download security intelligence. |
|
Protection status |
Status of the protection module installed on the computer. |
|
Isolation status |
Computer isolation status. |
|
“RDP attack containment” mode |
Status of the “RDP attack containment” mode. |
|
Computer Details page
Click a row in the list to open the computer details page. For more information, see Computer details.
Malware/PUP activity
This list shows the threats detected on the computers protected by Advanced EDR. It provides you with the necessary information to find the source of a problem, assess the severity of an incident and, if required, take the necessary remediation measures and update the organization security policies.
Field | Comment | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
Threat |
Name of the detected threat. |
Character string |
Path |
Full path to the infected file. |
Character string |
Run sometime |
The threat ran and the computer might be compromised. |
Binary value |
Accessed data |
The threat accessed data on the user computer. |
Binary value |
Made external connections |
The threat communicated with remote computers to send or receive data. |
Binary value |
Action |
Action taken on the malware. |
|
Date |
Date when the threat was detected on the computer. |
Date |
Fields displayed in the exported file
The context menu of the Malware/PUP Activity list shows two options: Export and Export List and Details. This section describes the content of the file generated when you select Export. For more information about the Export List and Details option, see Exported Excel files.
Field | Comment | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
Threat |
Name of the detected threat. |
Character string |
Path |
Full path to the infected file. |
Character string |
Action |
Action taken on the malware. |
|
Run |
The threat ran and the computer might be compromised. |
Binary value |
Accessed data |
The threat accessed data on the user computer. |
Binary value |
External connections |
The threat communicated with remote computers to send or receive data. |
Binary value |
Excluded |
The threat was excluded by you to allow it to run. |
Binary value |
Date |
Date when the threat was detected on the computer. |
Date |
Time that the threat was on the customer network without classification. |
Character string |
|
User |
Character string |
|
MD5 |
MD5 hash of the detected file. |
Character string |
SHA-256 |
SHA-256 hash of the detected file. |
Character string |
Infection source computer |
Name of the computer, if the infection attempt originated from another computer on the customer network. |
Character string |
Infection source IP address |
IP address of the computer, if the infection attempt originated from another computer on the customer network. |
Character string |
Infection source user |
The user that was logged in to the computer the infection attempt originated from, if applicable. |
Character string |
Filter tool
Field | Comment | Values |
---|---|---|
Search |
|
Character string |
Type |
Type of threat. |
|
Dates |
Set a time period, from the current moment back. |
|
Run |
The threat ran and the computer might be compromised. |
Binary value |
Action |
Action taken on the threat. |
|
Accessed data |
The threat accessed data on the user computer. |
Binary value |
External connections |
The threat communicated with remote computers to send or receive data. |
Binary value |
Details page
This page shows detailed information about the program classified as malware/PUP. See Malware and PUP detection.
Exploit activity
This list shows all computers with programs compromised by vulnerability exploit attempts. It provides you with the necessary information to find the source of a problem, assess the severity of an incident and, if required, take the necessary remediation measures and update the organization security policies.
Field | Comment | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
Compromised program or driver |
Program affected by the exploit attack, or vulnerable driver loaded. |
Character string |
Exploit technique |
Identifier of the technique used to exploit the program or driver vulnerability. |
Character string |
Exploit run |
Indicates whether the exploit managed to run or was blocked before it could affect the vulnerable program. |
Binary value |
Action |
|
Enumeration |
Date |
Date when the exploit attempt was detected on the computer. |
Date |
Fields displayed in the exported file
The context menu of the Exploit Activity list shows two options: Export and Export List and Details. This section describes the content of the file generated when you select Export. For more information about the Export List and Details option, see Exported Excel files.
Field | Comment | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
Compromised program or driver |
Program affected by the exploit attack, or vulnerable driver loaded. |
Character string |
Exploit technique |
Identifier of the technique used to exploit the program vulnerability. |
Enumeration |
User |
User account under which the program that received the exploit attack was run. |
Character string |
Action |
|
Enumeration |
Exploit run |
Indicates whether the exploit managed to run or was blocked before it could affect the vulnerable program. |
Binary value |
Date |
Date when the exploit attempt was detected on the computer. |
Date |
Filter tool
Field | Comment | Values |
---|---|---|
Search |
|
Enumeration |
Dates |
Set a time period, from the current moment back. |
|
Exploit run |
Indicates whether the exploit managed to run or was blocked before it could affect the vulnerable program. |
Binary value |
Action |
|
Enumeration |
Details page
This page shows detailed information about the program classified as an exploit. See Exploit detection.
If the exploit technique is Vulnerable driver, see Driver details
Blocks by advanced security policies
This list shows all programs blocked by advanced security policies. These policies prevent the execution of scripts and unknown programs that use advanced infection techniques.
Field | Comment | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
User |
User account under which the threat tried to run. |
Character string |
Path |
Full path to the blocked file. |
Character string |
Action |
Action taken on the file. |
|
Policy |
For more information, see Advanced security policies. |
|
Date |
Date when the threat was detected on the computer. |
Date |
Fields displayed in the exported file
The context menu of the Blocks by Advanced Security Policies list shows two options: Export and Export List and Details. This section describes the content of the file generated when you select Export. For more information about the Export List and Details option, see Exported Excel files.
Field | Comment | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
Policy |
For more information, see Advanced security policies. |
|
Path |
Full path to the file. |
Character string |
Action |
Action taken on the file. |
|
Date |
Date when the threat was detected on the computer. |
Date |
User |
User account under which the threat tried to run. |
Character string |
MD5 |
MD5 hash of the blocked program. |
Character string |
SHA-256 |
SHA-256 hash of the blocked program. |
Character string |
Filter tool
Field | Comment | Values |
---|---|---|
Search |
|
Character string |
Dates |
Set a time period, from the current moment back. |
|
Action |
Action taken on the threat. |
|
Policy applied |
For more information, see Advanced security policies. |
|
Details page
This page shows detailed information about the program blocked by the advanced security policies. See Block by advanced security policy.
Network attack activity
This list shows all network attacks detected and blocked by the Network Attack Protection module.
Field | Description | Values |
---|---|---|
Computer |
Computer name. |
Character string |
Network attack |
Name of the network attack. For more information, see https://www.pandasecurity.com/en/support/card?id=700145 |
Character string. |
Local IP address |
The computer local IP address. |
IP address |
Action |
Action taken.
|
|
Remote IP address |
IP address from which the attack originated. |
IP address |
Date |
Date the attack was detected or blocked. |
Date |
Fields displayed in the exported file
Field | Description | Values |
---|---|---|
Computer |
Computer name. |
Character string |
Network attack |
Type of network attack. |
Character string |
Action |
Action taken on the attack. |
|
Local IP address |
The computer local IP address. |
IP address |
Remote IP address |
Remote IP address of the attack. |
IP address |
Local port |
Local port on which the attack was detected or blocked. |
Character string |
Remote port |
Remote port from which the attack was detected or blocked. |
Character string |
Date |
Date the attack was detected. |
Date |
Number of occurrences |
Number of detections of the same type of attack with the same source IP address in the space of an hour. |
Character string |
Filter tool
Field | Description | Values |
---|---|---|
Computer |
Computer name. |
Character string |
Network attack |
Type of network attack. |
Character string |
Dates |
Date range. |
|
Action |
Action taken on the threat. |
|
Details page
Field | Description | Values |
---|---|---|
Network attack |
Type of network attack. For more details, click the |
Character string |
Action |
Action taken on the detection. For more information about how to manage detected threats blocked, see Stopping detecting suspicious network traffic. |
|
Computer |
Name of the computer where the threat was detected, IP address, and folder it belongs to in the group tree. |
|
Local IP address |
The computer local IP address. |
IP address |
Remote IP address |
Remote IP address of the network attack. |
IP address |
Local port |
Local port on which the attack was detected or blocked. |
Character string |
Remote port |
Remote port from which the attack was detected or blocked. |
Character string |
Detection date |
Date the network attack was detected. |
Date |
Number of occurrences |
Number of detections of the same type of attack with the same source IP address in the space of an hour. |
Character string |