Security module lists
The security lists show the information collected by Advanced EPDR in connection with computer protection activities. They provide highly detailed information because they contain the raw data used to generate the widgets.
There are two ways to access the security lists:
-
From the top menu, select Status. From the side panel, select Security. Click any of the available widgets to access its associated list. Depending on the item you click on the widget, you access different lists with predefined filters.
Or
-
From the top menu, select Status. From the My lists side panel, click Add. A dialog box opens that shows all lists available in Advanced EPDR.
-
Select any of the lists in the Security section. The list opens with no filters applied.
Select any of the entries on the list to open a new page with more details about that particular item.
Computer protection status
This list shows all computers on the network, with filters that enable you to search for computers and mobile devices that are unprotected for some specific reason.
To ensure correct operation of the security software, the computers on the network must communicate with the Cytomic cloud. For the list of URLs that must be accessible from your computers, see section Access to service URLs.
Field | Description | Values |
---|---|---|
Computer |
Computer name. |
Character string |
Computer status |
Agent reinstallation:
Protection reinstallation:
Computer isolation status:
“RDP attack containment” mode:
Verbose mode: |
Icon |
Folder in the Advanced EPDR folder tree that the computer belongs to. |
Character string |
|
Advanced protection status. |
|
|
Antivirus protection status. |
|
|
Updated protection |
Indicates whether or not the installed protection module is updated to the latest version released. Point the mouse to the field to see the version of the installed protection. |
|
Knowledge |
Indicates whether or not the signature file found on the computer is updated to the latest version. Point the mouse to the field to see the date that the file was last updated. |
|
Connection to knowledge |
Indicates whether the computer can communicate with the Cytomic cloud to send monitored events and download security intelligence. |
|
Last connection |
Date when the Advanced EPDR status was last sent to the Cytomic cloud. |
Date |
Fields displayed in the exported file
Field | Description | Values |
---|---|---|
Client |
Customer account the service belongs to. |
Character string |
Computer type |
Type of device. |
|
Computer |
Computer name. |
Character string |
The computer primary IP address. |
Character string |
|
Windows domain the computer belongs to. |
Character string |
|
Description |
Description assigned to the computer. |
Character string |
Group |
Folder in the Advanced EPDR folder tree that the computer belongs to. |
Character string |
Agent version |
Internal version of the Cytomic agent module. |
Character string |
Installation date |
Date when the Advanced EPDR software was successfully installed on the computer. |
Date |
Last update on |
Date the agent was last updated. |
Date |
Platform |
Operating system installed on the computer. |
|
Operating system |
Operating system installed on the computer, internal version, and patch status. |
Character string |
Updated protection |
Indicates whether or not the installed protection module is updated to the latest version released. |
Binary value |
Protection version |
Internal version of the protection module. |
Character string |
Updated knowledge |
Indicates whether or not the signature file found on the computer is the latest version. |
Binary value |
Last update on |
Date the signature file was last updated. |
Date |
Advanced protection File antivirus Mail antivirus Web browsing antivirus Program blocking |
Status of the associated protection. |
|
Advanced protection mode (Windows) |
Current configuration of the advanced protection module. Operating mode. |
|
Advanced protection mode (Linux) |
Current configuration of the advanced protection module. Malicious activity detection. |
|
Isolation status |
Indicates whether or not the computer is isolated from the rest of the network. |
|
Error date |
If an error occurred installing Advanced EPDR, date and time of the error. |
Date |
Installation error |
If an error occurred installing Advanced EPDR, error description. |
Character string |
Installation error code |
Shows codes that identify the installation error occurred. |
Codes are separated by “;”:
|
Other security products |
Name of any third-party antivirus product found on the computer at the time of installing Advanced EPDR. |
Character string |
Connection for web protection |
Shows the status of the connection between the computer and the servers that store the dangerous URL database. |
|
Shows the status of the connection between the computer and the servers that store signature files and security intelligence. |
|
|
Connection for sending events |
Shows the status of the connection between the computer and the servers that receive the events monitored on protected computers. |
|
“RDP attack containment” mode |
Status of the “RDP attack containment” mode. |
|
Filter tool
Field | Description | Values |
---|---|---|
Computer type |
Type of device. |
|
Search computer |
Computer name. |
Character string |
Last connection |
Date when the Advanced EPDR status was last sent to the Cytomic cloud. |
|
Updated protection |
Indicates whether or not the installed protection is updated to the latest version released. |
|
Platform |
Operating system installed on the computer. |
|
Updated knowledge |
Indicates whether or not the signature file found on the computer is the latest version. |
Binary value |
Connection to knowledge servers |
Indicates whether the computer can communicate with the Cytomic cloud to send monitored events and download security intelligence. |
|
Protection status |
Status of the protection module installed on the computer. |
|
Isolation status |
Computer isolation status. |
|
“RDP attack containment” mode |
Status of the “RDP attack containment” mode. |
|
Computer Details page
Click a row in the list to open the computer details page. For more information, see Computer details.
Malware/PUP activity
This list shows the threats detected on the computers protected by Advanced EPDR. It provides you with the necessary information to find the source of a problem, assess the severity of an incident and, if required, take the necessary remediation measures and update the organization security policies.
Field | Comment | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
Threat |
Name of the detected threat. |
Character string |
Path |
Full path to the infected file. |
Character string |
Run sometime |
The threat ran and the computer might be compromised. |
Binary value |
Accessed data |
The threat accessed data on the user computer. |
Binary value |
Made external connections |
The threat communicated with remote computers to send or receive data. |
Binary value |
Action |
Action taken on the malware. |
|
Date |
Date when the threat was detected on the computer. |
Date |
Fields displayed in the exported file
The context menu of the Malware/PUP Activity list shows two options: Export and Export List and Details. This section describes the content of the file generated when you select Export. For more information about the Export List and Details option, see Exported Excel files.
Field | Comment | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
Threat |
Name of the detected threat. |
Character string |
Path |
Full path to the infected file. |
Character string |
Action |
Action taken on the malware. |
|
Run |
The threat ran and the computer might be compromised. |
Binary value |
Accessed data |
The threat accessed data on the user computer. |
Binary value |
External connections |
The threat communicated with remote computers to send or receive data. |
Binary value |
Excluded |
The threat was excluded by you to allow it to run. |
Binary value |
Date |
Date when the threat was detected on the computer. |
Date |
Time that the threat was on the customer network without classification. |
Character string |
|
User |
Character string |
|
MD5 |
MD5 hash of the detected file. |
Character string |
SHA-256 |
SHA-256 hash of the detected file. |
Character string |
Infection source computer |
Name of the computer, if the infection attempt originated from another computer on the customer network. |
Character string |
Infection source IP address |
IP address of the computer, if the infection attempt originated from another computer on the customer network. |
Character string |
Infection source user |
The user that was logged in to the computer the infection attempt originated from, if applicable. |
Character string |
Filter tool
Field | Comment | Values |
---|---|---|
Search |
|
Character string |
Type |
Type of threat. |
|
Dates |
Set a time period, from the current moment back. |
|
Run |
The threat ran and the computer might be compromised. |
Binary value |
Action |
Action taken on the threat. |
|
Accessed data |
The threat accessed data on the user computer. |
Binary value |
External connections |
The threat communicated with remote computers to send or receive data. |
Binary value |
Details page
This page shows detailed information about the program classified as malware/PUP. See Malware and PUP detection.
Exploit activity
This list shows all computers with programs compromised by vulnerability exploit attempts. It provides you with the necessary information to find the source of a problem, assess the severity of an incident and, if required, take the necessary remediation measures and update the organization security policies.
Field | Comment | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
Compromised program or driver |
Program affected by the exploit attack, or vulnerable driver loaded. |
Character string |
Exploit technique |
Identifier of the technique used to exploit the program or driver vulnerability. |
Character string |
Exploit run |
Indicates whether the exploit managed to run or was blocked before it could affect the vulnerable program. |
Binary value |
Action |
|
Enumeration |
Date |
Date when the exploit attempt was detected on the computer. |
Date |
Fields displayed in the exported file
The context menu of the Exploit Activity list shows two options: Export and Export List and Details. This section describes the content of the file generated when you select Export. For more information about the Export List and Details option, see Exported Excel files.
Field | Comment | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
Compromised program or driver |
Program affected by the exploit attack, or vulnerable driver loaded. |
Character string |
Exploit technique |
Identifier of the technique used to exploit the program vulnerability. |
Enumeration |
User |
User account under which the program that received the exploit attack was run. |
Character string |
Action |
|
Enumeration |
Exploit run |
Indicates whether the exploit managed to run or was blocked before it could affect the vulnerable program. |
Binary value |
Date |
Date when the exploit attempt was detected on the computer. |
Date |
Filter tool
Field | Comment | Values |
---|---|---|
Search |
|
Enumeration |
Dates |
Set a time period, from the current moment back. |
|
Exploit run |
Indicates whether the exploit managed to run or was blocked before it could affect the vulnerable program. |
Binary value |
Action |
|
Enumeration |
Details page
This page shows detailed information about the program classified as an exploit. See Exploit detection.
If the exploit technique is Vulnerable driver, see Driver details
Blocks by advanced security policies
This list shows all programs blocked by advanced security policies. These policies prevent the execution of scripts and unknown programs that use advanced infection techniques.
Field | Comment | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
User |
User account under which the threat tried to run. |
Character string |
Path |
Full path to the blocked file. |
Character string |
Action |
Action taken on the file. |
|
Policy |
For more information, see Advanced security policies. |
|
Date |
Date when the threat was detected on the computer. |
Date |
Fields displayed in the exported file
The context menu of the Blocks by Advanced Security Policies list shows two options: Export and Export List and Details. This section describes the content of the file generated when you select Export. For more information about the Export List and Details option, see Exported Excel files.
Field | Comment | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
Policy |
For more information, see Advanced security policies. |
|
Path |
Full path to the file. |
Character string |
Action |
Action taken on the file. |
|
Date |
Date when the threat was detected on the computer. |
Date |
User |
User account under which the threat tried to run. |
Character string |
MD5 |
MD5 hash of the blocked program. |
Character string |
SHA-256 |
SHA-256 hash of the blocked program. |
Character string |
Filter tool
Field | Comment | Values |
---|---|---|
Search |
|
Character string |
Dates |
Set a time period, from the current moment back. |
|
Action |
Action taken on the threat. |
|
Policy applied |
For more information, see Advanced security policies. |
|
Details page
This page shows detailed information about the program blocked by the advanced security policies. See Block by advanced security policy.
Threats detected by the antivirus
This list provides complete, consolidated information about all detections made on all supported platforms and for all infection vectors used by hackers to infect computers on the network.
Field | Description | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
IP address |
The computer primary IP address. |
Character string |
Group |
Group within the Advanced EPDR group tree that the computer belongs to. |
Character string
|
Threat type |
Type of detected threat. |
|
Path |
Location of the threat on the file system. |
Character string |
Action |
Action taken by Advanced EPDR. |
|
Date |
Date when the attack was detected. |
Date |
Fields displayed in the exported file
Field | Description | Values |
---|---|---|
Client |
Customer account the service belongs to. |
Character string |
Computer type |
Type of device. |
|
Computer |
Name of the computer where the threat was detected. |
Character string |
Malware name |
Name of the detected threat. |
Character string |
Threat type |
Type of detected threat. |
|
Malware type |
Threat subclass. |
Character string |
Action |
Action taken by Advanced EPDR. |
|
Detected by |
Engine that detected the threat. |
|
Detection path |
Location of the threat on the file system. |
Character string |
Excluded |
The threat was excluded from the scans by the administrator to allow it to run. |
Binary value |
Date |
Date when the attack was detected. |
Date |
Group |
Group within the Advanced EPDR group tree that the computer belongs to. |
Character string |
IP address |
Primary IP address of the computer where the detection was made. |
Character string |
Domain |
Windows domain the computer belongs to. |
Character string |
Description |
Description assigned to the computer by the network administrator. |
Character string |
Filter tool
Field | Description | Values |
---|---|---|
Computer |
Name of the computer where the threat was detected. |
Character string |
Dates |
Range: Set a time period, from the current moment back. Custom range: Choose specific dates from a calendar. |
|
Computer type |
Type of device. |
|
Threat type |
Type of threat. |
|
Details page
This page shows detailed information about the detected virus.
Field | Description | Values |
---|---|---|
Threat |
Threat name. |
Character string |
Action |
Action taken by Advanced EPDR. |
|
Computer |
Name of the computer where the threat was detected. It includes a link to the Computer Details page. |
Character string |
Computer type |
Type of device. |
|
IP address |
The computer primary IP address. |
Character string |
Logged-in user |
Operating system user under which the threat was loaded and run. |
Character string |
Detection path |
Location of the threat on the file system. |
Character string |
Name |
Threat name. |
Character string |
Threat type |
Type of threat. |
Character string |
Malware type |
Type of malware. |
|
Detected by |
Module that detected the item. |
|
Date |
Date when the attack was detected. |
Date |
Blocked devices
This list provides details of the network computers that have restricted access to peripherals.
Field | Description | Values |
---|---|---|
Computer |
Computer name. |
Character string |
Group |
Folder in the Advanced EPDR folder tree that the computer belongs to. |
|
Name |
Name assigned manually to the device by you to make identification easier. |
Character string |
Type |
Type of device affected by the security settings. |
|
Action |
Action taken on the device. |
|
Date |
Date and time when the action was taken. |
Date |
Fields displayed in the exported file
Field | Description | Values |
---|---|---|
Client |
Customer account the service belongs to. |
Character string |
Computer type |
Type of device. |
|
Computer |
Computer name. |
Character string |
Original name |
Name of the blocked device. |
Character string |
Name |
Name assigned to the device by you. |
Character string |
Type |
Type of device. |
|
Instance ID |
ID of the affected device. |
Character string |
Number of detections |
Number of times the disallowed operation was detected on the device. |
Numeric value |
Action |
Action taken on the device. |
|
Detected by |
Module that detected the disallowed operation. |
Device control |
Date |
Date when the disallowed operation was detected. |
Date |
Group |
Folder in the Advanced EPDR folder tree that the computer belongs to. |
Character string |
IP address |
The computer primary IP address. |
Character string |
Domain |
Windows domain the computer belongs to. |
Character string |
Description |
Description assigned to the computer by you. |
Character string |
Filter tool
Field | Description | Values |
---|---|---|
Computer type |
Type of device. |
|
Search computer |
Computer name. |
Character string |
Dates |
|
|
Device type |
Type of device affected by the security settings. |
|
Name |
Device name. |
Character string |
Details page
This page shows detailed information about the blocked device.
Field | Description | Values |
---|---|---|
Device |
Name of the blocked device. |
Character string |
Action |
Action taken by Advanced EPDR. |
|
Computer |
Name of the computer where the device was blocked. |
Character string |
Computer type |
Type of computer. |
|
IP address |
The computer primary IP address. |
Character string |
Original name |
Name of the blocked device. |
Character string |
Name |
Name assigned to the device by you. To edit it, click the |
Character string |
Device type |
Type of device. |
|
Instance ID |
ID of the affected device. |
Character string |
Blocked by |
Module that detected the item. |
Device control |
Number of detections |
Number of detected blocks. |
Numeric value |
Date |
Date when the attack was detected. |
Date |
Intrusion attempts blocked
This list shows the network attacks received by the computers on the network and blocked by the firewall.
Field | Description | Values |
---|---|---|
Computer |
Name of the computer that received the network attack. |
Character string |
IP address |
IP address of the primary network interface of the computer that received the network attack. |
Character string |
Group |
Group within the Advanced EPDR group tree that the computer belongs to. |
Character string |
Intrusion type |
Indicates the type of intrusion detected. For more information about each type of network attack, see Block intrusions. |
|
Date |
Date and time Advanced EPDR logged the attack on the computer. |
Date |
Fields displayed in the exported file
Field | Description | Values |
---|---|---|
Client |
Customer account the service belongs to. |
Character string |
Computer type |
Type of device. |
Character string |
Computer |
Name of the computer that received the network attack. |
Character string |
Intrusion type |
Indicates the type of intrusion detected. For more information about each type of network attack, see Block intrusions. |
|
Local IP address |
IP address of the computer that received the network attack. |
Character string |
Remote IP address |
IP address of the computer that launched the network attack. |
Character string |
Physical address of the computer that launched the network attack, provided it is on the same subnet as the computer that received the attack. |
Character string |
|
Local port |
In TCP and UDP attacks, this section indicates the port where the intrusion attempt was received. |
Numeric value |
Remote port |
In TCP and UDP attacks, this section indicates the port from which the intrusion attempt was launched. |
Numeric value |
Number of detections |
Number of intrusion attempts of the same type received. |
Numeric value |
Action |
Action taken by the firewall according to its settings. For more information, see Firewall (Windows computers). |
Block |
Detected by |
Detection engine that detected the network attack. |
Firewall |
Date |
Date the network attack was logged. |
Date |
Group |
Folder in the Advanced EPDR folder tree that the computer belongs to. |
Character string |
IP address |
IP address of the primary network interface of the computer that received the network attack. |
Character string |
Domain |
Windows domain the computer belongs to. |
Character string |
Description |
Description assigned to the computer by you. |
Character string |
Filter tool
Field | Description | Values |
---|---|---|
Dates |
|
|
Intrusion type |
Indicates the type of intrusion detected. For more information about each type of network attack, see Block intrusions. |
|
Computer type |
Type of device. |
|
Details page
This page shows detailed information about the network attack detected.
Field | Description | Values |
---|---|---|
Intrusion type |
Indicates the type of intrusion detected. For more information about each type of network attack, see Block intrusions. |
|
Action |
Action taken by Advanced EPDR. |
Blocked |
Computer |
Name of the computer where the threat was detected. |
Character string |
Computer type |
Type of device. |
|
IP address |
The computer primary IP address. |
Character string |
Local IP address |
IP address of the computer that received the network attack. |
Character string |
Remote IP address |
IP address of the computer that launched the network attack. |
Character string |
Remote MAC address |
Physical address of the computer that launched the network attack, provided it is on the same subnet as the computer that received the attack. |
Character string |
Local port |
In TCP and UDP attacks, this section indicates the port where the intrusion attempt was received. |
Numeric value |
Remote port |
In TCP and UDP attacks, this section indicates the port from which the intrusion attempt was launched. |
Numeric value |
Detected by |
Module that detected the item. |
Firewall |
Number of detections |
Number of successive times the same type of attack occurred between the same source and target computers. |
Numeric value |
Date |
Date when the attack was detected. |
Date |
Web access by category
Field | Description | Values |
---|---|---|
Category |
Category that the accessed web page belongs to. |
Enumeration of all supported categories. |
Allowed access attempts |
Number of accesses allowed to pages belonging to the category specified in the Category field. |
Numeric value |
Allowed devices |
Number of computers allowed to access pages belonging to the category specified in the Category field. |
Numeric value |
Denied access attempts |
Number of access attempts denied to pages belonging to the category specified in the Category field. |
Numeric value |
Denied computers |
Number of computers denied to access pages belonging to the category specified in the Category field. |
Numeric value |
Fields displayed in the exported file
Field | Description | Values |
---|---|---|
Category |
Category that the accessed web page belongs to. |
Enumeration of all supported categories. |
Allowed access attempts |
Number of accesses allowed to pages belonging to the category specified in the Category field. |
Numeric value |
Allowed devices |
Number of computers allowed to access pages belonging to the category specified in the Category field. |
Numeric value |
Denied access attempts |
Number of access attempts denied to pages belonging to the category specified in the Category field. |
Numeric value |
Denied computers |
Number of computers denied to access pages belonging to the category specified in the Category field. |
Numeric value |
Filter tool
Field | Description | Values |
---|---|---|
Dates |
|
|
Category |
Category that the accessed web page belongs to. |
Enumeration of all supported categories. |
Web access by computer
This list shows all computers on the network and web page visits allowed or denied (sorted by category).
Field | Description | Values |
---|---|---|
Computer |
Computer name. |
Character string |
IP address |
The computer primary IP address. |
Character string |
Group |
Group within the Advanced EPDR group tree that the computer belongs to. |
|
Category |
Category that the accessed web page belongs to. |
Enumeration of all supported categories. |
Allowed access attempts |
Number of accesses allowed to pages belonging to the category specified in the Category field. |
Numeric value |
Denied access attempts |
Number of access attempts denied to pages belonging to the category specified in the Category field. |
Numeric value |
Fields displayed in the exported file
Field | Description | Values |
---|---|---|
Client |
Customer account the service belongs to. |
Character string |
Computer type |
Type of device. |
|
Computer |
Computer name. |
Character string |
Category |
Category that the accessed web page belongs to. |
Enumeration of all supported categories. |
Allowed access attempts |
Number of accesses allowed to pages belonging to the category specified in the Category field. |
Numeric value |
Denied access attempts |
Number of access attempts denied to pages belonging to the category specified in the Category field. |
Numeric value |
Group |
Group within the Advanced EPDR group tree that the computer belongs to. |
Character string |
IP address |
The computer primary IP address. |
Character string |
Domain |
Windows domain the computer belongs to. |
Character string |
Description |
Description assigned to the computer by you. |
Character string |
Filter tool
Field | Description | Values |
---|---|---|
Dates |
|
|
Category |
Category that the accessed web page belongs to. |
Enumeration of all supported categories. |
Computer type |
Type of device. |
|
Computer |
Computer name. |
Character string |
Network attack activity
This list shows all network attacks detected and blocked by the Network Attack Protection module.
Field | Description | Values |
---|---|---|
Computer |
Computer name. |
Character string |
Network attack |
Name of the network attack. For more information, see https://www.pandasecurity.com/en/support/card?id=700145 |
Character string. |
Local IP address |
The computer local IP address. |
IP address |
Action |
Action taken.
|
|
Remote IP address |
IP address from which the attack originated. |
IP address |
Date |
Date the attack was detected or blocked. |
Date |
Fields displayed in the exported file
Field | Description | Values |
---|---|---|
Computer |
Computer name. |
Character string |
Network attack |
Type of network attack. |
Character string |
Action |
Action taken on the attack. |
|
Local IP address |
The computer local IP address. |
IP address |
Remote IP address |
Remote IP address of the attack. |
IP address |
Local port |
Local port on which the attack was detected or blocked. |
Character string |
Remote port |
Remote port from which the attack was detected or blocked. |
Character string |
Date |
Date the attack was detected. |
Date |
Number of occurrences |
Number of detections of the same type of attack with the same source IP address in the space of an hour. |
Character string |
Filter tool
Field | Description | Values |
---|---|---|
Computer |
Computer name. |
Character string |
Network attack |
Type of network attack. |
Character string |
Dates |
Date range. |
|
Action |
Action taken on the threat. |
|
Details page
Field | Description | Values |
---|---|---|
Network attack |
Type of network attack. For more details, click the |
Character string |
Action |
Action taken on the detection. For more information about how to manage detected threats blocked, see Stopping detecting suspicious network traffic. |
|
Computer |
Name of the computer where the threat was detected, IP address, and folder it belongs to in the group tree. |
|
Local IP address |
The computer local IP address. |
IP address |
Remote IP address |
Remote IP address of the network attack. |
IP address |
Local port |
Local port on which the attack was detected or blocked. |
Character string |
Remote port |
Remote port from which the attack was detected or blocked. |
Character string |
Detection date |
Date the network attack was detected. |
Date |
Number of occurrences |
Number of detections of the same type of attack with the same source IP address in the space of an hour. |
Character string |