Overview
General
Entry Point
Summary
Complete
Remediation
Business Impact
Suspicious Activity
Suspicious Events
Uncorrelated Events
Network Events
Incident Details
Tree
Tree Timeline
Table Timeline Summary
Table Timeline Complete
DORMANT
User Name:
Computer:
Incident ID:
Trigger:
Triggered By:
Trigger Time:
Need insight?
Email us.
Entry Point
How did it enter the system?
Remediation
Was an infection present and removed?
REPUTATION
FILE NAME
FULL PATH
STATUS
Business Impact
What was the damage?
DAMAGE
FILE NAME
FULL PATH
Suspicious Activity
What happened in the system?
SEVERITY
EVENT CATEGORY
Incident Details
How do I analyze further?