Provides specific information about suspicious files
detected on your network
Detailed Suspicious File Information Data View
|
Data
|
Description
|
|
Received
|
The date and time Trend Micro Apex Central received
the data from the managed product
|
|
Detected
|
The date and time the managed product detected the
threat
|
|
Endpoint
|
The name of the endpoint
|
|
Product
|
The name of the managed product or service
Example: Apex One, ScanMail for Microsoft Exchange
|
|
Product Entity
|
The display name of the managed product
server in Trend Micro Apex Central
|
|
Endpoint IP Address
|
The IP address of the endpoint
|
|
Endpoint Host Name
|
The host name of the endpoint
|
|
File Type
|
The type of file object
|
|
Hash Value
|
The hash value of the file object
|
|
Hash Type
|
The type of hash value (SHA-1 or SHA-256) of the file object
|
|
File Path
|
The path of the file object or the path of the
program that executed the process
|
|
C&C List Source
|
The C&C list source that identified the C&C
server
|
|
Action
|
The action taken by the managed product
|
|
Scan Type
|
The type of scan that reported the event (for example,
Real-time Scan, Scheduled Scan, Manual Scan)
|
|
Created
|
The date and time the file object was created
|
|
Modified
|
The date and time the file object was last modified
|
