Details for Detection Status

The relation of process execution and suspicious behavior is visualized in the detection status. A host system and objects such as a process, file, registry, network, etc are displayed as icons. An arrow will be used to show the relation for individual objects, and when the system name, process name, or file name is selected in the suspicious behavior tree, the summary for the selected object will be displayed.

 

You can view the following information from Detection Status Details:

 

Note Note

Exception cases, which do not record logs for suspicious behaviors, may not be properly displayed in the process tree diagram. The exception cases are as follows:
1) If the same behavior does not occur within the next 20 minutes, the logs for suspicious behaviors will not be created. In such a case, a tree may be disconnected as logs are not created or the tree may not be properly displayed.
2) Suspicious behaviors executed in the shared folders will not be visually displayed.
3) If a mount point for a USB memory stick does not exist, suspicious behaviors will not be displayed in the tree.
4) The tree can be broken if all logs are not properly collected at the moment when a backup file for V3 suspicious behaviors is replaced.

 

Process Tree

The process tree visually shows the relation between process execution and suspicious behavior in three different types of tree structure. Process Tree shows the additional behaviors as well as V3 engine detections. The additional behavior information is shown in gray.

Click the system, file, process or registry in the process tree to view the detailed information. You can also block network, collect artifact, terminate process or search for or gather a file from Respond.

 

 

Configuration for Process Tree

 
Agent System

Click the system icon in the tree process to display the information for the detected agent information in the right side of the page. You can run commands such as completely  network intrusion prevention, collecting AhnReport and artifact to respond to the detected systems. Click the icon () next to a system name to move to Detection > Agent.

 

Process ()

Click the Process icon in the tree process to display the information for the detected Process in the right side of the page. You can run a command for Terminate Process to respond to a detected process.

 

Note Note

To view the command status for file search and file collection, select Search for File or Collect File under Response.

 
File ()

Click the Process icon in the process tree to display the information for the detected file in the right side of the page. Run a command for Search for File or Collect File to respond to a detected file. Click the icon () next to a file name to move to Detection > File.

 

Network ()

Click the network icon in the process tree to display the information for the detected the network in the right side of the page. No response is available in the network information,

 

 
Registry ()

Click the Registry icon in the process tree to display the information for the detected registry in the right side of the page. No response is available in the registry information,

 

 

Details

You can view the detailed information about the detected behaviors. The detailed information shows default information, detailed behaviors and IOC detection information.

 

Default Information

Displays the default information such as malicious property or hash value.

Behavior Information

Displays the detailed behavior information about the individual detection. The following information shows the details about process execution and suspicious behaviors. Click next to the detailed behavior information to select the required information such as View in order of occurrence, View in recent action order or View by behavior type.

Refer to Detection Behavior for detection details.

Note Note

Depending on a behavior type, the information displayed in [Process Information] and [Target] may differ.

IOC Detection Information:

Displays the detections made by IOC detection rules uploaded. To make a detection using IOC, the IOC files should be uploaded from IOC.

Note Note

STIX is compatible for the IOC file format. STIX 1.2 supports file, address object type and URL object type.

 

Displaying Process Tree

  

Note Note

You can view the detections for suspicious behaviors in Detection Behavior.