On-Demand Scan

An on-demand scan allows scanning a process selected from agent logs and checking process activities in the process tree even when the processes are not malicious or suspicious.

 

You can view the following information from the on-demand scan:

Note Note

Select the search period from the right side of the On-Demand page;  Last 24 hours, last 48 hours, last 7 days, last 14 days, last 30 days, and user-defined. When the option for user-defined is selected, click the calendar() to specify the date and then click the clock() to specify the time.

On-Demand Scan List

You can view the detailed scan information for the files where the on-demand scan has been run from the on-demand scan list. You can view the on-demand scan details as follows:

  1. Select Response at the top of the screen.
  2. Select the On-Demand tab.
  3. View the on-demand scan list. Click the scan result to display the detailed behavior information about the on-demand scan request process. You can run a command for the on-demand scan from the column for process information in Log > Agent EDR History.

Note Note

You can select a process in Log > EDR History to run the on-demand scan command in a specific agent.

View scan results

Process Tree

The process tree visually shows the relation between process execution and suspicious behavior in three different types of tree structure. Process Tree shows the additional behaviors as well as V3 engine detections. The additional behavior information is shown in gray. Click the system, file, process or registry from the process tree to view the details.

 

Configuration for Process Tree

 

Agent System

Click the system icon in the tree process to display the information for the detected agent information in the right side of the page. You can run commands such as completely  network intrusion prevention, collecting AhnReport and artifact to respond to the detected systems. Click the icon () next to a system name to move to Detection > Agent.

 

Process ()

Click the Process icon in the tree process to display the information for the detected Process in the right side of the page. You can run a command for Terminate Process to respond to a detected process.

Note Note

To view the command status for file search and file collection, select Search for File or Collect File under Response.

File ()

Click the Process icon in the process tree to display the information for the detected file in the right side of the page. Run a command for Search for File or Collect File to respond to a detected file. Click the icon () next to a file name to move to Detection > File.

Network ()

Click the network icon in the process tree to display the information for the detected the network in the right side of the page. No response is available in the network information,

Registry ()

Click the Registry icon in the process tree to display the information for the detected registry in the right side of the page. No response is available in the registry information,

 

Details

You can view the detailed information about the detected behaviors. The detailed information shows default information, detailed behaviors and IOC detection information.

 

Default Information

Displays the default information such as malicious property or hash value.

Behavior Information

Displays the detailed behavior information about the individual detection. The following information shows the details about process execution and suspicious behaviors. Click next to the detailed behavior information to select the required information such as View in order of occurrence, View in recent action order or View by behavior type.

Refer to Detection Behavior for detection details.

Note Note

Depending on a behavior type, the information displayed in [Process Information] and [Target] may differ.

IOC Detection Information:

Displays the detections made by IOC detection rules uploaded. To make a detection using IOC, the IOC files should be uploaded from IOC.

Note Note

STIX is compatible for the IOC file format. STIX 1.2 supports file, address object type and URL object type.

 

Displaying Process Tree

Note Note

You can view the detections for suspicious behaviors in Detection Behavior.