Assets
Files
Files from your detection integrations are analyzed to determine their nature—malicious or benign. Detection of malicious files considers factors such as the targeted endpoint or user, exclusion status, and findings from our threat intelligence sources.
File Exclusions
You can exclude files that are frequently flagged as malicious but are intended for legitimate use. See Exclusions for more information.
Metadata
Tools have the following metadata available on them that alter how they are handled:
Name | Description |
---|---|
Late stage tool | Associated with tools that are common in the later stages of a breach |
Malware | Tools that are commonly used in breaches |
Benign | Known safe for use |
Ransomware | Encrypts files and demands payment for decryption |
Unknown | None of the above categories are true |