Files from your detection integrations are analyzed to determine their nature—malicious or benign. Detection of malicious files considers factors such as the targeted endpoint or user, exclusion status, and findings from our threat intelligence sources.
Name | Description |
---|---|
Late stage tool | Associated with tools that are common in the later stages of a breach |
Malware | Tools that are commonly used in breaches |
Benign | Known safe for use |
Ransomware | Encrypts files and demands payment for decryption |
Unknown | None of the above categories are true |