Wirespeed home pagelight logodark logo
  • Back to Wirespeed
  • Back to Wirespeed
  • Documentation
  • API Reference
  • Changelog
  • Get Started
    • Introduction
    • Service Providers
    • Frequently Asked Questions
    Chat Ops
    • Introduction to Chat Ops
    • Communication Plan
    • I received a message from Wirespeed
    Containment
    • Introduction to Containment
    • User Containment
    • Endpoint Containment
    Verdicts
    • Introduction to Verdicts
    Exclusions
    • Introduction to Exclusions
    • Exclusion Examples
    Events
    • Introduction to Events
    • Advanced Queries
    • Custom Detections
    Assets
    • Users
    • Endpoints
    • Files
    • IPs
    • Locations
    • Processes
    Settings
    • Team
    Integrations
    • AWS
    • Box
    • Checkpoint Harmony (Avanan)
    • Cisco Meraki
    • Cisco Umbrella
    • ConnectWise PSA
    • CrowdStrike Falcon
    • Email
    • Fortinent FortiAnalyzer
    • Google Alert Center
    • Google Workspace
    • Have I Been Pwned
    • Hyas Protect
    • IPinfo
    • Jamf Pro
    • Jamf Protect
    • Jira Data Center
    • Kandji
    • ManageEngine ADAudit Plus
    • Microsoft
    • Microsoft Entra Sign-in Logs
    • Microsoft Teams
    • Microsoft Windows Event Logs
    • Okta
    • ReversingLabs
    • SentinelOne
    • Slack
    • Thinkst Canary
    Assets

    Processes

    Process information is taken from your detection integrations when malicious commands are identified on your endpoints. Process information includes things like the command that was run, the SHA1 and SHA256 of the command, and any threat intelligence we are able to gather related to the process.

    ​
    Process Exclusions

    You can exclude Processes that are frequently flagged as malicious but are intended for legitimate use. See Exclusions for more information.

    LocationsTeam
    xgithublinkedin
    Powered by Mintlify
    On this page
    • Process Exclusions
    Assistant
    Responses are generated using AI and may contain mistakes.