Assets
Processes
Process information is taken from your detection integrations when malicious commands are identified on your endpoints. Process information includes things like the command that was run, the SHA1 and SHA256 of the command, and any threat intelligence we are able to gather related to the process.
Process Exclusions
You can exclude Processes that are frequently flagged as malicious but are intended for legitimate use. See Exclusions for more information.