Threats tab

On the Threats tab, detected threats are represented by threat cards. A threat card displays the calculated threat score, the threat name and class, the detection outcome (if available), the threat status, and other actions. If available, the campaign to which this threat is connected is displayed. Expand the card to see its related evidence.

Sort the threat cards with the pull-down menu. Select from Most recent, Earliest, Highest impact (the default), and Lowest impact.

The quick search field above the list provides fast, as-you-type search. It filters the rows in the list, displaying only those rows that have text, in any field, that matches the query string.

Toggle the Show closed threats button to filter the displayed threat cards by threat status. The default is to show all threats.

Threat cards

The Threat cards show all the threats associated with the selected host and their corresponding threat levels.

Each card displays the calculated threat impact, the threat name, the threat class, and if available, the detection outcome. It also shows the status of the threat: Open or Closed.

Click the Next steps button and select an action from the pull-down menu. Select from Close to close the threat (Open to reopen a closed threat) or Manage alert to create an alert management rule from the threat.

Evidence summary: section contains an overview of the evidence and other data detected for the threat. Click the angle right icon (or almost anywhere else in the card) to expand the evidence details.

If campaign data connected to this threat is available, Campaign: with a link to the Campaign summary sidebar is displayed.

Evidence details

The Evidence column displays the file downloads, signatures, and other categories of evidence type along with a timestamp of when the evidence was seen.

The Network interactions & network IOCs column displays the IP address or domain name of external hosts. Click the link to expand the Network interaction sidebar. Click the Intelligence pages icon icon to view the host in Intelligence.

The Supporting data column provides a link to the detected events as well as a link to the threat details.

Detection outcomes

Threat detection event outcomes have four possible values, listed in order of severity:

  • Succeeded The threat was verified to have reached its goal. This could be its check-in attempt to the C&C server completed and data was received from the malicious endpoint.

  • Failed The threat failed to reach its goal. This could be caused by the C&C server being offline, the attacker made coding errors, etc.

  • Blocked The threat was blocked by the VMware NSX Network Detection and Response or by a third party application.

If the event outcome is unknown, this field is not displayed.