<< PREVIOUS  NEXT >>

 

VIEW PROFILE LIST

  1. Navigate to Host Security > Host Monitoring in the left navigation pane

    Picture 223

  2. Profile list is displayed

    Picture 84

  3. To filter the listed profiles, expand Search option

    Picture 1073742183

  4. Provide information in all the required fields

    1. Type:

      1. Process – Provide the Process Profile, Threat Intelligence (Safe, Unverified, Threat or Failed), Library Monitoring (Enabled or Disabled), Checksum value, Path, Parameters, Source (Scan or Incident), Allowlisted (True or False) AND Edited (True or False)

        Picture 83

      2. Library – Provide the Process Profile, Threat Intelligence (Safe, Unverified, Threat or Failed), Checksum value, Path, Source (Scan or Incident), Allowlisted (True or False) and Edited (True or False)

        Picture 81

  5. Click APPLY

  6. Search results display the processes or libraries matching the provided criteria across profiles. This feature aids the addition or removal of a specific process or library from allowlist that is included in many profiles

 

<< PREVIOUS  NEXT >>