VIEW PROFILE LIST
-
Navigate to Host Security > Host Monitoring in the left navigation pane
-
Profile list is displayed
-
To filter the listed profiles, expand Search option
-
Provide information in all the required fields
-
Type:
-
Process – Provide the Process Profile, Threat Intelligence (Safe, Unverified, Threat or Failed), Library Monitoring (Enabled or Disabled), Checksum value, Path, Parameters, Source (Scan or Incident), Allowlisted (True or False) AND Edited (True or False)
-
Library – Provide the Process Profile, Threat Intelligence (Safe, Unverified, Threat or Failed), Checksum value, Path, Source (Scan or Incident), Allowlisted (True or False) and Edited (True or False)
-
-
-
Click APPLY
-
Search results display the processes or libraries matching the provided criteria across profiles. This feature aids the addition or removal of a specific process or library from allowlist that is included in many profiles