McAfee QUICKCLEAN 3.0 User's Guide Page 104

  • Download
  • Add to my manuals
  • Print
  • Page
    / 140
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 103
Table 7-5 Column definitions (continued)
Column Definition
Severity
Indicates the severity level of the analyzed sample.
Information — Indicates that this is a clean file. White-listed files have this
severity level. Corresponds to a severity score of zero.
Very low — Corresponds to a severity score of 1.
Low — Corresponds to a severity score of 2.
Medium — Corresponds to a severity score of 3.
High — Corresponds to a severity score of 4.
Very high — Corresponds to a severity score of 5.
File Name
The name of the file that you submitted for analysis.
Analyzer
Profile
The analyzer profile that was referred to for the analysis.
VM Profile
The VM profile used for the dynamic analysis. If only static was used, that is
displayed.
Hash
The MD5 hash value of the file as calculated by McAfee Advanced Threat Defense.
File Size
The size of the analyzed file in KB.
3
Choose to hide the columns that you do not require.
a
Move the mouse over the right corner of a column heading and click the drop-down arrow.
b
Select Columns.
c
Select only the required column names from the list.
You can click a column heading and drag it to the required position.
4
To sort the records based on a particular column name, click the column heading.
You can sort the records in the ascending or descending order. Alternatively, move the mouse over
the right corner of a column heading and click the drop-down arrow. Then select Sort Ascending or Sort
Descending.
View the Analysis Summary report
The Analysis Summary report is an executive brief detailing key behaviors of the sample file. This
report is available in HTML, text, PDF, XML, and JSON formats.
The HTML, text, and PDF formats are mainly for you to review the analysis report. You can access the
HTML and PDF formats from the McAfee Advanced Threat Defense web application. The HTML and text
formats are also available in the reports .zip file for the sample, which you can download to your client
computer.
The XML and JSON formats provide well-known malware behavior tags for high-level programming
script to extract key information. Network Security Platform and McAfee Web Gateway use the JSON
formats to display the report details in their user interfaces.
7
Analyzing malware
View the analysis results
104
McAfee Advanced Threat Defense 3.0.4 Product Guide
Page view 103
1 2 ... 99 100 101 102 103 104 105 106 107 108 109 ... 139 140

Comments to this Manuals

No comments