Use exploit information to see exploit events on a device.
If the exploits info device list is empty, you must specify a device first.
This pie chart shows the exploit events found on the device and the percentage of occurrences for each event type.
This is the unique ID for an exploit event occurrence on the device.
This is the file name and path associated with the event.
Artifact SHA256 Hash
This is the SHA256 hash for the file.
Click on any of the table rows to get more information about the exploit.
Back to event list
Go back to the table view
The date and time the memory protection event was created
The path and the name of the file that triggered the event
File Hash ID
The SHA256 hash for the threat
The version number of the file that triggered the event
The agent version that identified the memory protection event
The process ID for the memory protection event
OS Security ID
The security identifier for the user, group, or other security principal; this is generated by the operating system
The name of the user who was logged in to the device when the memory protection event occurred
The groups the user belongs to