Is there a way to track where threats to endpoints come from? (See threat below)
ICMP.DLL,?Trojan.Dropper.Gen,?%appdata%{9a88e103-a20a-4ea5-8636-c73b709a5bf8}
Yes that would be really useful, at least for my business
Yeah as in which users profile it came through on and how? ie. from email attachment or website etc?
Reply
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.