Is there a way to track where threats to endpoints come from? (See threat below)

  • 12 October 2015
  • 3 replies
  • 1062 views

ICMP.DLL,?Trojan.Dropper.Gen,?%appdata%{9a88e103-a20a-4ea5-8636-c73b709a5bf8}

3 replies

Userlevel 7
Badge +56
Where as in which attachment or website they got it from?
Yes that would be really useful, at least for my business
Yeah as in which users profile it came through on and how? ie. from email attachment or website etc?

Reply