Jump to content

Recommended Posts

Hi all,

we have Endpoint Protection enrolled on some clients of ours, and on October 20th at 4:00-6:00PM we got some "suspicious activities" on the most different systems.

I will send the detected activities as attachment.

My question: Is there any way to determine if those "suspicious activities" are/were dangerous in some kind of way or if there were any compromisations/damages caused by those activities? Or are those entries false positivies?

Any help will be appreciated.
Thanks in advance.

suspicious_activity.jpg

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.