Skip to main content

Is there a way to track where threats to endpoints come from? (See threat below)

  • October 12, 2015
  • 3 replies
  • 17 views

ICMP.DLL,?Trojan.Dropper.Gen,?%appdata%{9a88e103-a20a-4ea5-8636-c73b709a5bf8}

3 replies

nic
Forum|alt.badge.img+56
  • Retired Webrooter
  • October 14, 2015
Where as in which attachment or website they got it from?

  • New Voice
  • October 20, 2015
Yes that would be really useful, at least for my business

  • Author
  • Fresh Face
  • October 30, 2015
Yeah as in which users profile it came through on and how? ie. from email attachment or website etc?