Dell Endpoint Security Suite Enterprise and Dell Threat Defense endpoint statuses can be pulled from a specific endpoint for in-depth review of threats, exploits, and scripts.
Not applicable
Dell Endpoint Security Suite Enterprise or Dell Threat Defense administrators may access an individual endpoint to review:
An administrator should only perform these steps when troubleshooting why the advanced threat prevention (ATP) engine misclassified a file. Click Access or Review for more information.
Access to malware information varies between Windows, macOS, and Linux. For more information, click the appropriate operating system.
By default, Windows does not record in-depth malware information.
regedit
and then press CTRL+SHIFT+ENTER. This runs the Registry Editor as admin.HKEY_LOCAL_MACHINE\Software\Cylance\Desktop
.HKEY_LOCAL_MACHINE\Software\Cylance\Desktop
, right-click the Desktop folder, select New, and then click DWORD (32-bit) Value.StatusFileEnabled
.1
and then press OK.HKEY_LOCAL_MACHINE\Software\Cylance\Desktop
, right-click the Desktop folder, select New, and then click DWORD (32-bit) Value.StatusFileType
.0
or 1
. Once Value data has been populated, press OK.0
= JSON file format1
= XML formatHKEY_LOCAL_MACHINE\Software\Cylance\Desktop
, right-click the Desktop folder, select New, and then click DWORD (32-bit) Value.StatusPeriod
.15
to 60
and then click OK.HKEY_LOCAL_MACHINE\Software\Cylance\Desktop
, right-click the Desktop folder, select New, and then click String Value
.StatusFilePath
.<CommonAppData>\Cylance\Status\Status.json
C:\ProgramData\Cylance
In-depth malware information is in the Status.json file at:
/Library/Application Support/Cylance/Desktop/Status.json
In-depth malware information is in the Status.json file at:
/opt/cylance/desktop/Status.json
The status file’s Contents include detailed information about multiple categories including Threats, Exploits, and Scripts. Click on the appropriate information to learn more about it.
snapshot_time |
The date and time the Status information was collected. The date and time are local to the device. |
ProductInfo |
|
Policy |
|
ScanState |
|
Threats |
|
Exploits |
|
Scripts |
|
Threats have multiple numerical-based categories to be deciphered in File_Status, FileState, and FileType. Reference the appropriate category for the values to be assigned.
The File_Status field is a decimal value calculated based on the values that are enabled by FileState (see the table in the FileState section). For example, a decimal value of 9 for file_status is calculated from the file being identified as a threat (0x01) and the file has been quarantined (0x08).
None | 0x00 |
Threat | 0x01 |
Suspicious | 0x02 |
Allowed | 0x04 |
Quarantined | 0x08 |
Running | 0x10 |
Corrupt | 0x20 |
Unsupported | 0 |
PE | 1 |
Archive | 2 |
3 | |
OLE | 4 |
Exploits have two numerical-based categories to be deciphered in both ItemType and State.
Reference the appropriate category for the values to be assigned.
StackPivot |
1 | Stack Pivot |
StackProtect |
2 | Stack Protect |
OverwriteCode |
3 | Overwrite Code |
OopAllocate |
4 | Remote Allocation of Memory |
OopMap |
5 | Remote Mapping of Memory |
OopWrite |
6 | Remote Write to Memory |
OopWritePe |
7 | Remote Write PE to Memory |
OopOverwriteCode |
8 | Remote Overwrite Code |
OopUnmap |
9 | Remote Unmap of Memory |
OopThreadCreate |
10 | Remote Thread Creation |
OopThreadApc |
11 | Remote APC Scheduled |
LsassRead |
12 | LSASS Read |
TrackDataRead |
13 | RAM Scraping |
CpAllocate |
14 | Remote Allocation of Memory |
CpMap |
15 | Remote Mapping of Memory |
CpWrite |
16 | Remote Write to Memory |
CpWritePe |
17 | Remote Write PE to Memory |
CpOverwriteCode |
18 | Remote Overwrite Code |
CpUnmap |
19 | Remote Unmap of Memory |
CpThreadCreate |
20 | Remote Thread Creation |
CpThreadApc |
21 | Remote APC Scheduled |
ZeroAllocate |
22 | Zero Allocate |
DyldInjection |
23 | DYLD Injection |
MaliciousPayload |
24 | Malicious Payload |
Oop
references Out of ProcessCp
references Child ProcessNone | 0 |
Allowed | 1 |
Blocked | 2 |
Terminated | 3 |
Exploits have a single numerical-based category to be deciphered in Action.
None | 0 |
Allowed | 1 |
Blocked | 2 |
Terminated | 3 |
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.