Threat Intelligence
Update Date:2025-05-09 14:54:26
The analysis of threat intelligence effectively predicts and prevents malicious behavior, and users can better understand the type, source and motivation of potential threats, so as to take corresponding countermeasures to improve the security and protection level of business data. Users only need to visit the https:// B .oray.com to enter the Aweshell management platform, the left navigation bar [Security Center]-> [Threat Intelligence] to view this function.
! Note: Threat Intelligence supports Aweshell Windows clients V8.13 and later.
#1. Alarm Event Threat intelligence analysis and alarm are performed on the PC side of the login Aweray Aweshell client to quickly identify various known network threats. Alarm events can be viewed by virus type, device name, and time. !
#2. Security Policy A security detection item is set for the terminal device corresponding to the mapping. If the program code run by the terminal device matches the detection item virus database, the mapping on the terminal device will be closed.
(1) Open [Security Policy], click [Settings], select the virus type to be detected, select the effective mapping, and then click OK. !
(2) If a virus type is detected in the program matching of the program currently running on the terminal device, the mapping on the terminal device will be closed. The administrator can query the abnormal terminal device in the processing record, and confirm whether the program is a normal program in the " File Path " corresponding to the terminal device. If the program is a normal program, click " Trust File " in the processing record. !
! Note: The security detection of threat intelligence is limited to scanning and detecting the end devices of the Windows system.
Did the content of the document help you?
If you encounter product-related problems, you can consult Online customer service Ask for help.