Indications of Compromise Events
The host's Indications of Compromise (IoC) events for encrypted visibility engine detection allows you to check connection events with a very high malware confidence level, as reported by EVE. IoC events are triggered for encrypted sessions generated from a host using a malicious client. You can view information, such as IP address, MAC address, and OS information of the malicious host, and the timestamp of the suspicious activity.
A session with Encrypted Visibility Threat Confidence score 'Very High' as seen in connection events genreates an IoC event. You must enable Hosts from . In the management center, you can view the IoC event existence from:
-
.
-
> Choose the host that must be checked.
You can view the process information of the session that generated the IoC from:
column. Note that you must manually select the Encrypted Visbility fields and IoC field.