McAfee QUICKCLEAN 3.0 Guía de usuario Pagina 117

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 140
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 116
convention. Consider that the sample submitted is vtest32.exe. Then the .zip file contains the
following results:
vtest32_summary.html (.json, .txt, .xml) — This is the same as the Analysis Summary report.
There are four file formats for the same summary report in the .zip file. The html and txt files
are mainly for end users to review the analysis report. The .json and .xml files provide
well-known malware behavior tags for high-level programming script to extract key information.
vtest32.log — This file captures the Windows user-level DLL API calling activities during dynamic
analysis. You must thoroughly examine this file to understand the complete API calling sequence
as well as the input and output parameters. This is the same as the User API Log report.
vtest32ntv.txt — This file captures the Windows native services API calling activities during
dynamic analysis.
vtest32.txt — This file shows the PE header information of the submitted sample.
vtest32_detail.asm — This is the same as the Disassembly Results report. This file contains
reverse-engineering disassembly listing of the sample after it has been unpacked or decrypted.
vtest32_logicpath.gml — This file is the graphical representation of cross-reference of function
calls discovered during dynamic analysis. This is the same as the Logic Path Graph report.
log.zip —This file contains all the run-time log files for all processes affected by the sample
during the dynamic analysis. If the sample generates any console output text, the output text
message is captured in the ConsoleOutput.log file zipped up in the log.zip file. Use any regular
unzip utility to see the content of all files inside this log.zip file.
dump.zip — This file contains the memory dump (dump.bin) of binary code of the sample during
dynamic analysis. This file is password protected. The password is virus.
dropfiles.zip — This is the same as the Dropped Files report in the Analysis Results page. The
dropfiles.zip file contains all files created or touched by the sample during the dynamic analysis.
It is also password protected. The password is virus.
McAfee Advanced Threat Defense does not provide you access to the original sample files that it
analyzed. If Network Security Platform is integrated, you can use the Save File option in the Advanced
Malware policy to archive samples. However, note that the Sensor's simultaneous file scan capacity
is reduced if the Save File option is enabled. See the latest Network Security Platform IPS
Administration Guide for the details.
Working with the McAfee Advanced Threat Defense Dashboard
When you access McAfee Advanced Threat Defense from a client browser, the McAfee Advanced Threat
Defense Dashboard is displayed. You can view the following monitors on the McAfee Advanced Threat
Defense Dashboard:
VM Creation Status — Shows the status for analyzer VMs that being created.
File Counters — Provides a status of files being analyzed.
Files analyzed by File Type — Provides a view of file types being analyzed.
Top Malware by File Name — Lists the most severe malware files in your network by file name.
Analyzer Profile Usage — Provides the details of the analyzer profiles being used.
Analyzing malware
Working with the McAfee Advanced Threat Defense Dashboard
7
McAfee Advanced Threat Defense 3.0.4 Product Guide
117
Vista de pagina 116
1 2 ... 112 113 114 115 116 117 118 119 120 121 122 ... 139 140

Comentarios a estos manuales

Sin comentarios