F-Secure Elements Endpoint Detection and Response lets you identify all harmful or otherwise unwanted and unknown applications, and the foreign destinations from the monitored hosts. It uses reputational data to identify potentially harmful applications in monitored organizations.
In the applications overview, you can check that no new harmful or otherwise unwanted applications have been installed that would require immediate action.
To check the application status:
-
- Log in to the portal with your email address and password.
The Home view opens.
-
- Check the Software overview pane.
- Most used
- Shows the applications that are most used in the monitored companies.
- Top destinations
- Shows the list of destinations where applications create the most outbound connections.
- Top OS by number of hosts
- Shows the list of operating systems that are being monitored by the installed sensors.
- Select Harmful software tab in the Software overview pane to see all installed harmful applications in the monitored companies.
Note: Select the harmful application to view detailed information about it and to see the hosts where the application is currently installed.
- Select the Software tab.
- Check the Software overview pane.
The list shows applications on the monitored devices.
-
- Select up or down arrow in the Reputation column to sort applications by their reputation or use search to find the application you want. Make sure that there are no harmful or unwanted applications.
The product uses F-Secure’s reputation analysis data to categorize applications.
- If the list contains applications that should be removed, select the number of hosts in the Hosts column to view a list of hosts where the application is installed.
- Inform your customer about the possible security risk that the harmful or unwanted application causes.
- Go through all customer organizations that you want to check in the same way.