McAfee ePO - Infected files by source

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Query searches for infected files which were detected.

Attribute Value
Type Hunting Query
Solution McAfee ePolicy Orchestrator
ID e83b72a0-60dd-4d65-b1c2-582766f2f181
Tactics InitialAccess
Techniques T1189
Required Connectors SyslogAma
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
Syslog ProcessName contains "EPOEvents"
SyslogMessage contains "<EPOevent>"
SyslogMessage contains "<UpdateEvents>"
?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to McAfee ePolicy Orchestrator