The Main Interface
Main Functional Areas
Title Bar – Shows Product name and current step involved
Step 1: Scanning Network to Find Endpoints
Step 2: Scanning Any Kind of Threats
Menu Bar – Shows the status of the scan and contains the following buttons:
-
Previous Scans / Current Scan - View results of past scans / current scan.
-
Create Report - View reports generated by the Threat Hunter Assessment Tool (THAT).
See 'Reports' for more details.
-
Options – Shows the port numbers that THAT uses to communicate with our file lookup service (FLS (File Lookup Server)).
The FLS is used to deliver real-time verdicts on the trust status of unknown files. Admins should leave these ports at the default.
-
Help - Contains 'About' and 'Agent Requirements'
'About' - shows product and version information.
'Agent Requirements' - Troubleshooting advice if you experience problems connecting to your
target computer.
-
My Account - You can use the tool as a guest or login as a registered user.
See 'Login to Threat Hunter Assessment Tool' for more information.
Controls - On the left, THAT shows messages such as the number of devices found, number of
malicious files detected and so on. Also contains control buttons for:
-
Scan Now / New Custom Scan / Stop Scan - Scan target computers to identify unknown files.
You can add computers via Active Directory, Workgroup or Network Addresses.
• Scan Now – Shown when you first open the application.
• New Custom Scan – Shown after you have run the first scan for the session.
• Stop Scan – Cancel a scanning process.
• See 'Scan Computers' for more details.
-
Custom Scan / Detailed Scan Results
• Custom Scan – Configure your scan. You can scan by Active Directory, network address, workgroup,
and local computer. See 'Scan Computers' for more information.
• Detailed Scan Results – Shown after a scan is completed. Click this button to view full
results of the scan at https://verdict.xcitium.com/login.
See 'Xcitium Verdict Cloud Analysis Results' for more information.
-
Start Discovery / Skip Discovery / Restart Discovery – Start/stop discovery of devices on your network.
Main Display Area - Details of discovered endpoints, scanned endpoints and scan results.
See 'Scan Computers' and 'Scan Results' for more details.
-
Search - Look for discovered endpoints by name or IP.
-
Enter your business email to receive the detailed scan report – All the files are classified as “Trusted/Clean,” “Malicious” or “Unknown.”The detailed Threat Hunter Assessment Tool (THAT) Report will be sent to the email address provided.