Comodo Help
Find the desired product help
Xcitium Enterprise

Xcitium Enterprise

Xcitium Enterprise Administrator Guide

English

Print Help Download Help
Security Systems > View Alerts And Security Events > View Alerts And Security Events By Time
  • Introduction To Xcitium Enterprise - Endpoint Protection Platform
    • Key Concepts
    • Best Practices
    • Login Into The Admin Console
    • Upgrade To Full Version
  • The Admin Console
  • The Dashboards
  • CNAPP Dashboard
  • ROI Dashboard
  • Devices And Device Groups
    • Manage Device Groups
      • Create Device Groups
      • Edit A Device Group
      • Assign Configuration Profiles To A Device Group
      • Remove A Device Group
      • Run Procedures On Device Groups
    • Manage Devices
      • Add New Devices
      • Manage Windows Devices
        • View And Edit Device Name
        • View Summary Information
        • View Network Information
        • View And Manage Profiles Associated With A Device
        • View Maintenance Windows Associated With A Device
        • View And Manage Applications Installed On A Device
        • View The Files On A Device
        • View Exported Configurations And Import Profiles
        • View MSI Files Installed On A Device Through Xcitium
        • View And Manage Patches For Windows And 3rd Party Applications
        • View Antivirus Scan History
        • View And Manage Device Group Memberships
        • View Device Logs
      • Manage Mac OS Devices
        • View And Edit Mac OS Device Name
        • Summary Information Of Mac Device
        • View Installed Applications
        • View Quarantined Files On Mac OS Device
        • View And Manage Profiles Associated With A Device
        • View Packages Installed On A Device Through Xcitium
        • View And Manage Device Group Memberships
        • View Mac Device Logs
      • Manage Linux Devices
        • View And Edit Linux Device Name
        • Summary Information Of Linux Device
        • View Network Information Of A Linux Device
        • View And Manage Profiles Associated With A Linux Device
        • View Linux Packages Installed On A Device Through Dragon
        • View And Manage Device Group Memberships
      • Manage Android Devices
        • View And Edit Device Name
        • View Summary Information
        • Manage Installed Applications
        • View And Manage Profiles Associated With A Device
        • View Sneak Peek Pictures To Locate Lost Devices
        • View The Location Of The Device
        • View And Manage Device Group Memberships
      • Manage IOS Devices
        • View And Edit Device Name Of An IOS Device
        • View Summary Information Of An IOS Device
        • View Applications Installed On An IOS Device
        • View And Manage Profiles Associated With An IOS Device
        • View The Location Of An IOS Device
        • View And Manage Group Memberships Of An IOS Device
      • View User Information
      • Remote Management Of Windows And Mac OS Devices
        • Transfer Items To / From The Remote Computer
      • Remotely Manage Folders And Files On Windows Devices
      • Manage Processes On Remote Windows Devices
      • Manage Services On Remote Windows Devices
      • Use The Command Prompt On Remote Windows Devices
      • View Event Logs On Remote Windows Devices
      • Apply Procedures To Windows And Mac Devices
      • Remotely Install And Manage Packages On Windows Devices
      • Remotely Install Packages On Mac OS Devices
      • Remotely Install Packages On Linux Devices
      • Send Enrollment Link To IOS Devices
      • Generate An Alarm On Android Devices
      • Remotely Lock Mobile And Mac OS Devices
      • Wipe Selected Mobile And Mac Devices
      • Assign Configuration Profiles To Selected Devices
      • Set / Reset Screen Lock Password For Mobile Devices
      • Update Device Information
      • Send Text Messages To Mobile Devices
      • Restart Selected Windows Devices
      • Change A Device's Owner
      • Change The Ownership Status Of A Device
      • Add Custom Notes And Tags On Devices
      • Remove A Device
      • Generate Device List Report
      • Manage Isolate And Release From Isolation
    • Bulk Enrollment Of Devices
      • Enroll Windows, Mac OS And Linux Devices By Installing The Communication Client
        • Enroll Windows Devices Via AD Group Policy
        • Enroll Windows, Mac OS And Linux Devices By Offline Installation Of Agent
        • Enroll Windows Devices Using Auto Discovery And Deployment Tool
      • Enroll Android And IOS Devices Of AD Users
    • Download And Install The Remote Control Tool
  • Cloud Workloads
  • Cloud Assets
  • Cloud Security
    • View Vulnerabilities Findings
    • Registry Scan
    • CSPM Executive Dashboard
    • Compliance Summary
    • CWPP Dashboard
    • App Behavior
    • Manage Policies
    • Remediation
    • View Alerts
    • Manage Triggers
    • View Reports
  • Users And User Groups
    • Manage Users
      • Create New User Accounts
        • Manually Add Users
        • Import Users From A CSV File
      • Enroll User Devices For Management
        • Enroll Android Devices
        • Enroll IOS Devices
        • Enroll Windows Endpoints
        • Enroll Mac OS Endpoints
        • Enroll Linux OS Endpoints
      • View User Details
        • Update The Details Of A User
      • Assign Configuration Profiles To User Devices
      • Remove A User
      • Generate New Password For A User
      • Reset Two Factor Authentication Token For A User
      • Run Procedures On User Devices
    • Manage User Groups
      • Create A New User Group
      • Edit A User Group
      • Assign Configuration Profiles To A User Group
      • Remove A User Group
      • Run Procedures On User Group Devices
    • Configure Role Based Access Control For Users
      • Create A New Role
      • Manage Permissions And Users Assigned To A Role
      • Remove A Role
      • Manage Roles Assigned To A User
  • Configuration Templates
    • Create Configuration Profiles
      • Profiles For Android Devices
      • Profiles For IOS Devices
      • Profiles For Windows Devices
        • Create Windows Profiles
          • Associated Devices Settings
          • Antivirus Settings
          • Communication Client And Xcitium Client - Security Application Update Settings
          • File Rating Settings
          • Firewall Settings
          • HIPS Settings
          • Containment Settings
          • Maintenance Window Settings
          • VirusScope Settings
          • Xcitium Verdict Cloud
          • Global Proxy Settings
          • Client Proxy Settings
          • Agent Discovery Settings
          • Communication Client And Xcitium Client - Security Application UI Settings
          • Logging Settings
          • Client Access Control
          • External Devices Control Settings
          • Monitors
          • Procedure Settings
          • Remote Control Settings
          • Remote Tools Settings
          • Miscellaneous Settings
          • Script Analysis Settings
          • Data Loss Prevention Settings
          • Patch Management Settings
          • Performance Settings
          • Thumbnails Settings
          • Chat Settings
          • Applications Settings
        • Import Windows Profiles
      • Profiles For Mac OS Devices
        • Create A Mac OS Profile
          • Antivirus Settings For Mac OS Profile
          • Certificate Settings For Mac OS Profile
          • Restrictions Settings For Mac OS Profile
          • VPN Settings For Mac OS Profile
          • Wi-Fi Settings For Mac OS Profile
          • Remote Control Settings For Mac OS Profile
          • External Device Control Settings For Mac OS Profile
          • Valkyrie Settings For MacOS Profile
          • Procedure Settings For Mac Profiles
          • Monitor Settings For Mac OS Profile
      • Profiles For Linux Devices
        • Create A Linux Profile
          • Antivirus Settings For Linux Profile
          • Communication Client And XcitiumClient - Security Application Update Settings For Linux Profile
          • User Interface Settings For Linux Profile
          • Logging Settings For Linux Profile
          • Clients Access Control Settings For Linux Profile
          • Valkyrie Settings For Linux Profile
    • View And Manage Profiles
      • Export And Import Configuration Profiles
      • Clone A Profile
    • Edit Configuration Profiles
    • Manage Default Profiles
    • Manage Alerts
      • Create A New Alert
      • Edit / Delete An Alert
    • Manage Procedures
      • View And Manage Procedures
      • Create A Custom Procedure
      • Combine Procedures To Build Broader Procedures
      • Review / Approve / Decline New Procedures
      • Add A Procedure To A Profile / Procedure Schedules
      • Import / Export / Clone Procedures
      • Change Alert Settings
      • Apply Procedures To Devices
      • Edit / Delete Procedures
      • View Procedure Results
    • Manage Monitors
      • Create Monitors And Add Them To Profiles
        • Monitors For Windows Devices
        • Monitors For Mac OS Devices
      • View And Edit Monitors
    • Data Loss Prevention Rules
      • Create DLP Discovery Rules And Add Them To Profiles
      • View And Edit DLP Discovery Rules
      • Create DLP Monitoring Rules And Add Them To Profiles
      • View And Edit DLP Monitoring Rules
  • Security Systems
    • View Alerts And Security Events
      • View Alerts And Security Events By Time
      • View Alerts And Security Events By Files
      • View Alerts And Security Events By Device
      • Alert Policy
      • Suppression Rule
    • Investigate Events
      • Search Events By Query
      • Search Events By File
      • Search Events By Device
      • View Android Threat History
      • Process Timeline
    • Endpoint Security Status
      • Run Antivirus And/or File Rating Scans On Devices
      • Handle Malware On Scanned Devices
      • Update Virus Signature Database On Windows, Mac OS And Linux Devices
    • View And Manage Blocked Threats
    • View And Manage Quarantined Items
    • View Contained Threats
    • View And Manage Autorun Items
    • Manage File Trust Ratings On Windows Devices
      • File Ratings Explained
    • View List Of File Verdicts
    • View History Of External Device Connection Attempts
    • Data Loss Prevention Scans
      • DLP Logs
      • DLP Quarantined Files
  • Network Management
    • Create And Run Network Discovery Tasks
    • Manage Profiles For Network SNMP Devices
    • Manage Network Devices
      • Manage SNMP Devices
        • SNMP Device Details Interface
      • Discovered Devices
    • Manage Network Monitors
  • Software Inventory
    • View Applications Installed On Android And IOS Devices
      • Blacklist And Whitelist Applications
    • Patch Management
      • Manage OS Patches On Windows Endpoints
      • Install 3rd Party Application Patches On Windows Endpoints
        • Xcitium Supported 3rd Party Applications
    • View And Manage Applications Installed On Windows Devices
      • Uninstall A Windows Application From Selected Devices
      • Uninstall A Windows Application From All Devices
    • Vulnerability Management
  • Management Settings
    • Account Management
    • License Management
      • Manage Your Licenses
      • License Allocations
      • Bill Forecast
  • Configure Xcitium Enterprise
    • Email Notifications, Templates And Custom Variables
      • Configure Email Templates
      • Configure Email Notifications
      • Create And Manage Custom Variables
      • Create And Manage Registry Groups
      • Create And Manage COM Groups
      • Create And Manage File Groups
      • Create And Manage Tags
    • Xcitium Enterprise Portal Configuration
      • Import User Groups From LDAP
      • Configure Portal Settings
      • Configure Communication And Security Client Settings
        • Configure The Xcitium Android Client
          • Configure Android Client General Settings
          • Configure Android Client Antivirus Settings
          • Add Google Cloud Messaging (GCM) Token
        • Add Apple Push Notification Certificate
        • Configure Windows Clients
          • Configure Communication Client Settings
          • Configure Client Security Settings
      • Manage Xcitium Enterprise Extensions
      • Configure Xcitium Enterprise Reports
      • Device Removal Settings
      • Account Security Settings
      • Set-up Administrator's Time Zone And Language
      • Configure Audit Log Settings
    • Dashboard Settings
    • Cloud Security Settings
      • Manage Cloud Accounts
        • Amazon Web Server (AWS) Account Onboarding
        • Google Cloud Platform (GCP) Account Onboarding
        • Microsoft Azure Account Onboarding
      • Manage Cluster
      • Configure Integrations
        • CWPP
        • CSPM
        • Registry
        • S3 Data Source
      • Create And Manage Labels
      • Create And Manage Tags
      • Create And Manage Groups
      • Configure Ticket Template
    • Data Protection Templates
      • View And Manage Pattern Variables
      • View And Manage Keyword Groups
    • View Version And Support Information
    • Alert Notification Settings
  • Appendix 1a - Xcitium Services - IP Nos, Host Names And Port Details - EU Customers
  • Appendix 1b - Xcitium Services - IP Nos, Host Names And Port Details - US Customers
  • Appendix 2 - Pre-configured Profiles
  • Appendix 3 - Default Xcitium Security Policy Details
  • About Xcitium

View Alerts and Security Events by Time

  • Click 'Security' > 'Endpoint Security' > 'Alerts' > 'Alert Search'

The 'Alert Search' view shows the list of alerts generated and events logged by various security modules in chronological order.


You can view search for specific events, view their complete details, investigate events and take actions on the alerts.


Open the 'Alerts Search' interface

  • Click 'Security' > 'Endpoint Security'

  • Place your mouse on the 'Alerts' tab and choose 'Alert Search'

  • The 'Alert Search' view shows security events from all managed endpoints in chronological order:



Column Header

Description

Component

The module that reported the event. This can be 'Antivirus', 'Containment', 'Application Control', 'Autorun Control', 'Virtual Desktop' or 'EDR'.

Score

The criticality rating of the event as per EDR rule or the module responsible for the event. Each event is applied a score between 0 and 10 based on its severity.

  • Scores 0 to 5 - Low risk events

  • Scores 6 to 10 - High risk events

Alert Name

The label of the event. This shows how the file was handled by the component mentioned above or the event that generated an EDR alert.


Here are the possible actions per module:


Antivirus - Windows, Mac OS, and Linux devices

  • Malware detected

  • Malware quarantined

  • Malware removed from quarantine

  • Malware restored from quarantine

  • Malware removed from infected file

  • The file was skipped by the scan

  • Detected malware ignored

  • Detected malware blocked

  • File added to exclusions

  • File added to trusted files list

  • File reported as a false positive from the results screen

Containment - Windows devices

  • File run inside container with different restriction levels:

  • Restricted

  • Virtually

  • File blocked

  • File ignored

Application Control - Windows devices

  • File added to the file list

  • File removed from the endpoint

  • Trust rating updated for a file

Autorun Control - Windows devices

  • Detected item ignored

  • Process / service stopped

  • Auto-run process stopped. Corresponding auto-run entry removed. In the case of a service, XCS disables the service.

  • Auto-start process quarantined. Corresponding auto-start entry removed. In the case of a service, XCS disables the service.

  • Processes restored from quarantine

  • File deleted from the endpoint

Virtual Desktop - Windows devices

  • Launched

  • Terminated

  • Session started

  • Session paused

  • Session continued

  • Session terminated

  • Switched to host

  • Switched to virtual desktop

EDR - Windows devices

  • The label of the event / condition specified in the rule that generated an alert.

Alert Time

The date and time of the event / alert.

Device

The label of the endpoint on which the event occurred.

  • Click the name of a device to open its 'Device Details' interface.

  • See Manage Devices for more details on the interface.

Alert Status

Progress of the alert generated by the event. Statuses include:

  • New - Admin has not yet reviewed the alert and the work has not yet been started

  • Closed - An admin has remediated and closed the alert


The 'Alert Search' view lets you:

  • Search for specific alerts or events using various search parameters

  • View granular details of an event and investigate it

  • Take actions on the alerts

Search Alerts and Events


The filter fields at the top let you to search for specific alerts / events using various filter criteria.




  • Component - Choose the security module that logged the event or generated the alert

  • Device - Choose the managed endpoint on which the event occurred

  • User - Choose the user on whose device the event occurred

  • File - Enter the file name or SHA 1 hash value of the file that generated the event

  • Alert Name - Choose the label of the event. This can describe how the file was handled by a XCS component above or the event that generated an EDR alert.

  • Status - Filter by whether the alert was remediated an closed by an admin or not

  • Score - Use the sliders to set a range of criticality rating to filter alerts

You can use any combination of filters simultaneously to search for specific event.

  • Enter / select the filter and click 'Apply'

  • Click 'Clear' to remove the search filters

View details of an event

  • The 'Alert Search' interface lets you view the granular details of an event including the device on which the event occurred, the security module or the EDR rule that triggered the alert, file / process involved in the event and more.

  • You can investigate the event using the hash values of the process / file involved in it, view the time line and tree views of the processes, view events on all devices by same file and more.

  • You can also take actions like reporting an alert as false-positive, create en exception rule for a file and more

Open the event details

  • Click 'Security' > 'Endpoint Security' > 'Alerts' > 'Alert Search'

  • Use the filter fields to search for specific event

  • Click the right arrow at the left of an alert / event to expand it



  • The left pane shows the details such as the event name, type, the device on which the event occurred and the time of occurrence.

  • The right pane shows the values of various event parameters. The number of event parameters depends on the event type

The event details screen lets you:

  • See the event in process timeline view of the device

  • View details of a process / file using hash search

  • Run an search event query with a specific file name or file path

View the process time line of an event

  • Click 'Security' > 'Endpoint Security' > 'Alerts' > 'Alert Search'

  • Use the filter fields to search for specific event

  • Click the right arrow at the left of an alert / event to expand it

  • Click the 'process hash' value and choose 'Show in Process Timeline'



The process time line chart of the device opens with the event pre-selected. The time line includes the events from 30 minutes before the selected event to 30 minutes after the selected event.


The bottom pane shows the details of the event. An example is shown below:




  • Click the 'Tree View' tab at the top to view the hierarchical structure of the processes, involved in the selected event.



See Process Timeline to read more about the time line view.


View details of a process / file using hash search

  • The event details screen lets you to run an hash search for the process or file involved in the event and view its details.

  • The hash search details include basic details of the executable file / parent file of a process, the file trajectory, its execution history and more.

  • You can also view the Valkyrie verdict of the file and set your own admin rating for the file from this interface.

View details of file / process involved in an event

  • Click 'Security' > 'Endpoint Security' > 'Alerts' > 'Alert Search'

  • Use the filter fields to search for specific event

  • Click the right arrow at the left of an alert / event to expand it

  • Click the value in the 'file hash' or 'process hash' field and choose 'Show file in Hash Search'




The 'Security' > 'Endpoint Security' > 'Investigate' > 'Hash Search' screen opens with the details of the chosen file or the parent file of the chosen process and events generated by the file.





See Search Events by File Hash to read more about the details shown on this page.


Run a search event query with a specific file name or file path

  • The event details screen lets you to create a query with the name or installation path of the file involved in the event

  • This is useful to search for all events involving the same file and investigate them

  • You can further refine the query with other search parameters too.

Create an event search query using the file name from an event

  • Click 'Security' > 'Endpoint Security' > 'Alerts' > 'Alert Search'

  • Use the filter fields to search for specific event

  • Click the right arrow at the left of an alert / event to expand it

  • Click the value in the 'file name' or ''file path' field and choose 'Query File Name' or 'Query File Path'




This opens the 'Investigate' > 'Event Search' interface with the file name/path pre-populated as search parameter. The interface shows a list of all events from all devices involving the same file.



You can refine the search further by adding more search parameters to the query.


See Search Events by Query for help to create search queries for event search.


Remediate an Alert

  • Click 'Security' > 'Endpoint Security' > 'Alerts' > 'Alert Search'

  • Use the filter fields to search for specific event

  • Click the right arrow at the left of an alert / event to expand it

The options on the top right let you take actions on the alert.




The availability of options depends on the security component that generated the alert or logged the event.

  • Report as False Positive - EDR only. Select this option if you are sure that EDR has generated an alert for a trustworthy file. Your verdict will be sent to Xcitium. We will analyze the file and update the rules accordingly.

  • Add Suppression Rule - EDR only. Select this option if you do not want EDR to generate an alert for the same event in future. The policy rules on your Xcitium Enterprise will automatically update to ignore similar events in future.

  • Close Alert - Select this if you have already taken an action on the rule.

The status of the alert will change to 'Closed' once you choose a verdict for it.

Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2025. All rights reserved.