Sample : |report|¶
Incident Report Texts
Number |
Items |
Descriptions |
---|---|---|
1 | Customer | Customer Name |
2 | Device | Device Name |
3 | Signature | Threat name |
4 | Severity | Describes how seriously the incident impacts on your utilizing ECL2.0. |
5 | Confidence | Detection accuracy |
6 | Reference | This is an incident ID being automatically assigned. |
7 | Time & Date |
This shows Time & Date of the latest threat logs being reported. |
8 | Description | Description on the Relevant Severity |
9 | Recommendations & Actions |
Recommended individual actions for various threats. |
10 | Access Patterns | Drawing threat access status |
11 | Details | Threat detail information |