2.1.6. Malcore retroanalyzer engine
2.1.6.1. Introduction
2.1.6.1.1. For what types of threats is this engine designed?
2.1.6.1.2. How does this particular engine detect threats?
2.1.6.1.3. How does Malcore retroanalyzer work in the GCenter?
2.1.6.2. Events generated
`Alerts`
screen and are displayed as detected by the engine.The events generated by the Malcore retroanalyzer and the Malcore engines are the same: see Events generated.
2.1.6.3. List of counters of the alert
Note
The alert counters are visible:
in the Alert details screen of the WEBUI
in the Expanded document of Kibana
in the export to the SIEM
The detailed information is given in the table (Counters of the source part of logs).
2.1.6.4. Counters associated with Malcore retroanalyzer engine
The following counters are present in Malcore retroanalyzer events:
Field |
Required |
Description |
Values |
---|---|---|---|
nb_rescans |
Yes |
Number of scans per Malcore retroanalyzer |
"Not reanalyzed", 1, 2 .. n |
Retroanalyzer |
No |
Result of Malcore retroanalyzer analysis. By default this field is NO
Only suspicious files will be reanalyzed by Malcore retroanalyzer
|
This field can be set to No or advanced malware
if Malcore retroanalyzer declares file as infected
|
2.1.6.5. Management of the engine
2.1.6.5.1. Viewing the engine status
The Malcore retroanalyzer engine and the Malcore engine use the same anti-viral engines: see `Health checks` screen.
2.1.6.5.2. Engine update
The Malcore retroanalyzer engine and the Malcore engine use the same update system: see the paragraph Engine update.
2.1.6.5.3. Configuration of Malcore retroanalyzer engine
The management interface enables to activate the engine: this activation is done in the `Malcore retroanalyzer` screen.