Palo Alto Networks, Inc.
DETECTING MALICIOUS ACTIVITY ON AN ENDPOINT BASED ON REAL-TIME SYSTEM EVENTS
Last updated:
Abstract:
Techniques for detecting malicious activity on an endpoint based on real-time system events are disclosed. In some embodiments, a system/process/computer program product for detecting malicious activity on an endpoint based on real-time system events includes monitoring an endpoint for malicious activity using an endpoint agent, in which the endpoint comprises a local device; detecting malicious activity associated with an application on the endpoint based on real-time system events using the endpoint agent based on a set of rules; and in response to detecting malicious activity on the endpoint based on real-time system events using the endpoint agent, performing a security response based on a security policy.
Utility
25 Feb 2020
26 Aug 2021