Skip to main content

Threat Checks

info

The product name for this user guide has changed from Foundation and Cloudscape to Business Service Discovery and Migration Planning. Previous UI pages known as Foundation have changed to Business Service Discovery. Previous UI pages known as CloudScape have changed to Migration Planning.

Threat Checks are a series of checks that are run nightly on every assessment. Threat Checks contribute to a device's Threat Level differently depending on their Check Impact. We list the Check Impact classification in the Threat Checks table. Basically, it takes more checks with low impacts to increase Threat Level than checks with High impacts.

Check nameImpactDescription
Device received connection from high-risk areaHighOn day of check, device reported a TCP/IP connection where the IP geolocated to a high-risk area AND was the source of the connection
Device initiated connection to high-risk areaOn day of check, device reported a TCP/IP connection where the IP geolocated to a high-risk area AND was the Destination of the connection.
Device initiated connection to known anonymous proxyHighOn day of check, device reported a TCP/IP connection where the IP geolocated to a known anonymous proxy where the proxy was the destination of the connection.
Device received connection from known anonymous proxyHighOn day of check, device reported a TCP/IP connection where the IP geolocated to a known anonymous proxy where the proxy was the source of the connection.
Device started receiving connections from the InternetMediumOn day of check, device reported a TCP/IP connection to a public IP address where the public address is the source of the connection AND no public IP address connection as the source was previously reported.
Device started reaching out to InternetLowOn day of check, device reported a TCP/IP connection to a public IP address where the public address is the destination of the connection AND no public IP address connection as the destination was previously reported.
Device receives connections from the InternetMediumOn day of check, device reported a TCP/IP connection to a public IP address.
Vulnerable package runningMediumOn day of check, device reported an executable that mapped to an installed package that was found to have a vulnerability.
Vulnerable package communicatingMediumOn day of check, device reported an executable in its TCP/IP connectivity that mapped to an installed package that was found to have a vulnerability.
Vulnerable package installedLowOn day of check, device reported an installed package that was found to have a vulnerability.
New Listening ProcessLowOn day of check, device reported a new listening process that did not exist on the previous day.
New Installed SoftwareLowOn day of check, device reported new software installed that did not exist on the previous day.
New Running ProcessLowOn day of check, device reported new process running that did not exist on the previous day.
Unused Listening ProcessLowOn day of check, device reported a listening process to which no connections were observed in the previous 30 days.