This information was detected and analyzed by the CimTrak Integrity Suite
This data is a snapshot in time and may change in the future based on new information provided.
Do not to be fooled by filenames as they can be changed and do not represent what the file actually is. The file HASH is what matters which represents the "fingerprint" or unique identifier of the file CONTENT. CimTrak analyzes files that change in your environment against multiple sources by taking the hash and seeing if that hash has been identified as a threat or not.
You can detect and identify authorized and unauthorized changes in your own environment using CimTrak as well.
LEGEND
File Name = Name of the file when analyzed.
File Hash = Hash of the file when analyzed.
Algorithm = Hashing algorithm used to create the file hash such as SHA-1, SHA-2, etc.
File Size = Size of files in bytes when analyzed.
Trust Rating - Low = If the file is identified as a threat via any of our Threat Analysis Engine Integrations or if it was in that user's Blacklist
Trust Rating - Medium = If the file has been reviewed and reconciled by the user.
Trust Rating - High = If the file has been added to the user's Whitelist as a trusted file.
UTC Time = Time the CimTrak Analysis Image was created OR updated in UTC time zone.
Real-Time Insight into Your Entire Network
Do you have the confidence and trust with your FIM software?