Alerts can come from several sources: Watchlists, USB Device Control, CB Analytics, Host-Based Firewall, Containers Runtime, or Intrusion Detection System (IDS). View alerts from each source by using the Type filter.
Watchlists Alerts
Watchlists provide custom detection and continuous monitoring of your environment for potential threats and suspicious activity.
Receiving alerts from watchlists are optional and are configurable on the Watchlists page when you subscribe to a watchlist or build a custom watchlist.
USB Device Control Alerts
When an end user tries to access a blocked USB device, a deny policy action is triggered, resulting in an alert. USB Device Control alerts cannot be triaged or investigated.
CB Analytics Alerts
CB Analytics alerts are detections that the Carbon Black Cloud analytics engine generates.
Host-Based Firewall Alerts
Containers Runtime Alerts
- An anomaly in the workload's behavior or a result of behavior that matches a known attack pattern, such as port scanning.
- An outbound connection to IP addresses with bad reputation.
Intrusion Detection System (IDS) Alerts
IDS monitors network activity against known signatures for potential threats and suspicious activity.
View Specific Alert Types
Use this procedure to view specific alert types.