docs.vmware.com
Open in
urlscan Pro
2a02:26f0:3500:894::2ef
Public Scan
URL:
https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-user-guide/GUID-E68E7554-3183-4E07-A0D6...
Submission: On June 23 via api from DE — Scanned from DE
Submission: On June 23 via api from DE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Your session is about to expire Continue session Your session has expired. Please login to VMware Docs again. Hello, Docs All Book Filter by: All All Book en EnglishDeutschFrançaisEspañol日本語한국어简体中文繁體中文РусскийItalianoNederlandsPortuguês brasileiroDanskČeštinaPolskieSvenskaTürkçe Tour VMware Pages Communities Support Downloads MyLibrary Login Logout All Book Filter by: All Book VMware Docs times * Hello, * Home * LANGUAGES * English * Deutsch * Français * Español * 日本語 * 한국어 * 简体中文 * 繁體中文 * Русский * Italiano * Nederlands * Português brasileiro * Dansk * Čeština * Polskie * Svenska * Türkçe * VMWARE PAGES * Communities * Support * Downloads * MyLibrary * Login * Logout * VMware Carbon Black Cloud * Product Documentation * Technical Articles * Blogs * FAQ VMware Carbon Black Cloud Product Documentation Technical Articles Blogs FAQ Expand All Collapse All VMware Carbon Black Cloud Product Documentation * VMware Carbon Black Cloud User Guide VMware Carbon Black Cloud User Guide * Related Documentation Related Documentation * Copyrights and notices Copyrights and notices * Contacting VMware Carbon Black Support Contacting VMware Carbon Black Support * Dashboard Dashboard * Widget Definitions List Widget Definitions List * Customizing the Dashboard Customizing the Dashboard * Export Data Export Data * Alerts Alerts * View Alert Details View Alert Details * Alert Types Alert Types * Alert and Report Severity Alert and Report Severity * Alert ID, Event ID, and Threat ID Alert ID, Event ID, and Threat ID * Group Alerts Group Alerts * Dismissing Alerts Dismissing Alerts * Search Basics Search Basics * Alert Triage Alert Triage * Investigating Alerts Investigating Alerts * True and False Positives True and False Positives * Take Action on Alerts Take Action on Alerts * Visualizing Alerts Visualizing Alerts * Alert Origin, Behaviors, and TTPs Alert Origin, Behaviors, and TTPs * Investigate Investigate * Investigate - Processes Investigate - Processes * Process Analysis Process Analysis * Investigate - Enriched Events Investigate - Enriched Events * Investigating Script-Based Attacks Investigating Script-Based Attacks * Add an Investigate Query to a Threat Report Add an Investigate Query to a Threat Report * Enriched Data Enriched Data * Live Query Live Query * Live Query Considerations Live Query Considerations * Run a Live Query Run a Live Query * View Query Results View Query Results * Live Query Extension Tables Live Query Extension Tables * Enforce Enforce * Managing Watchlists Managing Watchlists * Subscribe to a Curated Watchlist Subscribe to a Curated Watchlist * Enable or Disable a Watchlist Enable or Disable a Watchlist * Watchlist Alert Options Watchlist Alert Options * Build Custom Watchlists Build Custom Watchlists * Tuning Your Watchlists Tuning Your Watchlists * Tune Your Watchlist at the Report Level Tune Your Watchlist at the Report Level * Tune Your Report at the IOC Level Tune Your Report at the IOC Level * Unsubscribe from a Watchlist Unsubscribe from a Watchlist * Managing Policies Managing Policies * Predefined Policies Predefined Policies * Creating Policies Creating Policies * Set a Ransomware Policy Rule Set a Ransomware Policy Rule * General Policy Settings General Policy Settings * Local Scan Settings Local Scan Settings * Configuring Automatic Updates for Local Scan (Endpoint Standard) Configuring Automatic Updates for Local Scan (Endpoint Standard) * Configure Automatic Updates for Local Scan (Endpoint Standard) Configure Automatic Updates for Local Scan (Endpoint Standard) * Create Prevention Policy Rules Create Prevention Policy Rules * Prevention Rules Capabilities for Linux Sensors Prevention Rules Capabilities for Linux Sensors * Background Scans Background Scans * Enable Background Scan Enable Background Scan * Monitoring Background Scan Status Monitoring Background Scan Status * Monitor Background Scan Status with Windows Event Viewer Monitor Background Scan Status with Windows Event Viewer * Monitor Background Scan Status using Live Query Monitor Background Scan Status using Live Query * Monitor Background Scan Status with RepCLI Monitor Background Scan Status with RepCLI * Linux Background Scan File Types Linux Background Scan File Types * MacOS Background Scan File Types MacOS Background Scan File Types * Windows Background Scan File Types Windows Background Scan File Types * Enable Windows Security Center Integration Enable Windows Security Center Integration * Managing Kubernetes Policies Managing Kubernetes Policies * Managing Runtime Policies Managing Runtime Policies * Understanding K8s Runtime Policies Concepts and Definitions Understanding K8s Runtime Policies Concepts and Definitions * Create Kubernetes Runtime Policies Create Kubernetes Runtime Policies * Review Scope Baseline for a K8s Runtime Policy Review Scope Baseline for a K8s Runtime Policy * Add Behavior to Scope Baseline Add Behavior to Scope Baseline * Reset Scope Baseline Reset Scope Baseline * View All Alerts Based on Kubernetes Runtime Policies View All Alerts Based on Kubernetes Runtime Policies * View Alerts by K8s Workload View Alerts by K8s Workload * Add False Positives as Normal Behavior to the Baseline Add False Positives as Normal Behavior to the Baseline * Managing Hardening Policies Managing Hardening Policies * Understanding K8s Hardening Policies Concepts and Definitions Understanding K8s Hardening Policies Concepts and Definitions * Pre-Packaged Policies Pre-Packaged Policies * Create Kubernetes Hardening Policies Create Kubernetes Hardening Policies * Mutate Rules Outcome Mutate Rules Outcome * Add Exceptions to Kubernetes Hardening Policies Add Exceptions to Kubernetes Hardening Policies * Save Policy As Template Save Policy As Template * Duplicate Policy Duplicate Policy * Confirm Draft Policy Confirm Draft Policy * Edit Kubernetes Policies Edit Kubernetes Policies * Managing Kubernetes Rules Managing Kubernetes Rules * About Rules About Rules * About Built-in Rules About Built-in Rules * About Custom Rules for Kubernetes Hardening Policies About Custom Rules for Kubernetes Hardening Policies * Basic JSONPath Rules Basic JSONPath Rules * Images Rules Images Rules * Advanced Rules Advanced Rules * Add Custom Rules to Kubernetes Hardening Policies Add Custom Rules to Kubernetes Hardening Policies * Build Correct JSONPath Build Correct JSONPath * Edit or Delete Custom Rules Edit or Delete Custom Rules * Managing Kubernetes Templates Managing Kubernetes Templates * Add Kubernetes Templates Add Kubernetes Templates * Manage Reputations Manage Reputations * Adding to the Banned List Adding to the Banned List * Add Hash to Banned List Add Hash to Banned List * Configure an Automatic Banned List Configure an Automatic Banned List * Adding to the Approved List Adding to the Approved List * Add Trusted IT Tools to Approved List Add Trusted IT Tools to Approved List * Add Certs to Approved List Add Certs to Approved List * Expiration of Approved Certs Expiration of Approved Certs * Add Hash to Approved List Add Hash to Approved List * Upload Reputations Upload Reputations * Reputation Assignment Reputation Assignment * Reputations Assignment for New Files Reputations Assignment for New Files * Reputations Assignment for Pre-Existing Files Reputations Assignment for Pre-Existing Files * Reputations Assignment for Network Files Reputations Assignment for Network Files * Malware Removal Malware Removal * Cloud Analysis Cloud Analysis * Recommendations Recommendations * How Carbon Black Cloud Generates Recommendations How Carbon Black Cloud Generates Recommendations * Accept Recommendations Accept Recommendations * Reject Recommendations Reject Recommendations * Accept Rejected Recommendations Accept Rejected Recommendations * Recommendations in the Audit Log Recommendations in the Audit Log * Harden Harden * Managing Vulnerabilities Managing Vulnerabilities * Assessing Vulnerabilities for VM Workloads and Endpoints Assessing Vulnerabilities for VM Workloads and Endpoints * VM Workloads Vulnerabilities VM Workloads Vulnerabilities * Endpoints Vulnerabilities Endpoints Vulnerabilities * Risk Evaluation Risk Evaluation * Export Vulnerability Data Export Vulnerability Data * Resolve Vulnerabilities Resolve Vulnerabilities * Container Image Vulnerability Container Image Vulnerability * About Risk Evaluation for Container Images About Risk Evaluation for Container Images * Using Kubernetes Search Using Kubernetes Search * Discovering Kubernetes Health Discovering Kubernetes Health * About Risk Severity About Risk Severity * Review Kubernetes Clusters Health Overview Review Kubernetes Clusters Health Overview * Review Risks for Kubernetes Scopes Review Risks for Kubernetes Scopes * Investigating Kubernetes Violations Investigating Kubernetes Violations * Inventory Inventory * Endpoints Endpoints * Search for Sensors Search for Sensors * Managing Sensors by using RepCLI Managing Sensors by using RepCLI * Manage Windows Sensors by using RepCLI Manage Windows Sensors by using RepCLI * Enable RepCLI Authentication for Windows Sensors Enable RepCLI Authentication for Windows Sensors * Manage macOS Sensors by using RepCLI Manage macOS Sensors by using RepCLI * Manage Linux Sensors by using RepCLI Manage Linux Sensors by using RepCLI * Sensor Status and Details Sensor Status and Details * Sensor Filters Sensor Filters * Take Action on an Endpoint Take Action on an Endpoint * View and Update Signature Versions View and Update Signature Versions * Use Live Response Use Live Response * Live Response Commands Live Response Commands * About Updating Sensors on Endpoints through the Console About Updating Sensors on Endpoints through the Console * Initiate Sensor Updates Initiate Sensor Updates * View Progress of Sensor Updates View Progress of Sensor Updates * USB Devices USB Devices * USB Devices Approval USB Devices Approval * Approve USB Devices Approve USB Devices * Add Approval Add Approval * Add Devices for Approval Add Devices for Approval * Block USB Devices Block USB Devices * Monitor USB Devices Access Monitor USB Devices Access * Securing VM Workloads Securing VM Workloads * VM Workloads Filters VM Workloads Filters * Install Sensors on VM Workloads Install Sensors on VM Workloads * Monitor VM Workloads Monitor VM Workloads * Take Action on a VM Workload Take Action on a VM Workload * Use Live Response for VM Workloads Use Live Response for VM Workloads * Remediate VM Workloads Remediate VM Workloads * Assign Policy to a Sensor Group Assign Policy to a Sensor Group * Sensor Groups Sensor Groups * Add a Sensor Group Add a Sensor Group * Modify Sensor Group Priority Modify Sensor Group Priority * Managing VDI Clones Managing VDI Clones * VDI Terminology Overview VDI Terminology Overview * VDI Clones Filters VDI Clones Filters * Monitor VDI Clones Monitor VDI Clones * Take Action on a VDI Clone Take Action on a VDI Clone * Assign Policy to a Sensor Group Assign Policy to a Sensor Group * Bypass Reasons Bypass Reasons * Reviewing Kubernetes Workloads Reviewing Kubernetes Workloads * Managing Kubernetes Clusters and CLI Client Instances Managing Kubernetes Clusters and CLI Client Instances * View Cluster Details View Cluster Details * Managing CLI Client Instances Managing CLI Client Instances * About CLI Client Instance About CLI Client Instance * Set Up CLI Instance for Image Scanning Set Up CLI Instance for Image Scanning * Delete CLI Client Delete CLI Client * Working with Kubernetes Scopes Working with Kubernetes Scopes * About Kubernetes Scopes About Kubernetes Scopes * Pre-Packaged Scopes Pre-Packaged Scopes * Scopes Hierarchy Scopes Hierarchy * Add Scope for Kubernetes Resources Add Scope for Kubernetes Resources * Add Scope for Container Images Add Scope for Container Images * View Policy Attached to Scope View Policy Attached to Scope * Edit Scope Edit Scope * Securing Kubernetes Network Securing Kubernetes Network * Review Network Map Review Network Map * Visualize Encrypted and Unencrypted Connections Visualize Encrypted and Unencrypted Connections * Create Egress Groups Create Egress Groups * Edit or Delete Egress Groups Edit or Delete Egress Groups * Scanning Container Images Scanning Container Images * About Risk Evaluation for Container Images About Risk Evaluation for Container Images * View all Image Scans View all Image Scans * View Image Details View Image Details * View Image Scan Report View Image Scan Report * Copy Scan Report URL in the Clipboard Copy Scan Report URL in the Clipboard * Identify Available Fixes to Apply Identify Available Fixes to Apply * Enable Exceptions on Image Enable Exceptions on Image * Run an Image Scan Run an Image Scan * Settings Settings * General Settings General Settings * Define On-Premise Devices Define On-Premise Devices * Set Registry Key for Windows Update Set Registry Key for Windows Update * Managing Users Managing Users * Add or Edit Users Add or Edit Users * Delete Users Delete Users * Enabling Two-Factor Authentication Enabling Two-Factor Authentication * Enable Duo Security Enable Duo Security * Enable Google Authenticator Enable Google Authenticator * Enabling SAML Integration Enabling SAML Integration * Enable SAML Integration with Ping Identity Enable SAML Integration with Ping Identity * Enable SAML Integration with OneLogin Enable SAML Integration with OneLogin * Enable SAML Integration with Okta Enable SAML Integration with Okta * Managing Roles Managing Roles * About User Roles About User Roles * Predefined User Roles Predefined User Roles * Legacy User Roles Legacy User Roles * Permissions Matrix Permissions Matrix * Roles Permission Descriptions Roles Permission Descriptions * Add or Edit Custom Roles Add or Edit Custom Roles * Delete Custom Roles Delete Custom Roles * Export Roles Export Roles * Subscribe to Notifications Subscribe to Notifications * Setting up API Access Setting up API Access * Create and Manage an API Key Create and Manage an API Key * Delete API Key with Attached Notification Rule Delete API Key with Attached Notification Rule * Setting Access Levels Setting Access Levels * Create Access Levels Create Access Levels * Apply Access Level to API Key Apply Access Level to API Key * Data Forwarders Data Forwarders * Data Forwarder Types Data Forwarder Types * View Data Forwarders View Data Forwarders * Create an S3 Bucket in the AWS Console Create an S3 Bucket in the AWS Console * Configure the Bucket Policy to Allow Access Configure the Bucket Policy to Allow Access * Encrypt Your S3 Buckets Using AWS KMS Encrypt Your S3 Buckets Using AWS KMS * Create a Customer Managed KMS Key Create a Customer Managed KMS Key * Configure KMS Encryption for Your S3 Bucket Configure KMS Encryption for Your S3 Bucket * Add a Data Forwarder Add a Data Forwarder * Data Forwarder Filters Data Forwarder Filters * Create a Basic Data Filter Create a Basic Data Filter * Create a Custom Query Data Filter Create a Custom Query Data Filter * Syntax Tips for Custom Query Filters Syntax Tips for Custom Query Filters * Delete a Data Forwarder Filter Delete a Data Forwarder Filter * Edit a Data Forwarder Edit a Data Forwarder * Delete a Data Forwarder Delete a Data Forwarder * Change the Data Forwarder Status Change the Data Forwarder Status * Test a New Data Forwarder Test a New Data Forwarder * Data Forwarder and Duplicate Handling Data Forwarder and Duplicate Handling * Recognizing Duplication of Forwarded Data Recognizing Duplication of Forwarded Data * Using the Inbox Using the Inbox * Download Requested Files Download Requested Files * Manual Upload File Restrictions Manual Upload File Restrictions * Audit Logs Audit Logs * Modify the Level of Granularity of Log Entries Modify the Level of Granularity of Log Entries * Expand the Log Scope Expand the Log Scope * Limit the Log Scope to Keywords Limit the Log Scope to Keywords * Modify the Audit Table Configuration Modify the Audit Table Configuration * Export Audit Logs Export Audit Logs * Multi-tenancy Multi-tenancy * Managing Users in a Multi-tenancy Environment Managing Users in a Multi-tenancy Environment * Add Users in a Multi-tenancy Environment Add Users in a Multi-tenancy Environment * Modify Users in a Multi-tenancy Environment Modify Users in a Multi-tenancy Environment * Delete Users in a Multi-tenancy Environment Delete Users in a Multi-tenancy Environment * Multi-tenancy Role Assignments Multi-tenancy Role Assignments * Switch Organizations Switch Organizations * TTPs and MITRE Techniques TTPs and MITRE Techniques * TTP Reference TTP Reference * MITRE Techniques Reference MITRE Techniques Reference * Integrations Integrations * Workspace ONE Workspace ONE * Setting Up Your CWP Appliance Setting Up Your CWP Appliance * Create a Custom Access Level for Your Appliance Create a Custom Access Level for Your Appliance * Generate an API Key for Your Appliance Generate an API Key for Your Appliance * Connect Carbon Black Cloud Workload Appliance with Carbon Black Cloud Connect Carbon Black Cloud Workload Appliance with Carbon Black Cloud * Delete Appliance API Key Delete Appliance API Key * Advanced Search Techniques Advanced Search Techniques * Platform Search Platform Search * Using Regular Expressions (regex) Using Regular Expressions (regex) * Searching Specific Data Types Searching Specific Data Types * Searching on IP Address Ranges Searching on IP Address Ranges * Searching for Dotted Tokens Searching for Dotted Tokens * Searching for Subfolders in Paths Searching for Subfolders in Paths * Searching for Substrings of Large Tokens Searching for Substrings of Large Tokens * Searching on Paths that include GUIDs, SIDs, and Substrings Searching on Paths that include GUIDs, SIDs, and Substrings * Searching on GUID in a Path Field Searching on GUID in a Path Field * Searching on SID in a Path Field Searching on SID in a Path Field * Searching for Substrings by Leveraging Tokenization Searching for Substrings by Leveraging Tokenization * Tokenization FAQs Tokenization FAQs * Searching cmdline Fields using Wildcards Searching cmdline Fields using Wildcards * Command Lines and Avoiding the regex Interpreter Command Lines and Avoiding the regex Interpreter * Searching Numeric Fields with Wildcards and Multiple Values Searching Numeric Fields with Wildcards and Multiple Values * Searching for File Extensions Searching for File Extensions * Searching for Filemod Actions Searching for Filemod Actions * Bounded Range Searching on *_count Fields Bounded Range Searching on *_count Fields * Searching for Operating Systems Searching for Operating Systems * Searching for a Specific Hash Searching for a Specific Hash * Searching for PowerShell Invoking a Browser Searching for PowerShell Invoking a Browser TTP REFERENCE Add to Library Remove from Library RSS Download PDF Feedback Edit Review Share Twitter Facebook LinkedIn 微博 Updated on 01/18/2022 Selected product version: Tactics, Techniques, and Procedures (TTPs) are behaviors, methods, or patterns of activity used by a threat actor, or group of threat actors. Events and alerts are tagged with TTPs to provide context around attacks and behaviors leading up to attacks that are detected and prevented by policy actions. Events and alerts may also be tagged with MITRE Techniques. See the MITRE Techniques Reference for a full list of MITRE techniques in the Carbon Black Cloud console. Important: VMware Carbon Black is replacing the terms blacklist and whitelist with banned list and approved list. Notice will be provided in advance of terminology updates to APIs, TTPs, and Reputations. Tag Where It's Detected Category How It's Set Description ACCESS_CALENDAR (Severity: Medium) Sensor Data at Risk A filesystem filter driver is set to identify a read access based on target file extension. Access the calendar application data files. For example Outlook. ACCESS_CLIPBOARD (Severity: Medium) Sensor Data at Risk The Win32 API GetClipboardData() is called. Access clipboard application data. ACCESS_CONTACTS (Severity: Medium) Sensor Data at Risk A filesystem filter driver is set to identify a read access based on target file extension. Access contact list/phone list application data. ACCESS_DATA_FILES (Severity: Medium) Sensor Data at Risk A filesystem filter driver is set to identify a read access based on target file extension. Access data files. ACCESS_EMAIL_DATA (Severity: Medium) Sensor Data at Risk A filesystem filter driver is set to identify a read access based on target file extension. Access email contents. ACTIVE_CLIENT (Severity: Low) Sensor Network Threat A network filter driver is set to identify the successful initiation of IPv4 or IPv6 connections. Application successfully initiated a network connection. ACTIVE_SERVER (Severity: Medium) Sensor Network Threat A network filter driver is set to identify accepted IPv4 or IPv6 connections. Application successfully accepted a network connection. ADAPTIVE_WHITE_APP (Severity: None) Analytics Malware & Application Abuse A hash lookup has identified an executable with reputation: ADAPTIVE_WHITE_APP. App is also (not signed) and (new i.e. age < 30 days). An unknown application that scanned clean. ATTEMPTED_CLIENT (Severity: Low) Sensor Network Threat A network filter driver is set to identify the unsuccessful initiation of IPV4 or IPv6 connections. Application attempted to initiate a network connection (and failed). ATTEMPTED_SERVER (Severity: None) Sensor Network Threat A network filter driver is set to identify the unsuccessful acceptance of IPV4 or IPv6 connections. Application attempted to accept a network connection (and failed). BEACON (Severity: Medium) Analytics Network Threat A failed network socket connection was enforced at the network filter driver, including the use of userland hooks. Low Reputation application (ADAPTIVE_WHITE or worse) running for the first time attempted to beacon over http/s to a server, unsuccessfully. BUFFER_OVERFLOW_CALL (Severity: Medium) Sensor Emerging Threats Userland hooks are set to identify API calls from writeable memory. Application attempted a system call from a buffer overflow. BYPASS_POLICY (Severity: High) Sensor Emerging Threats Identified a driver callback that includes specially crafted command line arguments. Application attempted to bypass the device's default security policy. CODE_DROP (Severity: Medium) Sensor Malware & Application Abuse A filesystem filter driver is set to identify the creation of a new binary or script, based on target file extension. Application dropped an executable or script. COMPANY_BANNED (Severity: High) Sensor Malware & Application Abuse The hash of a binary has been banned from executing, placed on the COMPANY_BANNEDLIST. Application is on the company banned list. COMPANY_BLACKLIST (Severity: High) Sensor Malware & Application Abuse The hash of a binary has been banned from executing, placed on the COMPANY_BLACKLIST. Application is on the company banned list. COMPROMISED_PARENT (Severity: None) Sensor Process Manipulation Userland hooks are set to identify processes that complete buffer overflow, process hollowing or code injection by compromised app such as, email, office, or browsers apps. Parent process has been compromised due to process modifications such as buffer overflow, code injection, or process hollowing. COMPROMISED_PROCESS (Severity: Medium) Sensor Process Manipulation Userland hooks are set to identify processes that complete buffer overflow, process hollowing or code injection by compromised app such as, email, office, or browsers apps. Process has been compromised due to process modifications such as buffer overflow, code injection, or process hollowing. CONNECT_AFTER_SCAN (Severity: None) Analytics Network Threat Analytics checks to see if a connection has been made after an initial port scan. A connection has been made after an initial port scan. COPY_PROCESS_MEMORY (Severity: High) Sensor Data at Risk Userland hooks are set to identify an application that took a memory snapshot of another process. Application took a memory snapshot of another process DATA_TO_ENCRYPTION (Severity: None) Sensor Data at Risk A process attempts to modify a ransomware canary file. An application tried to modify one of the special ransomware canary files that the Carbon Black Cloud placed in the file system. These files are sensor-controlled and should never be modified by any application other than the Carbon Black Cloud. DETECTED_BLACKLIST_APP (Severity: High) Sensor & Analytics Malware & Application Abuse Hash of discovered executable has reputation: COMPANY_BLACKLIST. A Blacklisted application has been detected on the filesystem. DETECTED_MALWARE_APP (Severity: High) Sensor & Analytics Malware & Application Abuse Hash or local scan of discovered executable has reputation: KNOWN_MALWARE Malware application has been detected on the filesystem. DETECTED_PUP_APP (Severity: High) Sensor & Analytics Malware & Application Abuse Hash or local scan of discovered executable has reputation: PUP Potentially Unwanted Application (PUP) has been detected on the filesystem. DETECTED_SUSPECT_APP (Severity: High) Sensor & Analytics Malware & Application Abuse Hash or local scan of discovered executable has reputation: SUSPECT_MALWARE Suspect Application has been detected on the filesystem. DUMP_PROCESS_MEMORY (Severity: Medium) Sensor Data at Risk Userland API hooks are set to detect a process memory dump. Application created a memory dump of another process on the filesystem EMAIL_CLIENT (Severity: Low) Sensor Network Threat A network filter driver is set to identify client connections that use an email protocol (e.g.SMTP, SMTPS, POP3, POP3S. IMAP, IMAP2, IMAPS). Non-Email application (i.e. unknown) is acting like an email client and sending data on an email port. ENUMERATE_PROCESSES (Severity: Medium) Sensor Generic Suspect Userland API hooks are set to detect process enumeration. Process is attempting to obtain a list of other processes executing on the host. FAKE_APP (Severity: High) Analytics Malware & Application Abuse A filesystem driver is set to identify "well known" windows applications by path (e.g. explorer, winlogin, lsass, etc) which are executed from the wrong directory. Application that is potentially impersonating a well-known application. FILE_TRANSFER (Severity: High) Sensor Network Threat A network filter driver is set to identify successfully established, connected or rejected IPV4 or IPv6 connections on FTP. Application is attempting to transfer a file over the network. FILE_UPLOAD (Severity: Medium) Analytics Network Threat Userland hooks, network filter driver and file system filter driver are set to identify processes that perform memory scraping followed by a network connection. Application is potentially uploading stolen data over the network. FILELESS (Severity: Critical) Analytics Emerging Threats A driver callback is identified that includes command line arguments to execute a script from command line or registry A script interpreter is acting on a script that is not present on disk. FIXED_PORT_LISTEN (Severity: Low) Sensor Network Threat An IPv4 or IPv6 network filter driver has been set to listen for connections on a fixed port Application is listening on a fixed port. HAS_BUFFER_OVERFLOW (Severity: Low) Sensor Emerging Threats Userland hooks are set to identify API calls from writeable memory This process has exhibited a buffer overflow. HAS_COMPROMISED_CODE (Severity: High) Sensor Process Manipulation A COMPROMISED_PROCESS has called one of a large variety of high risk functions. A compromised process had called one of multiple functions HAS_INJECTED_CODE (Severity: None) Analytics Process Manipulation The analytics keeps track if a process has been compromised and then injects code into another process. The process is running injected code. HAS_MALWARE_CODE (Severity: High) Sensor Process Manipulation A MALWARE_APP has performed a process injection using one of a variety of high risk techniques. Process has been injected into by known malware. HAS_PACKED_CODE (Severity: Low) Sensor Process Manipulation Userland hooks have identified an API call from writeable memory. Application contains dynamic code (i.e. writable memory & not buffer overflow). HAS_PUP_CODE (Severity: High) Sensor Process Manipulation A PUP_APP has performed a process injection using one of a variety of techniques. Process has been injected into by a PUP. HAS_SCRIPT_DLL (Severity: Low) Sensor Generic Suspect A driver routine is set to identify processes that load an in-memory script interpreter. Process loads an in-memory script interpreter. HAS_SUSPECT_CODE (Severity: High) Sensor Process Manipulation A SUSPECT_APP has performed a process injection using one of a variety of techniques. Process has been injected into by suspect malware. HIDDEN_PROCESS (Severity: High) Sensor Generic Suspect Events attributed to a process which is not visible to periodic user level process calls. Sensor has detected a hidden process. HOLLOW_PROCESS (Severity: None) Sensor Process Manipulation Multiple user level hooks are set to identify a specific sequence of calls that indicate a process is being replaced with another. A technique used to hide the presence of a process, typically performed by creating a suspended process, replacing it with a malicious one. IMPERSONATE_SYSTEM (Severity: None) Analytics Process Manipulation Is set when the username that is associated with a process changes during the course of execution to NT AUTHORITY\SYSTEM. Tracks the username that is associated with a process and watches for change of associated username to system/root. IMPERSONATE_USER (Severity: None) Analytics Process Manipulation Is set when the username that is associated with a process changes during the course of execution to something other than NT AUTHORITY\SYSTEM. Tracks the username that is associated with a process and watches for change of associated username from system/root to that of another user. INDIRECT_COMMAND_EXECUTION (Severity: Low) Sensor Malware & Application Abuse Various system utilities may have been used to execute commands, possibly without invoking cmd. System utility used to indirectly execute another command. INJECT_CODE (Severity: Medium) Sensor Process Manipulation Multiple kernel, OS and User level techniques are set to identify applications attempting to inject code into another process space Application is attempting to inject code into another process. INJECT_INPUT (Severity: Medium) Sensor Generic Suspect Userland hooks are set to identify an attempt to inject input into process Application is attempting to inject input into process. INSTALL (Severity: Low) Sensor Generic Suspect A filesystem filter driver is set to identify the creation of new binaries or scripts based on target file extension by installer executable Install process is running. INTERNATIONAL_SITE (Severity: Low) Analytics Network Threat Geographic IP is set to identify the source or destination of IPv4 and IPv6 connections. Application attempt to communicate with a peer IP address located in another country (excluding into US) IRC (Severity: Medium) Sensor Network Threat An IPv4 or IPv6 network filter driver is set to identify connections using common IRC ports Application attempt to communicate over Internet Relay Chat port. KERNEL_ACCESS (Severity: None) Sensor Malware & Application Abuse A process attempts to modify the system's master boot record (MBR). An application attempts to directly access the system's hard drive to write data into the MBR portion of the disk. Malware uses this tactic to alter system behavior on startup. KNOWN_APT (Severity: Critical) Sensor & Analytics Malware & Application Abuse A hash lookup has identified a running executable that has reputation: KNOWN_MALWARE, category: APT Application is Advanced Persistent Threat. KNOWN_BACKDOOR (Severity: Critical) Sensor & Analytics Malware & Application Abuse A hash lookup has identified a running executable that has reputation: KNOWN_MALWARE, category: backdoor Application is a known backdoor into the system. KNOWN_DOWNLOADER (Severity: Critical) Sensor & Analytics Malware & Application Abuse A hash lookup has identified a running executable that has reputation: KNOWN_MALWARE, category: downloader Application is a known malicious downloader. KNOWN_DROPPER (Severity: Critical) Sensor & Analytics Malware & Application Abuse A hash lookup has identified a running executable that has reputation: KNOWN_MALWARE, category: dropper Application is a known dropper of executables KNOWN_KEYLOGGER (Severity: Critical) Sensor & Analytics Malware & Application Abuse A hash lookup has identified a running executable that has reputation: KNOWN_MALWARE, category: keylogger Application known to monitor keyboard input. KNOWN_PASSWORD_STEALER (Severity: Critical) Sensor & Analytics Malware & Application Abuse A hash lookup has identified a running executable that has reputation: KNOWN_MALWARE, category: password stealer Application known to steal passwords. KNOWN_RANSOMWARE (Severity: Critical) Sensor & Analytics Malware & Application Abuse A hash lookup has identified a running executable that has reputation: KNOWN_MALWARE, category: ransomware Application is known Ransomware. KNOWN_ROGUE (Severity: Critical) Sensor & Analytics Malware & Application Abuse A hash lookup has identified a running executable that has reputation: KNOWN_MALWARE, category: rogue Application is known as a rogue application. KNOWN_ROOTKIT (Severity: None) Sensor & Analytics Malware & Application Abuse A hash lookup has identified a running executable that has reputation: KNOWN_MALWARE, category: rootkit Application is a known root kit. KNOWN_WORM (Severity: Critical) Sensor & Analytics Malware & Application Abuse A hash lookup has identified a running executable that has reputation: KNOWN_MALWARE, category: worm Application is a known worm. LEVERAGES_SYSTEM_UTILITY (Severity: High) Analytics Emerging Threats Various system utilities may have been used to perform malicious activity. A system utility was used for potentially malicious purposes. LOW_REPUTATION_SITE (Severity: Medium) Analytics Network Threat A network filter driver is set to identify connections to a peer IP address or Domain that has a low site reputation score Application made a network connection to a peer with low reputation. MALWARE_APP (Severity: Critical) Analytics Malware & Application Abuse A hash lookup or local scanner has identified a running executable that has reputation: MALWARE Application is a known Malware application. MALWARE_DROP (Severity: High) Sensor Malware & Application Abuse A CODE_DROP has been detected where the dropped application has the reputation: KNOWN_MALWARE : SUSPECT_MALWARE Application dropped a malware application. MALWARE_SERVICE_DISABLED (Severity: Not applicable) Sensor Policy Action The analytics receives this info from the sensor and sets this value accordingly. Malware service detected and disabled by a policy. MALWARE_SERVICE_FOUND (Severity: Not applicable) Sensor Policy Action The analytics receives this info from the sensor and sets this value accordingly. Malware service detected by a policy. MODIFY_KERNEL (Severity: Critical) Sensor Process Manipulation A userland hook has identified a process that modified kernel space Application modified system kernel.via NullPage Allocation MODIFY_MEMORY_PROTECTION (Severity: Medium) Sensor Process Manipulation A userland hook is set to detect a process modifying the memory permissions of a secondary process Application modify memory protection settings for the process. MODIFY_OWN_PROCESS (Severity: Medium) Sensor Process Manipulation A userland hook is set to detect a process that opens a handle to itself. Application attempted to open its own process with permissions to modify itself. MODIFY_PROCESS_EXECUTION (Severity: None) Sensor Process Manipulation A userland hook is set to identify attempts to modify the execution context in another process thread. Application attempted to modify the execution context in another process thread (either EAX or EIP) MODIFY_PROCESS (Severity: Medium) Sensor Process Manipulation A userland hook is set to identify applications attempting to open another process Application attempted to open another process with permissions to modify the target. MODIFY_SENSOR (Severity: Critical) Sensor Emerging Threats A userland hook is set to identify an attempt to modify or disable the Carbon Black Cloud Sensor Tamper Protection - Application attempted to modify Carbon Black Cloud Sensor. MODIFY_SERVICE (Severity: High) Sensor Process Manipulation A userland hook is set to identify applications that attempt to control, create or delete a windows service Application attempted to control, create or delete a windows service. MONITOR_MICROPHONE (Severity: Medium) Sensor Data at Risk A userland hook is set to identify applications attempting to monitor the microphone Application attempted to monitor the microphone. MONITOR_USER_INPUT (Severity: Medium) Sensor Data at Risk A userland hook is set to identify applications attempting to monitor user input Application attempted to monitor user input (keyboard or mouse). MONITOR_WEBCAM (Severity: Medium) Sensor Data at Risk A userland hook is set to identify applications attempting to monitor the onboard camera Application attempted to monitor web camera. NETWORK_ACCESS (Severity: Low) Sensor Network Threat An IPv4 or IPv6 network filter driver has successfully initiated or accepted a network connection Application successfully initiated or accepted a network connection NON_STANDARD_PORT (Severity: None) Sensor Network Threat Network filter driver verifies ports for common protocols. Identifies non-trusted applications from making non-http requests. The process of passing network traffic on an alternative port to which it was assigned by the IANA Internet Assigned Numbers Authority (IANA); for example, passing FTP on port 8081 when it is normally configured to listen on port 21. OS_DENY (Severity: None) Sensor Operating System Action Analytics receives this info from the sensor and sets this value accordingly. The attempted action was denied by the operating system. PACKED_CALL (Severity: Medium) Sensor Emerging Threats A userland hook is set to identify API calls from writeable memory Application attempted a system call from dynamic code (i.e. writable memory & not buffer overflow) PACKED_CODE (Severity: None) Analytics Process Manipulation Depending on the arguments to script interpreters and applications, this is set when the arguments are related to encoding, obfuscating, file-less execution, etc. The process contains unpacked code. PERSIST (Severity: None) Sensor Generic Suspect A file system driver is set to identify registry modifications that enable persistence upon reboot or application removal also known as auto-start extensibility points (ASEP) Persistent application. PHISHING (Severity: None) Sensor Generic Suspect A driver callback is identified where an email application launches a web browser. Email client launching a browser. PHONE_HOME (Severity: Medium) Sensor Network Threat An IPv4 or IPv6 network filter driver is set to identify client connections to a host that had performed a port scan against a Sensor Application attempt to connect back to a scanning host. POLICY_DENY (Severity: Not applicable) Sensor Policy Action The analytics receives this info from the sensor and sets this value accordingly. The attempted action was denied due to policy. POLICY_TERMINATE (Severity: Not applicable) Sensor Policy Action The analytics receives this info from the sensor and sets this value accordingly. The process was terminated due to policy. PORTSCAN (Severity: None) Sensor Network Threat N consecutive scans on different ports from the same host are detected. A port scan is conducted. PRIVILEGE_ESCALATE (Severity: None) Analytics Process Manipulation Is set when the username that is associated with a process changes during the course of execution to "NT AUTHORITY\SYSTEM" or the process has gained the admin privilege. Checks to see whether the actual SYSTEM privilege is associated with the process (not just the username context). PROCESS_IMAGE_REPLACED (Severity: None) Sensor Process Manipulation Userland hooks watch for specific APIs being invoked that involve overwriting of the main executable section of a process, and other related manipulations such as suspending and unmapping sections. Application has had its primary executable code replaced with other code. PUP_APP (Severity: High) Analytics Malware & Application Abuse A hash lookup or local scanner has identified a running executable that has reputation: PUP Application is a Potentially Unwanted Program. RAM_SCRAPING (Severity: Medium) Sensor & Analytics Data at Risk User land hook is set to detect an application's attempt to read process memory. When a process tries to scrape the memory utilized by another process. READ_PROCESS_MEMORY (Severity: Medium) Sensor Data at Risk A userland hook is set to detect applications attempting to read process memory. Application is attempting to read process memory. READ_SECURITY_DATA (Severity: High) Sensor Data at Risk A userland hook is set to detect an application attempting to read privileged security information. Application is attempting to read privileged security information (for example, lsass.exe). REVERSE_SHELL (Severity: High) Sensor & Analytics Emerging Threats A userland hook is set to identify a process that reads from or writes to console via a network connection Command shell (e.g. cmd.exe) interactively receiving commands from a network parent RUN_ANOTHER_APP (Severity: Low) Sensor Malware & Application Abuse A userland hook is set to identify applications that attempt to execute another application. Application attempted to execute another application. RUN_BLACKLIST_APP (Severity: High) Sensor Malware & Application Abuse A userland hook is set to identify applications that attempt to execute RUN_ANOTHER_APP and child_proc is COMPANY_BLACKLIST Application attempted to execute a blacklisted application. RUN_BROWSER (Severity: Low) Sensor Malware & Application Abuse A userland hook is set to identify applications that attempt to execute RUN_ANOTHER_APP & child_proc is a common browser executable Application attempted to execute a browser. RUN_CMD_SHELL (Severity: Low) Sensor Malware & Application Abuse A userland hook is set to identify applications that attempt to execute RUN_ANOTHER_APP and child_proc is a windows shell Application attempted to execute a command shell. RUN_MALWARE_APP (Severity: Critical) Sensor Malware & Application Abuse A userland hook is set to identify applications that attempt to execute RUN_ANOTHER_APP and child process is MALWARE_APP Application attempted to execute a malware application. RUN_NET_UTILITY (Severity: High) Sensor Malware & Application Abuse A userland hook is set to identify applications that attempt to execute RUN_ANOTHER_APP and child target process is a common network utility such as "netsh.exe" Application attempted to execute a network utility application. RUN_PUP_APP (Severity: High) Sensor Malware & Application Abuse A userland hook is set to identify applications that attempt to execute RUN_ANOTHER_APP and child process is PUP_APP Application attempted to execute a PUP application. RUN_SUSPECT_APP (Severity: High) Sensor Malware & Application Abuse A userland hook is set to identify applications that attempt to execute RUN_ANOTHER_APP and child_proc is SUSPECT_APP. Application attempted to execute a application with a suspect reputation. RUN_SYSTEM_APP (Severity: Low) Sensor Malware & Application Abuse A userland hook is set to identify applications that attempt to execute RUN_ANOTHER_APP &and child process is a system app (application or dll located in the "windows", "windows\system32", "windows\sysWOW64", "\windows\WinSxS\**" directories ). Application attempted to execute a systems application. RUN_SYSTEM_UTILITY (Severity: Medium) Sensor Malware & Application Abuse A userland hook is set to identify applications that attempt to execute RUN_ANOTHER_APP and child_proc is a system utility such as regedit. Application attempted to run a system utility (for example, regedit) RUN_UNKNOWN_APP (Severity: None) Sensor Malware & Application Abuse A userland hook is set to identify applications that attempt to execute RUN_ANOTHER_APP and child process is UNKNOWN_APP. Application tried to execute an application with unknown reputation. SCREEN_SHOT (Severity: None) Sensor Data at Risk Win32 API SendInput() is used to synthesize a PrintScreen key press or Win32 API CreateCompatibleBitmap() is called. A screenshot is taken on the machine. SECURITY_CONFIG_DOWNGRADE (Severity: High) Analytics Emerging Threats Windows Firewall or other system security configurations have been changed or downgraded, lowering its security posture. A Windows security configuration has been downgraded. SET_APP_CONFIG (Severity: Medium) Sensor Generic Suspect A userland hook is set to identify apps that modify the registry (Microsoft Office Security keys) or set system application configuration parameters Application set system application configuration parameters. SET_APP_LAUNCH (Severity: Medium) Sensor Generic Suspect A userland hook is set to identify apps that attempt to modify registry to effect when or how another application may be launched (Autoruns key, Run, RunOnce, Load, Shell and Open Commands) Application attempted to modify keys to effect when/how another application may be launched SET_BROWSER_CONFIG (Severity: Low) Sensor Generic Suspect A userland hook is set to identify apps that attempt to modify registry (Install ActiveX controls, Internet Settings, System Certificates, Internet Explorer keys, browser helper objects, COM InProcServer) Application attempted to modify the browser settings. SET_LOGIN_OPS (Severity: Medium) Analytics Emerging Threats Set by monitoring registry modifications to keys related to Win log on process. Application attempted to modify process associated with Win log on or user name. SET_REBOOT_OPS (Severity: Low) Sensor Generic Suspect A userland hook is set to identify apps that attempt to modify registry ( BootExecute, Session Manager File Operations) Application attempted to set reboot configuration operations. SET_REMOTE_ACCESS (Severity: Medium) Sensor Emerging Threats A userland hook is set to identify apps that attempt to modify registry (SecurePipeServers winreg settings, lanman parameters, etc) Application attempted to set remote access configuration. SET_SYSTEM_AUDIT (Severity: High) Sensor Generic Suspect A userland hook is set to identify apps that attempt to modify registry (TaskManager keys, DisableRegistryTools) Application attempted to set the system audit parameters. SET_SYSTEM_CONFIG (Severity: Medium) Sensor Generic Suspect A userland hook is set to identify applications that attempt to modify registry such as Uninstall keys or wallpaper, as well as attempt to modify system configuration data files Application attempted to set system config parameters. SET_SYSTEM_FILE (Severity: None) Sensor Malware & Application Abuse A process attempts to modify the system's master boot record (MBR). An application attempts to directly access the system's hard drive to write data into the MBR portion of the disk. Malware uses this tactic to alter system behavior on startup. SET_SYSTEM_SECURITY (Severity: Medium) Sensor Generic Suspect A userland hook is set to identify apps that attempt to modify registry (Autoruns key, UserInit, Run, RunOnce, Load, BootExecute, AppInit_DLLs, Shell and Open Commands, Uninstall Keys, COM InProcServer, Install ActiveX controls etc.) Application attempts to set or change system security operations. SUSPECT_APP (Severity: High) Sensor & Analytics Malware & Application Abuse A hash lookup or local scanner has identified a running executable that has reputation: SUSPECT. App is also (not signed) Application is suspected malicious by AV. SUSPENDED_PROCESS (Severity: Medium) Sensor Process Manipulation A userland hook is set to identify a process that was created in the suspended state A process created in a suspended state is being modified (pre-execution). SUSPICIOUS_BEHAVIOR (Severity: Medium) Analytics Generic Suspect A userland hook is set to identify applications executing code from dynamic memory (e.g. from a Buffer Overflow or unpacked code) and are making calls to applications which typically do not communicate on the network (e.g. "calc.exe") making network connections, etc. Application unusual behavior warrants attention. SUSPICIOUS_DOMAIN (Severity: High) Sensor & Analytics Network Threat Network filter driver is set to identify when INTERNATIONAL_SITE is an ISO 3166-1 Country Code (e.g. CU, IR, SD, SY, IQ, LY, KP, YE, etc) Application is connecting to a suspicious network domain.(based upon ISO 3166-1 country codes). SUSPICIOUS_SITE (Severity: Medium) Sensor & Analytics Network Threat An IPv4 or IPv6 network filter driver is set to identify accepted connections from a suspicious INTERNATIONAL_SITE (e.g. domains in RU, CN) Application accepts an inbound network connection from a suspicious international site. UNKNOWN_APP (Severity: None) Sensor & Analytics Malware & Application Abuse A hash lookup has identified a running executable that has reputation: not_listed (i.e. unknown). App is also (not signed) Application is unknown reputation. Parent topic: TTPs and MITRE Techniques Previous Page Next Page check-circle-line exclamation-circle-line Translation Error Open MyLibrary close-line In this article TTP Reference Send Feedback Product Download Company About Us Executive Leadership News & Stories Investor Relations Customer Stories Diversity, Equity & Inclusion Environment, Social & Governance Careers Blogs Communities Acquisitions Office Locations VMware Cloud Trust Center COVID-19 Resources Support VMware Customer Connect Support Policies Product Documentation Compatibility Guide End User Terms & Conditions California Transparency Act Statement Twitter YouTube Facebook LinkedIn Contact Sales -------------------------------------------------------------------------------- © 2022 VMware, Inc. Terms of Use Your California Privacy Rights Privacy Accessibility Site Map Trademarks Glossary Help Feedback SHARE × Anyone with the Link can view Copy Link Share Collection ON Share Collection OFF Share on Social Media? Add Note Delete Note × Enter Note Cancel Submit Delete ASK NEW QUESTION × exclamation-circle-line We’re sorry, but we can’t post your question to Communities right now. Try again later, or go directly to VMware Communities and post a question without us. We’ll understand. check-circle-line Your question is posted to Communities. Wait patiently for an answer, or take a look now! Enter Subject Enter Question Product-specific community spaces are hosted in English. If you want to ask a question in another language, visit your global community instead. Global Communities Relevant Tags : Cancel Submit CREATE A VMWARE COMMUNITIES USERNAME × exclamation-circle-line We can’t create a username for you at this time. Please check that your My VMware profile is filled out. If the problem persists, contact support. My VMware| Support check-circle-line Welcome to VMware Communities! exclamation-circle-line Usernames can’t contain spaces or special characters. Try a username with numbers and letters instead. Enter Username Username Available x Username Not Available Cancel Create DELETE × Translation Error " "? Cancel Delete × Cookie Settings We use cookies to provide you with the best experience on our website, to improve usability and performance and thereby improve what we offer to you. Our website may also use third-party cookies to display advertising that is more relevant to you. By clicking on the “Accept All” button you agree to the storing of cookies on your device. If you want to know more about how we use cookies, please see our Cookie Policy. Cookie Settings Accept All Cookies COOKIE PREFERENCE CENTER GENERAL INFORMATION ON COOKIES GENERAL INFORMATION ON COOKIES When you visit our website, we use cookies to ensure that we give you the best experience. This information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies by clicking on the different category headings to find out more and change your settings. However, blocking some types of cookies may impact your experience on the site and the services we are able to offer. Further information can be found in our Cookie Policy. * STRICTLY NECESSARY STRICTLY NECESSARY Always Active Strictly Necessary Strictly necessary cookies are always enabled since they are essential for our website to function. They enable core functionality such as security, network management, and website accessibility. You can set your browser to block or alert you about these cookies, but this may affect how the website functions. For more information please visit www.aboutcookies.org or www.allaboutcookies.org. Cookie Details * PERFORMANCE PERFORMANCE Performance Performance cookies are used to analyze the user experience to improve our website by collecting and reporting information on how you use it. They allow us to know which pages are the most and least popular, see how visitors move around the site, optimize our website and make it easier to navigate. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. * FUNCTIONAL FUNCTIONAL Functional Functional cookies help us keep track of your past browsing choices so we can improve usability and customize your experience. These cookies enable the website to remember your preferred settings, language preferences, location and other customizable elements such as font or text size. If you do not allow these cookies, then some or all of these services may not function properly. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. * ADVERTISING ADVERTISING Advertising Advertising cookies are used to send you relevant advertising and promotional information. They may be set through our site by third parties to build a profile of your interests and show you relevant advertisements on other sites. These cookies do not directly store personal information, but their function is based on uniquely identifying your browser and internet device. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. * SOCIAL MEDIA SOCIAL MEDIA Social Media Social media cookies are intended to facilitate the sharing of content and to improve the user experience. These cookies can sometimes track your activities. We do not control social media cookies and they do not allow us to gain access to your social media accounts. Please refer to the relevant social media platform’s privacy policies for more information. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. Back Button ADVERTISING COOKIES Filter Button Consent Leg.Interest Select All Vendors Select All Vendors Select All Hosts Select All * REPLACE-WITH-DYANMIC-HOST-ID View Third Party Cookies * Name cookie name Clear Filters Information storage and access Apply Confirm My Choices Allow All word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1