Which Cyber Alert categories are there?

Modified on Tue, 02 May 2023 at 04:20 PM

We do the triage for alerts so that we can give the report the correct category. This happens completely automatically. This gives you a clear overview of what is happening.

 

There are five different priorities. In the overview below, you can see how the priorities are divided and which categories Cyber Alerts belong to.

 

Please note that the overview of the Cyber Alerts categories may change. Guardey scans all internet traffic, and technology and cybercriminals are developing rapidly. It is therefore possible that new categories are added.

 

Priority 1 (Urgent)

By Cyber Alerts with priority 1, we mean the following Cyber Alerts:

  • Blacklisted Hostnames and URLs
  • Botnet Controller
  •  Malware-Specific Behavioral Heuristics
  • Sinkhole
  • Tor Network

 

Priority 2 (High)
By Cyber Alerts with priority 2, we mean the following Cyber Alerts:

  • Disguised executable
  • Mining pool
  • Path traversal
  • Periodic heartbeats
  • Port scan
  • Web shells

 

Priority 3 (Moderate)
By Cyber Alerts with priority 3, we mean the following Cyber Alerts:

  • Adware
  • Bad Internet Neighborhood
  • BitTorrent tracker
  • Cloud Storage Service
  • File Sharing Tool
  • File Sharing
  • Instant messaging
  • Public proxy
  • Remote management

 

Priority 4 (Low)
By Cyber Alerts with priority 4, we mean the following Cyber Alerts:

  • Geofence

 

Priority 5 (Info)
By Cyber Alerts with priority 5, we mean the following Cyber Alerts:

  • Domain Parker
  • Dynamic DNS domains
  • Fee hosting domains
  • IP self-monitoring service


Note! If you have a priority 1 (urgent) or priority 2 (high) alert, you must have these alerts investigated by your IT partner.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article