| Common password information |
Searches for outbound passwords in plain text |
| Encrypted files - known format |
Searches for outbound transactions comprising common encrypted file formats |
| Encrypted files - unknown format |
Searches for outbound files that were encrypted using unknown encryption formats |
| IT asset information |
Searches for suspicious outbound transactions, such as those containing information about the network, software license keys, and database files. |
| Suspected malware communication |
Identifies traffic that is thought to be malware “phoning home” or attempting to steal information. Detection is based on the analysis of traffic patterns
from known infected machines. |
| Password files |
Searches for outbound password files, such as a SAM database and UNIX / Linux passwords files |