Skip to content

Deal with exploits

This is what happens when we detect an exploit.

If you know a detection is a false positive, see Deal with false positives.

When an exploit is detected, the following things happen:

  • The exploit is stopped.
  • The user is notified.
  • A scan checks all processes in memory for suspicious behavior.
  • A threat graph is generated.

What you should do

Go to Threat Analysis Center > Threat Graphs and review the graph details to find out where the attack started, how it spread, and which processes or files it affected.

Often a user has downloaded or authorized an application that gave an attacker access. To avoid this, give users training in safe browsing.