Hello,
We are running ENS 10.7 with ATP and we are seeing a significant number of detections being recorded as with a Threat Target Path that includes: Google Chrome "OneLaunch."
We are trying to pinpoint the reason for these detections? Is there some other reporting option that I can use or add to identify additional information? We are reaching out to clients to determine if they saw any pop messages during the time that the detection occurred. The information that I have is listed below. Any additional advice that can be provided is greatly appreciated.
Threat Name usually begins with a prefix of "ATP/Suspect" or "Real Protect."
Threat Type is usually "Trojan."
Event Category is: Malware detected using heuristics
Event Description is: Adaptive Threat Protection Clean
Threat Target File Path: C:\Users\%userName%\AppData\Local\OneLaunch\4.101.0\chromium\chromium.exe
Solved! Go to Solution.
Hello @Glenn_Bolton
Thank you for reaching out to the support community.
This case requires a more detailed analysis of the logs in order to address specifically which ATP rules are being trigered.
Please proceed to open a malware service request for us to continue the troubleshooting.
Hello @Glenn_Bolton
Thank you for reaching out to the support community.
This case requires a more detailed analysis of the logs in order to address specifically which ATP rules are being trigered.
Please proceed to open a malware service request for us to continue the troubleshooting.
Thank you.,..will do
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.
Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership: