Skip to main content
Version: 2.12.0

Detection Types

Threat Detection

Dell Cyber data security identifies and responds to these threat categories. For details on how threat detection works, see the Threat Detection Overview documentation.

Threat CategoryTypeCategoryDescription
Data Creation and DeletionRansomwareData Encryption and ManipulationCreation of new encrypted data while removing original data
Data EncryptionRansomwareData Encryption and ManipulationCreation of new encrypted data with specific extension while removing original data
Data RenamingRansomwareData Encryption and ManipulationReading data followed by bulk file renaming
Security Guard Simulated AttackSystemSystem FunctionsAutomated self-test that simulates an attack to verify system functionality
Suspicious ExtensionRansomwareSuspicious ActivitiesFile operations with extensions associated with ransomware (.blacksuit, .locky, .zzz)
Mass DeleteData LossDestructive ActionsMultiple files or objects deleted from a single location
Data Loss PreventionData TheftSuspicious ActivitiesExceeded access threshold for Data Loss Prevention triggers
Honeypot ActivitySuspiciousSuspicious ActivitiesInteraction with honeypot files serving as tripwires across the file system
Data OverwriteRansomwareData Encryption and ManipulationReading data followed by bulk overwriting of the same files
Multi-Extension File ModificationRansomwareData Encryption and ManipulationReading data followed by renaming files to multiple different extensions
Data EncryptionRansomwareData Encryption and ManipulationActivity matching known encryption patterns resulting in new encrypted data
Data OverwriteRansomwareData Encryption and ManipulationReading data followed by overwriting the same objects
Encryption Key ChangeRansomwareData Encryption and ManipulationCopying data with a new encryption key
Data EncryptionRansomwareData Encryption and ManipulationCopying/uploading encrypted objects then deleting previous versions
Data DeletionData LossDestructive ActionsBulk deletion of objects or buckets