Lumension® Endpoint Intelligence Center

Lumension® Endpoint Intelligence Center

Accurate. Current. Accessible.


File Lookup

Upload a binary file:
Or provide a hash file:
SHA-1 hash:
MD5 hash:
SHA-256 hash:


Learn More »

Malware Analysis

Upload a suspect file:

Provide your email address:
Email:  Why?

Learn More »

Application Scanner

Discover all applications and executables in your environment »

Device Scanner

Discover all removable storage devices used in your environment »

Vulnerability Scanner

Discover all OS and application vulnerabilities in your environment »

Threats

Risk Name Type
MEDIUM
WORM
MEDIUM
TROJAN
LOW
TROJAN
LOW
WORM
MEDIUM
WORM

Vulnerabilities

Score CVE Id Summary
4.0
Unspecified vulnerability...
9.0
Unspecified vulnerability...
4.0
Unspecified vulnerability...
9.0
Unspecified vulnerability...
9.3
Unspecified vulnerability...

Patches

Impact Identifier Summary
Critical - 01
F-Secure Anti-Virus DEF F...
Critical - 01
Sophos Anti-Virus IDE fil...
Critical - 01
Sophos Anti-Virus IDE fil...
Critical - 01
Sophos Anti-Virus IDE fil...
Critical - 01
Windows Defender Definiti...

File Lookup

Upload a binary file:
Or provide a hash file:
SHA-1 hash:
MD5 hash:
SHA-256 hash:


Malware Analysis

Upload a suspect file:

Provide your email address:
Email:  Why?


Last Updated: 20 Oct 2014 10:09:01