About Threat Events
Endpoint Detection and Response (EDR) creates a threat event when it identifies malware or potentially unwanted programs (PUPs) on a device. This happens in either Detect Posture or Protect Posture, where the threat is also quarantined. Each threat event includes details such as the threat name, classification, process involved, detection date, and current status. You can find all Threat events on the Threats page for devices linked to Blueprints with EDR. Additionally, these events are viewable on individual device records.How It Works
Threat events are automatically created when Iru Endpoint EDR identifies potential security risks on managed devices. The system organizes threat events in a threat-centric table view, grouping events by file hash for file detections and by detection rule for behavioral detections. This structure simplifies assessing a threat’s impact across your Mac fleet. Each grouped event includes a side panel that provides detailed insights into the threat, enabling security teams to quickly understand the scope and severity of detected threats.Understanding Event Information
Each threat event in the threat-centric table view provides essential information to assist InfoSec teams in investigating threats.- Threat ID: Displays the SHA-256 hash value of the detected threat
- Process: Shows the most recently detected process responsible for the threat
- Classification: Indicates the classification category of the threat event
- Detection Date: Records the date when EDR identified the threat
- Devices: Lists the total number of Mac devices affected by the threat event
- Threat Status: Provides a comprehensive view of all threat statuses—Not quarantined, Quarantined, Resolved, and Released—across all devices for the grouped threat event
Understanding Threat Severity Levels
Iru Endpoint EDR includes severity scoring to help InfoSec teams quickly assess the criticality of detected threats. Each threat event is assigned one of five severity levels: Critical, High, Medium, Low, and Informational. The threats table includes a Severity column that displays the corresponding severity level for each threat. You can sort and filter threat events based on severity for both file detections and behavioral detections. The Threats page also features a threats-by-severity pie chart that provides a visual breakdown of threats organized by their severity levels..png?fit=max&auto=format&n=UzJ56q8TtGBboKzK&q=85&s=ddbc0fb77316e49b65330f0aa09ea791)
Understanding Threat Classifications
Iru Endpoint classifies threats into four categories for file detections—malware, potentially unwanted program (PUP), benign, and unknown—and two categories for behavioral detections: malicious and suspicious.File Detection Classifications
- Malware: This term refers to malicious software designed to harm devices, individuals, or organizations
- Potentially Unwanted Program (PUP): These are applications that might be unwanted on a device. PUPs often use high system resources, affecting performance, displaying unwanted ads, and collecting personal information. Unlike malware, PUPs are not intended to cause harm and are usually installed inadvertently with other software, often found in bundled packages
- Benign: This classification is for files initially flagged as malicious but later determined to be non-malicious after further analysis. If you encounter benign threat events, it might be because the item was in your EDR Library Item block list at the time of detection or quarantine
- Unknown: This category is for files that Iru Endpoint EDR cannot definitively classify as either malicious or benign based on the available data. If you encounter benign threat events, it might be because the item was in your EDR Library Item block list at the time of detection or quarantine
Behavioral Detection Classifications
- Malicious: A classification that refers to a behavioral activity that intends to cause harm
- Suspicious: A classification that refers to behavioral activity that does not immediately indicate harm but warrants attention for further investigation
Understanding Threat Statuses
All threat events will have a status associated with them. The various statuses that a threat event may have are:File Detection Statuses
- Quarantined: A detected threat that was automatically quarantined in Protect posture
- Not Quarantined: A detected threat that was not quarantined in Detect posture
- Released: A threat that was initially quarantined but later released and restored to its original location
- Resolved: A detected threat that is no longer at the last detected file path and was not quarantined by the agent
Behavioral Detection Statuses
- Detected: Malicious behavioral activity was identified but not blocked (Detect posture)
- Blocked: Malicious behavioral activity was identified and blocked (Protect posture)
- Informational: Suspicious behavioral activity was detected and flagged for visibility
Quarantining of Malware and PUP will be determined by the posture mode as configured in the EDR Library Item. Please see Endpoint Detection and Response: Configuring the EDR Library Item for more information on how to configure the posture modes in your environment.
Viewing File Detections
1
Navigate to Threats
In the left-hand navigation bar, navigate to Threats.
2
Select File Detections
Ensure File detections is selected. By default, the Threats page opens to the File detections view.

Viewing Behavioral Detections
1
Navigate to Threats
In the left-hand navigation bar, navigate to Threats.
2
Select Behavioral Detections
Click on Behavioral detections in the top right corner to view behavioral detection events.

Filtering Threat Events
You can filter threat events for both file and behavioral detections based on their status for easier visualization and remediation.1
Set Date Range
Select the Detection Date range for which you’d like to view threat events.
2
Choose Threat Status
Choose the Threat status you want to see in the list; you can select one or multiple.
3
Select Classification
Pick the Classification type.
4
Clear Filters
When you’re finished, click the Clear all button to return to the default view, which shows all statuses for the last 30 days.

Side Panel
The threat-centric table view features a side panel for each grouped event, which can be opened by clicking on a threat event row to access detailed information about that specific threat. For file detections, the side panel includes:- Latest file name associated with the threat
- A global view of all threat statuses—Not quarantined, Quarantined, Resolved, and Released—for the grouped threat event across all devices
- First and last detection dates across all devices.
- Insights on all unique file paths found related to the threat
- The latest process name associated with the grouped event
- A global view of all threat statuses—Detected, Blocked, and Blocked (killed parent)—across all devices.
- A description of the malicious or suspicious activity
- The malware family associated with the behavioral activity
- Informational tags providing additional context
- The first and last detection dates across all devices
Device cards
Device cards in the side panel represent devices where the malicious file was found. For file detections, these cards will display information such as:- Device Name
- Serial Number
- Blueprint and Library Item.
- Malware and PUP Posture Mode
- Actionable Events
-
Threat Event Details:
- Threat Status - The current status of the threat on the device.
- Path - The file path where the threat was detected.
- User - The user associated with the process when the threat was detected.
- Detection Date - The date when EDR identified the threat.
- Quarantine Date - The date when EDR quarantined the threat.
- Resolved Date - The date when the threat was marked as resolved in the web app.
- Release Date - The date when the threat was released from quarantine on the device.
- Application Bundle Path - The path to the application bundle.
- Device name
- Serial number
- Blueprint and Library Item
- Malicious behavioral detection posture mode information
-
Threat event details:
- Threat Status - The current status of the threat on the device.
- Detection date - The date when EDR identified the threat.
- Rule version - Current rule version
-
Parent and target process information:
- Parent and target process name
- Parent and target process ID
- Process owner
- Image paths for parent and target processes
- Command line arguments for parent and target processes
- SHA265 hash of the parent and target processes
Viewing a Device’s Threat Events in the Side Panel
For File Detections
1
Navigate to Threats
On the left-hand navigation bar, navigate to Threats.
2
Open Side Panel
Click on any threat event to open the side panel.
3
View Device Cards
In the Devices tab, view the device cards for all devices where the malicious hash was detected. Click any device card to expand it and view associated threat events.
For Behavioral Detections
1
Navigate to Threats
In the left-hand navigation bar, navigate to Threats.
2
Select Behavioral Detections
Click on Behavioral detections in the top right corner to view behavioral detection events.
3
Open Side Panel
Click on any threat event to open the side panel.
Rechecking the Status of a Threat
When the Malware or PUP posture modes are set to Detect, you can manually check a threat’s status in the side panel to see if it’s still present at the file path. If the threat is no longer there, its status will update from ‘Not quarantined’ to ‘Resolved.’ If the threat is still present, its status will remain unchanged.1
Navigate to Threats
On the left-hand navigation bar, navigate to Threats.
2
Open Side Panel
Click on any threat event to open the side panel.
3
Expand Device Card
Click the desired device card to expand it and view the device’s threat events.
4
Recheck Status
Click Recheck status.

When threats are initially detected and removed from a device, their status will change from Not quarantined to Resolved once the Malware or PUP posture modes in the EDR Library Item are set to Protect mode. This update also occurs when a new Blueprint with these settings is applied to the device.
Releasing a Threat Event
There might be situations where InfoSec teams need to release a threat event for specific files or applications that were mistakenly quarantined, such as a security tool or application used by the organization. Releasing a threat event involves adding the item to the Allow list for the associated EDR Library Item.The threat event release action will only apply to the Blueprints assigned to the EDR Library Item. Releasing a threat will release it from all Mac computers where the threat has been detected.
1
Navigate to Threats
On the left-hand navigation bar, navigate to Threats.
2
Open Side Panel
Click on any threat event to open the side panel.
3
Expand Device Card
Click the desired device card to expand it and view the device’s threat events.
4
Initiate Release
Click Release threat.
5
Enter Item Name
Enter an Item Name.
6
Add Internal Note
Optionally, enter an internal note stating why the threat event is being released.
7
Confirm Release
Type RELEASE to release the threat.
8
Complete Release
Click Add and Release to add the threat to your Allow list and release the threat.


Performing a VirusTotal Search
VirusTotal is a powerful tool that provides in-depth analysis and insights into files and URLs. The web app includes a convenient feature for searching hashes within VirusTotal, allowing you to access additional contextual information directly from a threat event entry without leaving the app.1
Navigate to Threats
On the left-hand navigation bar, navigate to Threats.
2
Access Actions Menu
Click the ellipsis located on the far right of the desired threat event.
3
Search VirusTotal
Click Search VirusTotal to search the hash in VirusTotal.

Iru Endpoint EDR may classify certain hashes as malware or PUP, even if VirusTotal has no detections on them or considers them non-malicious; this is expected due to Iru Endpoint EDR’s utilization of multiple threat sources.
Exporting Threat Events in CSV
In addition to using the Iru Endpoint API, InfoSec and IT teams can export the list of threat events directly from the admin console. The export icon in the threat-centric view applies the current filter settings and generates a CSV file with detailed information about each Threat event in separate columns. This feature is available in both the main Threats module view and the Threats tab under Device Record.1
Navigate to Threats
On the left-hand navigation bar, navigate to Threats.
2
Select Detection Type
Select either File detections or Behavioral detections.
3
Export Data
Click the Export icon on the far right of the threat events list view. A CSV export file will download automatically.
Considerations
- Threat Classification: Understand the difference between file detection classifications (malware, PUP, benign, unknown) and behavioral detection classifications (malicious, suspicious) for proper threat assessment
- Status Management: Regularly review and update threat statuses to maintain accurate security posture and ensure proper remediation tracking
- Severity Prioritization: Use severity levels (Critical, High, Medium, Low, Informational) to prioritize threat response efforts and allocate resources effectively
- Posture Configuration: Ensure EDR Library Items are properly configured with appropriate posture modes (Detect vs. Protect) based on your security requirements
- Threat Investigation: Utilize the side panel and device cards to gather comprehensive information about threats, including file paths, user context, and detection timelines
- False Positive Management: Be prepared to release legitimate applications that may be mistakenly quarantined, using the threat release process with proper documentation
- External Validation: Use VirusTotal integration to cross-reference threat intelligence and validate threat classifications
- Data Export: Leverage CSV export functionality for threat analysis, reporting, and integration with other security tools
- Bulk Operations: Consider using bulk actions for efficient threat management when dealing with widespread threats across multiple devices
- Regular Monitoring: Establish regular review processes for threat events to ensure timely response and proper classification of security incidents