Getting Started with Security Events

Introduction

The WithSecure™ Security Events API provides access to real-time security event data from your protected endpoints. Security events are generated by various product features when they detect, block, or report security-related activities.

This guide provides an overview of the types of security events you can expect to receive from different product features in the WithSecure™ Elements platform.

For detailed API documentation, see the Security Events API Reference.

Security events

The following table shows the different product features and the types of security events they generate:

Product featuresEvent types
Real-time protectMalware / spyware detected, certain action was taken
DeepGuardMalware / suspicious application / riskware / rare application / ransomware blocked System / another process configuration attempt blocked Network access for an application was blocked
On-demand scanning (scheduled or manually triggered)Malware / spyware detected, certain action was taken
AMSI (antimalware scan interface)Malware / spyware blocked
FirewallFirewall blocked a connection
Browsing protectionHarmful / suspicious page blocked based on reputation score
Connection controlNetwork connection blocked
Web content controlPage belonging to certain category blocked
Web traffic scanningWeb page / binary blocked
Application controlApplication / module / installer start operation blocked Application start operation reported File access blocked File access reported App control rule is misconfigured
DataGuardAccess to file blocked / Access to file reported
Device controlDevice blocked Read / write access to mass storage device blocked Binary execution from mass storage device blocked
Integrity checker (Linux)File modification reported
Tamper protectionFile / registry / service modification attempt blocked Uninstallation operation was blocked
Server Share ProtectionPrevented malicious modification on the server

Understanding Security Events

Each security event contains detailed information about:

  • Event type - The specific security action that occurred
  • Timestamp - When the event was detected
  • Source information - Which endpoint generated the event
  • Event details - Specific context about the security incident

Next Steps

  1. Explore the API: Review the Security Events API Reference for complete endpoint documentation
  2. Set up monitoring: Configure your systems to consume security events via the API
  3. Implement filtering: Use API parameters to filter events based on your specific needs
  4. Create integrations: Build custom integrations with your SIEM or security tools