Navigating Detect & Respond
Verimatrix XTD Detect & Respond provides insights into the risk assessment of protected apps that your users are running on their devices.
Detect & Respond is available to Verimatrix XTD users. If you do not have access, you can upgrade your account through the Platform.
When you protect an app with XTD, it is automatically added to the Detect & Respond service.
Detect & Respond informs you of risky app instance behaviors at a glance and to optionally respond to detected risky events:
- See the health of your system in the status bar
- Filter your risk detections
- Detect risks in Dashboard view
- Respond to risks with Table view
Detect & Respond
On the left sidebar in the XTD menu, select Detect & Respond.
Detect & Respond is your entry point to see the state of all your protected app instances. It allows you to identify devices running your apps that are performing potentially risky activity.
The Detect & Respond display includes:
- Status bar showing the last 30 days' events, event datastream 10 day bar graph, and health rating for last 30 days
- Dashboard/Table selection, Display results time range setting, filter
- Dashboard view or Table view
Status Bar
The status bar shows a summary of the last 30 days' events over all your apps:
Event Datastream
The event datastream is a representative graph of all events of every risk level, including informational, that occurred over the last 30 days.
Health Rating
Health rating is calculated from the number of threat detections and the total number of events over the last 30 days. As the proportion of threats rises, the system is considered less healthy. Health may be Healthy, Medium, or Unhealthy.
The equation is:
Health Rating = 1 - (Detections) / (Detections + Informational Events)
The score ranges from 0 to 1 but is mapped to a scale of 1 to 10 to make it clearer visually. The higher the score, the healthier your instances.
Dashboard/Table Selection
The view includes a graphical view and a detailed table view. The default view is the graphical (Dashboard) view. To switch between these, click the Dashboard View or Table View tab.
Display Results
By default, Detect & Respond shows the results for the last hour, automatically refreshed every minute. You can change these values to the right of the Dashboard and Table tabs, affecting everything on Detect & Respond except for the status bar which always shows the last 30 days.
Filter
The Filter allows selection of a range of values to filter the data on, such as risk level, App ID, country, OS version, or phone manufacturer.
You can see active filters below the view selection bar. From there, you can also remove individual filters or reset all filters.
To open the filter popup, click Filter and select from the provided options. The filter affects the entire Detect & Respond screen. You can apply one or more filters simultaneously from both the instance and device characteristic sections.
Click Apply to update the dashboard with your selected filters.
Click Clear Filters to set all filters to their default, including the time range and refresh rate. On the main screen, you can clear an individual filter by clicking X next to the filter name.
Filters are either Instance filters or Device filters:
Instance
Set of filters for filtering instance characteristics
Threat - Filters instances by threat detection type. For detailed descriptions of these threats and recommended responses, refer to Risk Detections Quick Guide.
- Rooting - The device has been rooted or jailbroken
- Hooking - Hooking tools which allow insertion of code at run time have been detected
- Tampering - A modification to the protected app's code has been detected
- Debugger - A debugger has been attached to the device running the app instance
- Overlay - GUI elements have been added on top of the app's GUI
- Bootloader Unlock - Custom firmware images can be installed on the device to bypass security
- Accessibility Malware - A specific kind of overlay attack
- Emulator - The protected app is running on an emulator, not a real device
- VPN - A Virtual Private Network is in use on the device
- Proxy - A proxy was detected in the internet connection between the app and the server
- MITM - Man-in-the-Middle attack. Data is being intercepted between the app and the server
Package ID - Filter by instance package ID
App - Filter instances by protected app name
Risk Level - Filter instances by high, suspicious, low, or informational risk
Country - Filter by geographic location of the app instance
App Instance - Filter by the unique identifier of the app installed on a user's device
Device - Filters by reported device characteristics
OS - Filter by OS type (iOS or Android)
OS Version - Filter by exact OS version (for example, iOS 13.0)
Manufacturer - Filter by device manufacturer
Model - Filter by device model
Updated about 2 months ago