Loaded Modules (DLLs)

Here is the list of all DLLs loaded by this process.

You can select all DLLs available on the screen or select individual one and Mark as Safe, Mark as Unsafe, Block, Unblock, Mark as Inspected, Mark as Uninspected them, or click Seen On button to get the list of computers on which these DLLs were seen on by using the buttons located at the bottom of the screen.


Right-click module name or left click anywhere else on the row to bring up a context menu with the following options:

Details—Same as Executable Details when clicking the name of the executable.

Details(New Tab)—Redirect to Executable Details, but in the new tab

Statistics—Redirect to the Statistics of that particular module

Detections—Redirect to the Detections list of that particular module

Seen On—Redirect to the Seen On tab

Sources—Redirect to the Sources tab

Mark as Safe—Safe state, which is used by many rules to determine the risk. Mark as Safe does have an impact on detections. Mark as Safe does not necessarily guarantee that a particular module will never be included in detections. There are a few hundred rules, and some raise detections, regardless of which module executed the suspicious action. For example, a popular instance, trusted modules as powershell can do it. Other rules try to evaluate risk on the basis of the module. Such rules take “safe” flag into consideration. This flag means that the user analyzed the module, and it is unlikely that the module is malicious, so rules assume that the risk is lower during the evaluation

Mark as Unsafe—If you marked as safe some executable by mistake, you can use this to unmark it

Block—Redirect to Block Hashes section

Unblock—Hash from Blocked Hash section is removed

Mark as Inspected—does not have an impact on detections. The module can be marked this way if Security Admin/Reviewer checked them, knows the source of the module, and what it does, but he is still unsure whether the module is safe (he can let to decide higher rank colleague or so)

Mark as Uninspected—will mark the executable as uninspected by the logged user. You can also use the button at the bottom of the page

Download File—The download window for the affected DLL appears

Tags—used to tag the computer. After choosing this option, a new window for tag edition opens. In the Select field, you can type a new tag or select an already existing one. You can also use the button at the bottom of the screen to show the list of assigned tags

Display Absolute/Relative Time—Absolute time will show the time in format DD/MM/YYYY HH:MM:SS. Relative time will show the time in the format minutes/hours/months in relation to present time, like "15 minutes ago" or "6 days ago"

Filter—you can find these quick filters, depending on the column:

oShow only this—Shows only records, based on this particular value

oHide this—Hides all records based on this particular value

oShow before—shows only records that are before this value (for example, time)

oShow after—shows only records that are after this value (for example, time)

oShow lower—Shows only records, which value is lower than this particular one

oShow higher—Shows only records, which value is higher than this particular one


Tagging is an additional form of filtering that can connect multiple objects through multiple views (computer, executable, event filter, etc.). If available, the tag icon Tag_Panel is on the left side, next to the name of the view. In the Computers view, the tag panel can be accessed by clicking the Three_dots icon. In the opened tag panel, all created tags are listed and ready to use. If the list of tags is already too long, you can use the magnifying glass to search for a specific tag. At the top of the screen, the TAGS selector can be used to select the desired tags. If available, the user can use also TAGS button located at the bottom of the screen among action buttons.

Additional filters

The additional filters are accessible by clicking the ADD FILTER button or clicking on a space next to the add filter button, where the list of available filters shows. The user can search filter by typing its name or selecting from the list. For the definitions of the additional filters, follow here.

Some of the filters have a funnel icon next to them with two or four possible predefined options:

Unknown—the value in the filtered column is not available (probably not a known value at the time of occurrence)

Known—the value is available

None—value is an empty string

Any—the value is not empty. The negation of None filter

If present on the screen you, can refresh the table by clicking the refresh iconAlarms_Refresh. If available, the export icon Export_CSV can be used to export the table grid to CSV format and use it in other applications to work with the list.

If present, click the PRESETS button to manage filter sets. These options are available:

Save filters—allows you to save the actual filter set. Select the check box Include the visible columns and sorting to save also this setting of your selection, otherwise when loading saved filter without this option selected will end up by showing you the default column setting

Reset filters—resets active filter and return to default filter setting with default column setting

Reset view—resets the active view without resetting the filter set

Manage—allows you to manage your filter sets

Save Filters as Rule—if available, allows you to save the filter as a rule. You can find it then in the list of rules under the Detection rules sub-tab of the admin tab


Columns can be reorganized by using the Columns_Move icon that appears on the right side of the column name when you hover the mouse over the column name.

The width of the column can be re-sized by the Column_Resize icon that appears on the left side of the column name when you hover the mouse over the column name.

The order of the columns can be organized by clicking the name of the column:

Default (No icon)

Ascending Column_Ascending

Descending Column_Descending

You can change which columns are displayed after clicking the gear icon and selecting the Select column option, or you can reset the view to default by clicking the Reset columns option. You can use Enter quick search pattern—here, you can search for the column by typing its name or a couple of letters from it. Useful if the list of columns is long. For the definitions of the columns follow here.

The process tree on the right side—The process tree reflects the parent-child relationship between processes where child processes are shown directly beneath their parent and right-indented. Processes that are on the left are orphans, and their parent has exited.