SecurityCategory is used to standardize security categories across products so one event is not categorized as "malware" and another as a "virus".
| Enums | |
|---|---|
| UNKNOWN_CATEGORY | The default category. | 
| SOFTWARE_MALICIOUS | Malware, spyware, rootkit. | 
| SOFTWARE_SUSPICIOUS | Below the conviction threshold; probably bad. | 
| SOFTWARE_PUA | Potentially Unwanted App (such as adware). | 
| NETWORK_MALICIOUS | Includes C&C or network exploit. | 
| NETWORK_SUSPICIOUS | Suspicious activity, such as potential reverse tunnel. | 
| NETWORK_CATEGORIZED_CONTENT | Non-security related: URL has category like gambling or porn. | 
| NETWORK_DENIAL_OF_SERVICE | DoS, DDoS. | 
| NETWORK_RECON | Port scan detected by an IDS, probing of web app. | 
| NETWORK_COMMAND_AND_CONTROL | If we know this is a C&C channel. | 
| ACL_VIOLATION | Unauthorized access attempted, including attempted access to files, web services, processes, web objects, etc. | 
| AUTH_VIOLATION | Authentication failed (e.g. bad password or bad 2-factor authentication). | 
| EXPLOIT | Exploit: For all manner of exploits including attempted overflows, bad protocol encodings, ROP, SQL injection, etc. For both network and host- based exploits. | 
| DATA_EXFILTRATION | DLP: Sensitive data transmission, copy to thumb drive. | 
| DATA_AT_REST | DLP: Sensitive data found at rest in a scan. | 
| DATA_DESTRUCTION | Attempt to destroy/delete data. | 
| TOR_EXIT_NODE | TOR Exit Nodes. | 
| MAIL_SPAM | Spam email, message, etc. | 
| MAIL_PHISHING | Phishing email, chat messages, etc. | 
| MAIL_SPOOFING | Spoofed source email address, etc. | 
| POLICY_VIOLATION | Security-related policy violation (e.g. firewall/proxy/HIPS rule violated, NAC block action). | 
| SOCIAL_ENGINEERING | Threats which manipulate to break normal security procedures. | 
| PHISHING | Phishing pages, pops, https phishing etc. | 

