{UUID} {decodedUUID}
Lookout Logo
Your Name

Security Analyzer Results

{pass count} Tests Pass
{fail count} Tests Fail
Lookout logo

Cybersecurity Analyzer Report

Section 1

Content Inspection & Malware Detection

1.1

Executable File Detection

Pass

To assess the system's ability to detect potentially harmful executable files that could compromise system integrity, simulate downloading an executable file from a public website.

Recommendations

  • Update your security policy to block the downloads of executable files from any website.
  • Deploy a solution that helps enforce this policy and protect you from external threats.
1.2

Malware Detection

Pass

To evaluate the system's ability to detect and prevent the installation of malicious software, safeguarding the system from potential data breaches and unauthorized access, attempt to download a known virus (Eicar) from a public website.

Recommendations
  • Update your security policy to block malware downloaded from any website.
  • Deploy a solution that helps detect malware effectively, enforces this policy and protects you from external threats.

1.3

Multi-Layered Malware in ZIP File Detection

Pass

To assess the system's capability to detect this multi-layered threat, try to download a virus (Eicar) from a publicly accessible archive contained within a ZIP file with multiple layers. Detecting such threats is crucial for preventing complex malware attacks that could exploit vulnerabilities within the system, potentially leading to data breaches and system compromise.

Recommendations
  • Update your security policy to block malware downloaded from any website.
  • Deploy a solution that helps detect malware embedded under multiple layers of a zip file, enforce this policy and protect you from external threats.
1.4

Infected PDF Detection

Pass

To evaluate the system's ability to detect malware embedded in Office or PDF documents, preventing complex malware attacks that could exploit vulnerabilities within the system, try to download a virus (Eicar) from a publicly accessible archive contained within a PDF file.

Recommendations
  • Update your security policy to block malware embedded in any document downloaded from any website.
  • Use a web proxy that can detect malware embedded in Office or PDF documents.
  • Deploy a solution that has integration with threat engines and can detect malware in any form,  effectively enforces this policy across all users and protects you from external threats.
** SAMPLE ONLY **
Please run CyberSecurity Analyzer to generate a full report