We are running ENS 10.7 with ATP and we are seeing a significant number of detections being recorded as with a Threat Target Path that includes: Google Chrome "OneLaunch."
We are trying to pinpoint the reason for these detections? Is there some other reporting option that I can use or add to identify additional information? We are reaching out to clients to determine if they saw any pop messages during the time that the detection occurred. The information that I have is listed below. Any additional advice that can be provided is greatly appreciated.
Threat Name usually begins with a prefix of "ATP/Suspect" or "Real Protect." Threat Type is usually "Trojan." Event Category is: Malware detected using heuristics Event Description is: Adaptive Threat Protection Clean Threat Target File Path: C:\Users\%userName%\AppData\Local\OneLaunch\4.101.0\chromium\chromium.exe
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.
Community Help Hub
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.