The Compromised Host Security Use Case is a Logger solution that provides resources to investigate

whether a host is compromised, using information from Arcsight Logger and Arcsight Events. The

solution tracks each of the following phases of the attack lifecycle:

  • Reconnaissance
  • Gaining access
  • Maintaining access
  • Cover track hiding
  • A set of Logger Saved Searches provides the tools used in the Security Use Case.

Suggested apps

Suggested for you are based on app category, product compatibility, popularity, rating and newness. Some apps may not show based on entitlements. Learn more about entitlements.


Arcsight Solution Logger Compromised Host
204.6 KB
Aug 22, 2018
More info Less info
Product compatibility
Version 6.1 · 6.2 · 6.3 · 6.4
Release notes

Micro Focus rebranding changes



Unsubscribe from notifications

You are receiving release updates for this item because you have subscribed to the following products:
If you unsubscribe, you will no longer receive any notifications for these products.
Tip: to update your subscription preferences, go to Manage Subscriptions from your Dashboard, uncheck the products you no longer want to receive notifications for, and click 'Save'.

Marketplace Terms of Service

In order to continue, you must accept the updated Marketplace Terms of Service
Since you are downloading an app from the OpenText Marketplace, you need to accept the updated Marketplace Terms of Service before you can continue. Use the link to review the Marketplace Terms of Service. Once complete check the, "I accept the Marketplace Terms of Service" box below and click accept to continue your download.

Your download has begun...

Your download has begun

Related content and resources

Your browser is not supported!

Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox

release-rel-2024-5-1-6172 | Mon Jun 24 04:52:54 PDT 2024