How to use ShredTheSystem
Last Modified: 2024-02-01 08:39:16 Etc/GMT
Affected Products
Languages:
This article is available in the following languages:
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
As of May 14, 2024, Knowledge Base (KB) articles will only be published and updated in our new Trellix Thrive Knowledge space.
Log in to the Thrive Portal using your OKTA credentials and start searching the new space. Legacy KB IDs are indexed and you will be able to find them easily just by typing the legacy KB ID.
How to use ShredTheSystem
Technical Articles ID:
KB73939
Last Modified: 2024-02-01 08:39:16 Etc/GMT Environment
SIEM Enterprise Security Manager (ESM) 11.x SIEM Event Receiver (Receiver) 11.x Summary
When you erase a file, the data isn't destroyed. Only the index listing where the file is stored is destroyed, and the storage is made available for reuse. On a busy system with a nearly full drive, this space can get overwritten and reused in a few seconds. But, there's no way to know with certainty that overwriting has occurred. Shred is a U.S. government (Department of Defense) approved secure hard disk erasure tool. Shred lets you delete information permanently by overwriting data numerous times (25 times by default), which makes shredded data nearly impossible to reclaim. A shell script called
Command-line parameters
Previous Document ID (Secured)
NitroSecurity ID:15094-53
Affected ProductsLanguages:This article is available in the following languages: |
|