A realistic example of suspicious activity antivirus often ignores

Most real security incidents don’t start with a loud alert.
They start quietly, with something that could be normal… or could be the first sign of trouble.
Let’s walk through a realistic example.
No malware samples.
No red-team theatrics.
Just something that happens on real machines every day.
The scenario: a normal Windows machine
Imagine a Windows 11 desktop or laptop used for everyday work.
Antivirus is enabled (Defender, Norton, etc.)
System is up to date
User installs software occasionally
Nothing obviously malicious has happened
This is a very normal environment.
Step 1: A legitimate installer runs
The user installs a common application, say a code editor or utility.
During installation:
An installer executable runs
Temporary files are extracted
Child processes are launched
This is expected behaviour.
Antivirus is happy.
Step 2: A process runs from a temporary folder
As part of the install, a process runs from a path like:
C:\Users\Dean\AppData\Local\Temp\is-RB20M.tmp\
The filename looks long and random.
The path is user-writable.
The process name isn’t something the user recognises.
Still, this happens all the time during installs.
What antivirus sees
File hash not known to be malicious
No exploit behaviour
No obvious payload
So antivirus does nothing.
And that’s reasonable.
Step 3: PowerShell is launched
Shortly after, PowerShell starts.
It’s:
A legitimate Windows binary
Located in
System32Frequently used by installers and tools
Again, antivirus stays quiet.
Nothing here is definitively malicious.
Why antivirus ignores this (and why that’s not wrong)
Traditional antivirus is designed to answer one main question:
“Is this file known to be bad?”
In this scenario:
The files are legitimate
The binaries are trusted
There’s no signature match
From an AV point of view, there’s nothing to block.
And blocking it could cause false positives and break installs.
The problem: context is missing
What antivirus doesn’t surface is context.
Questions like:
Why did this process run from a temporary directory?
What launched it?
Is this normal for this device?
Has this pattern been seen here before?
That’s where blind spots appear.
What FortiSense surfaces instead
FortiSense doesn’t immediately say “this is malware”.
Instead, it surfaces explainable signals.
For example:
A legitimate binary running from a temporary directory
A parent–child process chain showing how it started
Whether this behaviour has been seen on this device before
Why the activity is considered unusual
The alert doesn’t say “danger”.
It says “this is worth looking at”, and explains why.
What the user actually sees
Instead of a vague warning, the user sees:
What ran: the exact process name
Where it ran from: a temp directory
How it started: the parent process
Why it scored risk: unusual execution path
All in plain language.
No reverse engineering required.
Step 4: The user makes a decision
At this point, the user can decide:
“Yes, this was a legitimate install, ignore it going forward.”
“This shouldn’t be happening, quarantine it.”
The tool doesn’t force an action.
It gives enough context to make a confident choice.
Over time, false positives are reduced because:
Trusted patterns are learned
Noise is explicitly suppressed
Only genuinely unusual behaviour stands out
Why this matters in the real world
Many real attacks start by:
Using legitimate binaries
Running from writable locations
Blending into normal system activity
They don’t trip antivirus immediately, and sometimes never do.
The goal isn’t to panic on every anomaly.
It’s to surface the early signals that are otherwise invisible.
FortiSense’s role
FortiSense exists to answer a different question than antivirus:
“Is this behaviour normal for this system, and if not, why?”
It’s not trying to replace AV.
It’s not trying to be a full EDR.
It’s there to give you early, explainable visibility, before things escalate.
Closing thought
Most suspicious activity doesn’t look suspicious at first glance.
That’s why context matters.
FortiSense doesn’t shout.
It explains.
And that difference is often what turns “nothing to see here” into “glad we caught that early.”
Join Founders Access for beta features and direct support during development.
Learn more →