update icons

This commit is contained in:
jcaparas 2018-04-03 10:35:58 -07:00
parent 4b83e1ec5c
commit 00694388a2
11 changed files with 17 additions and 17 deletions

View File

@ -1,6 +1,6 @@
--- ---
title: Advanced hunting best practices in Windows Defender ATP title: Advanced hunting best practices in Windows Defender ATP
description: Learn about advanced hunting best practices such as what filters and keywords to use to effectively query data. description: Learn about Advanced hunting best practices such as what filters and keywords to use to effectively query data.
keywords: advanced hunting, best practices, keyword, filters, atp query, query atp data, intellisense, atp telemetry, events, events telemetry, azure log analytics keywords: advanced hunting, best practices, keyword, filters, atp query, query atp data, intellisense, atp telemetry, events, events telemetry, azure log analytics
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Advanced hunting reference in Windows Defender ATP title: Advanced hunting reference in Windows Defender ATP
description: Learn about advanced hunting table reference such as column name, data type, and description description: Learn about Advanced hunting table reference such as column name, data type, and description
keywords: advanced hunting, atp query, query atp data, intellisense, atp telemetry, events, events telemetry, azure log analytics, column name, data type, description keywords: advanced hunting, atp query, query atp data, intellisense, atp telemetry, events, events telemetry, azure log analytics, column name, data type, description
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Query data using Advanced hunting in Windows Defender ATP title: Query data using Advanced hunting in Windows Defender ATP
description: Learn about advanced hunting in Windows Defender ATP and how to query ATP data. description: Learn about Advanced hunting in Windows Defender ATP and how to query ATP data.
keywords: advanced hunting, atp query, query atp data, intellisense, atp telemetry, events, events telemetry, azure log analytics keywords: advanced hunting, atp query, query atp data, intellisense, atp telemetry, events, events telemetry, azure log analytics
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10
@ -32,10 +32,10 @@ Advanced hunting allows you to proactively hunt for possible threats across your
- **Powerful query language with IntelliSense** - Built on top of a query language that gives you the flexibility you need to take hunting to the next level. - **Powerful query language with IntelliSense** - Built on top of a query language that gives you the flexibility you need to take hunting to the next level.
- **Query the stored telemetry** - The telemetry data is accessible in tables for you to query. For example, you can query process creation, network communication, and many other event types. - **Query the stored telemetry** - The telemetry data is accessible in tables for you to query. For example, you can query process creation, network communication, and many other event types.
- **Links to portal** - Certain query results, such as machine names and file names are actually direct links to the portal, consolidating the advanced hunting query experience and the existing portal investigation experience. - **Links to portal** - Certain query results, such as machine names and file names are actually direct links to the portal, consolidating the Advanced hunting query experience and the existing portal investigation experience.
- **Query examples** - A welcome page provides examples designed to get you started and get you familiar with the tables and the query language. - **Query examples** - A welcome page provides examples designed to get you started and get you familiar with the tables and the query language.
To get you started in querying your data, you can use the basic or advanced query examples that have some preloaded queries for you to understand the basic query syntax. To get you started in querying your data, you can use the basic or Advanced query examples that have some preloaded queries for you to understand the basic query syntax.
![Image of Advanced hunting window](images/atp-advanced-hunting.png) ![Image of Advanced hunting window](images/atp-advanced-hunting.png)
@ -45,7 +45,7 @@ A typical query starts with a table name followed by a series of operators separ
In the following example, we start with the table name **ProcessCreationEvents** and add piped elements as needed. In the following example, we start with the table name **ProcessCreationEvents** and add piped elements as needed.
![Image of Windows Defender ATP advanced hunting query](images/advanced-hunting-query-example.png) ![Image of Windows Defender ATP Advanced hunting query](images/advanced-hunting-query-example.png)
First, we define a time filter to review only records from the previous seven days. First, we define a time filter to review only records from the previous seven days.
@ -74,9 +74,9 @@ To see a live example of these operators, run them as part of the **Get started*
For more information on the query language and supported operators, see [Query Language](https://docs.loganalytics.io/docs/Language-Reference/). For more information on the query language and supported operators, see [Query Language](https://docs.loganalytics.io/docs/Language-Reference/).
## Use exposed tables in advanced hunting ## Use exposed tables in Advanced hunting
The following tables are exposed as part of advanced hunting: The following tables are exposed as part of Advanced hunting:
- **AlertEvents** - Stores alerts related information - **AlertEvents** - Stores alerts related information
- **MachineInfo** - Stores machines proprties - **MachineInfo** - Stores machines proprties
@ -126,23 +126,23 @@ These steps guide you on modifying and overwriting an existing query.
2. Select **Delete** and confirm that you want to delete the query. 2. Select **Delete** and confirm that you want to delete the query.
## Result set capabilities in advanced hunting ## Result set capabilities in Advanced hunting
The result set has several capabilities to provide you with effective investigation, including: The result set has several capabilities to provide you with effective investigation, including:
- Columns that return entity-related objects, such as Machine name, Machine ID, File name, SHA1, User, IP, and URL, are linked to their entity pages in the Windows Defender ATP portal. - Columns that return entity-related objects, such as Machine name, Machine ID, File name, SHA1, User, IP, and URL, are linked to their entity pages in the Windows Defender ATP portal.
- You can right-click on a cell in the result set and add a filter to your written query. The current filtering options are **include**, **exclude** or **advanced filter**, which provides additional filtering options on the cell value. These cell values are part of the row set. - You can right-click on a cell in the result set and add a filter to your written query. The current filtering options are **include**, **exclude** or **advanced filter**, which provides additional filtering options on the cell value. These cell values are part of the row set.
![Image of Windows Defender ATP advanced hunting result set](images/atp-advanced-hunting-results-filter.png) ![Image of Windows Defender ATP Advanced hunting result set](images/atp-advanced-hunting-results-filter.png)
## Filter results in advanced hunting ## Filter results in Advanced hunting
In advanced hunting, you can use the advanced filter on the output result set of the query. In Advanced hunting, you can use the advanced filter on the output result set of the query.
The filters provide an overview of the result set where The filters provide an overview of the result set where
each column has it's own section and shows the distinct values that appear in the column and their prevalence. each column has it's own section and shows the distinct values that appear in the column and their prevalence.
You can refine your query based on the filter by clicking the "+" or "-" buttons on the values that you want to include or exclude and click **Run query**. You can refine your query based on the filter by clicking the "+" or "-" buttons on the values that you want to include or exclude and click **Run query**.
![Image of advanced hunting filter](images/atp-filter-advanced-hunting.png) ![Image of Advanced hunting filter](images/atp-filter-advanced-hunting.png)
The filter selections will resolve as an additional query term and the results will be updated accordingly. The filter selections will resolve as an additional query term and the results will be updated accordingly.

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.9 KiB

After

Width:  |  Height:  |  Size: 770 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.4 KiB

After

Width:  |  Height:  |  Size: 1.0 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.2 KiB

After

Width:  |  Height:  |  Size: 1.1 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.1 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 908 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.4 KiB

After

Width:  |  Height:  |  Size: 3.2 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 892 B

View File

@ -100,12 +100,12 @@ Icon | Description
![Community center icon](images\atp-community-center.png) | Community center ![Community center icon](images\atp-community-center.png) | Community center
![Notifications icon](images\atp-notifications.png) | Notifications ![Notifications icon](images\atp-notifications.png) | Notifications
![Remediated icon](images\remediated.png) | Automated investigation - remediated ![Remediated icon](images\remediated.png) | Automated investigation - remediated
![Partially investigated icon](images\partially_remediated.png) | Automated investigation - investigated ![Partially investigated icon](images\partially_remediated.png) | Automated investigation - partially remediated
![Partially remediated icon](images\partially_investigated.png) | Automated investigation - partially remediated ![Partially remediated icon](images\partially-investigated.png) | Automated investigation - partially investigated
![Pending icon](images\pending.png) | Automated investigation - pending ![Pending icon](images\pending.png) | Automated investigation - pending
![Running icon](images\running.png) | Automated investigation - running ![Running icon](images\running.png) | Automated investigation - running
![Termindated by system](images\terminated_by_system.png) | Automated investigation - terminated by system ![Termindated by system](images\terminated-by-system.png) | Automated investigation - terminated by system
![No threats found](images\no_threats_found.png) | Automated investigation - no threats found ![No threats found](images\no-threats-found.png) | Automated investigation - no threats found