mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 06:17:22 +00:00
include new filters and malware categories
This commit is contained in:
parent
4ca5223556
commit
0cac8f38b5
@ -23,21 +23,21 @@ localizationpriority: high
|
|||||||
|
|
||||||
The **Machines list** shows a list of the machines in your network, the domain of each machine, when it last reported and the local IP Address it reported on, its **Health state**, the number of active alerts on each machine categorized by alert severity level, and the number of active malware detections. This view allows viewing machines ranked by risk or sensor health state, and keeping track of all machines that are reporting sensor data in your network.
|
The **Machines list** shows a list of the machines in your network, the domain of each machine, when it last reported and the local IP Address it reported on, its **Health state**, the number of active alerts on each machine categorized by alert severity level, and the number of active malware detections. This view allows viewing machines ranked by risk or sensor health state, and keeping track of all machines that are reporting sensor data in your network.
|
||||||
|
|
||||||
Use the Machines view in these main scenarios:
|
Use the Machines list in these main scenarios:
|
||||||
|
|
||||||
- **During onboarding**</br>
|
- **During onboarding**</br>
|
||||||
During the onboarding process, the **Machines list** is gradually populated with endpoints as they begin to report sensor data. Use this view to track your onboarded endpoints as they come online. Sort and filter by time of last report, **Active malware category**, or **Sensor health state**, or download the complete endpoint list as a CSV file for offline analysis.
|
During the onboarding process, the **Machines list** is gradually populated with endpoints as they begin to report sensor data. Use this view to track your onboarded endpoints as they come online. Sort and filter by time of last report, **Active malware category**, or **Sensor health state**, or download the complete endpoint list as a CSV file for offline analysis.
|
||||||
- **Day-to-day work**
|
- **Day-to-day work**
|
||||||
The **Machines list** enables easy identification of machines most at risk in a glance. High-risk machines have the greatest number and highest-severity alerts; **Sensor health state** provides another dimension to rank machines. Sorting machines by **Active alerts**, and then by **Sensor health state** helps identify the most vulnerable machines and take action on them.
|
The **Machines list** enables easy identification of machines most at risk in a glance. High-risk machines have the greatest number and highest-severity alerts; **Sensor health state** provides another dimension to rank machines. Sorting machines by **Active alerts**, and then by **Sensor health state** helps identify the most vulnerable machines and take action on them.
|
||||||
|
|
||||||
## Sort, filter, and download the list of machines from the Machines view
|
## Sort, filter, and download the list of machines from the Machines list
|
||||||
You can sort the **Machines list** by clicking on any column header to sort the view in ascending or descending order.
|
You can sort the **Machines list** by clicking on any column header to sort the view in ascending or descending order.
|
||||||
|
|
||||||
Filter the **Machines list** by time period, **Active malware categories**, or **Sensor health state** to focus on certain sets of machines, according to the desired criteria.
|
Filter the **Machines list** by time period, **OS Platform**, **Health**, or **Malware category alerts** to focus on certain sets of machines, according to the desired criteria.
|
||||||
|
|
||||||
You can also download the entire list in CSV format using the **Export to CSV** feature.
|
You can also download the entire list in CSV format using the **Export to CSV** feature.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
You can use the following filters to limit the list of machines displayed during an investigation:
|
You can use the following filters to limit the list of machines displayed during an investigation:
|
||||||
|
|
||||||
@ -48,35 +48,50 @@ You can use the following filters to limit the list of machines displayed during
|
|||||||
- 30 days
|
- 30 days
|
||||||
- 6 months
|
- 6 months
|
||||||
|
|
||||||
|
**OS Platform**</br>
|
||||||
|
- Windows 10
|
||||||
|
- Windows Server 2012 R2
|
||||||
|
- Windows Server 2016
|
||||||
|
- Other
|
||||||
|
|
||||||
|
**Sensor health state**</br>
|
||||||
|
Filter the list to view specific machines grouped together by the following machine health states:
|
||||||
|
|
||||||
|
- **Active** – Machines that are actively reporting sensor data to the service.
|
||||||
|
- **Misconfigured** – Machines that have impaired communication with service or are unable to send sensor data. Misconfigured machines can further be classified to:
|
||||||
|
- Impaired communication
|
||||||
|
- No sensor data
|
||||||
|
|
||||||
|
For more information on how to address issues on misconfigured machines see, [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md).
|
||||||
|
- **Inactive** – Machines that have completely stopped sending signals for more than 7 days.
|
||||||
|
|
||||||
|
|
||||||
**Malware category**</br>
|
**Malware category**</br>
|
||||||
Filter the list to view specific machines grouped together by the following malware categories:
|
Filter the list to view specific machines grouped together by the following malware categories:
|
||||||
- **Ransomware** – Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
|
- **Ransomware** – Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
|
||||||
- **Credential theft** – Spying tools, whether commercially available or solely used for unauthorized purposes, include general purpose spyware, monitoring software, hacking programs, and password stealers.
|
- **Credential theft** – Spying tools, whether commercially available or solely used for unauthorized purposes, include general purpose spyware, monitoring software, hacking programs, and password stealers.
|
||||||
These tools collect credentials and other information from browser records, key presses, email and instant messages, voice and video conversations, and screenshots. They are used in cyberattacks to establish control and steal information.
|
These tools collect credentials and other information from browser records, key presses, email and instant messages, voice and video conversations, and screenshots. They are used in cyberattacks to establish control and steal information.
|
||||||
- **Exploit** – Exploits take advantage of unsecure code in operating system components and applications. Exploits allow attackers to run arbitrary code, elevate privileges, and perform other actions that increase their ability to compromise a targeted machine. Exploits are found in both commodity malware and malware used in targeted attacks.
|
- **Exploit** – Exploits take advantage of unsecure code in operating system components and applications. Exploits allow attackers to run arbitrary code, elevate privileges, and perform other actions that increase their ability to compromise a targeted machine. Exploits are found in both commodity malware and malware used in targeted attacks.
|
||||||
|
- **Backdoor** - Backdoors are malicious remote access tools that allow attackers to access and control infected machines. Backdoors can also be used to exfiltrate data.
|
||||||
- **General malware** – Malware are malicious programs that perform unwanted actions, including actions that can disrupt, cause direct damage, and facilitate intrusion and data theft. Some malware can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyberattacks.
|
- **General malware** – Malware are malicious programs that perform unwanted actions, including actions that can disrupt, cause direct damage, and facilitate intrusion and data theft. Some malware can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyberattacks.
|
||||||
- **Unwanted software** – Unwanted software is a category of applications that install and perform undesirable activity without adequate user consent. These applications are not necessarily malicious, but their behaviors often negatively impact the computing experience, even appearing to invade user privacy. Many of these applications display advertising, modify browser settings, and install bundled software.
|
- **PUA** – Unwanted software is a category of applications that install and perform undesirable activity without adequate user consent. These applications are not necessarily malicious, but their behaviors often negatively impact the computing experience, even appearing to invade user privacy. Many of these applications display advertising, modify browser settings, and install bundled software.
|
||||||
|
|
||||||
**Sensor health state**</br>
|
|
||||||
Filter the list to view specific machines grouped together by the following machine health states:
|
|
||||||
|
|
||||||
- **Active** – Machines that are actively reporting sensor data to the service.
|
|
||||||
- **Misconfigured** – Machines that have impaired communication with service or are unable to send sensor data. For more information on how to address issues on misconfigured machines see, [Fix unhealthy sensors](fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md).
|
|
||||||
- **Inactive** – Machines that have completely stopped sending signals for more than 7 days.
|
|
||||||
|
|
||||||
## Export machine list to CSV
|
## Export machine list to CSV
|
||||||
You can download a full list of all the machines in your organization, in CSV format. Click the **Manage** menu icon  to download the entire list as a CSV file.
|
You can download a full list of all the machines in your organization, in CSV format. Click the **Export to CSV** button to download the entire list as a CSV file.
|
||||||
|
|
||||||
**Note**: Exporting the list depends on the number of machines in your organization. It might take a significant amount of time to download, depending on how large your organization is.
|
**Note**: Exporting the list depends on the number of machines in your organization. It might take a significant amount of time to download, depending on how large your organization is.
|
||||||
Exporting the list in CSV format displays the data in an unfiltered manner. The CSV file will include all machines in the organization, regardless of any filtering applied in the view itself.
|
Exporting the list in CSV format displays the data in an unfiltered manner. The CSV file will include all machines in the organization, regardless of any filtering applied in the view itself.
|
||||||
|
|
||||||
## Sort the Machines view
|
## Sort the Machines list
|
||||||
You can sort the **Machines list** by the following columns:
|
You can sort the **Machines list** by the following columns:
|
||||||
|
|
||||||
- **Machine name** - Name or GUID of the machine
|
- **Machine name** - Name or GUID of the machine
|
||||||
|
- **Domain** - Domain where the machine is joined in
|
||||||
|
- **OS Platform** - Indicates the OS of the machine
|
||||||
|
- **Health State** – Indicates if the machine is misconfigured or is not sending sensor data
|
||||||
- **Last seen** - Date and time when the machine last reported sensor data
|
- **Last seen** - Date and time when the machine last reported sensor data
|
||||||
- **Internal IP** - Local internal Internet Protocol (IP) address of the machine
|
- **Internal IP** - Local internal Internet Protocol (IP) address of the machine
|
||||||
- **Health State** – Indicates if the machine is misconfigured or is not sending sensor data
|
|
||||||
- **Active Alerts** - Number of alerts reported by the machine by severity
|
- **Active Alerts** - Number of alerts reported by the machine by severity
|
||||||
- **Active malware detections** - Number of active malware detections reported by the machine
|
- **Active malware detections** - Number of active malware detections reported by the machine
|
||||||
|
|
||||||
@ -91,7 +106,7 @@ You can sort the **Machines list** by the following columns:
|
|||||||
- [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md)
|
- [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md)
|
||||||
- [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md)
|
- [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md)
|
||||||
- [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md)
|
- [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md)
|
||||||
- [Investigate machines in the Windows Defender ATP Machines view](investigate-machines-windows-defender-advanced-threat-protection.md)
|
- [Investigate machines in the Windows Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md)
|
||||||
- [Investigate a user account in Windows Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md)
|
- [Investigate a user account in Windows Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md)
|
||||||
- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
- [Take response actions in Windows Defender ATP](response-actions-windows-defender-advanced-threat-protection.md)
|
- [Take response actions in Windows Defender ATP](response-actions-windows-defender-advanced-threat-protection.md)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user