update threat protection report and make machine status report

This commit is contained in:
Joey Caparas
2019-01-16 16:43:55 -08:00
parent 0102d6ed88
commit 15ac468b7f
3 changed files with 87 additions and 17 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 112 KiB

View File

@ -0,0 +1,64 @@
---
title: Machine status report in Windows Defender ATP
description: Track machine sensor health state, antivirus status, OS platforms, and versions using the machine status report
keywords: sensor helath state, antivirus status, os platforms, versions
search.product: eADQiWindows 10XVcnh
search.appverid: met150
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
author: mjcaparas
ms.localizationpriority: medium
---
# Machine status report in Windows Defender ATP
**Applies to:**
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
[!include[Prerelease information](prerelease.md)]
The machines status report provides high-level information about the devices in your organization. The report includes trending information showing the sensor health state, antivirus status, OS platforms, and Windows 10 versions.
The dashboard is structured into two columns:
Section | Description
:---|:---
1 | Status over time
2 | Status (last 6 months)
## Machine attributes
The report is made up of cards that display the following alert attributes:
- **Sensor health state**: shows information about the sensor state on devices, providing an aggregated view of devices that are active, experiencing impaired communications, inactive, or where no sensor data is seen.
- **Antivirus status**: shows the status of the antivirus product in machines.
- **OS platforms**: shows the distribution of OS platforms that exists within your organization.
- **Windows 10 versions**: shows the number of Windows 10 machines and their versions in your organization.
## Date range for status over time
By default, the status over time column displays machine information from the 30-day period ending in the latest full day. To adjust this, select a time range from the drop-down options.
## Filter data
Use the provided filters to include or exclude alerts with certain attributes.
>[!NOTE]
>These filters apply to **all** the cards in the report.
For example, to show data about Windows 10 machines only:
1. Under **Filters > OS platforms**, select **Windows 10**
2. Ensure that all other options under **OS platforms** are deselected.
3. Select **Apply**.

View File

@ -10,7 +10,6 @@ ms.sitesec: library
ms.pagetype: security
author: mjcaparas
ms.localizationpriority: medium
ms.date: 11/07/2018
---
# Threat protection report in Windows Defender ATP
@ -20,35 +19,42 @@ ms.date: 11/07/2018
[!include[Prerelease information](prerelease.md)]
The threat protection report provides high-level information about alerts generated in your organization. The report includes trending information showing the detection sources, categories, severities, statuses, classifications, and determinations of alerts across time as well as the last full day.
The threat protection report provides high-level information about alerts generated in your organization. The report includes trending information showing the detection sources, categories, severities, statuses, classifications, and determinations of alerts across time.
The dashboard is structured into two columns:
![Image of the threat protection report](images/atp-threat-protection-reports.png)
Section | Description
:---|:---
1 | Alerts over time
2 | Alert distribution (last 6 months)
## Alert attributes
The report is made up of cards that display the following alert attributes:
- **Alert detection sources**: shows information about the sensors and detection technologies that provide the data used by Windows Defender ATP to trigger alerts.
- **Detection sources**: shows information about the sensors and detection technologies that provide the data used by Windows Defender ATP to trigger alerts.
- **Alerts by categories**: shows the types of threat or attack activity that triggered alerts, indicating possible focus areas for your security operations.
- **Threat categories**: shows the types of threat or attack activity that triggered alerts, indicating possible focus areas for your security operations.
- **Alerts by severity**: shows the severity level of alerts, indicating the collective potential impact of threats to your organization and the level of response needed to address them.
- **Severity**: shows the severity level of alerts, indicating the collective potential impact of threats to your organization and the level of response needed to address them.
- **Alert status**: shows the resolution status of alerts, indicating the efficiency of your manual alert responses and of automated remediation (if enabled).
- **Status**: shows the resolution status of alerts, indicating the efficiency of your manual alert responses and of automated remediation (if enabled).
- **Alert classification & determination**: shows how you have classified alerts upon resolution, whether you have classified them as actual threats (true alerts) or as incorrect detections (false alerts). These cards also show the determination of resolved alerts, providing additional insight like the types of actual threats found or the legitimate activities that were incorrectly detected.
- **Classification & determination**: shows how you have classified alerts upon resolution, whether you have classified them as actual threats (true alerts) or as incorrect detections (false alerts). These cards also show the determination of resolved alerts, providing additional insight like the types of actual threats found or the legitimate activities that were incorrectly detected.
## 30-day and today cards
For each of the described alert attributes, the report provides two cards:
- **30-day cards**: shows daily trending information from a 30-day period
- **Today cards**: shows 24-hour snapshot information from the latest completed or full day
## Date range for alerts over time
## Set start date of 30-day cards
By default, the 30-day cards in the report display data from the 30-day period ending in the latest full day. To adjust this 30-day window, select a different start date under **Filters > Start date for 30-day cards**.
For example, to show the period from December 1 to December 30, select December 1 as the start date. Select **Apply** after adjusting the start date.
By default, the alerts over time column displays alert information from the 30-day period ending in the latest full day. To adjust this, select a time range from the drop-down options.
## Filter data
Use the provided filters to include or exclude alerts with certain attributes. These filters apply to all the cards in the report.
Use the provided filters to include or exclude alerts with certain attributes.
>[!NOTE]
>These filters apply to **all** the cards in the report.
For example, to show data about high-severity alerts only: