mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-18 08:17:23 +00:00
Merge pull request #4760 from MicrosoftDocs/macky-techniques
Techniques in the device timeline
This commit is contained in:
commit
430544de94
@ -351,6 +351,7 @@
|
|||||||
|
|
||||||
#### [Devices list]()
|
#### [Devices list]()
|
||||||
##### [View and organize the Devices list](microsoft-defender-atp/machines-view-overview.md)
|
##### [View and organize the Devices list](microsoft-defender-atp/machines-view-overview.md)
|
||||||
|
##### [Techniques in device timeline](microsoft-defender-atp/techniques-device-timeline.md)
|
||||||
##### [Device timeline event flags](microsoft-defender-atp/device-timeline-event-flag.md)
|
##### [Device timeline event flags](microsoft-defender-atp/device-timeline-event-flag.md)
|
||||||
##### [Manage device group and tags](microsoft-defender-atp/machine-tags.md)
|
##### [Manage device group and tags](microsoft-defender-atp/machine-tags.md)
|
||||||
|
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 6.4 KiB |
Binary file not shown.
After Width: | Height: | Size: 129 KiB |
Binary file not shown.
After Width: | Height: | Size: 107 KiB |
Binary file not shown.
After Width: | Height: | Size: 38 KiB |
Binary file not shown.
After Width: | Height: | Size: 70 KiB |
Binary file not shown.
After Width: | Height: | Size: 73 KiB |
@ -0,0 +1,98 @@
|
|||||||
|
---
|
||||||
|
title: Techniques in the device timeline
|
||||||
|
description: Understanding the device timeline in Microsoft Defender for Endpoint
|
||||||
|
keywords: device timeline, endpoint, MITRE, MITRE ATT&CK, techniques, tactics
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: m365-security
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: maccruz
|
||||||
|
author: schmurky
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: article
|
||||||
|
ms.technology: mde
|
||||||
|
---
|
||||||
|
|
||||||
|
# Techniques in the device timeline
|
||||||
|
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
|
||||||
|
|
||||||
|
You can gain more insight in an investigation by analyzing the events that happened on a specific device. First, select the device of interest from the [Devices list](machines-view-overview.md). On the device page, you can select the **Timeline** tab to view all the events that occurred on the device.
|
||||||
|
|
||||||
|
## Understand techniques in the timeline
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>Some information relates to a prereleased product feature in public preview which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
|
In Microsoft Defender for Endpoint, **Techniques** are an additional data type in the event timeline. Techniques provide more insight on activities associated with [MITRE ATT&CK](https://attack.mitre.org/) techniques or sub-techniques.
|
||||||
|
|
||||||
|
This feature simplifies the investigation experience by helping analysts understand the activities that were observed on a device. Analysts can then decide to investigate further.
|
||||||
|
|
||||||
|
For public preview, Techniques are available by default and shown together with events when a device's timeline is viewed.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Techniques are highlighted in bold text and appear with a blue icon on the left. The corresponding MITRE ATT&CK ID and technique name also appear as tags under Additional information.
|
||||||
|
|
||||||
|
Search and Export options are also available for Techniques.
|
||||||
|
|
||||||
|
## Investigate using the side pane
|
||||||
|
|
||||||
|
Select a Technique to open its corresponding side pane. Here you can see additional information and insights like related ATT&CK techniques, tactics, and descriptions.
|
||||||
|
|
||||||
|
Select the specific *Attack technique* to open the related ATT&CK technique page where you can find more information about it.
|
||||||
|
|
||||||
|
You can copy an entity's details when you see a blue icon on the right. For instance, to copy a related file's SHA1, select the blue page icon.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You can do the same for command lines.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
## Investigate related events
|
||||||
|
|
||||||
|
To use [advanced hunting](advanced-hunting-overview.md) to find events related to the selected Technique, select **Hunt for related events**. This leads to the advanced hunting page with a query to find events related to the Technique.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Querying using the **Hunt for related events** button from a Technique side pane displays all the events related to the identified technique but does not include the Technique itself in the query results.
|
||||||
|
|
||||||
|
|
||||||
|
## Customize your device timeline
|
||||||
|
|
||||||
|
On the upper right-hand side of the device timeline, you can choose a date range to limit the number of events and techniques in the timeline.
|
||||||
|
|
||||||
|
You can customize which columns to expose. You can also filter for flagged events by data type or by event group.
|
||||||
|
|
||||||
|
### Choose columns to expose
|
||||||
|
You can choose which columns to expose in the timeline by selecting the **Choose columns** button.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
From there you can select which information set to include.
|
||||||
|
|
||||||
|
### Filter to view techniques or events only
|
||||||
|
|
||||||
|
To view only either events or techniques, select **Filters** from the device timeline and choose your preferred Data type to view.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## See also
|
||||||
|
- [View and organize the Devices list](machines-view-overview.md)
|
||||||
|
- [Microsoft Defender for Endpoint device timeline event flags](device-timeline-event-flag.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
x
Reference in New Issue
Block a user