mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 23:07:23 +00:00
alert timeline section
This commit is contained in:
parent
616ab55ac2
commit
552ed11d52
BIN
windows/keep-secure/images/atp-alert-timeline.png
Normal file
BIN
windows/keep-secure/images/atp-alert-timeline.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 187 KiB |
BIN
windows/keep-secure/images/atp-incident-graph.png
Normal file
BIN
windows/keep-secure/images/atp-incident-graph.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 132 KiB |
@ -51,6 +51,8 @@ Selecting an indicator within the alert process tree brings up the **Alert detai
|
|||||||
## Incident graph
|
## Incident graph
|
||||||
The **Incident graph** provides a visual representation of where an alert was seen, events that triggered the alert, and which other machines are affected by the event. It provides an illustrated alert footprint on the original machine and expands to show the footprint of each alert event on other machines.
|
The **Incident graph** provides a visual representation of where an alert was seen, events that triggered the alert, and which other machines are affected by the event. It provides an illustrated alert footprint on the original machine and expands to show the footprint of each alert event on other machines.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
You can click the circles on the incident graph to expand the nodes and view the associated events or files related to the alert. It expands alert evidence to connect to other machines it was observed on by file and process.
|
You can click the circles on the incident graph to expand the nodes and view the associated events or files related to the alert. It expands alert evidence to connect to other machines it was observed on by file and process.
|
||||||
|
|
||||||
The Windows Defender ATP service keeps track of "known processes" such as system files like PowerShell and others, that often trigger alerts. These alerts can be considered benign and very prevalent (on almost all machines) – so there is little to no value in expanding the **Incident graph** to other machines these files were observed on.
|
The Windows Defender ATP service keeps track of "known processes" such as system files like PowerShell and others, that often trigger alerts. These alerts can be considered benign and very prevalent (on almost all machines) – so there is little to no value in expanding the **Incident graph** to other machines these files were observed on.
|
||||||
@ -62,25 +64,12 @@ The **Incident graph** also shows that ‘the same command’ (for the same know
|
|||||||
The **Incident graph** also supports IP Addresses as a criterion of expansion, showing the potential scope of alert evidence without having to change context by navigating to the IP Address page.
|
The **Incident graph** also supports IP Addresses as a criterion of expansion, showing the potential scope of alert evidence without having to change context by navigating to the IP Address page.
|
||||||
|
|
||||||
|
|
||||||
|
## Alert timeline
|
||||||
|
The **Alert timeline** feature helps ease investigations by highlighting alerts related to a specific machine and events.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Selecting an alert detail brings up the **Details pane** where you'll be able to see more information about the alert such as file details, detections, instances of it observed worldwide, and in the organization.
|
||||||
## Alert spotlight
|
|
||||||
The **Alert spotlight** feature helps ease investigations by highlighting alerts related to a specific machine and events. You can highlight an alert and its related events in the machine timeline to increase your focus during an investigation.
|
|
||||||
|
|
||||||
You can click on the machine link from the alert view to see the alerts related to the machine.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> This shortcut is not available from the Incident graph machine links.
|
|
||||||
|
|
||||||
Alerts related to the machine are displayed under the **Alerts related to this machine** section.
|
|
||||||
|
|
||||||
Clicking on an alert row takes you the to the date in which the alert was flagged on **Machine timeline**. This eliminates the need to manually filter and drag the machine timeline marker to when the alert was seen on that machine.
|
|
||||||
|
|
||||||
You can also choose to highlight an alert from the **Alerts related to this machine** or from the **Machine timeline** section to see the correlation between the alert and other events that occurred on the machine. Right-click on any alert from either section and select **Mark related events**. This highlights alerts and events that are related and helps differentiate between the other alerts listed in the timeline. Highlighted events are displayed in all filtering modes whether you choose to view the timeline by **Detections**, **Behaviours**, or **Verbose**.
|
|
||||||
|
|
||||||
You can also remove the highlight by right-clicking a highlighted alert and selecting **Unmark related events**.
|
|
||||||
|
|
||||||
|
|
||||||
### Related topics
|
### Related topics
|
||||||
- [View the Windows Defender Advanced Threat Protection Dashboard](dashboard-windows-defender-advanced-threat-protection.md)
|
- [View the Windows Defender Advanced Threat Protection Dashboard](dashboard-windows-defender-advanced-threat-protection.md)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user