mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-28 13:17:23 +00:00
update file topic with images
This commit is contained in:
parent
41afe10e02
commit
ac4876f5f3
@ -190,7 +190,7 @@ Authorization: Bearer <access_token>
|
||||
Accept: application/json;odata.metadata=none
|
||||
```
|
||||
|
||||
If successful, you should get a 200 OK response containing a single indicator of compromise representation (per the specified Id) in the payload, as shown as follows:
|
||||
If successful, you should get a 200 OK response containing a single indicator of compromise representation (per the specified ID) in the payload, as shown as follows:
|
||||
|
||||
```json
|
||||
HTTP/1.1 200 OK
|
||||
@ -281,7 +281,7 @@ Accept: application/json;odata.metadata=none
|
||||
}
|
||||
```
|
||||
|
||||
If successful, you should get a 200 OK response containing the updated alert definition representation (per the specified Id) in the payload.
|
||||
If successful, you should get a 200 OK response containing the updated alert definition representation (per the specified ID) in the payload.
|
||||
|
||||
## Update the association (relation) between an indicator of compromise to a different alert definition
|
||||
|
||||
|
BIN
windows/keep-secure/images/atp-alerts-related-to-file.png
Normal file
BIN
windows/keep-secure/images/atp-alerts-related-to-file.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 129 KiB |
BIN
windows/keep-secure/images/atp-file-in-org.png
Normal file
BIN
windows/keep-secure/images/atp-file-in-org.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 63 KiB |
BIN
windows/keep-secure/images/atp-file-information.png
Normal file
BIN
windows/keep-secure/images/atp-file-information.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 74 KiB |
@ -33,13 +33,23 @@ You can get information from the following sections in the file view:
|
||||
- Most recent observed machines with file
|
||||
|
||||
|
||||
The file details, malware detection, and prevalence worldwide sections display various attributes about the file. You’ll see actions you can take on the file and details such as the file’s MD5, the VirusTotal detection ratio and Windows Defender AV detection if available, and the file’s prevalence worldwide.
|
||||
The file details, malware detection, and prevalence worldwide sections display various attributes about the file. You’ll see actions you can take on the file and details such as the file’s MD5, the VirusTotal detection ratio and Windows Defender AV detection if available, and the file’s prevalence worldwide. You'll also be able to [submit a file for deep analysis](investigate-files-windows-defender-advanced-threat-protection.md#deep-analysis).
|
||||
|
||||

|
||||
|
||||
The **Alerts related to this file** section provides a list of alerts that are associated with the file. This list is a simplified version of the Alerts queue, and shows the date when the last activity was detected, a short description of the alert, the user associated with the alert, the alert's severity, the alert's status in the queue, and who is addressing the alert.
|
||||
|
||||

|
||||
|
||||
The **File in organization** section provides details on the prevalence of the file, prevalence in email inboxes and the name observed in the organization.
|
||||
|
||||
The **Most recent observed machines with the file** section allows you to specify a date range to see which machines have been observed with the file. This allows for greater accuracy in defining entities to display such as if and when an entity was observed in the organization. For example, if you’re trying to identify the origin of a network communication to a certain IP Address within a 10-minute period on a given date, you can specify that exact time interval, and see only files that communicated with that IP Address at that time, drastically reducing unnecessary scrolling and searching.
|
||||

|
||||
|
||||
The **Most recent observed machines with the file** section allows you to specify a date range to see which machines have been observed with the file.
|
||||
|
||||

|
||||
|
||||
This allows for greater accuracy in defining entities to display such as if and when an entity was observed in the organization. For example, if you’re trying to identify the origin of a network communication to a certain IP Address within a 10-minute period on a given date, you can specify that exact time interval, and see only files that communicated with that IP Address at that time, drastically reducing unnecessary scrolling and searching.
|
||||
|
||||
## Stop and quarantine files in your network
|
||||
You can contain an attack in your organization by stopping the malicious process and quarantine the file where it was observed.
|
||||
|
Loading…
x
Reference in New Issue
Block a user