mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 22:37:22 +00:00
include preview features
This commit is contained in:
parent
6702778c59
commit
aeafbfc77c
Binary file not shown.
After Width: | Height: | Size: 65 KiB |
@ -61,21 +61,42 @@ You can also choose to highlight an alert from the **Alerts related to this mach
|
||||
|
||||
The **Machine timeline** section provides a chronological view of the events and associated alerts that have been observed on the machine.
|
||||
|
||||
This feature also enables you to selectively drill down into events that occurred within a given time period. You can view the temporal sequence of events that occurred on a machine over a specified time period.
|
||||
This feature also enables you to selectively drill down into events that occurred within a given time period. You can view the temporal sequence of events that occurred on a machine over a specified time period. You can also view alerts related to a specific user without leaving the context of the machine timeline by selecting their name from the machine timeline.
|
||||
|
||||

|
||||
|
||||
Windows Defender ATP monitors and captures questionable behavior on Windows 10 machines and displays the process tree flow in the **Machine timeline**. This gives you better context of the behavior which can contribute to understanding the correlation between events, files, and IP addresses in relation to the machine.
|
||||
|
||||
### Search for specific alerts
|
||||
Use the search bar to look for specific alerts or files associated with the machine:
|
||||
Use the search bar to look for specific alerts or files associated with the machine. Harness the power of using the following defined search queries and event filter types to sift through the search results:
|
||||
|
||||
- **Value** – Type in any search keyword to filter the timeline with the attribute you’re searching for.
|
||||
- **Value** - Type in any search keyword to filter the timeline with the attribute you’re searching for. <br>
|
||||
You can use any of the following values:<br>
|
||||
- Hash: Sha1 or MD5
|
||||
- File name
|
||||
- File extension
|
||||
- Path
|
||||
- Command line
|
||||
- User
|
||||
- IP
|
||||
- URL
|
||||
- **Informational level** – Click the drop-down button to filter by the following levels:
|
||||
- **Detections mode**: displays Windows ATP Alerts and detections
|
||||
- **Behaviors mode**: displays "detections" and selected events of interest
|
||||
- **Verbose mode**: displays "behaviors" (including "detections"), and all reported events
|
||||
- **User** – Click the drop-down button to filter the machine timeline by the following user associated events:
|
||||
- Detections mode: displays Windows ATP Alerts and detections
|
||||
- Behaviors mode: displays "detections" and selected events of interest
|
||||
- Verbose mode: displays all raw events without aggregation or filtering
|
||||
- **Event type** - Click the drop-down button to filter by the following levels:
|
||||
- Windows Defender ATP alerts
|
||||
- Windows Defender AV alerts
|
||||
- Response actions
|
||||
- AppGuard related events
|
||||
- Windows Defender Device Guard events
|
||||
- Process events
|
||||
- Network events
|
||||
- File events
|
||||
- Registry events
|
||||
- Load DLL events
|
||||
- Other events
|
||||
- **User account** – Click the drop-down button to filter the machine timeline by the following user associated events:
|
||||
- Logon users
|
||||
- System
|
||||
- Network
|
||||
|
@ -32,3 +32,10 @@ Turn on the preview experience setting to be among the first to try upcoming fea
|
||||
|
||||
1. In the navigation pane, select **Preferences setup** > **Preview experience**.
|
||||
2. Toggle the setting between **On** and **Off** and select **Save preferences**.
|
||||
|
||||
## Preview features
|
||||
|
||||
The following feature is included in the preview release:
|
||||
|
||||
- **Machine timeline full verbose and advanced search** <br>
|
||||
You can now see all raw events in the machine timeline without aggregation or filtering. You can harness the power of using defined search queries and event filter types to sift through the search results. For more information, see [Investigate machines](investigate-machines-windows-defender-advanced-threat-protection.md).
|
||||
|
Loading…
x
Reference in New Issue
Block a user