diff --git a/windows/threat-protection/windows-defender-atp/images/atp-machine-timeline-export.png b/windows/threat-protection/windows-defender-atp/images/atp-machine-timeline-export.png
index da80abb64f..d442625a85 100644
Binary files a/windows/threat-protection/windows-defender-atp/images/atp-machine-timeline-export.png and b/windows/threat-protection/windows-defender-atp/images/atp-machine-timeline-export.png differ
diff --git a/windows/threat-protection/windows-defender-atp/images/atp-machine-view-ata.png b/windows/threat-protection/windows-defender-atp/images/atp-machine-view-ata.png
index 3546f04f3b..23f244b902 100644
Binary files a/windows/threat-protection/windows-defender-atp/images/atp-machine-view-ata.png and b/windows/threat-protection/windows-defender-atp/images/atp-machine-view-ata.png differ
diff --git a/windows/threat-protection/windows-defender-atp/images/atp-user-details-pane.png b/windows/threat-protection/windows-defender-atp/images/atp-user-details-pane.png
index 1d852999b9..121357dc3b 100644
Binary files a/windows/threat-protection/windows-defender-atp/images/atp-user-details-pane.png and b/windows/threat-protection/windows-defender-atp/images/atp-user-details-pane.png differ
diff --git a/windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md
index d41fd50d2b..3022ec6a95 100644
--- a/windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md
@@ -35,7 +35,6 @@ When you investigate a specific machine, you'll see:
- Alerts related to this machine
- Machine timeline
-[TAKEN FROM MOCK ONLY!! JOEY: UPDATE WITH ACTUAL WHEN READY!!]

The machine details, ATA alerts, total logged on users, and machine reporting sections display various attributes about the machine.
@@ -77,38 +76,40 @@ Use the search bar to look for specific timeline events. Harness the power of us
- **Value** - Type in any search keyword to filter the timeline with the attribute you’re searching for. This search supports defined search queries based on type:value pairs.
You can use any of the following values:
- - Hash: Sha1 or MD5
- - File name
- - File extension
- - Path
- - Command line
- - User
- - IP
- - URL
+ - Hash: Sha1 or MD5
+ - File name
+ - File extension
+ - Path
+ - Command line
+ - User
+ - IP
+ - URL
+
- **Informational level** – Click the drop-down button to filter by the following levels:
- - Detections mode: displays Windows ATP Alerts and detections
- - Behaviors mode: displays "detections" and selected events of interest
- - Verbose mode: displays all raw events without aggregation or filtering
+ - Detections mode: displays Windows ATP Alerts and detections
+ - Behaviors mode: displays "detections" and selected events of interest
+ - Verbose mode: displays all raw events without aggregation or filtering
- **Event type** - Click the drop-down button to filter by the following levels:
- - Windows Defender ATP alerts
- - Windows Defender AV alerts
- - Response actions
- - AppGuard related events
- - Windows Defender Device Guard events
- - Process events
- - Network events
- - File events
- - Registry events
- - Load DLL events
- - Other events
- Filtering by event type allows you to define precise queries so that you see events with a specific focus. For example, you can search for a file name, then filter the results to only see Process events matching the search criteria or to only view file events, or even better: to view only network events over a period of time to make sure no suspicious outbound communications go unnoticed.
+ - Windows Defender ATP alerts
+ - Windows Defender AV alerts
+ - Device Guard events
+ - Exploit Guard events
+ - SmartScreen events
+ - Response actions
+ - Process events
+ - Network events
+ - File events
+ - Registry events
+ - Load DLL events
+ - Other events
+ Filtering by event type allows you to define precise queries so that you see events with a specific focus. For example, you can search for a file name, then filter the results to only see Process events matching the search criteria or to only view file events, or even better: to view only network events over a period of time to make sure no suspicious outbound communications go unnoticed.
- **User account** – Click the drop-down button to filter the machine timeline by the following user associated events:
- - Logon users
- - System
- - Network
- - Local service
+ - Logon users
+ - System
+ - Network
+ - Local service
The following example illustrates the use of type:value pair. The events were filtered by searching for the user jonathan.wolcott and network events as the event type: