update images

This commit is contained in:
Joey Caparas 2017-08-21 15:23:58 -07:00
parent bbafc0b5c5
commit f013a2018d
4 changed files with 29 additions and 28 deletions

Binary file not shown.

Before

Width:  |  Height:  |  Size: 79 KiB

After

Width:  |  Height:  |  Size: 106 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 473 KiB

After

Width:  |  Height:  |  Size: 133 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 143 KiB

After

Width:  |  Height:  |  Size: 132 KiB

View File

@ -35,7 +35,6 @@ When you investigate a specific machine, you'll see:
- Alerts related to this machine - Alerts related to this machine
- Machine timeline - Machine timeline
[TAKEN FROM MOCK ONLY!! JOEY: UPDATE WITH ACTUAL WHEN READY!!]
![Image of machine details page](images/atp-machine-view-ata.png) ![Image of machine details page](images/atp-machine-view-ata.png)
The machine details, ATA alerts, total logged on users, and machine reporting sections display various attributes about the machine. The machine details, ATA alerts, total logged on users, and machine reporting sections display various attributes about the machine.
@ -77,38 +76,40 @@ Use the search bar to look for specific timeline events. Harness the power of us
- **Value** - Type in any search keyword to filter the timeline with the attribute youre searching for. This search supports defined search queries based on type:value pairs.<br> - **Value** - Type in any search keyword to filter the timeline with the attribute youre searching for. This search supports defined search queries based on type:value pairs.<br>
You can use any of the following values:<br> You can use any of the following values:<br>
- Hash: Sha1 or MD5 - Hash: Sha1 or MD5
- File name - File name
- File extension - File extension
- Path - Path
- Command line - Command line
- User - User
- IP - IP
- URL - URL
- **Informational level** Click the drop-down button to filter by the following levels: - **Informational level** Click the drop-down button to filter by the following levels:
- Detections mode: displays Windows ATP Alerts and detections - Detections mode: displays Windows ATP Alerts and detections
- Behaviors mode: displays "detections" and selected events of interest - Behaviors mode: displays "detections" and selected events of interest
- Verbose mode: displays all raw events without aggregation or filtering - Verbose mode: displays all raw events without aggregation or filtering
- **Event type** - Click the drop-down button to filter by the following levels: - **Event type** - Click the drop-down button to filter by the following levels:
- Windows Defender ATP alerts - Windows Defender ATP alerts
- Windows Defender AV alerts - Windows Defender AV alerts
- Response actions - Device Guard events
- AppGuard related events - Exploit Guard events
- Windows Defender Device Guard events - SmartScreen events
- Process events - Response actions
- Network events - Process events
- File events - Network events
- Registry events - File events
- Load DLL events - Registry events
- Other events <br><br> - Load DLL events
Filtering by event type allows you to define precise queries so that you see events with a specific focus. For example, you can search for a file name, then filter the results to only see Process events matching the search criteria or to only view file events, or even better: to view only network events over a period of time to make sure no suspicious outbound communications go unnoticed. - Other events <br><br>
Filtering by event type allows you to define precise queries so that you see events with a specific focus. For example, you can search for a file name, then filter the results to only see Process events matching the search criteria or to only view file events, or even better: to view only network events over a period of time to make sure no suspicious outbound communications go unnoticed.
- **User account** Click the drop-down button to filter the machine timeline by the following user associated events: - **User account** Click the drop-down button to filter the machine timeline by the following user associated events:
- Logon users - Logon users
- System - System
- Network - Network
- Local service - Local service
The following example illustrates the use of type:value pair. The events were filtered by searching for the user jonathan.wolcott and network events as the event type: The following example illustrates the use of type:value pair. The events were filtered by searching for the user jonathan.wolcott and network events as the event type: