![]() |
NoteTo perform an investigation on the current system state, use
Live Investigation.
For more information, see Starting a One-time Investigation.
|
Procedure
- Go to .
- Click the OpenIOC file tab.
Note
Using OpenIOC files in Historical Investigations has the following limitations:-
Only one OpenIOC file can be loaded at a time.
-
Any operator specified in the OpenIOC file is changed to
OR
. -
The only supported condition is
IS
. Entries using other conditions are ignored and marked with a strikethrough. -
The only supported indicators are the indicators that are applicable to the collected metadata. Entries using unsupported indicators are ignored and marked with a strikethrough.For details, see Supported IOC Indicators for Historical Investigations.
-
- To upload and investigate using a new OpenIOC file:
- Click Upload OpenIOC File.
- Select a valid OpenIOC file.
- Click Open.
- To investigate using an existing OpenIOC file:
- Click Use Existing OpenIOC File.
- Select a file.
- Click Apply.
- Click Assess.
- On the results pane, review the results that
appear.
Note
-
Allow some time for the Historical Investigation to run. The investigation appends more rows to the results table as soon as matching objects are found in the metadata. It may take a few minutes for the investigation to complete.
-
Hover over the Endpoints label to display a pop-up that displays the progress of the assessment.
-
The data available during Historical Investigations is a subset of Security Agent data and only includes information about high risk file types. If an assessment returns no results, you may want to perform a Live Investigation.
The following details are available:Column NameDescriptionEndpointName of the endpoint containing the matching objectClick to view more details about the endpoint.StatusCurrent connection status of the endpointIP AddressIP address of the endpoint containing the matching objectThe IP address is assigned by the networkOperating SystemOperating system used by the endpointUserUser name of the user logged in when the Security Agent first logged the matched objectClick the user name to view more details about the user.Managing ServerServer that manages the affected endpointFirst LoggedDate and time when the Security Agent first logged the matched objectDetailsClick the icon to open the Match Details screen.The Match Details screen displays the following details:-
Criteria: Criteria used in the assessment
-
First Logged: Date and time when the Security Agent first logged the matched object
-
CLI/Registry Occurrences: Number of matches found in command line or registry entriesClick the value to show more details.
-
Rating: Rating assigned by Trend Micro intelligenceYou can further examine objects with
Malicious
ratings in Threat Connect or VirusTotal. -
Affected Endpoints: If the rating is malicious, the number of endpoints where a similar match was foundThe count only includes endpoints affected within the last 90 days.
Asterisk (*)Indicates an endpoint tagged as Important -
- Identify and select one or more endpoints that
require further action.
Note
The Historical Investigation results may include macOS endpoints. Since there are no actions available for macOS endpoints, the check boxes for these endpoints are disabled.ActionDescriptionGenerate Root Cause AnalysisGenerates a Root Cause Analysis to review the sequence of events leading to the execution of the matched object.For more information, see Starting a Root Cause Analysis from an Assessment.Start Live InvestigationRuns a new investigation with the same criteria on the current system state.The Live Investigation screen appears and initiates a new one-time investigation using the existing criteria.For assessments using an OpenIOC file, Live Investigation uses both the current OpenIOC file and selected endpoints as criteriaFor more information, see Starting a One-time Investigation.Isolate EndpointsDisconnects the selected endpoints from the network.Note
After resolving the security threats on an isolated endpoint, the following locations on thescreen provides options to restore the network connection of an isolated endpoint:-
: Click the name of an endpoint in the table, and click on the screen that appears.
-
: Select the endpoint row in the table, and click .
-