Procedure
- Go to .
- Click Advanced.
- Select OpenIOC file.
Note
Using OpenIOC files in Historical Investigations has the following limitations:-
Only one OpenIOC file can be loaded at a time.
-
The only supported condition is
IS
. Entries using other conditions are ignored and marked with a strikethrough. -
The only supported indicators are the indicators that are applicable to the collected metadata. Entries using unsupported indicators are ignored and marked with a strikethrough.For details, see Supported IOC Indicators.
-
- Specify the data period for the investigation.
- To upload and investigate using a new OpenIOC file:
- Click Upload OpenIOC File.
- Select a valid OpenIOC file.
- Click Open.
- To investigate using an existing OpenIOC file:
- Click Use Existing OpenIOC File.
- Select a file.
- Click Apply.
- Click Assess Impact.The Matched Endpoints section appears. Allow some time for the investigation to run.
- Check the results in the Matched
Endpoints section.The following details are available:Column NameDescriptionEndpointName of the endpoint containing the matching objectIPv4 AddressIP address of the endpoint containing the matching objectThe IP address is assigned by the networkOperating SystemOperating system used by the endpointUserUser name of the user logged in when the Security Agent first logged the matched objectClick the user name to view more details about the user.First LoggedDate and time when the Security Agent first logged the matched objectDetailsClick the icon to open the Match Details screen.The Match Details screen displays the following details:
-
Criteria: Criteria used in the assessment
-
First Logged: Date and time when the Security Agent first logged the matched object
-
CLI/Registry Occurrences: Number of matches found in command line or registry entriesClick the value to show more details.
-
Affected Endpoints: If the rating is malicious, the number of endpoints where a similar match was foundThe count only includes endpoints affected within the last 90 days.
-
- To review the sequence of events leading to the execution
of the matched object, select the endpoints that require further analysis and
click Generate Root Cause Analysis.The Generate Root Cause Analysis screen appears.
- Specify a name for the root cause analysis and click Generate.
- Click the Root Cause Analysis tab to check the results. Allow some time for the task to complete.