The Summary section displays the severity, number of detected internal hosts, number of Indicators of Compromise (IOCs), and attack patterns, and provides a high-level overview of the malicious activity of the correlated event.
Severity |
The severity assigned by Deep Discovery Director - Network Analytics to the event and related correlations. Deep Discovery Director - Network Analytics uses a number of factors to assign severity, including proprietary analysis. |
Internal Hosts and Indicators of Compromise detection count |
The detection count numbers allow you to quickly determine the scope of the correlated event. |
Attack patterns |
The attack patterns for the suspicious object selected in Trend Vision One. |
Activity summary |
The activity summary is broken up by attack pattern and provides the following information:
|
Item |
Action |
---|---|
Internal Hosts detection number |
Click the detection number and then click on the
Copy to clipboard
icon ( |
Indicators of Compromise detection number |
Click the detection number and then click on the
Copy to clipboard
icon ( |
Attack patterns |
Hover over an attack pattern to highlight only activities related to that attack pattern in the summary. |
IP addresses and domains |
Hover over the triangle icon (
|
Printer-friendly: Displays your system's printer dialog. Modify settings and then click Print.
CSV: Select a delimiter and then click Export to export and download the correlation data of this correlated event to a CSV file with the chosen delimiter.
If any advanced search filter is applied, export is limited to the currently filtered correlation data.