OVERVIEW
GENERAL
General Details
Reputation Details
ENTRY POINT
Summary
Complete
REMEDIATION
BUSINESS IMPACT
SUSPICIOUS ACTIVITY
Mitre ATT&CK™ Matrix
Suspicious Events
Uncorrelated Events
Network Events
INCIDENT DETAILS
Tree
Tree Timeline
Table Timeline Summary
Table Timeline Complete
status
malware family
MEDIUM
severity
triggered by
trigger
protection name
user
ATTACK STATS
What sort of connections and processes were involved?
No known malicious elements
Remote Logon
Internal
Malicious
Connections
Suspicious
Connections
Unclassified
Connections
Malicious
Processes
Suspicious
Processes
Unclassified
Processes
Malicious
Files
Suspicious
Files
Unsigned
Processes
Script
Processes
ATTACK TYPES
What were the attacks types seen or prevented?
No known attack type
ENTRY POINT
How did it enter the system?
BUSINESS IMPACT
What was the potential damage done?
No damage detected
0
Credential
Theft
0
Data
Changes
0
Data
Loss
0
Data
Ransom
0
Key
Logger
0
Lateral
Movement
0
Mouse
Logger
0
Privacy
Violation
0
USB
Tampering
0
Security
Tampering
0
DNS
Tampering
REMEDIATION
Were all incident created elements removed?
No remediation needed
terminated processes
quarantined/deleted files
restored files
NETWORK MAP
Where were the untrusted connections being made?
Country
INCIDENT DETAILS
How do I analyze further?
MITRE ATT&CK™
Tactics and techniques seen as defined by the MITRE ATT&CK™ framework
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact