-
vulnerabilities are detected when a Security Guardian Assessment is run
AND/OR
-
critical activity anomalies are detected by On Demand Audit.
|
NOTE:Hygiene indicates that objects are susceptible to an adversary attack. Detected indicates that an action took place that could possibly be an adversary attack.
|
The top of an Investigation page identifies the object being investigated, along with the following information:
-
the Severity of the Finding
-
the Finding Type (Hygiene, Detected TTP, Detected Anomaly)
-
the Finding Status (Active or Inactive)
-
MITRE ATT&CK TTP (if applicable)
NOTE: Up to three TTPs may be returned for the finding. If "+ [number]" is shown to the right of the displayed TTP, hover over the icon to view the additional values.
-
the number of Affected Objects
-
Last Updated (that is, the last time the Finding was detected)
NOTE: Last Updated displays a relative time. However, you can hover over the clock icon to see an exact date and time (which displays the local date and time of the signed-in user).
-
options to dismiss the Finding and view history of the Finding.
What Happened?/What Is Wrong?
The What Happened? (for Detected Indicators) or What Is Wrong? (for Hygiene) page provides a description of the Finding and lists the objects that are affected. The following information is included for each object:
-
Object Name (with a link that allows you to display object details)
exception: If an Object Type is trustedDomain, Container or dnsZone, object details cannot be displayed from the Investigation page and the Object Name link will be disabled.
-
Principal Name (which is searchable)
-
Object Type
-
First Discovered date and time
NOTE: This field displays the signed-in user's local date and time.
-
Certification Status, which may be
-
Certified or Not Certified (for Tier Zero objects)
OR
-
Not Tier Zero
NOTE: A status of "Status Not Available" may occur if the object has been deleted from Active Directory or the Object ID cannot otherwise be identified.
-
This section also includes a series of links to help you complete your investigation, as described in the following table.
Link | Description | ||
---|---|---|---|
For Selected Objects in the list | |||
Object Name (for a single object) |
The properties of the object, including whether or not it is Tier Zero, identifiers used for the object within Active Directory, the date the object was added and the date its information was last updated.
| ||
Mute Object button | See Muting Findings for Hygiene and Detected Indicators. | ||
View Activity button (for a single object) |
This link opens the Quick Search page in On Demand Audit, which lists event data for the object being investigated. | ||
View Assessment button (for a single object) |
If the indicator was raised by a Security Guardian Assessment, this link opens the Assessment Results Vulnerability Detail page that includes the selected object.
| ||
View critical activity link | If the indicator was raised by an On Demand Audit critical activity event, this link opens Critical Activity event details in On Demand Audit. | ||
Escalate this Finding | |||
Copy | This link allows you to copy the text of the Finding to the clipboard so that you can share it with others. | ||
Send email | This link allows you to prepare and send an escalation email to recipients with whom you want to share the Finding. |
How Do I fix this?
This section provides the recommended remediation.