You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{elastic-sec}} allows any event detected by {{elastic-endpoint}} to be analyzed using a process-based visual analyzer, which shows a graphical timeline of processes that led up to the alert and the events that occurred immediately after. Examining events in the visual event analyzer is useful to determine the origin of potentially malicious activity and other areas in your environment that may be compromised. It also enables security analysts to drill down into all related hosts, processes, and other events to aid in their investigations.
16
+
{{elastic-sec}} allows any event detected by {{elastic-endpoint}} or supported third-party integrations to be analyzed using a process-based visual analyzer, which shows a graphical timeline of processes that led up to the alert and the events that occurred immediately after. Examining events in the visual event analyzer is useful to determine the origin of potentially malicious activity and other areas in your environment that may be compromised. It also enables security analysts to drill down into all related hosts, processes, and other events to aid in their investigations.
17
17
18
18
::::{tip}
19
19
If you’re experiencing performance degradation, you can [exclude cold and frozen tier data](/solutions/security/get-started/configure-advanced-settings.md#exclude-cold-frozen-tiers) from analyzer queries. This setting is only available for the {{stack}}.
@@ -27,15 +27,20 @@ You can visualize events from the following sources:
27
27
28
28
* {{elastic-defend}} integration
29
29
* Sysmon data collected through {{winlogbeat}}
30
-
*[CrowdStrike integration](integration-docs://reference/crowdstrike.md) (Falcon logs collected through Event Stream or FDR)
* {applies_to}`stack: ga 9.2`[Microsoft Defender for Endpoint](integration-docs://reference/microsoft_defender_endpoint.md)
32
34
33
35
In KQL, this translates to any event with the `agent.type` set to:
34
36
35
37
*`endpoint`
36
38
*`winlogbeat` with `event.module` set to `sysmon`
37
39
*`filebeat` with `event.module` set to `crowdstrike`
38
40
*`filebeat` with `event.module` set to `sentinel_one_cloud_funnel`
41
+
* {applies_to}`stack: ga 9.2``filebeat` with `event.module` set to `microsoft_defender_endpoint`
42
+
43
+
{applies_to}`stack: ga 9.2` The visual analyzer also supports analyzing `event.kind: "alert"` events from third-party integrations. To view these events, your role must have `read` privileges for the `alerts-security.alerts-*` indices.
39
44
40
45
To find events that can be visually analyzed:
41
46
@@ -50,6 +55,12 @@ To find events that can be visually analyzed:
50
55
*`agent.type:"winlogbeat" and event.module: "sysmon" and process.entity_id : *`
51
56
*`agent.type:"filebeat" and event.module: "crowdstrike" and process.entity_id : *`
52
57
*`agent.type:"filebeat" and event.module: "sentinel_one_cloud_funnel" and process.entity_id : *`
58
+
* {applies_to}`stack: ga 9.2``agent.type:"filebeat" and event.module: "microsoft_defender_endpoint" and process.entity_id : *`
59
+
60
+
::::{note}
61
+
{applies_to}`stack: ga 9.2` To specifically filter for alert-kind events from third-party integrations, add `event.kind:"alert"`. For example:
62
+
`agent.type:"filebeat" and event.module:"microsoft_defender_endpoint" and event.kind:"alert" and process.entity_id:*`
63
+
::::
53
64
54
65
3. Events that can be visually analyzed are denoted by a cubical **Analyze event** icon. Select this option to open the event in the visual analyzer. The event analyzer is accessible from the **Hosts**, **Alerts**, and **Timelines** pages, as well as the alert details flyout.
0 commit comments