AlienVault USM Anywhere provides a centralized view of your alarmsAlarms provide notification of an event or sequence of events that require attention or investigation.. To view your alarms, go to Activity > Alarms.
Note: You can watch the Conducting Security Analysis with AT&T Cybersecurity USM Anywhere customer training webcast on-demand to learn how to leverage USM Anywhere to perform security analyst duties.
The Alarms page displays information on alarms. These are the different parts of the Alarms page:
- On the left of the page are the search and filters options. Use filters to delimit your search.
See Searching Alarms for more information.
- At the top of the page, you can see any filters you have applied, and you have the option to create and select different views of the alarms.
- The main part of the page is the actual list of alarms. Each row describes an individual alarm and includes a check-box that you can use to select individual alarms. You can select all alarms on the same page by clicking the check-box in the first column of the header row.
Important: An alarm is created when USM Anywhere receives the event, which may appear much later than the time when the event was created. You can verify by comparing the Time Created and Time Received field of an event.
Refreshing the page
USM Anywhere gives you the option of refreshing the page automatically in a period of time that you can configure.
You can configure a period of time for refreshing the data on the Alarm page. See Managing Your Profile Settings for more information.
Following the name of the view, you can click the icon to stop the auto-refresh countdown and refresh the page manually.
There is an auto-refresh countdown that refreshes the page at a regular interval. The number inside the blue circle indicates the remaining time until the next refresh. See Managing Your Profile Settings to configure this interval.
Alarm Summary Graph
Alarms graphed by intent are sorted into five different categories, which are represented by the graphic icons in the display:
- Delivery & Attack ()
- Environmental Awareness ()
- Exploitation & Installation ()
- Reconnaissance & Probing ()
- System CompromiseState or indication that an intruder has bypassed security measures and gained unauthorized access to resources, installed malicious software, or modified existing software or configurations in an attempt to cause damage or steal information. ()
If you want to analyze the data
Use the icon to change the alarms view, which is by default Alarms by Intent. This view is a bubble graph that provides a graphical representation of alarms by intent.
The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a framework for understanding attackers' behaviors and actions. USM Anywhere and AT&T Alien Labs™ Open Threat Exchange® (OTX™) include MITRE ATT&CK information. The alarms view incorporates a table with tactics and techniques to describe adversarial actions and behaviors. Techniques are specific actions an attacker might take and tactics are phases of attacker behavior. This view includes the alarms mapping to their corresponding ATT&CK techniques and helps you to understand the context and the scope of an attack. See MITRE ATT&CK for more information.
The headers of the table are the 11 ATT&CK tactics, and each tactic has numerous techniques, which are the rows. The tooltips match the identification (ID) technique provided by MITRE ATT&CK. Some techniques display in several tactics. If you click in one of the techniques, the specific filters are added and the list shows the result.
USM Anywhere includes MITRE ATT&CK Dashboard to display MITRES ATT&CK information.
The Alarm Strategies by Intent view displays a table that lists the purposes of the alarm. The table headers represent the intent of the alarms. The table rows display the strategies.