The eventAny traffic or data exchange detected by AT&T Cybersecurity products through a sensor, or through external devices such as a firewall. details page provides in-depth information on events.
To view the details of an event
- Go to Activity > Events.
- Click the event to display its details.
Click the icon to bookmark an item for quick access. Clicking the icon on the secondary menu shows the bookmarked items and provides links to them.
The Event Details page includes event management functions that are supported for your assigned user roleTasks and responsibilities based on job description and position within an organization. A user's role is often used to define access to functionality and privileges to perform specific tasks and operations.:
- Select Action: See Applying Actions to Events for more information.
- Create Rule: See Creating Rules from Events for more information.
- Suppress Event: You can suppress the specific event you are displaying. See Suppressing/Unsuppressing Events for more information.
- Add to Investigation: Use this button to associate an event with an investigation. See Adding an Event to an Investigation for more information.
The event details include the main fields that identify an event. Keep in mind that you can edit or add values into this field:
- Investigation: This field indicates if the event has been associated to an investigation. You can click the icon to edit the field and enter the title or the number that identifies each investigation. See Adding an Event to an Investigation for more information.
You can see the event details, then the source, the destination, the payloadContents of the application layer of a packet triggering the security event., and the log. The icon located next to the Source and Destination fields enables you the access to several options. See Asset List View. In addition, you have these two options:
- Add to current filter: This option enables you to add the asset to the selected filters.
- Look up in OTX. This option searches the IP address of the source asset in the Open Threat Exchange page. See Using OTX in USM Anywhere for more information.
- Add asset to system: Use this option to create the asset, see Adding Assets for more information.
Note: The value in the FQDN field comes from the event itself (raw log). This field can have a real FQDN, an IP address, or be empty.