Columns within List Views

Role Availability Read-Only Investigator Analyst Manager

For each alarm in the alarm columns list, USM Anywhere displays useful information to help you determine the best response.

The following table lists the fields you see on the page.

Default Columns Found in the List View
Column Field Name Description
Alarm Summary It displays several fields, which are the type of attack, the method of attack, and how long the alarm happened in the past.
Priority Impact of the detected attack. It can be Low, Medium, or High. See Priority Field for Alarms for more information.
Alarm Status Status applied to the alarm. By default, it can be Open, In Review, and Closed. See Alarm Status for more information. The alarms that have the status "Closed" are not displayed in the list.
Sources Hostname A hostname is a label that is assigned to a device connected to a computer network and is used to identify the device on the network. or IP address of the source, (including a national flag icon if the country is known) for an event creating the alarm.
Destinations Hostname or IP address of the destination, (including a national flag icon if the country is known) that received the events generating the alarm.
Source Users Name of the user entity that was the source for an event creating the alarm.
Destination Users Name of the user entity that was the destination of an event creating the alarm.
Investigations Identification (ID) of the investigation associated to the alarm. See Adding an Alarm to an Investigation and USM Anywhere Investigations for more information.
Sensors The sensor Sensors are deployed into an on-premises, cloud, or multi-cloud environment to collect logs and other security-related data. This data is normalized and then securely forwarded to USM Anywhere for analysis and correlation. name associated with the alarm. The type of sensor is also displayed below the sensor name.
Labels Labels applied to the alarm. By default, it can be In Progress, False Positive, Open, and Closed. You can create and manage labels. See Labeling the Alarms for more information.

From the list of alarms, you can click any individual alarm row to display more information on the selected alarm, including individual events that triggered the alarm. See Viewing Alarm Details for more information.

To select an alarm, select the checkbox to the left of the alarm. You can select all alarms at the same time by selecting the first checkbox in the column. These buttons display when you select an alarm:

  • Remove Alarm Labels: This button displays if there are labels associated to any alarm. Use this button to remove a label or labels from an alarm. See Labeling the Alarms for more information.
  • Apply Labels: You can add a label to an alarm, which enables you to have classified alarms. See Labeling the Alarms for more information.
  • Add To Investigation: You can create an investigation for an alarm or associate an investigation to an alarm. See Adding an Alarm to an Investigation and USM Anywhere Investigations for more information.
  • Alarm Status: You can add a status to an alarm. See Alarm Status for more information.

See Differences between Statuses and Labels to distinguish between label and status.

The asset name includes a chevron icon that can be gray () if the asset is not in the system, or blue () if the asset has been added to the system.

Click the gray chevron icon () to access the following options. Your access to these options may vary based on your user role. See Role-Based Access Control (RBAC) in USM Anywhere for more information:

  • Add to current filter: Use this option to add the asset name as a search filter. See Searching Events for more information.
  • Find in events: Use this option to execute a search of the asset name in the Events page. See Searching Events for more information.
  • Look up in OTX: This option searches the IP address of the source asset in the AT&T Cybersecurity Alien Labs Open Threat Exchange® (OTX™) page. See Using OTX in USM Anywhere for more information.
  • Add asset to system: Use this option to create the asset in the system. See Adding Assets for more information.

Click the blue chevron icon () to access the following options. Your access to these options may vary based on your user role. See Role-Based Access Control (RBAC) in USM Anywhere for more information:

You can configure the view you want for the list of alarms. See Alarms Views for more information.

Click Generate Report to open the Configure Report dialog box. See Create an Alarms Report for more information.

Click the icon to change the graph to a Count/Time, MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) or Alarms Strategies by Intent view. See Alarms List View for more information.

Click the icon to bookmark an item for quick access.

Note: You can view your bookmarked items by going to the secondary menu and clicking the icon. This will display all of your bookmarked items and provide direct links to each of them.

Click the icon to filter your search by row fields. See Filtering Alarms by Row Fields for more information.

You can choose the number of items to display by selecting 20, 50, or 100 below the table. You can classify some columns by clicking the icons to the right side of the heading. You can sort the item information in ascending or descending order.