USM Anywhere provides a centralized view of your alarms Alarms provide notification of an event or sequence of events that require attention or investigation.. Go to Activity > Alarms to see this centralized view.
Note: You can watch the Conducting Security Analysis with AT&T Cybersecurity USM Anywhere customer training webcast on-demand to learn how to leverage USM Anywhere to perform security analyst duties.
- On the left side of the page are the search and filters options. Use filters to delimit your search.
- At the top of the page, you can see any filters you have applied, and you have the option to create and select different views of the
- The main part of the page is the list of
alarms, where each row describes an individual alarm. Click an alarmto open a summary view. See Viewing Alarm Details for more information. Each alarm includes a check box that you can use to select it. You can select all alarms in the same page by clicking the check box in the first column of the header row. You can also select all the alarms in the system. See Selecting Alarms in Alarm List View for more information.
Important: An alarm is created when USM Anywhere receives the event, which may appear later than the time when the event was created. You can verify by comparing the Time Created and Time Received field of an event.
Refreshing the page
USM Anywhere gives you the option of refreshing the page automatically in a period of time that you can configure.
You can configure a period of time for refreshing the data on the Alarm page. See Managing Your Profile Settings for more information.
Following the name of the view, you can click the icon to stop the auto-refresh countdown and refresh the page manually.
There is an auto-refresh countdown that refreshes the page at a regular interval. The number inside the blue circle indicates the remaining time until the next refresh. See Managing Your Profile Settings to configure this interval.
Alarm Summary Graph
Alarms graphed by intent are sorted into five different categories, which are represented by the graphic icons in the display:
- Delivery & Attack ()
- Environmental Awareness ()
- Exploitation & Installation ()
- Reconnaissance & Probing ()
- System Compromise State or indication that an intruder has bypassed security measures and gained unauthorized access to resources, installed malicious software, or modified existing software or configurations in an attempt to cause damage or steal information. ()
If you want to analyze the data
Use the icon to change the alarms view, which is by default Alarms by Intent.
The icon accesses these options:
- Alarms by Intent: This view is a bubble graph that provides a graphical representation of alarms by intent.
- Count / Time: The Count/Time view is a graph that provides a graphical representation of the number of
alarmsin a period of time.
- MITRE ATT&CK: The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a framework for understanding attackers' behaviors and actions.
- Alarm Strategies by Intent: This view is a table that provides a representation of alarms strategies by intent.
Important: The period of time is mapped with the timestamp_occurred field. This field can be overwritten by the current sensor UTC timestamp if, when processing events, a delay is detected up to 15 minutes or the timestamp_occurred field is not provided.
The MITRE ATT&CK View
USM Anywhere and AT&T Alien Labs™ Open Threat Exchange® (OTX™) include MITRE ATT&CK information. The alarms view incorporates a table with tactics and techniques to describe adversarial actions and behaviors. Techniques are specific actions an attacker might take and tactics are phases of attacker behavior. This view includes the alarms mapping to their corresponding ATT&CK techniques and helps you to understand the context and the scope of an attack. See MITRE ATT&CK for more information.
The headers of the table are the 11 ATT&CK tactics, and each tactic has numerous techniques, which are the rows. The tooltips match the identification (ID) technique provided by MITRE ATT&CK. Some techniques display in several tactics. If you click in one of the techniques, the specific filters are added and the list shows the result.
USM Anywhere includes MITRE ATT&CK Dashboard to display MITRE ATT&CK information.
The Alarm Strategies by Intent view displays a table that lists the purposes of the alarm. The table headers represent the intent of the alarms. The table rows display the strategies.