The alarm Alarms provide notification of an event or sequence of events that require attention or investigation. details page provides in-depth information on an alarm, what caused it, and how to resolve the situation.
To view the details of an alarm
- Go to Activity > Alarms.
- Click the alarm to display a summary view, then click the alarm name to open the full details of the alarm.
Click the icon to bookmark an item for quick access. Clicking the icon on the secondary menu shows the bookmarked items and provides links to them.
Not all alarms found during monitoring Process of collecting all device status and event information and processing normalized events for evidence of vulnerabilities, possible attacks, and other malicious activity. are necessary in managing your environment because they do not pose a security threat. Frequently, there are alarms that create a noisy environment, making it difficult to monitor other alarms that require more attention. You can identify these alarms and suppress them by using a rule.
The alarms details page includes alarm management functions that are supported for your assigned user role Tasks and responsibilities based on job description and position within an organization. A user's role is often used to define access to functionality and privileges to perform specific tasks and operations.:
- Select Action: See Applying Actions to Alarms for more information.
- Create Rule: See Creating Rules from Alarms for more information.
The alarm details include the main fields that identify an alarm. Keep in mind that you can edit or add values into these fields:
- Status: This field indicates the status for the alarm: open, in review, or closed. You can click the icon to edit the field and apply a status. See Alarm Status for more information.
- Labels: This field indicates if the alarm has been classified by using a label. You can click the icon to manage the labels of the alarm. See Labeling the Alarms for more information.
- Investigation: This field indicates if the alarm has been associated to an investigation. You can click the icon to edit the field and enter the title or the number that identifies each investigation. See Adding an Alarm to an Investigation for more information.
- HTTP Hostname: If the alarm includes this field, you can search for events by using it. See Searching Events from the Details of an Alarm for more information.
- DNS RR Name: If the alarm includes this field, you can search for events by using it. See Searching Events from the Details of an Alarm for more information.
Below the alarm details, you can see the source, the destination, the associated alarm if it exists, the associated events Any traffic or data exchange detected by AT&T Cybersecurity products through a sensor, or through external devices such as a firewall., a description, and, in the case of an alarm with a high priority, a recommendation to fix the problem.
The icon located next to the asset enables you to access these options:
- Add to current filter. Use this option to add the asset name as a search filter. See Searching Alarms for more information.
- Find in events. Use this option to execute a search of the asset name in the Events page. See Events List View for more information.
- Look up in OTX. This option searches the IP address of the source asset in the Open Threat Exchange page. See Using OTX in USM Anywhere for more information.
- Add asset to system. Use this option to create the asset in the system, see Adding Assets for more information.
Note: The value in the FQDN field comes from the event itself (raw log). This field can have a real FQDN, an IP address, or be empty.
Note: See the Searching Events from the Details of an Alarm page for more information about the options in the HTTP Hostname, DNS RR Name, Source, and Destination fields.