The eventAny traffic or data exchange detected by AT&T Cybersecurity products through a sensor or external devices such as a firewall. details page provides in-depth information on events.
To view the details of an event
- Go to Activity > Events.
- Click the event to display a summary view, then click the event name to open the full details of the event.
Click the icon to bookmark an item for quick access. Clicking the icon on the secondary menu shows the bookmarked items and provides links to them.
The Event Details page includes event management functions that are supported for your assigned user roleTasks and responsibilities based on job description and position within an organization. A user's role is often used to define access to functionality and privileges to perform specific tasks and operations.:
- Select Action: See Applying Actions to Events for more information.
- Create Rule: See Creating Rules from Events for more information.
- Generate Report: This option displays if you have opened the full details of the event. See Create an Events Report for more information.
The event details include the main fields that identify an event. Keep in mind that you can edit or add values into this field:
- Investigation: This field indicates if the event has been associated to an investigation. You can click the icon to edit the field and enter the title or the number that identifies each investigation. See Adding an Event to an Investigation for more information.
You can see the event details, then the source, the destination, the source and destination users, the payloadContents of the application layer of a packet triggering the security event., and the log. The icon located next to the Source, Destination, and two User fields enables you the access to several options. See Events List View for more information about those options.
In addition, you have these three options:
- Add to current filter: This option enables you to add the asset to the selected filters.
- Look up in OTX: This option searches the IP address of the source asset in the AT&T Cybersecurity Open Threat Exchange (OTX™) page. See Using OTX in USM Anywhere for more information.
- Add asset to system: Use this option to create the asset, see Adding Assets for more information.
Note: The value in the FQDN field comes from the event itself (raw log). This field can have a real FQDN, an IP address, or be empty.