Role Availability | Read-Only | Investigator | Analyst | Manager |
The event Any traffic or data exchange detected by LevelBlue products through a sensor or external devices such as a firewall. details page provides in-depth information on events.
To view the details of an event
- Go to Activity > Events.
- Click the event to display a summary view, then click the event name to open the full details of the event.
- Select Action: See Applying Actions to Events for more information.
- Create Rule: See Creating Rules from Events for more information.
- Generate Report: This option displays if you have opened the full details of the event. See Create an Events Report for more information.
- Investigation: This field indicates if the event has been associated to an investigation. You can click the icon to edit the field and enter the title or the number that identifies each investigation. See Adding an Event to an Investigation for more information.
- Add to current filter: This option enables you to add the asset to the selected filters.
- Look up in OTX: This option searches the IP address of the source asset in the LevelBlue Open Threat Exchange (OTX™) page. See Using OTX in USM Anywhere for more information.
- Add asset to system: Use this option to create the asset, see Adding Assets for more information.
- In the upper right corner, click Previous and Next to navigate between items.
- Click the icon to close the dialog box.
Click the icon to bookmark an item for quick access.
The Event Details page includes event management functions that are supported for your assigned user role Tasks and responsibilities based on job description and position within an organization. A user's role is often used to define access to functionality and privileges to perform specific tasks and operations.:
The event details include the main fields that identify an event. Keep in mind that you can edit or add values into this field:
You can see the event details, then the source, the destination, the source and destination users, the payload Contents of the application layer of a packet triggering the security event., and the log. The icon located next to the Source, Destination, and two User fields enables you the access to several options. See Events List View for more information about those options.
In addition, you have these three options:
Note: The value in the FQDN field comes from the event itself (raw log). This field can have a real FQDN, an IP address, or be empty.