Event Analysis

Overview

Event Analysis is an interactive display of security event activity across your enterprise over a given time period.

Click to enlarge

The display is comprised of five panels showing the following information: 

  • Events: Displays a graphical line chart showing the audit trail of security events raised by the monitored systems in your enterprise.
  • Actions: Displays a horizontal bar chart showing the Top 5 actions that raised the most security events.
  • Operators: Displays the user names of the Top 5 user profiles that raised the most security events.
  • Platforms: Displays the Top 10 operating systems in your enterprise that generated the most security events.
  • Assets: Displays the Top 10 assets in your enterprise that generated the most security events.
NOTE: The panels in this display cannot be edited or moved by the user.

For each panel in this display, the following security event information is available: 

  • Common: This is the audit trail of all security events received by Event Manager over the given time period.
  • Highlights: A highlight is a security event not deemed severe enough to be considered a threat or incident but warrants further manual investigation.
  • Threats: A threat is an event deemed serious enough to put your business at risk and should be investigated as a matter of urgency.
  • Incidents: An incident means that security has been breached. This is the highest level of event possible.

Accessing information in the display

From within each of the panels on the Event Analysis display it is possible to get a breakdown of the security events .

Changing the Security Event Data that is displayed

Within each of the panels (with the exception of the Events panel) on the Event Analysis display, it is possible to edit the content.

Click the Edit icon in the required panel. This becomes visible when the mouse pointer is wholly contained within the required panel.

The content that can be edited is different for each panel but the process is the same.

The Select Actions/Operators/Platforms/Assets panel is displayed.

Number of Top Actions/Operators/Platforms/Assets

This figure represents the items in the subsequent list that have returned the most number of security events.

For example, if the this figure is set to 5 only the security events from the top 5 items in the available list are displayed in the panel. Change this figure to show more or less data in the panel for which the Edit option was selected.

Select All

Enable this option to select all the possible items from which security event data can be extracted for this panel.

Individual Options

These can only be selected if the Select All option is inactive. Items are selected if they have a tick mark against them. Click to include or exclude items as required.

Click Save to confirm the amendments to the panel.

Displaying or excluding data for a single security event type

The default setting shows all event types (Common, Highlights, Threat or Incident) in each panel of the Event Analysis display.

From within each panel it is possible to show information by a single event type or by excluding events of a specific type from the display. This can make it easier to process the available information by removing the visibility of those security events that are not required.

This is done by using the Events Summary panel at the top of the Event Analysis page.

Displaying single security event type data

To show a single security event type within all panels in the Event Analysis display, click on the required event type within the Events Summary panel.

For example, clicking Threats in the Events Summary panel would return the following:

Viewing a panel full screen

If a panel contains a lot of information that is difficult to read in the limitations of the current size, it is possible to view the contents of the panel in full-screen mode.

Click the full screen icon in the top right-hand corner of the panel to increase the display to full screen.

Click the reduce screen icon to close the full screen view and return the panel to the original size.

Drill-down Analysis

Drill-down analysis provides a way of interrogating the security event data to pinpoint specific security events using just this display. Further itemized information can then be obtained from the Event Manager and Forensic Analysis displays.

In the following example, the drill-down investigates a successful login reported as a threat on the Windows operating platform for the asset LocalHost.

In the Actions panel the mouse pointer is hovered over the Successful Login bar chart to reveal that there were just a single security threat posted within the specified time period.

Click on the Successful Login bar. The entire Events Analysis display is updated as a drill-down has been performed on the Successful Login action. This is shown in the Event Analysis Header Bar.

Further investigation reveals that the threat was actioned on the Windows Server.

Click on the Server - Windows bar. The Events Analysis display is updated again with the new-drill down request and the header is also updated.

In the Assets panel, only the LocalHost asset is displayed.

Finally, in the Operator's panel, remove all the events other than the Threats. This reveals that the Security Threat was on the Administrator's user profile.

Further investigation can now be undertaken using the Event Manager and Forensic Analysis displays.

Resetting the display

Following a drill-down analysis the display can be reset to the original setting in one of two ways.

Either:

Click on the name of the drill-down filter setting in the Event Analysis header bar to remove the filter.

Or

Click on the Reset button in the top-right corner of each panel that has had a drill-down filter applied.

Refreshing the data

By default, the data in the Events Analysis display is auto-refreshed every 5 minutes.

You can also perform a manual refresh of the display by clicking the Refresh button in the main header bar of the Event Analysis display.

Related Topics