Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The SOC Insight Report Events tab provides a comprehensive view of all security DNS events associated with an insight. It displays important information such as the threat level, threat confidence, date and time of detection, class, query, query type, user, device IP, threat family, policy, action, and source. Additionally, you can customize the table layout by selecting which data columns to display. The Events tab also allows you to search for specific events, filter events based on criteria such as threat level and query and export all insight events records in .csv format.Image RemovedA detailed view of the SOC Insights - Viewing Insight Events dashboard used for managing SOC insights. The Viewing Insight Events dashboard is designed to give cybersecurity professionals detailed and actionable insights on DNS events, allowing them to view, sort, and export event data for further analysis and action.Image Added

Image: A detailed view of the SOC Insights - Viewing Insight Events dashboard used for managing SOC insights. The Viewing Insight Events dashboard is designed to give cybersecurity professionals detailed and actionable insights on DNS events, allowing them to view, sort, and export event data for further analysis and action.

Dashboard


call-out AImage Removedcall-out AImage Added

Insight SummaryThe Insight Summary includes a brief description of the Insight including the type of threat associated with the insight. 

call-out BImage Removedcall-out BImage Added

Priority Notification: The priority rating card displays the following information about the Insight:

  • Priority: The Insight's priority level (High, Medium, Low, or Info).
  • Date and time: The Insight's date and time of first detection and for its most recent detection. All times are adjusted to the local time zone. 

call-out CImage Removedcall-out CImage Added

Insight IDRoll over the truncated Insight ID displayed on the page to view the full-length Insight ID number in a tool tip.

call-out DImage Removedcall-out DImage Added

Copy Insight: Clickthe copy insight iconImage RemovedClickthe copy icon to copy the insight to the clipboard. 
call-out EImage Removed

call-out EImage Added

Edit insight: Click the edit iconImage RemovedClick the edit icon to change the status of an insight. nThe Insight Change Status window will appear. In the window, you can change the Insight status from Insight Open to Insight Close or Insight Close to Insight Open by toggling the status switch. Optionally, you can leave a comment in the text field at the time of the status change. Finally, you can read prior comments associated with the Insight. Click Save & Close to complete the Insight status change. Do note that the Save & Close button will not be accessible (it will be grayed out) until such time a status change has been made for the Insight.      
Image RemovedImage Added
Image: The Edit Insight window. 
call-out FImage Removed

call-out FImage Added

Share & Export Options: Click Share & Export to share a selected Insight within your organization. The Share Insight window will appear, allowing you to choose any or all information associated with an Insight. Raw logs can be downloaded in zip format while the Summary can be downloaded as a PDF by clicking Download

Image RemovedImage Added
Image: The Share Insight window. 
call-out GImage Removed

call-out GImage Added

Export: Click Export to export all insight events records in .csv format. 

call-out HImage Removedcall-out HImage Added

Events Table: The Events table displays all data associated with an event. The default table layout includes the following data columns. 

...

  • Indicator: A DNS detection and response (DDR) that represents a domain or IP address seen in the resolution chain of a query from a device. It provides valuable information about the associated asset IP, user, and operating system. The Indicator Definition helps users understand the meaning and significance of the indicators displayed in the Insight Reporting interface. Click the search in Dossier iconImage Removed in the "View in Dossier" icon in the indicator column associated with an indicator to view the Dossier Summary report for the indicator. 
  • Device Name: The name or identifier assigned to a specific device on a network. It helps in identifying and monitoring the activities of threat actors on the network. Insightful Reporting correlates data from multiple sources, such as remote domains, unique WHOIS data, IP addresses, domain registrars, and malware families, to detect patterns of malicious activity. By analyzing the device names associated with these activities, Insightful Reporting provides insights into potential targeted attacks and recommends actions to mitigate the threats.
  • Property: The protected assets or users within a network that are being monitored for potential threats. Insightful Reporting helps customers identify and analyze threat actors and their activities on their networks, allowing them to detect patterns of malicious activity and mitigate potential threats related to malware and data exfiltration. The objective of Insightful Reporting is to provide customers with insights into targeted attacks and recommend actions to protect their networks.
  • Response: The recommended actions provided to customers to mitigate potential threats detected on their networks. It helps customers understand and respond to targeted attacks, monitor for malware and data exfiltration, and identify common application patterns. The goal of the response is to provide insights into potential threats and suggest appropriate actions to block known and unknown malicious domains.
  • DNS View: Provides a comprehensive view of all security DNS events associated with an insight. It displays important information such as the threat level, threat confidence, date and time of detection, class, query, query type, user, device IP, threat family, policy, action, and source. The DNS View allows users to customize the table layout by selecting which data columns to display, search for specific events, filter events based on criteria such as threat level and query.
  • Feed: A list of domains, IP addresses, or URLs that is used to make policy decisions based on continually updated data. It is recommended to use specific threat feeds to maintain optimal security.
  • Mac Address: Refers to the Media Access Control address. It is a unique identifier assigned to a network interface controller (NIC) for communication on a network. MAC addresses are used to identify and locate devices on a network. In Insightful Reporting, MAC addresses are associated with assets and can be used as a filtering criterion to analyze and monitor network activity.
  • OS Version: Refers to the operating system and its version that is associated with the events and insights being analyzed. It helps in understanding the specific environment and potential vulnerabilities that may be exploited by threat actors. 
  • DHCP Fingerprint: A unique identifier used by BloxOne Universal DDI to identify remote DHCP clients on a network. It is formed by incorporating information from DHCP options 55 and 60, which include option number sequences and vendor IDs. The combination of these parameters helps infer the operating system and device type of the remote client. DHCP fingerprinting is used to track devices on the network and perform system identification.
  • Response Region: The geographical region from which the response to a DNS query originated. It provides information about the location of the server or network that responded to the query. The Response Region data column in the Events tab of Insightful Reporting displays the region associated with the response.
  • Response Country: The country from which the response to a DNS query originated. It is a data column that provides information about the country associated with the response received for a specific event.
  • Device Region: The geographical region where the device associated with a security DNS event is located. It provides information about the location of the device that generated the event.
  • Device Country: The country where the device associated with a security DNS event is located. It is one of the data columns displayed in the Events table, providing information about the geographical location of the device involved in the event.

The table layout is customizable. You can select which data to display by placing a tic in the checkbox associated with a data column. Conversely, you can select a data column to not display by removing the tic from the checkbox associated with the column name. 

Image RemovedThe Column Selection panel.Image Added
Image: The Column Selection panel. 
call-out IImage Removed

call-out IImage Added

SearchEnter a search criterion in the Search text box. The Cloud Services The Infoblox Portal will show all records that match the criterion.

call-out JImage Removedcall-out JImage Added

Refresh | Show:

  • Click  the refresh iconImage RemovedClick  the refresh icon to refresh the page. 
  • Click Show to see all events for a specific time period. Select Show All, Last 24 hours, Last 7 days, or Last 30 days.

Image RemovedImage Added
Image
: The Show option list. 

call-out KImage Removedcall-out KImage Added

Filtering: Clickthe filter iconImage RemovedClickthe filter icon to open the filtering panel. In the filtering panel, the following filtering criteria:

  • Threat Level: The level of certainty or trustworthiness assigned to a threat or security event. It is a measure of how confident the system is in the accuracy and reliability of the detected threat. By assigning a Threat Confidence score, Insightful Reporting can provide insights into the credibility and severity of potential threats, helping customers prioritize and take appropriate actions to mitigate them.
  • Threat Confidence: The level of certainty or trustworthiness assigned to a threat or security event. It is a measure of how confident the system is in the accuracy and reliability of the detected threat. By assigning a Threat Confidence score, Insightful Reporting can provide insights into the credibility and severity of potential threats, helping customers prioritize and take appropriate actions to mitigate them.
  • QueryQuery is the domain for the particular event.
  • Query Type: The type of DNS query made by a device on the network. It provides information about the specific type of DNS request, such as A (address) record, AAAA (IPv6 address) record, CNAME (canonical name) record, MX (mail exchange) record, etc. Query Type helps in analyzing and understanding the nature of the DNS traffic on the network and can be used to identify potential threats or suspicious activities.
  • Device IP: The IP address associated with a protected asset or device that has been affected or associated with an Insight. It provides information about the IP address or addresses associated with the asset and the date range of the first observed detection and the most recent observed detection on the network.
  • Source: The origin or originator of the threat or malicious activity detected on a network. It could be an individual, a group, or an organization that is responsible for the targeted attack or compromise. the given knowledge base is identified by correlating multiple communications with the same origin, such as IP addresses, unique WHOIS data, domain registrars, malware families, and more.
  • Indicator: A DNS detection and response (DDR) that represents a domain or IP address seen in the resolution chain of a query from a device. It provides valuable information about the associated asset IP, user, and operating system. The Indicator Definition helps users understand the meaning and significance of the indicators displayed in the Insight Reporting interface. (Click the link in the indicator column associated with an indicator to view the Dossier Summary report for the indicator. Click the link in the indicator column associated with an indicator to view the Dossier Summary report for the indicator.
  • Detected: The timestamp of the event indicating the date and time of detection.

Image RemovedImage Added
Image: The Filtering panel. 

Filtering can be performed using one or more filtering criteria. Multiple filters can be used simultaneously when filtering records.


You can also do the following on the page: 

  • Background TasksClick the hourglass iconImage RemovedClick the hourglass icon to open the side panel to view a list of all running background tasks. 

  • Search: Click the search iconImage Removed the search icon in the Search text box, then enter your search criterion. 

  • Pagination Controls: At the bottom left, there are controls for navigating through different pages of insights, indicating that there is more data available beyond what is displayed on the current page. Click on the number of insight records to display on the page. The options include, 25, 50, or 100.
  • Click <Back to Console of Insights to return to the Open Insights console.