This article discusses how you can use the Stories Workbench to review XDR stories for Cato EPP alerts.
The Cato EPP solution integrates with Cato XDR to generate stories for endpoint devices. The endpoint stories help you get a more complete picture of potential threats in your network, and you can conduct investigations in a unified XDR platform extending into both the network and the endpoint.
The Cato Endpoint Alert engine creates a story by correlating data from all Cato EPP alerts that occurred on the same device within a 24-hour period. Cato Endpoint Alert stories include all relevant evidence detected by Cato EPP. The Stories Workbench shows the Cato EPP stories together with the other story types, and you can sort and filter the stories to focus on the Cato Endpoint Alert stories.
The Stories Workbench page shows a summary of the stories for the potential threats in your account.
For information about the columns in the Stories Workbench see Understanding the Stories Columns.
You can group and filter the stories according to the Cato Endpoint Alert story type to quickly find stories for endpoint devices. For more about grouping and filtering stories, see Reviewing Detection & Response (XDR) Stories in the Stories Workbench.
You can click on a story in the Stories Workbench to drill-down and investigate the details in a different page. This page contains a number of widgets that help you evaluate the potential threat identified in the story.
When you drill-down to investigate an Endpoint Alert story, you can review all the EPP Alerts that the story is based on, and examine in detail the pieces of evidence that relate to each Alert. The Evidences include processes, files, and registry values, and can be reviewed in two different ways:
-
A chronological process tree presented in the context of a specific Alert - This helps you understand the sequence of events that looked suspicious and generated the Alert
-
The Evidences table - Provides an overview of the Evidences from all the Endpoint Alert stories. This helps to assess more broadly the prevalence of specific malicious or suspicious activities on the endpoint device
These are the story drill-down widgets:
Item |
Name |
Description |
---|---|---|
1 |
Story summary |
A summary of basic information about the story, including:
Click |
2 |
Shows a timeline of the story, such as changes made to the story verdict and severity, and when new Alerts are added to the story |
|
3 |
Details |
Basic information for analyzing the story, including:
|
4 |
Device |
Name, operating system, and MAC address for the endpoint device associated with the story |
5 |
User |
Shows the user name and domain name for the user logged into the endpoint device |
6 |
Alerts |
Shows details for the Alerts related to the story.
These are the columns in the Alerts table:
|
7 |
Evidences |
Aggregates details for all the Processes and Files identified in the evidence for the various story Alerts. Some of the columns in the Evidences table are shared by all the types of Evidences, and some are specific per type. These are the columns that appear for all types of Evidences:
These are the specific columns for each type of Evidence:
|
0 comments
Please sign in to leave a comment.