OVERVIEW
GENERAL
General Details
Reputation Details
ENTRY POINT
Summary
Complete
REMEDIATION
BUSINESS IMPACT
SUSPICIOUS ACTIVITY
Mitre ATT&CK™ Matrix
Suspicious Events
Uncorrelated Events
Network Events
INCIDENT DETAILS
Tree
Tree Timeline
Table Timeline Summary
Table Timeline Complete
MITRE ATT&CK™ Matrix
These are the tactics and techniques as described by the
MITRE ATT&CK™
framework.
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact
Forensics Suspicious Event
Description
Time