Movatterモバイル変換


[0]ホーム

URL:


Loading
  1. Elastic Docs/
  2. Solutions and use cases/
  3. Security solution/
  4. Investigation tools

Visual event analyzer

Elastic Security allows any event detected by Elastic Endpoint or supported third-party integrations to be analyzed using a process-based visual analyzer, which shows a graphical timeline of processes that led up to the alert and the events that occurred immediately after. Examining events in the visual event analyzer is useful to determine the origin of potentially malicious activity and other areas in your environment that may be compromised. It also enables security analysts to drill down into all related hosts, processes, and other events to aid in their investigations.

If you’re experiencing performance degradation, you canexclude cold and frozen tier data from analyzer queries. This setting is only available for the Elastic Stack.

You can visualize events from the following sources:

In KQL, this translates to any event with theagent.type set to:

The visual analyzer also supports analyzingevent.kind: "alert" events from third-party integrations. To view these events, your role must haveread privileges for thealerts-security.alerts-* indices.

To find events that can be visually analyzed:

  1. First, display a list of events by doing one of the following:

  2. Filter events that can be visually analyzed by entering one of the following queries in the KQL search bar, then selectingEnter:

  3. Events that can be visually analyzed are denoted by a cubicalAnalyze event icon. Select this option to open the event in the visual analyzer. The event analyzer is accessible from theHosts,Alerts, andTimelines pages, as well as the alert details flyout.

    analyze event button
Tip

You can also analyze events fromTimelines.

Within the visual analyzer, each cube represents a process, such as an executable file or network event. In the analyzer, you can:

  • Zoom in and out of the Analyzer Graph view using the slider
  • Click and drag around the Analyzer Graph view to explore the hierarchy of all process relationships
  • Observe child process events that spawned from the parent process
  • Determine how much time passed between each process
  • Identify all events related to each process

Use the following icons to perform more actions:

  • To understand what fields were used to create the process, select theProcess Tree icon () to show the schema that created the Analyzer Graph view. The fields included are:

    • SOURCE: Indicates the data source—for example,endpoint orwinlogbeat
    • ID: Event field that uniquely identifies a node
    • EDGE: Event field that indicates the relationship between two nodes
  • Click theLegend icon () to show the state of each process node.

  • Select a different data view () to further filter the alert’s related events.

  • Use the time filter () to analyze the event within a specific time range. By default, the selected time range matches that of the table from which you opened the alert.

  • Click the list icon () to open the preview analyzer panel. This displays a list of all processes related to the event, starting with the event chain’s first process. TheAnalyzed Event—the event you selected to analyze from the events list or Timeline—is highlighted with a light blue outline around the cube.

visual event analyzer

Process and event details

To learn more about each related process, select the process in the preview analyzer panel or the Analyzer Graph view. The preview analyzer panel then displays process details such as:

  • The number of events associated with the process
  • The timestamp of when the process was executed
  • The file path of the process within the host
  • Theprocess-pid
  • The user name and domain that ran the process
  • Any other relevant process information
  • Any associated alerts
process details
×process details

When you first select a process, it appears in a loading state. If loading data for a given process fails, clickReload{{process-name}} beneath the process to reload the data.

Access event details by selecting that event’s URL at the top of the process details view or choosing one of the event pills in the Analyzer Graph view. Events are categorized based on theevent.category value.

When you select anevent.category pill (for example,x file orx registry), all the events within that category are listed in the preview analyzer panel. To display more details about a specific event, select it from the list.

Note

To examine alerts associated with the event, select the alert pill (x alert). The preview analyzer panel lists the total number of associated alerts, ordered from oldest to newest. Each alert shows the type of event that produced it (event.category), the event timestamp (@timestamp), and rule that generated the alert (kibana.alert.rule.name). Click on the rule name to open the alert’s details.

In the example screenshot, the analyzed event (sdclt.exe) generated three alerts. The preview analyzer panel displays basic information about each one.

alert pill
×alert pill

[8]ページ先頭

©2009-2026 Movatter.jp