Investigate: Investigate View

Document created by RSA Information Design and Development on Mar 27, 2018Last modified by RSA Information Design and Development on Apr 25, 2019
Version 6Show Document
  • View in full screen mode
 

The Investigate view ( INVESTIGATE ) is the primary entry point to NetWitness Investigate. The Investigate view has six submenus, which open different views that allow you to analyze events from different perspectives. The submenus are: Navigate, Events, Event Analysis, Hosts, Files, Users, and Malware Analysis.

Workflow

The figure below depicts the high-level tasks that you can perform in the Investigate view.

a high-level diagram showing all features available in the Investigate view

You can use the submenu options to move between the different views.

  • The Navigate view, Events view, and Event Analysis view offer linkages to each other to look at the current results from a different perspective, which provides some continuity for the investigation as you move between views.
  • The Hosts view and Files view integrate NetWitness Endpoint into Investigate, and provide a view of all hosts with a NetWitness Endpoint agent installed and a view of unique executable files found in the deployed environment.
  • The Users view provides visibility into risky user behaviors across your enterprise using NetWitness UEBA. You can view a list of high-risk users and a summary of the top alerts for risky behavior for your environment, and then select a user or an alert and view details about the risky behavior and a timeline during which the behaviors occurred.
  • The Malware Analysis view provides the ability to scan files found in one of the other views or collected by continuous scanning of network traffic.

When you find an event or file of interest, you can perform different actions to continue the investigation on a deeper level: reconstruct and analyze events, export events and files, perform lookups with internal and external resources, and create incidents and alerts.

What do you want to do?

                                                
User RoleI want to ...Show me how
Threat Hunterbrowse event metadataBegin an Investigation in the Navigate or Events View
Threat Hunter browse raw events Begin an Investigation in the Navigate or Events View
Threat Hunter

analyze raw events and metadata

Begin an Investigation in the Event Analysis View

Threat Hunterinvestigate endpoints (Version 11.1 and later)NetWitness Endpoint User Guide
Threat Hunterfind suspicious endpoint files (Version 11.1 and later) NetWitness Endpoint User Guide
Threat Hunterfind risky user behaviorsNetWitness UEBA User Guide
Threat Hunterscan files and events for malwareMalware Analysis User Guide

Related Topics

Quick Look

The Investigate view consists of six views, each representing a different approach to analyzing data. By default, Investigate opens to the Navigate view. You can change the default view to one of the other views as described in Configuring NetWitness Investigate Views and Preferences. See How NetWitness Investigate Works for an introduction to the uses for each view. The following figure illustrates the submenus under INVESTIGATE.

Note: The Event Analysis, Hosts, and Files submenus are available in Version 11.1 and later. The Users menu is available in Version 11.2 and later. Configured permissions per user role and user determine which submenus are displayed.

the Investigate view submenus

You are here
Table of Contents > Investigate Reference Materials > Investigate View

Attachments

    Outcomes