This website uses cookies. By clicking OK, you consent to the use of cookies. Click Here to learn more about how we use cookies.
OK
  • RSA.com
  • Products
    • Archer®
      • Archer®
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Archer® Exchange
      • Training
      • Upcoming Events
      • Videos
    • RSA® Fraud & Risk Intelligence Suite
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Web Threat Detection
      • Upcoming Events
      • Videos
    • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Cloud
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Patch Content
      • Videos
    • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication Mobile SDK
      • Advisories
      • Events
      • Ideas
      • Knowledge Base
      • Request Access
      • Training
    • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication for eCommerce
      • RSA® Adaptive Authentication for eCommerce
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® FraudAction Services
      • RSA® FraudAction Services
      • Advisories
      • Discussions
      • Documentation
      • Ideas
      • Videos
    • RSA® Web Threat Detection
      • RSA® Web Threat Detection
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Videos
    • RSA NetWitness® Platform
      • RSA NetWitness® Platform
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA NetWitness® Detect AI
      • RSA NetWitness® Detect AI
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Investigator
      • RSA NetWitness® Investigator
      • Documentation
      • Download the Client
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Orchestrator
      • RSA NetWitness® Orchestrator
      • Overview
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA SecurID® Suite
      • RSA SecurID® Suite
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Knowledge Base
      • Ideas
      • Integrations
      • Training
      • Videos
    • RSA® Identity Governance & Lifecycle
      • RSA® Identity Governance & Lifecycle
      • Advisories
      • Blog
      • Community Exchange
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA SecurID® Access
      • RSA SecurID® Access
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • Other RSA® Products
      • Other RSA® Products
      • RSA® Access Manager
      • RSA® Data Loss Prevention
      • RSA® Digital Certificate Solutions
      • RSA enVision®
      • RSA® Federated Identity Manager
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
  • Resources
    • Advisories
      • Product Advisories on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Hosted
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Product Advisories
    • Blogs
      • Blogs on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Blogs on RSA Link
    • Discussion Forums
      • Discussion Forums
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Discussion Forums on RSA Link
    • Documentation
      • Product Documentation
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Downloads
      • Product Downloads
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Downloads on RSA Link
    • Ideas
      • Idea Exchange
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Knowledge Base
      • Knowledge Base
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Knowledge Base Pages on RSA Link
    • Upcoming Events on RSA Link
      • Upcoming Events
    • Videos
      • Videos on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Videos on RSA Link
  • Support
    • RSA Link Support
      • RSA Link Support
      • News & Announcements
      • Getting Started
      • Support Forum
      • Support Knowledge Base
      • Ideas & Suggestions
    • RSA Product Support
      • RSA Product Support
      • General Security Advisories and Statements
      • Product Life Cycle
      • Support Information
      •  
      •  
      •  
      •  
      •  
  • RSA Ready
  • RSA University
    • Certification Program
      • Certification Program
    • Course Catalogs
      • Course Catalogs
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • On-Demand Subscriptions
      • On-Demand Subscriptions
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • Product Training
      • Product Training
      • Archer®
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Identity Governance & Lifecycle
      • RSA NeWitness® Platform
      • RSA SecurID® Access
    • Student Resources
      • Student Resources
      • Access On-Demand Learning
      • Access Virtual Labs
      • Contact RSA University
      • Enrollments & Transcripts
      • Frequently Asked Questions
      • Getting Started
      • Learning Modalities
      • Payments & Cancellations
      • Private Training
      • Training Center Locations
      • Training Credits
      • YouTube Channel
    • Upcoming Events
      • Upcoming Events
      • Full Calendar
      • Conferences
      • Live Classroom Training
      • Live Virtual Classroom Training
      • Webinars
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

Visit the Known Issues dashboard if you are experiencing issues on RSA Link

View Dashboard

RSA NetWitness® Platform Online Documentation

Browse the official RSA NetWitness Platform Online documentation for helpful tutorials, step-by-step instructions, and other valuable resources.
  • RSA Link
  • :
  • Products
  • :
  • RSA NetWitness Platform
  • :
  • Documentation
  • :
  • Online Documentation
  • :
  • Investigation: Visualize Metadata as Parallel Coor...
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content
    • English
    • French (Français)
    • German (Deutsche)
    • Japanese (日本人)
    • Spanish (Español)
Versions
Collections
All Downloads

Table of Contents

  •   Release Notes
    •   Release Notes 11.5
      •   What's New
      •   Fixed Issues
      •   Known Issues
      •   End of Life Functionality
      •   Product Documentation
      •   Getting Help with NetWitness Platform
      •   Build Numbers
      •   Revision History
    •   Release Notes 11.5.0.1
      •   Introduction
      •   Upgrade Instructions
      •   Build Numbers
      •   Appendix
    •   Release Notes 11.5.1
      •   What's New
      •   Fixed Issues
      •   Product Documentation
      •   Getting Help with NetWitness Platform
      •   Build Numbers
      •   Revision History
    •   Release Notes 11.5.2
      •   What's New
      •   Fixed Issues
      •   Product Documentation
      •   Getting Help with NetWitness Platform
      •   Build Numbers
      •   Revision History
    •   Release Notes 11.5 Language Pack
      •   Introduction
      •   Contact Customer Care
      •   Product Documentation
      •   Revision History
  •   Getting Started
    •   RSA NetWitness Platform
      •   Introduction
      •   User Roles
      •   Basic Navigation
      •   Logs and Network Investigation
      •   Endpoint Investigation
      •   User Entity Behavior Analysis
      •   Common Use Cases and Business Value
    •   Feeds, Parsers and Hunting Packs
      •   Content Quick Start Guide
      •   Network Data and Logs Hunting Guide
      •   UEBA Essentials Hunting Guide
      •   UEBA Essentials Hunting Pack
      •   Content Bundles (Packs)
      •   Investigation Model for Information Security Incident Response
      •   Investigation Feed
      •   Simple Feed Creation
      •   A Treatise on Writing Packet Parsers
      •   Log Parser Customization
      •   All RSA Content Information
  •   Install and Upgrade
    •   Understand the Architecture and Plan
      •   Look at Deployment from a High Level
      •   Choose Your Deployment Options
      •   Review the Architecture and Ports
      •   Third-Party Licenses
    •   Understand Licenses
      •   Understand NetWitness Licenses
    •   Download RSA NetWitness Platform Software
      •   View All Downloads
    •   Install on a Physical Host
      •   Set up Hardware
      •   Physical Host Installation
      •   Create a Build Stick
      •   Configure and Allocate Storage
    •   Install on an On-Premise Host
      •   Install on an On-Premise Virtual Host
      •   Configure and Allocate Storage
      •   Deploy Health and Wellness (BETA) on a Dedicated Virtual Host
    •   Install in the Cloud
      •   Install on an AWS Instance
      •   Install on an Azure Virtual Machine
      •   Install on a Google Cloud Platform Instance
      •   Configure and Allocate Storage
    •   Install Endpoints
      •   About Insights and Advanced Endpoint Agents
      •   Install an Endpoint Server
      •   Install Endpoint Agents
      •   Install and Configure an Endpoint Relay Server
      •   Migrate Version 4.4.0.x to RSA NetWitness Platform
    •   Install Standalone UEBA Server
      •   Install NetWitness UEBA
      •   Integrate with Third-Party SIEM
    •   Install Platform Licenses
      •   Understand How Licensing Works
      •   Understand License Types
      •   Install Product Licenses
    •   Upgrade from 11.x to 11.x
      •   11.x Physical or Virtual Host to Version 11.5
      •   11.x Physical or Virtual Host to Version 11.5.0.1
      •   11.x Physical or Virtual Host to 11.5.1
      •   11.x Physical or Virtual Host to 11.5.2
  •   Configure and Manage
    •   Basic Services
      •   Hosts and Services
      •   Deploy Hosts and Install Services
    •   Live Services
      •   Live Services Management
    •   Configure Network Data Capture
      •   Configure a Network Decoder
      •   Configure a Broker or Concentrator
      •   Start and Stop Data Capture
      •   Filter Data and Set Up Alert Rules
      •   Configure Feeds and Parsers
    •   Configure Log Collection
      •   Capture Data
      •   Basic Log Collection
      •   Supported Event Sources
      •   Event Sources for Log Collection
      •   Search for Specific Event Sources
      •   Windows Legacy Collector
      •   Customize Log Parsers
      •   Edit Log Parsers
      •   Archive Log Data
      •   Enable Endpoints for Log Collection
      •   Integration with LogStash
      •   Event Export Connector Installation and Configuration Guide
    •   Configure Endpoint Data Collection
      •   Configure the Endpoint Log Hybrid
      •   Forward Endpoint Data to a Log Decoder
      •   Define Agent Behavior
      •   Risk Score Calculation
      •   Monitor Endpoints outside Your Network
    •   Configure UEBA
      •   Configure UEBA Users
    •   Configure Real-Time Analysis, Enrichment Lookup, and Automated Threat Detection
      •   Event Stream Analytics
      •   Best Practices for Writing ESA Rules
      •   Enrichment Lookup Capability
      •   Automated Threat Detection
    •   Configure Incident Management Capability
      •   Incident Response Settings
    •   Configure Application Settings
      •   Configure Access, Notification, Logging, Investigation, Live, and Syslog Settings
      •   Configure Your Dashboard
      •   Review the Dashboards Catalog
    •   Configure Reports
      •   Set Up RSA NetWitness for Report Generation
      •   Generate Reports
      •   Review Reports
      •   Review Core Compliance Reports
    •   Configure Security and User Access
      •   Secure the RSA NetWitness Platform Network
      •   Set Up System-Level Security Settings
      •   Change the Default Admin Password
      •   Configure External Authentication
      •   Configure PKI Authentication
      •   Use a Custom Server Certificate
      •   Manage Users with Roles and Permissions
      •   Implement Data Privacy
    •   Configure Audit Logging and Notifications
      •   Monitor Health and Wellness
      •   Monitor Health and Wellness Using Kibana
      •   Reissue Certificates
      •   Track License Usage
      •   Tune Core Database Performance
      •   Manage Periodic Backups and Incidental Restoring
    •   Maintain the System
      •   Monitor Health and Wellness
      •   Monitor Health and Wellness Using Kibana
      •   Reissue Certificates
      •   Track License Usage
      •   Tune Core Database Performance
      •   Manage Periodic Backups and Incidental Restoring
  •   Investigate and Respond
    •   Respond to Incidents
      •   Incident Management
      •   Use Case Examples
    •   Configure System and View Investigate Settings
      •   Configure Query and Session Attributes for Analysts
      •   Configure Global Default Settings and Limits for Investigate
      •   Configure Navigate and Legacy Events View Settings (User Preference)
      •   Configure Events View Settings (User Preference)
      •   Configure Malware Analysis View Settings (User Preference)
    •   Investigate Network Data and Logs
      •   https://community.rsa.com/videos/34434
      •   Use Query Hints in the Events View
      •   Conduct Malware Analysis
    •   Investigate Endpoints
      •   Review the Workflow
      •   Isolate a Host from the Network
    •   Analyze User and Entity Behavior
  •   Integrate and Develop
    •   RSA NetWitness Platform Integrations Catalog
      •   Integration Catalog
      •   Integrate with RSA Archer
      •   Integrate with RSA SecurID
      •   Integrate with NetWitness Endpoints
    •   Developer Tools
      •   Use the NetWitness API
      •   Use the RESTful API
      •   Use the NwConsole
      •   Use the nw-shell Utility to Troubleshoot Operations

Product Resources

  •   Advisories
    •   Product Advisories
    •   Security Advisories
    •   Service Notifications
    •   Technical Advisories
  •   Blog
  •   Discussions
  •   Documentation
    •   Online Documentation
    •   Detect AI
    •   Hardware Setup Guides
    •   Investigator
    •   Orchestrator
    •   Threat Intelligence
  •   Downloads
    •   RSA NetWitness Platform
    •   RSA NetWitness Investigator
  •   Events
  •   Ideas
  •   Integrations
  •   Knowledge Base
  •   Training
  •   Videos

This topic tells analysts how to use the parallel coordinates visualization in the Navigate view to focus the investigation on combinations of meta keys and values that may indicate events are abnormal and worth investigation.

The parallel coordinates chart is a way of visualizing the current drill point in Investigation to examine more than two meta keys simultaneously. Visualizing multiple meta keys simultaneously can help in identifying security issues associated with multivariate patterns and comparisons, such as when individual meta keys and values may not be of concern, but combining them together may bring an abnormal pattern or relationship to light. 

Best Practices for Effective Parallel Coordinates Charts

To create effective parallel coordinates charts, follow these recommendations:

  • Start from a drill point in the Navigate view rather than attempting to visualize all data. 
  • Limit the time range if necessary.
  • Choose the smallest useful set of meta keys to display as axes. 
  • Specify the sequence of axes to highlight anomalies between the meta values as you follow a line across the chart.
  • When you can identify a useful set of meta keys and sequence, create a custom meta group to use for future investigations. For example, you can create a custom meta group for Windows executable file types.
  • Import custom meta groups that RSA has distributed through the RSA community.
  • Re-use and share custom meta groups by importing and exporting groups as .jsn files.
  • It may be useful to create two versions of each custom meta group. One for analysis of meta values and one for creating a parallel coordinates chart focusing on a smaller subset of the same use case.

Note: When importing meta groups meta groups into Security Analytics server, Security Analytics displays an error message if any of the groups are already present in Security Analytics.  To import a group that is a duplicate, you must first delete the existing group. If you want to delete a meta group, it can not be in use by a profile.

To help build better parallel coordinates charts, several optimizations are included in Security Analytics10.5 and above.

  • Analysts can specify that only sessions in which all meta keys exist are rendered in the chart.
  • The administrator can increase the number of meta values rendered in the Parallel Coordinates Settings in the Administration System view.

RSA Meta Groups for Parallel Coordinates Use Cases

A set of predefined custom meta groups is available through the RSA community as a jsn file: MetaGroups_ootb_w_query.jsn. To get started with some meta groups that RSA has configured to highlight certain activities, you can import this .jsn file in the Manage Meta Groups dialog. Some of the targeted activities that lend themselves well to Parallel Coordinates visualizations are:

  • Botnet Beaconing
  • Covert Channels
  • Email
  • Encrypted Sessions
  • File Analysis
  • Malware Analysis
  • Query Files
  • Query Hosts
  • Query IPs
  • Query Mail
  • Query Users
  • Query Web
  • SQL Injection Attacks
  • Threat Analysis
  • Web Analysis

View a Parallel Coordinates Visualization

From an investigation in the Investigation > Navigate view:

  1. If the Visualization panel above the Values panel is closed, select Visualization.
  2. In the toolbar, select Use Meta Group > File Analysis.
  3. In the Values panel, in the Forensic Fingerprint meta key, click windows_executable and then javascript, so that the breadcrumb reads filetype = 'windows_executable' | filetype = 'javascript'.
    PCprocValues_525x94.png
  4. A default visualization for the current drill point is displayed as a timeline.
    PCVisDef_518x290.png
  5. In the Visualization panel, select Options.
    The Visualization Options dialog is displayed.
  6. In the Visualization drop-down list, select Coordinates and click Apply.
    VisOptDga_327x327.png
    The visualization is loaded. In this example, 249 events are found and 199 unique paths are visualized.
    PCVisanykeys_526x295.png

Select Meta Keys for a Parallel Coordinates Visualization

With a Parallel Coordinates visualization open, do the following:

  1. In the Visualization panel, select Options.
    The Visualization Options dialog is displayed. In the toolbar, click ic-info2_17x15.png to display the recommended number of axes for a readable visualization. When a recommended count of keys is displayed, the count changes based on the browser size. If you make the browser window larger, the recommended count is increased.
    VisOptDgInfo_331x331.png
  2. If you want to change the sequence of the meta keys, drag meta keys up or down to the desired sequence. 
  3. If you want to delete any meta keys, click in the selection box, and click icon-remove.png.
    The meta keys are removed, but the change has not been applied.
  4. If you want to revert to the previous state, click icon-revert.png.
    Any meta keys you have deleted are restored and any changes that you made are removed.
  5. If you want to select individual meta keys, click icon-add.png, select From Default keys, and in the drop-down list, select the meta keys.
    AddPCKeys_329x387.png
    The selected keys are listed.
    AddKeysPCDg2_332x349.png
  6. If you want to add all the keys in a meta group, you cannot add individual meta keys. Select From Meta Groups, and select a group from the drop-down list.
    AddPCGrps_332x465.png
    The selected meta groups are listed in the field.
  7. Select the method of adding the keys or groups: Replace the current list of keys, Append to the current list of keys (at the end), or Insert at the beginning of current list of keys.
    AddMeth_326x343.png
  8. To complete the procedure, click Add.
    The Visualization Options dialog is displayed with the meta keys or groups you selected.
  9. To display the new visualization chart, click Apply.
    PCVisanykeys_524x294.png

Optimize a Parallel Coordinates Visualization

  1. To optimize the visualization by removing events in which not all meta keys exist, select Options.
    105PcOpt_334x333.png
  2. In the Visualization Options dialog, select All Meta Keys Must Exist in an Event. Click Apply.
    The resulting graph is more readable and useful and usually has fewer unique paths.
    PCVisAllKeys_519x278.png
  3. If you want to highlight a small set of points to see the path of the line from right to left, click on an axis. The cursor changes to cross hairs, which you can drag to select one or more values. When you let go of the mouse, the lines are highlighted. In the example below, the SSL service type is highlighted by a gray  box.
    PCVisHighl_529x293.png
  4. If you want to enlarge the visualization, drag the bottom edge of the panel down and drag the right edge of the browser window wider.

Sample Use Case

Below is an example of a parallel coordinates visualization of meta keys representing file metadata in a session. There are three meta keys or axes from left to right: Extensions, Forensic Fingerprint, and Filename with values listed along each axis. Values on the Extension axis show the file extension, and values on the Forensic fingerprint axis are windows executables. Normally the file type matches the expected forensics fingerprint; however, it is abnormal for a gif file type to be combined with the Windows executable fingerprint. The gif file type is selected to highlight the correlations of that file type, x86pe , and two filenames in the third axis so that an analyst can quickly identify the files that merit investigation.

To reach this view:

  1. Order by Value and Sort in Ascending order.
  2. Apply two filters (file type = 'windows executable' and extension = 'gif') in the Navigate view to limit the amount of data.
  3. Configure a parallel coordinates chart by choosing three axes: file extension, forensic fingerprint, and filename.
    invsamp_522x297.png

Sample Visualization of a Large Data Set

This example of a parallel coordinates visualization applied to a larger set of data illustrates several messages that help analysts to understand what has been charted.

  • To create a chart, Security Analytics begins scanning meta values and returning results. A typical time range could have up to 10,000,000 meta values. When the number of meta values returned reaches the Meta Values Result Limit, the chart is rendered even if Security Analytics has not scanned a number of meta values equal to the Meta Values Scan Limit. 
  • There is a fixed limit on the amount of data that can be rendered as a parallel coordinates chart. In Security Analytics 10.4 and prior, the limit is based on the number of axes times data values: 1000 x the number of axes to protect performance, but in Security Analytics 10.5 and above the administrator configures parallel coordinates limits as part of the Investigation settings In the  Administration > System view.

PCVisanykeys_567x319.png

With a larger set of data, the parallel coordinates chart takes longer to process than the smaller set of data and meta keys. To preserve performance, Security Analytics renders the meta values from the Values panel below until the limits set by the Administrator are reached. An informational message tells you: Only a subset of events is displayed.

Of all the data visualized for 249 events, there were only 199 unique parallel coordinates paths. Some events are included though they do not include some of the meta keys; these are labeled DNE because the meta does not exist in the event.

Previous Topic:Use Investigation Profiles to Encapsulate Custom Views
Next Topic:Query Data in the Navigate View
You are here
Table of Contents > Conduct an Investigation > Filter Information in the Navigate View > Visualize Metadata as Parallel Coordinates
Labels (3)
Labels:
  • User Guides

  • Version 10.6

  • Version 10.6.5

Tags (19)
  • 10.6
  • 10.6.5
  • 10.6.6
  • Docs
  • Documentation
  • intermediate
  • NetWitness
  • NW
  • NWP
  • Product Docs
  • Product Documentation
  • RSA NetWitness
  • RSA NetWitness Platform
  • threat hunter
  • user guide
  • User Manual
  • Version 10.6
  • Version 10.6.5
  • Version 10.6.6
0 Likes
Was this article helpful? Yes No
Share
No ratings

On this page

Powered by Khoros
  • Products
  • Resources
  • Solutions
  • RSA University
  • Support
  • RSA Labs
  • RSA Ready
  • About RSA Link
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
© 2020 RSA Security LLC or its affiliates.
All rights reserved.