Overview
General
Entry Point
Summary
Complete
Remediation
Business Impact
Suspicious Activity
Suspicious Events
Uncorrelated Events
Network Events
Incident Details
Tree
Tree Timeline
Table Timeline Summary
Table Timeline Complete
General Details
Incident ID:
Analysis Time:
PC Name:
OS:
Domain:
IP Address:
UserName:
Logon Time:
Detection Details
Trigger:
Trigger Time:
Trigger App:
Trigger Process:
Trigger PID: