Network analysis sidebar
The sidebar is used to display information that is relative to one or more elements of the blueprint graph. By default it is minimized.
-
Click the icon to view node or edge information.
-
Click the icon to view a timeline of the graph.
-
Click the icon to view third-party tools.
-
Click the icon to edit a rule.
-
Click the icon to bookmark the current blueprint graph.
To minimize the sidebar, click the icon.
Node or edge information
The node/edge information tab provides additional information about a selected node or edge in the blueprint graph. To select a node, click on its icon in the graph.
Node type |
Information |
---|---|
Analysis report |
Additional information about an analysis report. Report details:
Sightings details of the analyzed sample:
|
Malicious reputation entry |
Additional information about a malicious reputation entry (IP address or domain name). Entry details:
Malicious reputation history details
|
Downloaded file |
Additional information about a downloaded file File details:
Sightings details:
|
Email address |
Provides the email address. |
Email message |
Additional information about an email message Message details:
Analyzed URLs contained in the message:
Analyzed attachments contained in the message:
|
Host |
Additional information about a host. Host-level details:
Incidents involving the host:
A note indicates if the host is internal or external to the monitored network. |
Hostname |
Additional information about a domain name that was resolved.
|
HTTP request |
Additional information about an HTTP request. URL details:
Request details
|
Threat |
Additional information about a threat Threat details:
|
When you click an edge, the following information is displayed about the connection:
-
Source node — The source of the connection. This can be a node name, an IP address, a domain name, etc.
-
Target node — The destination of the connection. This can be a node name, an IP address, a domain name, etc.
Under the Source node and Target node is the actual source or target of the connection. Click the to expand the source or target.
Timeline
View a timeline of the selected threat or analysis report.
The cards show the date and time of the selected data.
Timeline visualization data is only available for threats and analysis reports.
Third-party tools
The third-party tools tab links to external tools that may provide additional information about an entity selected in the graph. Currently, the tools supported are DomainTools and VirusTotal.
The following searches are supported:
-
Selecting a host node allows you to search for the corresponding IP address on DomainTools and VirusTotal.
-
Selecting a hostname node allows you to search for the corresponding domain name on DomainTools and VirusTotal.
-
Selecting a downloaded file node allows to search for the corresponding hash on VirusTotal.
-
Selecting an HTTP request node allows to search for the request's hostname on DomainTools and VirusTotal.
Rule editor
The rule editor is used to create or update a rule. See Network analysis rules for details of the rules, their syntax, and a selection of examples.
To use the editor, perform the following steps:
-
Select a License from the pull-down menu. The rule can be associated with All licenses (Global rule) or a specific license.
-
Select a Sensor from the pull-down menu. The rule can be associated with All sensors or a specific Sensor.
-
Enter a Rule name.
-
Enter a Rule. Refer to Network analysis rules for valid syntax and other details.
-
Provide an optional Comment to describe the rule.
-
Enter an Impact value or click the icon to change the value in steps of 10.
To save your changes to a new rule, click Create rule. For an existing rule, click Update rule.
To abandon your changes, click Reset.