ESET PROTECT – Table of Contents

Incidents

Incidents allow us to correlate detections into incidents, improving threat investigations. Incidents are created automatically from detections, which significantly reduces alert triage time.

The Incidents section lists incidents automatically created from Detections based on pre-defined rules.

Filtering the view

There are different ways to filter your view:

Click the Tags selector (arrow icon) and choose a tag(s) to activate the filter on the listed incidents. Results are highlighted in blue and show incidents with the selected tags.

Click an Incident severityHigh severity High, Medium severity Medium or Low severity Low. You can combine these icons by turning them on or off.

Incident statusOpen Open, In progress In progress, scheduled Waiting for input or Closed Closed

Click Add Filter and select incident types from the drop-down menu.

oAssignee—type the assingee name.

oAuthor—select from the drop-down menu: ESET, ESET Service or the username.

oClose reason—select from the drop-down menu: All, False positive, Suspicious, True positive.

oCreation time—select from the drop-down menu: ≤ Today, ≤ 24h ago, ≤ 3 days ago, ≤ 7 days ago, ≤ 14 days ago, ≤ 30 days ago, ≤ 90 days ago or ≤ 180 days ago.

oLast update—select from the drop-down menu: ≤ Today, ≤ 24h ago, ≤ 3 days ago, ≤ 7 days ago, ≤ 14 days ago, ≤ 30 days ago, ≤ 90 days ago or ≤ 180 days ago.

oName—type the incident name.

oNumber of computers—type the number of selected computers.

oNumber of detections—type the number of selected detections.

Filters and layout customization

You can customize the current Web Console screen view:

Manage the side panel and main table.

Add filters and filter presets. You can use tags for filtering the displayed items.


Note

If you cannot find a specific incident in the list and know it is in your ESET PROTECT infrastructure, ensure that all filters are turned off and permission sets are assigned to your user account.


Important

The permissions you configure are applied to the parent company of the static group you selected in the Static Groups step.

Gear Presets

Filter sets.

Open the ESET Inspect Web Console Inspect

Open the ESET Inspect Web Console Incidents section. ESET Inspect is only available when you have ESET Inspect license and ESET Inspect connected to ESET PROTECT. A Web Console user requires Read permission or higher for Access to ESET Inspect.

Refresh Refresh

Refresh the page.

Incident details

Select any incident(s), click the Actions button and click the three dots More button to:

View Details—to display an overview of the incident.

Overview—provides the following information:

oIncident details are displayed in the main section.

oCompany impact—the number of affected Computers, Executables and Processes. Click the number to go to the related specific page.


Important

Executables and Processes are available only for customers with EDR tier with active ESET Inspect license. You will be redirected to the cloud ESET Inspect console to see the lists.

oComments—you can Add comment for the incident. Click View all comments to display all created comments. You can Edit comment, Pin comment or Delete comment.

oDescription—incident explanation.

oMITTRE ATT&CK® techniques—available MITTRE ATT&CK techniques for the selected incident.

oRecommended steps—steps to initiate the incident response process.

Detections—list of detections. Click a detection to view the detection details. You can view a process tree with process and detection nodes:

Process tree


Important

Currently, we provide only the beta version of the process tree, with only the selected detection displayed.

 


Important

Detection details for detections and processes are available for incidents created after the ESET PROTECT 6.4 release update (August 1, 2025). If you have incidents created before the ESET PROTECT 6.4 release update, you will be redirected to the cloud ESET Inspect console to see more details.

The process tree allows users to navigate through detection. You can click a process node (a rounded node) or a detection node (a rectangle node) in the process tree to display details based on data availability:

arrow_down_businessDetection node:
arrow_down_businessProcess node:

Affected Computers—list of affected computers.

Incident Timeline—timeline with a brief history of incidents, from the triggering event until closing the incident.

In every section, you can click:

the Inspect button to redirect into ESET Inspect and investigate the incident in the incident graph.

the refresh button Refresh to refresh the page.

Click the Respond to incident button to select the affected objects and define their response actions. Select a response action (Isolate, Log out user, Reboot, Scan & Clean) and click Confirm.

oComputers > Continue > select the response action (Isolate, Log out user, Reboot, Scan & Clean) > Confirm.

oProcesses > Continue > select the response action (Kill Process) > Confirm.

oExecutables > Continue > select the response action (Block, Block & Clean) > Confirm.

Change Status & Assignee—click to select from the drop-down menu.

oStatus—select the incident's current status from the drop-down menu: Open, In progress, Waiting for input or Closed. When you select Closed, additionally select the reason for closing the incident (True positive, Suspicious, False positive or invalid) and optionally write a comment.

oAssignee—when you selected Open or In progress status, select the available user from the drop-down menu.

Click Save.

Tags—click to select tags from the drop-down menu and click Apply. Or you can type a new keyword and press Enter to create a new tag.