ESET Online Help

Search English
Select the topic

Incidents


note

The Incidents section will be released gradually in the upcoming weeks.

Incidents allow us to correlate detections into incidents, which has improved threat investigations significantly. Incidents are created automatically from detections, which significantly reduces alert triage time.

The Incidents section lists incidents automatically created from Detections based on pre-defined rules.

Filtering the view

There are different ways to filter your view:

Click the Tags selector (arrow icon) and choose a tag(s) to activate the filter on the listed incidents. Results are highlighted in blue and show incidents with the selected tags.

Click an Incident severityseverity_high High, severity_medium Medium or severity_low Low. You can combine these icons by turning them on or off.

Incident statusopen_incident Open, in_progress_incident In progress or closed_incident Closed

Click Add Filter and select incident types from the drop-down menu.

oAssignee—type the assingee name.

oAuthor—select from the drop-down menu: ESET, ESET Service or the username.

oCreation time—select from the drop-down menu: < 24h, ≥ 24h ago, ≥ 3 days ago, ≥ 7 days ago, ≥ 14 days ago, ≥ A month ago, ≥ 3 months ago or ≥ 6 months ago.

oLast update—select from the drop-down menu: < 24h, ≥ 24h ago, ≥ 3 days ago, ≥ 7 days ago, ≥ 14 days ago, ≥ A month ago, ≥ 3 months ago or ≥ 6 months ago.

oName—type the incident name.

oNumber of computers—type the number of selected computers.

oNumber of detections—type the number of selected detections.

Filters and layout customization

You can customize the current Web Console screen view:

Manage the side panel and main table.

Add filters and filter presets. You can use tags for filtering the displayed items.


note

If you cannot find a specific incident in the list and know it is in your ESET PROTECT infrastructure, ensure that all filters are turned off and permission sets are assigned to your user account.

Incident details

Select any incident(s), click the Actions button and click the three dots icon_more_vertical button to:

View Details—to display an overview of the incident.

Overview—provides the following information:

oQuick details—incident details are displayed in the main section.

oCompany impact—the number of affected Computers, Executables and Processes. Click the number to go to the related specific page.

oComments—you can Add comment for the incident. Click View all comments to display all created comments. You can Edit comment, Pin comment or Delete comment.

oDescription—incident explanation.

oRecommended steps—steps to initiate the incident response process.

Detections—list of detections. You can click the three dots icon_more_vertical icon to View Details.

Affected Computers—list of affected computers.

Incident Timeline—timeline with a brief history of incidents, from the triggering event until closing the incident.

 

Click the Respond to incident button to select the affected objects and define their response actions. Select a response action (Isolate, Log out user, Reboot, Scan & Clean) and click Confirm.

oComputers > Continue > select the response action (Isolate, Log out user, Reboot, Scan & Clean) > Confirm.

oProcesses > Continue > select the response action (Kill Process) > Confirm.

oExecutables > Continue > select the response action (Block, Block & Clean) > Confirm.

Change Status & Assignee—click to select Status and Assignee from the drop-down menu. Click Save.

Tags—click to select tags from the drop-down menu and click Apply. Or you can type a new keyword and press Enter to create a new tag.