Views:

View a visual representation of relationships between the trigger object and related objects.

The Correlation Graph provides an interactive visual graph you can use to investigate security events. There are several tools and actions you can take to focus on objects and relationships.
CorrelationGraph=83317e79-9d78-42fb-af3d-893101ccf139.png
Correlation graph

Detail
Description
Available actions
Playback bar
The playback bar provides a historical review of the events and connections detailed in the Network Analytics report
Click play, pause, or stop to control the playback.
Use the time sliders to limit the events displayed in the correlation graph to the specific time frame.
Advanced search filter
Advanced search filters provide customization to find specific events or objects in the correlation graph
Click the filter icon (dddna_graph_filter=GUID-1A803C70-BBB6-4F2B-BF16-6B5CFFFAC409=1=en-us=Low.png) to apply an advanced search filter. For more information, see Correlation Graph advanced search filter.
Correlation line
Correlation lines show the relationships between internal hosts, IoCs, and other objects detected by the network analytics report
  • Each correlation line represents one or more transactions between two hosts.
  • The thickness of the line is proportional to the number of transactions occurring between the hosts.
  • Correlation lines can be between an internal host and external server or between two internal hosts (lateral movement).
  • Each correlation line has a label with the protocols used in transactions between the hosts. An arrow within the correlation line indicates the direction of the transactions, from source to destination.
    Correlation lines involving email senders have the label Suspicious Email Activity.
Click a correlation line to filter the details provided in Transactions and IOCs
Internal hosts
Internal hosts are endpoints and other network devices located within your network
The graph identifies internal hosts by internet protocol (IP address) as well as host name and user are, if known.
Icons representing relevant information might appear next to an internal host. For example, if the internal host is on the Priority Server List or on a Trusted Service Source List, the graph displays the appropriate icon. For more information, see Network Resource Lists.
Hover over the actions icon (dddna_graph_icon_plus=GUID-674BF3B2-46AB-4463-AEB9-658F8598E69D=2=en-us=Low.png) to view a list of additional actions you can take for that host.
  • Copy to clipboard: Copy the value to your clipboard.
External servers
External servers are IP addresses, domains, and other related objects detected by Network Analytics
External servers are identified by IP address; the domain name is also supplied if known.
Email senders are identified by email address and are always displayed at the top of the External Servers side.
Other relevant information might be displayed for external hosts.
Hover over the actions icon (dddna_graph_icon_plus=GUID-674BF3B2-46AB-4463-AEB9-658F8598E69D=2=en-us=Low.png) to view a list of additional actions you can take for that host.
  • Copy to clipboard: Copy the value to your clipboard.
  • Threat Connect: Open Trend Micro Threat Connect in a new browser tab with a query for this object.
  • DomainTools (WHOIS): Open DomainTools in a new browser tab with a query for this IP address or domain.
  • VirusTotal: Open VirusTotal in a new browser tab with a query for this object.
Activity legend
The activity legend identifies key activities for the internal host and external server participants in the graph.
  • Activities vary for each specific correlation graph.
  • Can include activities similar to the following: Brute Force Authentication, C&C Callback, Data Exfiltration, Lateral Movement, Malicious Transfer, Other Malicious Activities, and Vulnerability Exploit.
-
Participant icons
Participant icons help show which activities each internal host or external server participated in
You can determine the activities in which each internal host or external server participated by checking the presence of an icon in the corresponding activity column.
Hover over an internal host or external server to see the activities in which they are participants highlighted in blue.