Dan,
Thanks for the response, very helpful information to know. I'll share my ideas and answers to your questions below:
I certainly agree that presenting every UDP transaction would be overly noisy for most deployment situations. Perhaps a toggle feature, similar to the ability to filter on Event Type within the timeline view? I'm imagining selecting only network communications, with further options for selecting TCP and/or UDP communications. Even when selecting UDP from the dropdown menu, I think it would be beneficial to provide 5-tuple summaries similar to how the timeline currently summarizes encrypted network communications with the source process tree and destination IPs (ex: chrome.exe communicated over the network using an encrypted channel), adding in the destination port would help with lead information.
1) What was the trigger for typical investigation cases?
Various NIDS alerts for newly seen outbound UDP traffic (VOIP Traffic to a cloud service as an example)
2) Was it HTTP over UDP traffic or something else?
VOIP and its supporting protocols (sip, stun/turn), NTP, DNS
3) Inbound or outbound traffic.
Outbound
4) What data in the machine time line or in the investigation experience of ATP could help you?
A summary of source process, destination IPs, ports, would help. (ntpd.exe communicated over UDP 123 with 6 IPs)
5) Anything else you might think will be useful.
Even if the information doesn't make sense to view in the timeline feature, perhaps adding a table within the Advanced Hunting feature dedicated to UDP communications would help during an investigation?
Thanks again,
Ricky