What’s new in the WDATP Portal? July 24th, 2017
Published Oct 18 2017 01:46 AM 912 Views
Microsoft

Alert & machine reporting - Power BI content pack [Internal Preview]

WDATP Alert & machine statistics data is now consumable via a Power BI content pack and displays:

  • "Data Dashboard" - Summary of the past month, showing:
    • Machine statistics: Breakdown by machine health status, and by OS platform
    • Alerts: Breakdown by: severity, status, detection source
    • Resolved alerts: Breakdown by severity, by detection source, by precision, and trend of resolved alerts (by day)

 35.jpg

Clicking on any of the tiles will take you to the respective tab that drills down further into the data:

  • "Machines tab" - Summary of the past month, showing:
    • Machine statistics: Breakdown by machine health status, OS platform, and domain
    • Alert statistics: List of machines, ranked by # of reported alerts, alert breakdown by severity and status, by category, and by threat family

 32.jpg

  • "Alerts tab" - Summary of the past month, showing:
    • Alert statistics: Breakdown by severity, status, detection source, (machine) domain, category, threat family
    • Alert lists: ranked list of alerts, total number of alerts, and total number of machines reporting that alert, and a list of the reported alerts

 33.jpg

  • "Investigation results tab" - Summary of the past month, showing:
    • Resolved Alerts statistics: Breakdown by severity, detection source, daily trend (# of alerts resolved), and category
    • Classification and resolution: Average time to resolve, alert precision, breakdown by classification & resolution, and # resolutions per analyst
    • List of alerts and details

 34.jpg

Note: Access to this feature is currently limited within Internal Preview and not [yet] fully exposed via the WDATP portal to all approved users on the MSIT tenant

 

Tagging in portal [Internal Preview]

We now support adding custom tags to machines (e.g. SAWs, etc.), to support easier filtering and focusing on customer-defined grouping.

Filter the Machines list by custom tag/s

 39.jpg

Managing and applying custom tags to machines

 40.jpg

Custom tags appear on the Machine page

 42.jpg

"Restrict code execution" response action [Internal Preview]

In this update, we're further enhancing response capabilities and adding the ability to disrupt & contain attacker activity by applying a lock down policy on potentially compromised machines to prevent execution of unknown, malicious programs.

The new "Restrict code execution:" response action will be available in the portal for Windows 10 machines running the Creators Fall (RS3) update.

To use this new capability:

 

  1. Open the action menu and select "Restrict code execution"44.jpg
  2. Type a comment (optional) and select yes to take action on the machine
  3. The action center shows the submission information similarly to other response action
  4. When execution restriction action is applied on the machine, a new event is reflected in the machine timeline

45.png
Note: undoing execution restriction is also possible from the console by opening the action menu and selecting "Undo restrict code execution" on a machine the action was previously applied on.

 

We'd love to hear your feedback on the new features - that's it for this time!

Version history
Last update:
‎Oct 18 2017 08:21 AM
Updated by: