blackberry CylanceMDR 24×7 Managed Extended Detection and Response Service User Guide

September 13, 2024
BlackBerry

CylanceMDR 24×7 Managed Extended Detection and Response Service

Specifications

  • Product Name: CylanceMDR
  • Requirements: CylancePROTECT and CylanceOPTICS, optional
    CylanceGATEWAY

Product Information

CylanceMDR is a comprehensive cybersecurity solution that offers
threat monitoring, detection, triage, response, and hunting
capabilities. It integrates with various endpoint protection
solutions and provides access to threat prevention status updates
and incident navigation.

Subscription Features

The subscription includes different levels such as On-Demand,
Standard, Advanced, and Pro. Each level offers specific features
like threat monitoring, triage, response, threat hunting, advisory
services, and more. The Pro subscription also includes third-party
application integration for enhanced security.

Usage Instructions

Logging in to the Portal

To access the CylanceMDR portal, go to the login page and enter
your credentials to log in securely.

Profile Management

Within the portal, you can manage your profile settings,
including reconfiguring multi-factor authentication and changing
your password for security purposes.

Dashboard Overview

The dashboard provides a snapshot of your cybersecurity status,
displaying key metrics and alerts for quick insights into your
threat landscape.

Contact Management

You can create new users within the portal and export a list of
users for reference or administrative purposes.

Escalations and Reports

Utilize the escalation feature to manage incidents effectively.
You can also generate and export detailed reports for in-depth
analysis.

FAQ

What are the key features of CylanceMDR subscriptions?

The key features include threat monitoring, detection, triage,
response, threat hunting, advisory services, and third-party
application integration for Pro subscriptions.

CylanceMDR
User Guide

2024-08-06Z | |2

Contents
Overview…………………………………………………………………………………………….. 4
CylanceMDR requirements…………………………………………………………………………………………………………………… 5 System requirements…………………………………………………………………………………………………………………………… 6 CylanceMDR On- Demand……………………………………………………………………………………………………………………… 7 Third-party log source integration………………………………………………………………………………………………………….7 Configuration and firewall settings for CylanceMDR syslog mirroring…………………………………………………….. 8 Critical event management mobile app integration with CylanceMDR……………………………………………………10 CylanceMDR email addresses to allow………………………………………………………………………………………………..11 Onboarding and configuration……………………………………………………………………………………………………………. 11
Log in to the portal…………………………………………………………………………….. 12
Profile………………………………………………………………………………………………. 13
Reconfigure multi-factor authentication……………………………………………………………………………………………….13 Change your password………………………………………………………………………………………………………………………. 14
Dashboard…………………………………………………………………………………………. 15
Contacts……………………………………………………………………………………………. 18
Create a user…………………………………………………………………………………………………………………………………….. 18 Export a list of users…………………………………………………………………………………………………………………………. 19
Escalations………………………………………………………………………………………… 20
Searching for alerts…………………………………………………………………………………………………………………………….20 Set the priority of an alert………………………………………………………………………………………………………………….. 21 Change the assignee…………………………………………………………………………………………………………………………. 21 Add comments………………………………………………………………………………………………………………………………….. 21 Close an alert……………………………………………………………………………………………………………………………………..22
Reports………………………………………………………………………………………………23
Export a report……………………………………………………………………………………………………………………………………23
| | iii

Overview

CylanceMDR is a subscription-based, 24×7-managed extended detection and response (XDR) service that provides actionable intelligence for customers to prevent threats quickly, while minimizing alert fatigue without requiring additional resources. This service is fully integrated with CylancePROTECT, CylanceOPTICS, and CylanceGATEWAY and can be integrated with third-party vendors to provide holistic and unified telemetry across all endpoints. Highly skilled BlackBerry analysts threat-hunt through customer environments to find and contain threats, prevent major breaches, and allow organizations to mature their security posture. BlackBerry has the strategy, expertise, and technology to protect an organization by analyzing, preventing, and containing threats as well as large-scale breaches.
CylanceMDR requires CylancePROTECT and CylanceOPTICS but with the CylanceMDR Pro subscription, you can use your current endpoint protection, detection, and response solutions. CylanceGATEWAY is optional. For more information, see the CylanceMDR requirements.

What’s included in the subscription

The following table highlights the features that are included in CylanceMDR On-Demand, Standard, Advanced, and Pro subscriptions.
The CylanceMDR Standard, Advanced, and Pro subscriptions include closed-loop communications and access to a CylanceMDR analyst to help navigate incidents and provide regular updates and ongoing review of the overall threat prevention status. For CylanceMDR Pro subscriptions, third-party application integration is available, such as for firewall integration. For CylanceMDR On- Demand subscriptions, support is provided on demand only.

Feature
Onboarding (Alert finetuning and Cylance product configuration)

CylanceMDR On-Demand

CylanceMDR Standard

CylanceMDR Advanced

CylanceMDR Pro 1

24×7 threat monitoring

24×7 threat

detection

24×7 triage and

response

24×7 threat hunting

Custom threat hunting

Monthly reports

Advisory services

| Overview | 4

Feature

CylanceMDR On-Demand

CylanceMDR Standard

CylanceMDR Advanced

CylanceMDR Pro

Critical Event Management mobile app

Threat intelligence indicators of compromise (IOC) integration

24×7 phone support

Advanced threat intelligence (simulation, validation, monthly reports)

Incident response

Optional add-on

Optional add-on

and forensic

investigation

Service level

objectives

$1,000,000 guarantee

Eligible2

Eligible2

Third-party log

source integration

(for example,

firewall integration)

1 Alert finetuning is included but configuration is available for Cylance products only. Cylance products are optional for CylanceMDR Pro subscriptions.
2 For information about eligibility requirements, see CylanceMDR $1 Million Guarantee.

CylanceMDR requirements

The following table lists the products and solutions that CylanceMDR supports and highlights which are required, optional, and not applicable for CylanceMDR On-Demand, CylanceMDR Standard, CylanceMDR Advanced, and CylanceMDR Pro subscriptions.
For example, your organization must have CylancePROTECT and CylanceOPTICS if you want to subscribe to CylanceMDR Standard or Advanced. If your organization wants CylanceMDR to receive and monitor alerts from third-party integrations such as firewall, email gateway, and cloud providers, you must subscribe to CylanceMDR Pro.

| Overview | 5

Product

CylanceMDR On-Demand

CylanceMDR Standard

CylanceMDR Advanced

CylancePROTECT CylanceOPTICS CylanceGATEWAY

Required Optional1 Optional1

Required Required Optional1

Required Required Optional1

Third-party log

N/A

N/A

N/A

source integration

(for example,

firewall integration)

1 If you want to integrate these features, an additional purchase may be required.

CylanceMDR Pro
Optional1 Optional1 Optional1 Optional1

System requirements

CylanceMDR requires the following:
· CylancePROTECT Desktop agent, CylancePROTECT Mobile app, and CylanceOPTICS agent installed on the endpoints.
· CylanceGATEWAY desktop agent installed on the endpoints. · The latest Google Authenticator app is required to log in to the CylanceMDR (CylanceGUARD) portal using
multi-factor authentication (MFA).

Requirement

Description

Agent and operating system versions

It is recommended that you run the latest version of the agent that’s supported for your OS with the CylanceMDR solution. See the OS compatibility matrix content for each of the agents:
· CylancePROTECT Desktop compatibility matrix · CylancePROTECT Mobile compatibility matrix · CylanceOPTICS compatibility matrix · CylanceGATEWAY compatibility matrix
For software and hardware requirements for each of the agents, see the requirements content.
For information about the software lifecycle for BlackBerry enterprise products, see the BlackBerry Enterprise Software Lifecycle Reference Guide.

Data storage and collection

CylanceMDR collects data that is natively collected by CylancePROTECT and CylanceOPTICS. Potential forensic data sets may be collected in the case of an incident. Data collection includes information contained in both CylancePROTECT and CylanceOPTICS alerts as well as data captured through the Package Deploy (Refract) and InstaQuery. Package Deploy has the ability to pull forensic artifacts from the file system at almost any level, while InstaQuery returns filesystem, registry, process, and network information from the customer environment.

| Overview | 6

CylanceMDR On-Demand
The CylanceMDR On-Demand subscription is a convenient and helpful option if your organization monitors the alerts that are reported to the Cylance console. With this subscription, you can request CylanceMDR support on demand for any alerts that you think might be a threat but you need the time and expertise of a CylanceMDR analyst to help you resolve it. You can request support from an alert in an alert group in the Alerts view in the Cylance console. CylanceMDR analysts are immediately notified with the alert details and can start their investigation and assess the threat. To track and follow up on the investigation (for example, to share additional details), you can log in to the CylanceMDR (CylanceGUARD) portal and find the alert in the Escalations screen.
Third-party log source integration
When you integrate CylanceMDR with third-party log sources for managed XDR services, you unify endpoint detection and response (EDR) with other security and business tools for improved visibility and control of security incidents across the business in a single console. Related telemetry data from various tools across the environment are automatically associated with a single incident, reducing manual effort and unnecessary context switching. Based on the efficacy, correlation, and actions of incidents from the various telemetry sources, CylanceMDR can be optimized to automatically take action against security incidents in real time. A CylanceMDR Pro subscription is required to support third-party log sources. The following table lists some examples of third-party log sources that can be integrated with CylanceMDR so that suspicious activities can be reported and tracked from the Cylance console.
| Overview | 7

Solution

Examples of third-party log sources

Firewall integration can help identify and track unauthorized network access and suspicious network activity.

· Barracuda · Check Point · Cisco · F5 · Juniper · Palo Alto

Identity and access management integration can help identify and track user activity such as suspicious authentication attempts and access to resources.

· Beyond Trust · Citrix · NetIQ · OneLogin · VMware

Cloud service platform integration can help identify and track suspicious activity across cloud services that are deployed across your organization.

· Microsoft Azure · Microsoft Office 365 · Amazon Web Services

Email gateway integration can help analyze and track email messages that contain threats such as malware.

· Fortinet · IronScales · Open LDAP

Security Incident and Event Management (SIEM) technology supports threat detection, compliance, and security incident management through the collection and analysis (both near real-time and historical) of security events, as well as a wide variety of other event and contextual data sources.

Exabeam

Configuration and firewall settings for CylanceMDR syslog mirroring
To allow communication between BlackBerry syslog mirroring servers and your organization’s syslog servers, you need to configure your organization’s firewall to allow connections from the appropriate BlackBerry IP addresses. Additionally, you need the FQDN (or IP) address and port of your organization’s syslog servers, which needs to present a signed, TLS-enabled, server certificate to receive syslog messages. If your organization requires mTLS authentication, you need to provide a signed client certificate to BlackBerry. The following table lists the configuration details, such as the IP addresses that you should allow based on your assigned region for the Cylance Endpoint Security management console, as well as information about how to generate an mTLS client certificate for BlackBerry.
For assistance with setting up syslog mirroring for your organization, visit https://myaccount.blackberry.com/ and open a case for CylanceMDR. A CylanceMDR analyst will work with your organization to complete the configuration.

| Overview | 8

Requirement

Description

Allow the source IP address (from BlackBerry)

Based on your assigned region, configure your firewall to allow connections from the appropriate IP address from BlackBerry:
· US: 52.202.215.1 · EU: 52.29.124.76 · JP: 35.73.65.169 · AU: 54.206.75.195 · SA: 54.232.154.173

Destination address and port number

You need the FQDN (or IP) address and port number of your organization’s syslog server that will receive the syslog messages. A signed, TLS-enabled, server certificate is required to establish a connection for syslog mirroring.

Protocol

TLS encrypted syslog over TCP

mTLS authentication (optional)

If mTLS authentication is required for your organization, you need to generate an mTLS client certificate and provide it to BlackBerry.
When generating the mTLS client certificate:
· Use the certificate signing request (.csr) that BlackBerry provides to your organization.
· Verify that TLS Web Server Authentication and TLS Web Client Authentication are present when signing the client certificate. Also, use the same certificate authority as your organization’s syslog server.

example command to generate a mTLS client certificate

openssl x509 -req -CA rootCA.crt -CAkey rootCA.key -in blackberry.csr -out blackberry.crt -days 3650

| Overview | 9

Requirement
Processing the header of the forwarded syslog event

Description
Syslog events that are forwarded to your organization’s syslog servers have an extra header, in addition to the header of the original event. The header for the original event provides the accurate date and time of the event. You can configure your organization’s system to process the extra header, which has the date and time of when the message was forwarded.
The extra header is in RFC5424 format and is bolded in the example below:
2022-09-08T00:25:00.000Z 11.11.111.11 CylancePROTECT[-]: 1138 <44>1 2022-09-08T00:24:57.000000+00:00 sysloghost CylancePROTECT – – [5555abcd-abcd- wxyz-a123-12345abcdef] Event Type: NetworkThreat, Event Name: blocked connection, Eco Id: AbC/AaaaaaBBBcc0DeFGhIJ=, User: …
Prior to the November 2022 update, the extra header was in RFC3164 format and is bolded in the example below:

<13> Sep 08 00:25:00 11.11.111.11 CylancePROTECT[-]: 1138 <44>1 2022-09-08T00:24:57.000000+00:00 sysloghost CylancePROTECT – – [5555abcd-abcd- wxyz-a123-12345abcdef] Event Type: NetworkThreat, Event Name: blocked connection, Eco Id: AbC/AaaaaaBBBcc0DeFGhIJ=, User: …

Critical event management mobile app integration with CylanceMDR

CylanceMDR users can receive notifications through the BlackBerry AtHoc mobile app when a security incident is escalated to their organization. The AtHoc mobile app is another channel from which users can be notified as
| Overview | 10

soon as possible of any incidents that require attention. From the app, users can quickly access the CylanceMDR portal from their mobile device and learn more about the incidents.
You can request critical event management integration to be enabled for your CylanceMDR organization. When it is enabled, CylanceMDR users receive a Welcome email with information about how to download and register the AtHoc mobile app. For more information, see Register the BlackBerry AtHoc mobile app for the CylanceMDR service.
After a user registers the AtHoc mobile app on the device, they receive app notifications when a security incident is escalated to them. For more information, see Responding to CylanceMDR alerts in the AtHoc mobile app.

CylanceMDR email addresses to allow

You can expect to receive email messages from CylanceMDR and analysts. To prevent the email messages from being blocked or marked as spam, it is recommended that your email software is configured to allow messages from the certain addresses and domains. The following table lists the email addresses and domains that you should allow:

Email address or domain

Description

admin@portal.cylance.io

This email address is used for email notifications from the Cylance Endpoint Security management console, such as invitations and escalations for CylancePROTECT and CylanceOPTICS.

noreply@blackberry.com

This email address is used for email notifications from CylanceMDR, such as invitations and onboarding email messages.

*.blackberry.com

You may receive email messages, such as reports, from analysts that have an email address in this domain.

*.service-now.com

You may receive automated email messages, such as incident escalation notifications, from CylanceMDR that have an email address in this domain.

Onboarding and configuration
CylanceMDR is deployed through a proven onboarding process led by a ThreatZero expert while leveraging CylancePROTECT, CylanceOPTICS, and CylanceGATEWAY agent technology. When the deployment process is complete, you are granted access to a transparent web portal where you can manage threats to the environment.

| Overview | 11

Log in to the portal
When you are invited to use the CylanceMDR (CylanceGUARD) portal, you receive an email with login information. Click the link in the email and follow the instructions on the screen to set a new password and set up multi-factor authentication using the Google Authenticator app to complete the registration process. The authenticator app is used to generate a multi-factor code that is required each time you log in to the CylanceMDR portal. Before any of your organization’s users can access the CylanceMDR portal, an administrator in your organization must log in and accept the relevant end user license agreements: the BlackBerry Solution License Agreement and the Professional Services Agreement. Before you begin: You must download and install an authenticator app, such as Google Authenticator, on your mobile device. 1. Click the portal link in the email invitation. 2. Enter your username and password. 3. If prompted, change and confirm your password. 4. Enter the six- digit code displayed in the authenticator app. If you’re logging in for the first time, follow the
instructions on the screen to set up multi-factor authentication. a) On your mobile device, open the Google Authenticator app. b) Tap + > Scan a QR code to scan the QR code that is displayed on the screen. c) On your computer, in the 6-digit code field, enter the code that the authenticator app generated. d) Tap Pair device and login. 5. If it is displayed, read the BlackBerry Solution License Agreement and the Professional Services Agreement and select the checkbox to agree to them. The portal dashboard opens. You are logged in.
| Log in to the portal | 12

Profile
On the Profile screen, you can fill in your user profile to add information about yourself, including contact information. You can do the following: · Set your location · Fill in your bio · Add contact information such as email and phone numbers · Enable accessibility · Set your time zone · Reconfigure multi- factor authentication · Change your password
Reconfigure multi-factor authentication
When you reconfigure multi-factor authentication, you can generate new codes and invalidate codes that are generated on previously-configured devices (for example, if your device was lost or stolen), or you can add other devices that will generate the same code. If you are trying to log in and you have lost access to your device that you already configured with multi-factor authentication, click the Click here to receive a one time code via email option at the top of the 2-Factor Authentication screen. After you log in, you can follow these steps to reconfigure it. Before you begin: You must download and install an authenticator app, such as Google Authenticator, on your mobile device. 1. On the menu, click Profiles. 2. In the User preferences section, click Configure Multi-Factor Authentication.
A dialog with a QR Code appears. 3. Do one of the following:
· If you want to generate new codes and invalidate codes that are generated on previously configured devices (for example, if your device was lost or stolen), click Generate a new code and OK to confirm.
| Profile | 13

· If you want to keep codes generated on previously-configured devices valid and add another device that will generate the same code, skip this step.
4. Follow the instructions on the screen to configure multi-factor authentication: a) On your mobile device, open the Google Authenticator app. b) Tap + > Scan a QR code to scan the QR Code that is displayed on the screen. c) If you chose to generate new codes, enter the new code and tap Pair device.
At the top of the dialog box, a Multi-factor authentication has been successfully configured message displays in green.
Change your password
1. On the menu, click Profiles. 2. In the Security section, click Change Password. 3. In the Current Password field, enter your current password. 4. In the New password field, enter your new password. 5. In the Confirm password field, confirm your new password. 6. Click Change.
| Profile | 14

Dashboard
The CylanceMDR Dashboard page has an interactive layout that visually displays the various types of alerts that were escalated in your organization, as well as top threats by alert type or target. You can set the timeframe to limit the data that is presented on the dashboard. For example, you can limit the data to the last 24 hours so that you view only a list of escalations that occurred in that timeframe. If you manage multiple child organizations, you can also limit the results to specific organizations. These settings can be found on the top right of the Dashboard page. If there is no data available according to the specified timeframe, the widget will display “No data”. The following dashboard views are available out of the box: · Executive Summary: This view provides a high level view of the overall protection status and threat landscape,
such as visualizations of open and resolved alerts, as well as a map of threat sources. · Operations: This view provides a quick report of the open escalations and top types of threats allowing users
to target high-priority threats and resolve them as soon as possible. · Threat Summary: This view provides a quick report of the number of incidents, escalated incidents, open
escalations, and the top rules that were applied to fewest devices, allowing users to see the effectiveness of their threat strategy and take necessary actions. Executive Summary dashboard
The following alert metrics are displayed in the Executive Summary tab of the dashboard: · Device health: View a score that is calculated based on the number of devices running supported versions of
the Cylance agents, the enablement of agent policy features, and the completion of threat mitigation actions. · Protection: View the current percentage of alerts that are resolved. · Escalations: View a graph of escalations to see the ratio of unresolved threats by severity, as well as threats
that were already resolved. You can click on parts of this widget to view a list of all open escalations, or view a list of open escalations of a specific severity. Escalations are alerts that are brought to the attention of your organization. · Average MTTR in last 30 days: View the average time for analysts to escalate and close alerts in the last 30 days.
| Dashboard | 15

· Targeted users: View the number of users that were targeted. · Targeted devices: View the number of devices that were targeted. · Unresolved Alerts Severity: View a graph that shows the status of overall alerts by severity. At a glance, you
can see the ratio of resolved and unresolved alerts. Unresolved alerts are incoming alerts that CylanceMDR analysts are working on that may or may not be escalated to your organization for attention. · Threat Source Heat Map: View a map of threat sources to understand where attacks are originating from. You can click the numbers that appear on the map to see the severity of threats for each geographic area. Operations dashboard
The following alert metrics are displayed in the Operations tab of the dashboard: · Device health: A score that is calculated based on the number of devices running supported versions of the
Cylance agents, the enablement of agent policy features, and the completion of threat mitigation actions. · Average MTTR in last 30 days: View the average time for analysts to escalate and close alerts in the last 30
days. · Open Escalations: View a list of open escalations that might require your attention, such as those with critical
and high severity. You can click on an alert to quickly jump to its details. · Top Alert Types: View the top alert types to see the alert types (such as memory exploit attempts, script
control threats, and network threats) that are reported most frequently in your organization. · Detected Malware by Subclass: View the top malware types by subclass, such as whether a threat was a
trojan, virus, or worm. · Top Scripts Convicted: View the top scripts to see the scripts that are run the most often in your organization
that are also generating alerts. Hover over a script in the list to see the full directory path to the script. · Alert Types Over Time: View the top alert types that have occurred over a period of time. You can adjust the
timeframe by sliding the bar below the x-axis and click the alert types to show or hide them in the graph. · Top Targeted Processes: View the top targeted processes to see the processes that are most often targeted
by threats. · Top Targeted Devices: View the top targeted devices to see the devices that are generating the most alerts. · Top Targeted Users: View a list of users that have encountered the most threats. · Top Response Actions By Type: View a list of the top response actions that were used to resolve threats.
| Dashboard | 16

Threat Summary dashboard
The following alert metrics are displayed in the Operations tab of the dashboard: · Response actions taken: The number of actions taken within the specified timeframe. · Alerts detected: The number of alerts detected within the specified timeframe. · Average MTTR in last 30 days: View the average time for analysts to escalate and close alerts in the last 30
days. · Incidents: View the total number of incidents that were escalated and not escalated. · Escalated incidents: View a list of incidents that were recently escalated. · Device health: A score that is calculated based on the number of devices running supported versions of the
Cylance agents, the enablement of agent policy features, and the completion of threat mitigation actions. · Open Escalations: View a list of open escalations that might require your attention, such as those with critical
and high severity. You can click on an alert to quickly jump to its details. · Top Ten Rules Applied to the Fewest Devices: View a list of CylanceOPTICS rules that were applied to the
fewest devices.
| Dashboard | 17

Contacts
On the Contacts page, administrators in an organization can add and manage their CylanceMDR users. They can also export a list of users in PDF, CSV, and Excel format.
Create a user
If you are an administrator of an organization, you can add users so that they can use the CylanceMDR portal. If you manage multiple organization accounts in CylanceMDR, you can select the organization that the user can access (if you select a parent organization, they can also access its child organizations). If you want to create an administrator, you must contact BlackBerry Support.

  1. On the menu, click Contacts. 2. Click Create New User. 3. Enter the following required information:
    · User ID · Account · First Name · Last Name · Email address 4. Optionally, enter the following information. · Business Phone · Mobile Phone · Title · Language 5. Click Submit. After you finish: The user receives an email invitation to access the CylanceMDR portal. They must follow the instructions in the email message to complete the registration.
    | Contacts | 18

Export a list of users
1. On the menu, click Contacts. 2. Click and do one of the following:
· Click Export as PDF. · Click Export as Excel. · Click Export as CSV. 3. Save the file to your computer.
| Contacts | 19

Escalations
An alert is a collection of events that are correlated into a single incident. The Escalations page provides users details and access to the triggering events captured from CylancePROTECT and CylanceOPTICS. Each alert that was escalated displays as a separate escalation on this page and can be assigned to you or another group member. You can add comments to escalations to communicate with CylanceMDR analysts about the threat. If your organization is subscribed to CylanceMDR Standard or Advanced, analysts monitor your alerts for you and will escalate them to you if they require your attention. When an analyst identifies a threat and escalates it in your organization, designated groups in your organization are notified and you can view them on the Escalations page. If your organization is subscribed to CylanceMDR On-Demand, you must manually request CylanceMDR support from the Alerts page in the Cylance console. These requests are escalated to CylanceMDR analysts so that they can investigate. You can follow up on these requests from the Escalations page in the CylanceMDR (CylanceGUARD) portal. On the Escalations page, you can do the following: · Click an alert or escalation in the list to view its details. · Enter keywords in the search field to filter the alerts. · For advanced search, click .
Searching for alerts
On the Escalations page, you can quickly filter the results by organization, search for keywords, or apply specific search filters. For example, specify multiple search filters such as hostname, username, domain, comment, timestamp, and many other attributes. Filter by organization: If your organization has parent or child accounts associated with it, you can select an organization from the list to filter it by organization. Keyword search: Type some keywords in the search bar to quickly apply a keyword filter.
| Escalations | 20

Add search filters: Click to add search filters and specify a set of conditions that must be met. If you want to add an alternative set of criteria, you can click New Criteria. Click Run to start the search and display the results. Save search filters: To save a search filter for later use, click Save Filter. Specify a name for the filter and its visibility. Load search filters: To load a search filter that was saved, click Load Filter and click the search filter that you want. You can also delete a search filter from here. Sort search filters: You can click Add Sort to sort the results according to a specific field. You can also click the column headings in the search results to sort the results in ascending or descending order. Clear search filters: To remove all search criteria, click Clear All. Filter out results: To quickly hide alerts that have a specific value, right-click the value that’s displayed on the screen and select Filter Out. For example, if you see alerts listed with several priority levels, you can use this option to hide alerts with the “P5” priority from the results. Show matching results only: To quickly see alerts that have a specific value only, right-click the value that’s displayed on the screen and select Show Matching. For example, if you see several devices listed in the results, you can use this option to show the alerts that are related to the “Windows_PC_123ABC” device only.
Set the priority of an alert
1. Open the details view of an alert. 2. Beside Priority, click . 3. Select the priority that you want to set for the alert. 4. Click Save.
Change the assignee
From an alert details page, you can assign an alert to other individuals within the currently assigned group. Both the original and new assignee are notified. 1. Open the details view of an alert. 2. Beside Assignee, click . 3. Select the user that you want to assign the alert to. 4. Click Save.
Add comments
You can add comments when you view the details of an alert. Use comments to share useful information and note the actions that need to be taken to resolve the threat. Comments in the conversation are shown in reverse chronological order. When you add comments, CylanceMDR sends email notifications. 1. On the menu, click Escalations. 2. Click the alert that you want to add a comment to. 3. On the right pane, in the Activity tab, type your comment in the Comments box. 4. If you want to attach a file, click Add attachments and select the file that you want to add. 5. Click Send.
| Escalations | 21

The comment is added to the conversation and the text box is cleared.
Close an alert
You can close an alert when your organization considers it to be resolved or when no further action is required. You can also leave a comment for a CylanceMDR analyst to let them know that it can be closed. When an alert is closed, it cannot be reopened. 1. Open the details view of an alert. 2. Beside Status, click . 3. Select Closed. 4. Click Save.
| Escalations | 22

Reports
The Reports page displays more detailed alert metrics for your organization. Beside each alert metric, you can choose to export a report in XLS, CSV, or PDF format. The following are some examples of reports that are displayed on this dashboard: · Closed alerts by event trigger type · Escalated alerts detail · User last login
Export a report
CylanceMDR exports the results that are currently displaying on the Reports screen. For example, if multiple organizations are associated with your organization account, you can select a child organization to filter the results and export the reports for it. If no specific organizations are selected, the results for all organizations that you manage are displayed. 1. On the menu, click Reports. 2. If necessary, select the organizations that you want to filter the reports for and click Apply.
The filter is applied and the reports on the page are refreshed. 3. Beside the report that you want to export, click and do one of the following:
· Click Export as PDF. · Click Export as Excel. · Click Export as CSV. 4. Save the file to your computer.
| Reports | 23

References

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals