Security Tools
XDR Dashboard
Endpoint visibility, process trees, and response actions.
XDR Dashboard
The XDR (Extended Detection and Response) dashboard provides deep visibility into endpoint activity, including process execution, file changes, and network connections.
Interface Overview
1. Endpoint List
View all monitored endpoints:
- Hostname - Device name
- Status - Online, Offline, Isolated
- OS - Windows, macOS, Linux
- Last Seen - Most recent activity
- Risk Score - Based on recent alerts
2. Alert Queue
XDR-specific alerts focusing on:
- Process execution anomalies
- Suspicious file modifications
- Unusual network connections
- Registry/config changes
- Persistence mechanisms
3. Process Tree
Visualize parent-child process relationships:
explorer.exe
└── cmd.exe
└── powershell.exe
└── net.exe
└── [Network Connection: 185.243.xx.xx:443]Click any process to see:
- Command line arguments
- Start time and duration
- User context
- File hash (MD5, SHA256)
- Network connections
4. Timeline
Event-by-event breakdown:
| Time | Event | Details |
|---|---|---|
| 14:32:01 | Process Start | powershell.exe |
| 14:32:03 | File Create | C:\Temp\payload.ps1 |
| 14:32:05 | Network | Outbound to 185.243.xx.xx |
| 14:32:07 | Registry | Run key modified |
Response Actions
Take immediate action on threats:
Isolate Endpoint
Disconnect the device from the network while maintaining management access:
- Select the endpoint
- Click Isolate
- Confirm the action
- The device is network-isolated but manageable
Kill Process
Terminate a malicious process:
- Click on the process in the tree
- Select Kill Process
- Optionally kill child processes
- Process terminates immediately
Collect Evidence
Gather forensic data:
- Select Collect
- Choose data types (memory, files, logs)
- Evidence package is created
- Download for offline analysis
Block Hash
Prevent a malicious file from executing:
- View the file hash
- Click Block Hash
- Hash is added to blocklist
- All endpoints will block this file
Key Techniques to Watch
| Technique | Indicators |
|---|---|
| Living off the Land | PowerShell, cmd, wmic, certutil |
| Persistence | Scheduled tasks, Run keys, services |
| Credential Access | LSASS access, mimikatz patterns |
| Lateral Movement | PsExec, WMI, RDP to multiple hosts |
| Exfiltration | Large uploads, unusual protocols |
Tips for Success
Always check the process tree - understanding parent-child relationships reveals the attack chain.
- Suspicious child processes of Word/Excel suggest malware
- PowerShell with encoded commands needs investigation
- Processes spawning network connections to rare IPs are high-priority
- Check if the user account makes sense for the activity