Skip to main content
Skip table of contents

Policy Violations Page

To access the Policy Violations page:

  1. Log in to LogRhythm NDR's new UI.
  2. Click Hunt from the sidebar menu and then click Policy Violations.
    The Policy Violations page appears displaying the total number of violations which are further classified as Critical, High, Medium, and Low.
    The incidents are generally categorized based on Severity, Certainty, and Score. By default, the incidents are summarized based on severity.
  3. To change the category, click the drop-down menu available next to the Dialog Box/Side Panel toggle button and select the required category.
  4. Click on a particular entry to open a drop-down table that contains further details.
    Details such as Occurred On, Score, Certainty, Severity, Case ID, Entry Origin, Entry Type, Trigger, Src, and Dest. are listed in the table.
  5. Click the column headers in the table to sort the table entries in ascending/descending order.

  6. To group the entries, drag and drop the column entries to a designated space.
  7. To add or remove column headers, click the Show Columns icon.
  8. To export the case details, click the Export icon.

  9. To show/hide column grouping space, click the Show/Hide Column Group icon.
  10. To show/hide column filters, click the Show/Hide Column Filters icon.
  11. To filter from the list of available policy violations, use the Anomaly and Score sliders.
    The Anomaly slider filters policy violations based on severity.

    The Score slider filters entries based on score.
  12. To open a particular policy violation without detailed summary, set the Dialog Box/Side Panel toggle button to Off.
  13. To get detailed summary of a policy violation, set the Dialog Box/Side Panel toggle button to On.

More Details Window

  1. To get a more detailed summary, click the three-dot menu option available at the bottom of the Summary panel.
    The More Details... page appears displaying details such as summary, recommendation, details, source, and destination.
    The Entry Origin table is displayed which maps the rule and the time period in which that policy violation was created.
    Below the Entry Origin table, the Highlighted Events and All Events tab are available.
  2. Click the Bookmark icon to bookmark the selected entry.
  3. Click Investigate at the top right of the page to further investigate a particular policy violation.
  4. To select one of the following actions, click the three-dot menu icon:
    • Email Alert
    • Whitelist
    • Run Firewall SmartResponse
    • Close Incident
    • Open Case
    • Mark for Investigation
  5. To further filter the events, use the Anomaly and Threat Severity sliders available in the Highlighted Events tab.
    The highlighted users chart is displayed below the sliders where the policy violation events and types are mapped to their respective dates.
    The highlighted users table is presented with information such as Occurred on, Info., Activity , Category, and Attribute.
  6. Click the column headers in the table to sort the table entries in the ascending or descending order.
  7. To export the table details, click the Export icon.

  8. To filter the entries, click the Show/Hide Column Filters icon and select your filter parameters.

  9. In the Info column of the table, the Alert Event option is available to the user.

  10. Click the Alert Event drop-down option, corresponding to a particular entry to choose one of the following: 
    • Whitelist - To whitelist an entry.
    • Payload - To view payload as Text and Hex.
    • Make Main Event - To make the entry a main event.
    • Auto Main Event - To revert back to the original main event.
    • Rapid 7
  11. Click the corresponding links provided in the table, for further information on the topics.
  12. To view the event details, click anywhere on the row.
    There are 3 tabs available in the event page: Details tab, Raw Data (JSON) tab, and Related Logs tab.
  13. To view the source and destination IP addresses, click the Details tab.
  14. To view the raw data in JSON format, click the Raw Data (JSON) tab.
  15. To see all the related logs, click the Related Logs tab.
    The Activity timeline for this particular policy violation is displayed at the end of the More Details window.
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.