Monitor Endpoints in ThreatSync

Applies To: ThreatSync

The Endpoints page provides a list of incidents grouped by endpoint, and enables Incident Responders to review and perform response actions for the incidents associated with an endpoint.

From the Endpoints page, you can:

For more information on how to perform actions on an endpoint, go to Perform Actions in ThreatSync.

Your operator role determines what you can see and do in WatchGuard Cloud. Your role must have the ThreatSync Core permission to view or configure this feature. For more information, go to Manage WatchGuard Cloud Operators and Roles.

To open the ThreatSync Endpoints page:

  1. Select Monitor > Threats > Endpoints.
    The Endpoints page opens.

  1. You can view the list of endpoints with their associated incidents for a specific time range or filter the list based on incident type, action performed, incident risk score, or endpoint risk score. For more information, go to Sort and Filter the Endpoints list in ThreatSync.
  2. To view a list of incidents for a specific endpoint, locate the endpoint in the list and click Expand icon on the right side of the row. For more information, go to Review Endpoint Details in ThreatSync.
    The incidents list for that endpoint opens.

Screenshot of the Endpoints page with an endpoint incident list expanded.

  1. To view more detailed information for a specific incident in the Incident Details page, click the incident. Tip! For more information, go to Review Incident Details in ThreatSync.

You can perform actions on endpoints and related incidents directly from the Endpoints page. For more information, go to Perform Actions in ThreatSync.

Review Endpoint Details in ThreatSync

Endpoints in the endpoint list include the endpoint name, risk score and level, a timeline of incidents related to the endpoint, and an expandable list of incidents that occurred on the endpoint.

Endpoint Risk Scores and Levels in ThreatSync

ThreatSync determines the risk score for an endpoint based on the incident risk scores associated with the endpoint in the past 30 days. The endpoint risk score is the same as the value of the highest incident risk score detected on the endpoint in the past 30 days. For example, if an endpoint has two open incidents in a 30-day period, one with an incident risk score of 9 and the another with a risk score of 7, the endpoint risk score is 9.

ThreatSync uses only new and read incidents to determine endpoint risk scores, not closed incidents. When a new incident occurs or an incident is closed, ThreatSync recalculates the endpoint risk score. After the detection of a new incident, recalculated endpoint risk scores can take several seconds to appear in the ThreatSync UI.

ThreatSync determines the risk level for an endpoint based on its risk score. ThreatSync categorizes endpoint risk scores into these risk levels:

Risk Level Risk Score Description
Critical 9,10 Endpoints with critical risk scores require immediate attention and investigation.
High 7, 8 We strongly recommend you investigate endpoints with high risk scores.
Medium 4, 5, 6 We recommend you investigate endpoints with medium risk scores.
Low 1, 2, 3 Investigate endpoints with low risk scores if you have the time and resources available.

Incident Responders can use endpoint risk scores to investigate whether a device poses a threat to the network. Risk scores appear as a numerical value in a square icon next to the endpoint in the endpoint list.

Screenshot of an endpoint risk score on the Endpoints page in ThreatSync.

Timeline

The endpoint timeline shows the sequence of detected incidents for a specified time period.

Screenshot of an endpoint timeline.

The timeline is divided into color-coded squares. Each square on the timeline represents one day. The color of the square corresponds to the risk score of the highest-risk incident from that day.

To view details about the types of incidents that occurred on a specific day, hover over a square in the timeline.

Screenshot of an endpoint timeline with the details for a day on the timeline open.

The details for the selected day can include: 

  • Incidents — The number of incidents detected for each incident type.
  • First Seen — The date and time the incident was first detected.
  • Last Seen — The date and time the incident was last detected.
  • Account — The account associated with the endpoint.

Sort and Filter the Endpoints list in ThreatSync

By default, the Endpoints page lists endpoints according to their risk level in descending order. You can manually sort the list alphabetically, by date, or by risk level. You can filter the list by incident type, action performed, endpoint risk score, or incident risk score.

Isolate an Endpoint from ThreatSync

You can isolate or stop isolation of one or more endpoints from the Endpoints page in ThreatSync.

To isolate an endpoint, from the Endpoints page in ThreatSync:

  1. Select Monitor > Threats > Endpoints.
    The Endpoints page opens.
  2. Select the check box next to one or more endpoints.
    The Actions menu appears.

Screenshot of the Actions menu on the Endpoints page.

  1. From the Actions drop-down list, select Isolate Device or, to stop isolation on an endpoint, select Stop Isolating.
    The Isolate Device dialog box opens.

Screenshot of the Isolate Device dialog box.

  1. (Optional) In the text box, enter a comment for the isolate action.
  2. (Optional) If you want to create exceptions to the isolation and allow communications from specific processes, enable Advanced Options.
    The Advanced Options and Show Message on Device sections appear in the Isolate Device dialog box.

Screenshot of the Isolate Device dialog box with Advanced Options enabled.

  1. In the Allow Communication from these Processes text box, enter the names of the processes you want to allow as exceptions to the isolation. For example, enter chrome.exe to allow communications from Google Chrome.
  2. (Optional) In the Show Message on Device text box, enter the custom message you want to show on isolated computers. If you do not want a message to show on isolated devices, disable Show Message on Device.
  3. Click Isolate Device.

Use the Remote Control Tool in ThreatSync

With the remote control tool, you can remotely connect to the Windows, Mac, and Linux computers on your network from the Endpoints page to investigate and remediate potential attacks.

To use this feature, your remote computers must have:

  • An active WatchGuard Advanced EPDR license
  • A remote control settings profile assigned in Endpoint Security. For more information, go to Configure Remote Control Settings.

To start a remote control session on an endpoint, from the Endpoints page in ThreatSync: 

  1. Select Monitor > Threats > Endpoints.
    The Endpoints page opens.
  2. Select the check box next to an endpoint.
    The Actions menu appears.

Screenshot of the Actions menu with Remote Control highlighted.

  1. From the Actions drop-down list, select Remote Control.
    The Remote Control window for the computer opens.

Screenshot of the Remote Control window with the Terminal tab open.

For information on how to use remote control, go to Remote Control Terminal — Commands and Parameters and About the Remote Control Tool.

Related Topics

Monitor ThreatSync

Incident Types and Triggers in ThreatSync

Review Incident Details in ThreatSync

ThreatSync Incident Summary

Configure ThreatSync

About the Remote Control Tool