GRAPHICAL DISPLAY OF EVENTS INDICATING SECURITY THREATS IN AN INFORMATION TECHNOLOGY SYSTEM
1 Assignment
0 Petitions
Accused Products
Abstract
A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI.
-
Citations
50 Claims
-
1-20. -20. (canceled)
-
21. A method comprising:
-
extracting, by a computer system, one or more values from each event in a plurality of time-stamped, searchable events, wherein the one or more values are extracted from a field present in raw machine data in each event, the machine data having been produced by one or more components of an information technology environment and indicative of activity in the information technology environment; creating, by the computer system, an event group from a set of events in the plurality of time-stamped, searchable events, wherein each event in the set of events is associated with an extracted value that satisfies a security criterion; creating, by the computer system, an event group summary for the event group, wherein the event group summary summarizes one or more fields present in the machine data in the events in the event group; and causing, by the computer system, display of a plurality of event group summaries, including the event group summary, wherein the plurality of event group summaries are indicative of potential security threats in the information technology environment. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
-
49. A non-transitory machine-readable storage medium storing instructions, execution of which in a computer system on a computing network causes performance of:
-
extracting, by a computer system, one or more values from each event in a plurality of time-stamped, searchable events, wherein the one or more values are extracted from a field present in raw machine data in each event, the machine data having been produced by one or more components of an information technology environment and indicative of activity in the information technology environment; creating, by the computer system, an event group from a set of events in the plurality of time-stamped, searchable events, wherein each event in the set of events is associated with an extracted value that satisfies a security criterion; creating, by the computer system, an event group summary for the event group, wherein the event group summary summarizes one or more fields present in the machine data in the events in the event group; and causing, by the computer system, display of a plurality of event group summaries, including the event group summary, wherein the plurality of event group summaries are indicative of potential security threats in the information technology environment.
-
-
50. An apparatus comprising:
-
a value extraction device, implemented at least partially in hardware of one or more devices in a computer network, that when in operation extracts one or more values from each event in a plurality of time-stamped, searchable events, wherein the one or more values are extracted from a field present in raw machine data in each event, the machine data having been produced by one or more components of an information technology environment and indicative of activity in the information technology environment; an event group creator, implemented at least partially in hardware, that when in operation creates an event group from a set of events in the plurality of time-stamped, searchable events, wherein each event in the set of events is associated with an extracted value that satisfies a security criterion; a summary creator, implemented at least partially in hardware, that when in operation creates an event group summary for the event group, wherein the event group summary summarizes one or more fields present in the machine data in the events in the event group; and a display generator, implemented at least partially in hardware, that when in operation causes display of a plurality of event group summaries, including the event group summary, wherein the plurality of event group summaries are indicative of potential security threats in the information technology environment.
-
Specification