Monthly Service Report

Introduction

The monthly Service Report represents an aggregation of all the activity Field Effect MDR discovered within a month. It's meant to act as a single resource you can use for investigations and identifying gaps that may impact your organization's cyber security posture. 


The metrics in this report quantify the threats identified over the month, as well as deliver a broad analysis of different areas of you threat surface. Reports are available in the MDR Portal's Reports View, where you can read or download them.


To view a full sample report, see the attachment at the end of this article. 


These reports are unique to every organization, and you can see an example report below. The report is divided into the follow sections:


This article outlines what to generally expect from each section of a monthly report, though it will vary per organization and month.

 

The Sections of a Monthly Service Report

The following sections of this article provide examples of each section included in the monthly Service Report.


Title & Health Check

The title page of the report provides a summary health check for your organization.

  

The logic for this health check label is based on the presence of unresolved AROs. So, if any AROs remaining unresolved at the time the report to generated, the health check will be set to "at risk".



Introduction

This section contains general information about the report, the intended audience, how to use the report, and contact information if you need help or are experiencing an emergency incident.



Your Field Effect Service

This section provides a summary of Field Effect’s active features and services in your environment. In the example below, all services are enabled except for cloud monitoring.


 

Your Network

This section reports on observed devices and the most resolved domains throughout the month.




Monitoring Threats to Your Environment

This section reviews all relevant events observed over the month and provides key insights from our analysts. 



Your Network

This section tallies the number of network related security events for the month, along with any applicable insights from our analysts.



Threat Intelligence

If malicious systems, domains, botnets, ransomware operators and other Indicators of Compromise (IOCs) are discovered within your network, they will be included in this section.



Threat Hunting

In addition to automated and machine-learning-driven analytics monitoring your network, the Field Effect Threat Hunting Team is continuously scouring your environment for emerging threats, signs of undiscovered threat actors and never-before-seen malware.



Beacon Detection

Field Effect monitors your network for devices emitting beacons, which are periodic communications from your network to systems on the internet. All beacon events from the month are tallied in this section. A map is also included to show the geographical location of detected beacons, along with their risk level.



Top Beacon Destinations

The most active beacons discovered on your network are included in this subsection as a chart.



Scan Detection

Online scanners are automated tools that seek to identify systems on the internet to gather information about them. These scanners have the potential to be malicious, and Field Effect monitors for suspicious scans. If any are found, they are included in this section of the monthly report.



Threat Surface Reduction

This section reviews all AROs issued within the period. This section contains helpful advice and remediation steps for each ARO. 



External Network Information

This section contains knowledge about external systems, when relevant.



Resources & Industry Best Practices

This section contains external resources to knowledge recommended by our analysts to use when implementing cyber security measures and plans for your network.




Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article