The TLS Activity Page

Introduction

The TLS Activity page (Network section) is presented as a list view that shows endpoints within an organization connecting to TLS servers and information about the certificate. While not all TLS activity is inherently malicious, this data may be used to identify suspicious connectivity to TLS servers.


This article introduces the TLS Activity page and how to navigate it, as well as how to use the predictive search functionality, edit and filter columns, and sort the view.


 

Navigating the TLS Activity Page

The List View

The main page is a table view showing all TLS activity Field Effect has identified in an organization’s environment. Columns can be resized, rearranged, and shown or hidden to suit your needs.



The following columns are available for the Local Systems page: Cipher, Cipher Suite, Destination Domain Name, Destination IP, Destination MAC Address, First Seen, Hash, Key Exchange, Key Length, Last Seen (UTC). Protocol, Seen Count, Sensor, Server Info, Source Domain Name, Source IP, and Source MAC Address.


The Details View

Clicking a row will expose more details about the selected endpoint agent along bottom of the table.



The Details view can also be expanded into a modal view using the Expand icon. Clicking the Host Name link will take you to a drilled in view of the endpoint agent on the Agents page.



Editing Columns

Columns can be shown or hidden to suit your needs. To edit a view’s columns, click Edit Columns from the view you want to adjust. The Edit Columns tool will open, listing all the available columns. Use the checkmarks to select the columns you want to use in the table. Unchecked columns will not be visible. Once you’ve made your selections, click Apply.



The size of each column can also be adjusted. Use the arrows in the column header to sort and drag the edge of the column to adjust the width.



Searching for TLS Activity

The search bar leverages logic that allows you to create custom queries to find and filter alerts. You can select from default queries (Systems with Agents, Systems Without Agents), use logic to create your own searches (Column contains XYZ), or perform keyword searches.



After selecting a suggested column from the dropdown, suggested logic statements will become visible. Select the logic statement that suites your search to continue.



After selecting a logic statement, suggested search choices, specific to the selected column, will become visible. In the example below, the user chose the First Seen column and Contains logic statement. Therefore, the dropdown shows UTC times available in the list as suggestions.



Also note that you are not restricted to suggestions, you can add custom search queries to logic statements, or perform basic keywork searches.



Sorting & Filtering TLS Activity

To sort the list, click on a column header to toggle between a descending or ascending order for the selected column. You can also use the “Order By” feature shown as a suggested search function.


To filter the list, you can use the “Is Not” or “Is Null” suggestions. Using “Is not” will query results that do not include selected suggestions or provided keywords. The “Is Null” suggestion will query items with no content in the selected column.


As you make selections, you will be prompted with suggestions as shown above in Searching for Local Systems.



Exporting Results

You can export the entire list of alerts, or a filtered subsection, using the Export .csv icon. 



Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article