Level Blue home page
Search...
⌘K
Support
Dashboard
Dashboard
Search...
Navigation
USM Anywhere Investigations
USM Anywhere Investigations
Home
Documentation
API Reference
Blog
Events
Contact Us
USM Anywhere™
Overview
USM Anywhere Architecture
USM Anywhere Data Security
USM Anywhere Log Data Enhancement
USM Anywhere Quick Start Guides
USM Anywhere Deployment Guide
USM Anywhere User Guides
Overview
Getting Started with USM Anywhere
USM Anywhere Best Practices
USM Anywhere Dashboards
Asset Management
Alarms Management
System Events Management
Console User Events on USM Anywhere
Configuration Issues Management
User Behaviour Analytics
Events Management
USM Anywhere Scheduler
Rules Management
Vulnerability Assessment
Open Threat Exchange® and USM Anywhere
USM Anywhere Sensor Management
The AWS Cloud Connector in USM Anywhere
Subscription Management
USM Anywhere Reports
Machine Learning
USM Anywhere User Management
Using USM Anywhere for PCI Compliance
USM Anywhere Investigations
Overview
Investigations List View
Creating a New Investigation
Editing Investigations
Searching Investigations
Viewing Investigations Details
Deleting Investigations
Notification Rule for Investigations
System Status within USM Anywhere
USM Anywhere Agents Guide
USM Anywhere BlueApps Guide
USM Central™
Overview
USM Central Web User Interface (UI)
USM Central Deployments
Alarms Management
Vulnerabilities
Configuration Issues
Orchestration Rules Management
Saved Reports
System Events Management
User Management
LevelBlue TDR for Gov Documentation
How to Submit a Security Issue to LevelBlue
Automated Policy Manager
Overview
Navigation Panel
Dashboard
Create
Manage
Tickets
Assets
Dark Mode/Light Mode
Early Access Features
Network Based Firewall Service (NBFW)
USM Anywhere Investigations
USM Anywhere Investigations
Role Availability
Read-Only
Investigator
Analyst
Manager
Using USM Anywhere, you can create investigations and organize the information from your environment. This feature enables you to manage and coordinate incident response activities. Use Investigations for linking
alarms
,
events
, notes, and other files to their responses, and you will have a complete view of actions you have taken to address a particular threat.
This topic discusses these subtopics:
Investigations List View
Creating a New Investigation
Editing Investigations
Searching Investigations
Viewing Investigations Details
Activity on Investigations
Notes on Investigations
Evidence on Investigations
Deleting Investigations
Notification Rule for Investigations
Working with Assets and PCI DSS
Investigations List View
Assistant
Responses are generated using AI and may contain mistakes.