Investigating activity using the Analysis page

The Analysis page is the primary investigation workspace in Kaseya MDR. It provides a single, correlated view of alerts and related activity across your environment so you can understand what happened, how activity is connected, and whether behavior is expected or represents a security risk.

Instead of reviewing individual alerts in isolation, the Analysis page lets you investigate devices, users (when applicable), IP addresses, and related activity together in one searchable view. This is where investigation and validation decisions are typically made before response actions are taken.

If the Dashboard answers What needs attention?, the Analysis page answers What actually happened?

How alert behavior decisions fit together

Use the articles in this section together as a deliberate decision ladder:

  1. Start with the alert

    Review the alert and understand what it represents before taking action.

    See Working with alerts

  2. Investigate before changing behavior

    Use the Analysis page to validate context, scope, and impact.

    See Investigating activity using the Analysis page

  3. Decide how (or whether) alert behavior should change

    Determine whether tuning, suppression, or no action is appropriate based on investigation results.

    See Managing noise and signal; Managing repeated alerts

  4. Apply the selected change in the correct place

    Severity or detection tuning > global prioritization changes.

    See: Managing alert severity and detection tuning

    Suppression rules > scoped exceptions for specific conditions.

    See Suppressing alerts from Events; Alert suppression

    Each article in this set is intentionally scoped to one step in this process.

Avoid skipping steps. Changing alert behavior without investigation can hide meaningful security activity and reduce confidence in response decisions.

When to use the Analysis page

Use the Analysis page whenever you need deeper context than the dashboard or an individual alert provides, including when you want to:

  • Investigate an alert in detail

  • Understand activity before and after a detection

  • Validate whether activity is benign, suspicious, or malicious

  • Investigate a specific user, device, IP address, network, or organization

  • Review low‑severity or suppressed activity

  • Confirm scope and impact before initiating response actions

The purpose of investigation in the Analysis page is to determine whether the observed activity is expected, suspicious, or requires response before any action is taken.

How the Analysis page works

Kaseya MDR is built around the idea that meaningful investigations require correlation, not just isolated events.

The Analysis page works by:

  • Normalizing telemetry collected by Kaseya MDR

  • Correlating related activity across time, entities, and detections

  • Presenting results in a single, searchable investigation table

This approach allows you to see what occurred before, during, and after an alert, helping you determine whether activity is isolated or part of a broader incident.

Accessing the Analysis page

  1. From the side navigation menu, click Analysis.

  2. The Analysis page opens with:

  • A filter panel at the top

  • A results table below (empty until a report is run)

Running an investigation

Investigations are performed by defining scope in the filter panel and running a report.

Understanding the Results table

After you click Run Report, the Results table displays all matching alerts and related activity in a single, correlated view.

Each row represents a single alert or a related activity record correlated for investigation. Results are normalized so activity from different products can be reviewed together without switching views.

How filters behave

Some filters apply additional rules that are helpful to understand:

  • IP Address(es): Enter multiple IPs separated by commas or Enter. Wildcards are supported (for example, 192.168.*).

  • Account(s)/User(s): User lookup occurs in real time. Enter at least three characters to trigger search results.

  • ASN(s): The ASN list is populated based on observed activity from the last 24 hours.

  • IP Threat Score >: Accepts values from 0 (lowest threat) to 100 (highest threat).

  • Country(ies): Based on IP geolocation, not user or device location.

  • PSA Ticket Status: Filters activity based on the PSA ticket lifecycle state.

  • Product(s): Filters results by the product or detection source that generated the activity.

  • Unify Status: Filters activity using Unify enrichment data, which may not be available for all records.

Clearing or resetting an investigation

  • Click Clear Report to reset filters and results

  • Use Collapse Filters to hide the filter panel and focus on results

Exporting investigation data

Click Export in the upper‑right corner of the results table to download investigation data for reporting or offline review.

NOTE  For security reasons, file paths are not included in exported data.

Using Analysis to manage alert noise

The Analysis page can also be used to understand alert volume and distinguish meaningful signal from background activity.

Reviewing alert volume before notifications or ticketing

  1. From the side navigation menu, clickAnalysis.

  2. Select a 1–2 week date range.
  3. FilterEvent Status to Medium and Critical.
  4. Scope to all users or a specific organization.
  5. ClickRun Report.

This shows which alerts would have generated notifications or PSA tickets if integrations were enabled.

Reviewing low‑severity activity

Low‑severity alerts do not generate notifications but remain searchable in Analysis. This allows you to reduce noise while preserving visibility.

Using results to guide tuning decisions

Look for activity that is:

  • High‑frequency

  • Informational

  • Expected in your environment

  • Not actionable on their own

These patterns often indicate candidates for severity tuning or suppression. After tuning, Analysis can be used again to confirm that noise has been reduced without losing visibility into important activity.

Relationship to the Dashboard and Response

  • Use the Dashboard for high‑level visibility and prioritization

  • Use the Analysis page for investigation and validation

  • Use investigation context to inform response actions and minimize false positives

The Analysis page bridges detection and response, ensuring actions are taken with full context.

Related articles

  • Exploring the dashboard: Explains how MDR alerts are prioritized on the Dashboard and when to use the Analysis page for deeper investigation

  • Working with alerts: Provides detail on alert severity, alert lifecycle, and how MDR alerts are investigated and validated using Analysis

  • Managing noise and signal: Describes how to reduce alert noise through tuning and suppression while keeping activity visible for investigation