Skip to main content
Entity Insights provide rich context during incident investigations. Instead of switching between tools to gather information about affected users, devices, or IP addresses, ContraForce surfaces relevant data directly within the incident view.
Available insights vary by entity type and your connected data sources. The more integrations you have enabled, the richer your entity insights will be.

Why Entity Insights Matter

Faster Investigations

Access critical context without leaving ContraForce

Complete Picture

See related incidents, logs, and threat intel in one place

Better Decisions

Make informed response choices with full entity context

Available Insights by Entity Type

ContraForce provides different insights depending on the entity type associated with an incident.
User entities include accounts, identities, and mailboxes.
InsightDescription
Related IncidentsOther incidents involving this user
Sign-In LogsAuthentication history including locations, devices, and outcomes
Audit LogsAdministrative actions and changes made by or to this user
User InsightsAccount details, group memberships, risk score, and profile information
Use cases: Investigating compromised accounts, tracking lateral movement, understanding user behavior patterns

Accessing Entity Insights

Follow these steps to view insights for any entity in an incident.
1

Open the Incident

From the Command Page, click the Incident ID in the Incidents table to open the compact incident overview
2

Expand to Detailed View

Click the diagonal arrows icon (next to the X) in the top right corner to open the detailed incident view
3

Select Entities Tab

Click the Entities tab to see all associated entities
4

Open Entity Menu

Click the three dots (⋮) on any entity row to see available insights
5

Select Insight Type

Choose the insight you want to view from the dropdown menu
Entity insights menu for a user

Working with Insights

Multiple Insights

You can open multiple insights simultaneously:
  • Each insight opens in its own tab within the popup window
  • Switch between tabs to compare information
  • The popup window can be resized for better viewing
Multiple entity insight tabs

Insight Details

Each insight type displays relevant information in an organized format:
Columns typically include:
  • Timestamp
  • Sign-in status (Success/Failure)
  • IP address and location
  • Device and browser information
  • Conditional access results
  • Risk level
Filter by: Date range, status, location, risk level
Columns typically include:
  • Timestamp
  • Activity type
  • Target resource
  • Initiated by (user/service)
  • Result (Success/Failure)
Filter by: Date range, activity type, target
Information displayed:
  • Display name and UPN
  • Job title and department
  • Manager
  • Group memberships
  • Account status
  • Risk score
  • Last sign-in
Information displayed:
  • Device name and ID
  • OS platform and version
  • Health state
  • Exposure level
  • Last seen timestamp
  • Compliance status
  • Logged-on users
Information displayed:
  • Geolocation (country, city)
  • ASN and ISP
  • Reputation score
  • Associated domains
  • Historical activity
  • Threat intelligence matches
Information displayed:
  • File name and path
  • SHA256, SHA1, MD5 hashes
  • File size
  • First/last seen
  • Detection ratio
  • Threat intelligence enrichment

The Related Incidents insight is available for all entity types and shows other incidents where the same entity appears.

Why This Matters

  • Pattern Detection — Identify if an entity is repeatedly involved in security events
  • Attack Chain Analysis — Understand how an attacker moved through your environment
  • Scope Assessment — Determine the full impact of a compromise
  • False Positive Identification — Recognize legitimate activity that triggers multiple alerts
ColumnDescription
Incident IDClick to open the related incident
TitleBrief description of the incident
SeverityHigh, Medium, Low, Informational
StatusCurrent state of the incident
CreatedWhen the incident was detected
If you see the same entity in multiple high-severity incidents, prioritize investigating that entity—it may indicate an active compromise.

Threat Intelligence Enrichment

Some entity insights include threat intelligence from integrated sources.

Supported Enrichments

Entity TypeThreat Intel Data
IP AddressReputation, malicious activity history, blocklist status
File/HashVirusTotal detections, malware family, first seen date
URL/DomainReputation, phishing indicators, domain age
UserCompromised credential alerts, risk indicators
Threat intelligence enrichment requires integration with tools like VirusTotal or Microsoft Defender Threat Intelligence. Contact your administrator to enable additional enrichment sources.

Integration-Specific Insights

Available insights depend on which integrations are connected to your workspace.

Microsoft Defender XDR

  • Device timeline and alerts
  • User sign-in and audit logs
  • Email trace and threat detection
  • File and URL analysis

Microsoft Sentinel

  • Log Analytics query results
  • Custom entity enrichments
  • Watchlist matches
  • Threat intelligence indicators

Third-Party Integrations

Additional insights may be available based on your connected tools:
  • CrowdStrike — Device details, detection history
  • SentinelOne — Agent status, threat indicators
  • QRadar — Offense correlation, log data

Capabilities Matrix

See which entity insights are available for each XDR and SIEM integration

Best Practices

Compare sign-in logs with the incident timeline. Look for unusual locations, impossible travel, or authentication failures before the incident.
When investigating compromised accounts, review audit logs for privilege changes, group membership modifications, or unusual administrative actions.
For device-based incidents, the timeline shows the sequence of events leading to detection—crucial for understanding initial access and lateral movement.
Copy important insight data to incident comments for team visibility and post-incident documentation.

Troubleshooting

Common Issues

IssuePossible CauseSolution
No insights availableEntity type not supportedCheck the Capabilities Matrix for supported entities
Missing sign-in logsEntra ID integration not connectedVerify Azure AD/Entra ID connector status
Empty device timelineDefender for Endpoint not onboardedConfirm MDE integration is enabled
No threat intel dataEnrichment source not configuredContact admin to enable VirusTotal or other TI sources


Questions about entity insights? Contact us at [email protected].