Alert details are a page in the interface that contains all of the information related to the alert, including the alert properties.
To view alert details:
The alert details are displayed.
The toolbar in the upper part of the alert details allows you to perform the following actions:
Alert details contain the following sections:
The summary section contains the following alert properties:
In the Details section, you can track the telemetry events related to the alert.
The event table displays the search result that you define through an SQL query.
The toolbar of the event table allows you to perform the following actions:
In the Threat hunting section, you can link events to alerts manually. This might be helpful if you discover that some events relate to an alert, but they were not linked to the alert automatically. For details, refer to the instructions on linking or unlinking events to or from alerts.
In the Assets section, you can view the devices and users affected by or involved in the alert.
The asset table contains the following columns:
Possible values: device or user.
Possible values: attacker or victim.
This parameter is only applied to device asset type. A device authorization status is defined by KICS for Networks. You can change the authorization status by applying the corresponding response action to a device.
The Administration Server that manages the device.
The administration group to which the device belongs.
Asset categories which include the asset.
By clicking a user name or a device name, you can:
You can also click a device name to open the device properties.
By clicking a user ID or a device ID, you can:
You can also click a device ID to open the device properties.
In the Observables section, you can view the observables related to the alert. The observables may include:
By clicking a link in the Value column, you can:
The toolbar of this section contains the following buttons:
In the Similar closed alerts section you can view the list of closed alerts that have the same affected artifacts as the current alert. The affected artifacts include observables and affected devices. The similar closed alerts can help you investigate the current alert.
By using the list, you can evaluate the degree of similarity of the current alert and other alerts. The similarity is calculated as follows:
Similarity = M / T * 100
Here, 'M' is a number of artifacts that matched in the current and a similar alert, and 'T' is total number of artifacts in the current alert.
If the similarity is 100%, the current alert has nothing new in comparison with the similar alert. If the similarity is 0%, the current and the similar alert are completely different. Alerts that have a similarity of 0% are not included in the list.
The calculated value is rounded off to the nearest whole number. If similarity is equal to a value between 0% and 1%, the application does not round such a value down to 0%. In this case, the value is displayed as less than 1%.
Clicking an alert ID opens the alert details.
Customizing the similar closed alerts list
You can customize the table by using the following options:
In the Similar incidents section, you can view the list of incidents that have the same affected artifacts as the current alert. The affected artifacts include observables and affected devices. The similar incidents can help you decide if the current alert may be linked to an existing incident.
By using the list, you can evaluate the degree of similarity of the current alert and the incidents. The similarity is calculated as follows:
Similarity = M / T * 100
Here, 'M' is a number of artifacts that matched in the current alert and a similar incident, and 'T' is total number of artifacts in the current alert.
If the similarity is 100%, the current alert has nothing new in comparison with the similar incident. If the similarity is 0%, the current alert and the similar incident are completely different. Incidents that have similarity of 0% are not included in the list.
The calculated value is rounded off to the nearest whole number. If the similarity is equal to a value between 0% and 1%, the application does not round such a value down to 0%. In this case, the value is displayed as less than 1%.
Clicking an incident ID opens the incident details.
Customizing the similar incidents list
You can customize the table by using the following options:
In the Comments section, you can leave comments related to the alert. For example, you can enter a comment about investigation results or when you change the alert properties, such as the alert assignee or status.
You can edit or remove your own comments. The comments of other users cannot be modified or removed.
To save your comment, press Enter. To start a new line, press Shift+Enter. To edit or delete your comment, use the buttons on the top right.
The Write permission in the Alerts and incidents functional area is required to leave comments.
In the Alert event log section, you can track the changes that were made to the alert as a work item:
In the Response history section, you can see the log of manual and playbook response actions. The table contains the following columns:
See also: |