Incident details are a page in the interface that contains all of the information related to the incident, including the incident properties.
To view incident details:
The window with incident details is displayed.
If necessary, you can refresh the information in the incident details by clicking the refresh () icon next to the incident name.
The toolbar in the upper part of the incident details allows you to perform the following actions:
Incident details contain the following sections:
The summary section contains the following incident properties:
When you click Go to Threat hunting in the menu, the Threat hunting section opens in the same tab. If you want to open the Threat hunting section in a new browser tab, click and hold the Ctrl
key, and then click Go to Threat hunting in the menu.
In the Details section, you can track the telemetry events related to the incident.
To view the events related to the incident, click the Find in Threat hunting button. The opened table displays alert events related to the incident.
The toolbar of the event table allows you to perform the following actions:
You can go back to the incident details by clicking Incident investigation or by clicking the back button in your browser.
In the Similar incidents section, you can view the list of incidents that have the same affected artifacts as the current incident. The affected artifacts include both observables and affected devices of the alerts linked to an incident. The list contains incidents in any status.
By using the list, you can evaluate the degree of similarity of the current incident and other incidents. The similarity is calculated as follows:
Similarity = M / T * 100
Here, M is a number of artifacts that matched in the current and a similar incident, and T is total number of artifacts in the current incident.
If the similarity is 100%, the current incident has nothing new in comparison with the similar incident. If the similarity is 0%, the current and the similar incident are completely different. Incidents that have similarity of 0% are not included in the list.
The calculated value is rounded off to the nearest whole number. If similarity is equal to a value between 0% and 1%, the application does not round such value down to 0%. In this case, the value is displayed as less than 1%.
Clicking an incident ID opens the incident details.
Customizing the similar incidents list
You can customize the table by using the following options:
In the Alerts section, you can view the list of the alerts linked to the current incident.
By clicking an alert ID, you can open the alert details. You can also use the toolbar buttons to unlink alerts from the incident.
In the Assets section, you can view the devices and users affected by or involved in the incident.
The asset table contains the following columns:
Possible values: device or user.
Possible values: attacker or victim.
This parameter is only applied to device asset type. A device authorization status is defined by KICS for Networks. You can change the authorization status by applying the corresponding response action to a device.
The Administration Server that manages the device.
The administration group to which the device belongs.
Asset categories which include the asset.
By clicking a user name or a device name, you can:
When after clicking a user name or a device name you select Go to Threat hunting in the menu, the Threat hunting section opens in the same tab. If you want to open the Threat hunting section in a new browser tab, click and hold the Ctrl
key, and then click Go to Threat hunting in the menu.
You can also click a device name to open the device properties.
By clicking a user ID or a device ID, you can:
When after clicking a user ID or a device ID you select Go to Threat hunting in the menu, the Threat hunting section opens in the same tab. If you want to open the Threat hunting section in a new browser tab, click and hold the Ctrl
key, and then click Go to Threat hunting in the menu.
You can also click a device ID to open the device properties.
In the Files section, you can upload, download, edit, or delete files related to the incident.
You can upload files of any extension. Duplicate file names are allowed. The maximum number of files that you can attach to the incident and the maximum total file size you can specify in the configuration file.
To upload files, click the Upload button and select one or multiple files. If you attempt to upload files exceeding the limitations, the Uploading files panel displaying a warning message will open. In this panel, you can remove files from the upload queue until the warning message disappears and click the Upload button to upload files. If you click the Upload button ignoring the warning message, upload will fail and the file list will include files that could not be uploaded with a warning icon next to the file names.
Click a file to open the Edit file panel that displays file details. In this panel, you can edit file description.
Use check boxes to select a file or multiple files. Select a file and click the Download button to download it. Select a file or multiple files and click the Delete button to delete the selected files.
The Write permission in the Alerts and incidents functional area is required to upload and delete files and edit file descriptions. The Read permission in the Alerts and incidents functional area is required to download files.
In the Observables section, you can view the observables that relate to the alerts linked to the current incident. The observables may include:
By clicking a link in the Value column, you can:
When after clicking a link in the Value column you select Go to Threat hunting in the menu, the Threat hunting section opens in the same tab. If you want to open the Threat hunting section in a new browser tab, click and hold the Ctrl
key, and then click Go to Threat hunting in the menu.
The toolbar of this section contains the following buttons:
In the Incident log section, you can track the changes that were made to the incident as a work item:
In the Response history section, you can see the log of manual and playbook response actions. The table contains the following columns:
In the Comments section, you can leave comments related to the incident. For example, you can enter a comment about investigation results or when you change the incident properties, such as the incident assignee or status.
You can edit or remove your own comments. The comments of other users cannot be modified or removed.
To save your comment, press Enter. To start a new line, press Shift+Enter. To edit or delete your comment, use the buttons on the top right.
The Write permission in the Alerts and incidents functional area is required to leave comments.