Skip to main content

Alerts

Alerts are events flagged by detections as requiring attention. They serve as critical indicators of potential security incidents, operational anomalies, or other noteworthy events.

How to Access

Navigate to Insights → Alerts in the platform.

Alert Tabs

TabDescriptionShows
TriageAlerts undergoing AI analysisPending and in-progress AI triage
UnassignedOpen alerts not linked to a caseNew alerts awaiting review
AssignedOpen alerts linked to a caseAlerts under investigation
ClosedResolved alertsHistorical reference with closing reasons
Timeline View

Click the Timeline View button to see alerts displayed chronologically, useful for understanding attack sequences and event correlation.

Alert Properties

PropertyDescription
Alert IDUnique identifier
TitleDetection-generated title
SeverityCritical, High, Medium, Low, Informational
DetectionThe detection rule that triggered the alert
Created AtWhen the alert was generated
Related AlertsCount of similar or connected alerts
CaseLinked case (if assigned)
AI AnalysisTriage status and summary

Filtering Alerts

Use filters to narrow down the alert list:

FilterDescription
Alert IDSearch by exact alert ID
Related Alerts CountFilter by number of related alerts
Created AtFilter by date range
DetectionFilter by specific detection rules
ObservablesSearch within alert observables
SeverityFilter by severity level

Working with Alerts

Viewing Alert Details

Click an alert to view:

  • Full event data and payload
  • Detection that triggered it
  • Related alerts grouped together
  • AI analysis summary (if triaged)
  • Observable indicators

AI Triage

When detections have triage enabled:

  1. Alert enters Triage tab automatically
  2. AI Assistant analyzes the event context
  3. Analysis summary is attached to the alert
  4. Alert moves to appropriate tab based on findings
tip

AI triage helps prioritize alerts by providing initial analysis, reducing time spent on false positives.

Bulk Actions

Select multiple alerts to:

  • Close — Resolve with a closing reason
  • Add to Case — Link to existing or new case
  • Re-triage — Resubmit for AI analysis

Assigning to Cases

Link alerts to investigations:

  1. Select one or more alerts
  2. Click Add to Case
  3. Choose existing case or create new
  4. Alerts appear in case timeline

Severity Levels

LevelColorDescription
CriticalRedMajor incidents actively compromising systems
HighOrangeSignificant threats requiring prompt attention
MediumYellowNotable events warranting investigation
LowBlueMinor anomalies for awareness
InformationalGrayContext events for reference

Best Practices

  1. Use the Triage tab — Let AI pre-analyze alerts before manual review
  2. Filter by severity — Address critical alerts first
  3. Group related alerts — Link to cases for complete context
  4. Document closures — Always add meaningful closing reasons
  5. Review patterns — Look for recurring alert types to tune detections