Alert Details

Alert Details

Alert Summary

Alert ID: Unique identifier for the alert instance.

Rule Name: Indicates the detection rule triggered (e.g., "network event").

Description: Brief label or tag associated with the alert (e.g., "win").

Incident Name: Grouping label for related alerts.

Created On: Timestamp when the alert was generated.

Source: Origin of the alert (e.g., EDR).

Severity: Risk level assigned by the system (e.g., Low).

Assigned To: Analyst or team responsible for triage (may be "Unassigned").

MITRE TTP: Mapping to MITRE ATT&CK techniques (if applicable).

Host Name: Device where the event occurred.

Users: Logged-in user at the time of the event (e.g., Administrator).

Events Timeline

The timeline section provides a chronological view of key activities associated with the alert. For example:

14:21:04 – Network event involving chrome.exe

This may indicate outbound or inbound traffic initiated by the Chrome browser, which could be benign or warrant further inspection depending on context.

Recommended Actions

Review Host Activity: Check recent activity on the host OPEAPTPWW090T for anomalies.

Validate User Context: Confirm whether the Administrator account was expected to be active.

Analyse Network Traffic: Use packet capture or flow logs to inspect the nature of the Chrome network event.

Assign for Triage: If not already assigned, route the alert to a security analyst for review.

Document Findings: Record any observations or decisions in the incident tracking system.

Was this page helpful?