Alerts and Incidents
Alerts
Alerts are warnings generated to notify users when any significant events occur. They fire incidents that enable you to execute appropriate actions. Any valid search query can trigger an alert to generate incidents.
You can create an alert rule and select a mechanism to notify you of the incident. Logpoint can notify you via Email, Syslog, SNMP, HTTP, or SSH. You have the flexibility to design an alert mechanism based on your requirements.
The Alert Rules section in LPSM allows you to set up, manage, and perform actions on the Alert Rules on behalf of the Fabric-enabled Logpoints connected to its pools.

Version compatibility of the alert rules:
Fabric-enabled Logpoint
Compatible Fabric-enabled Logpoint Versions
6.11.x
6.11.x
6.12.x
6.12.x to 7.1.0
7.0.x
6.12.x to 7.1.0
7.1.0
6.12.x to 7.1.0
7.1.1, 7.1.2, 7.1.3
7.1.1, 7.1.2, 7.1.3
7.2.x
7.2.x
7.3.0
7.3.0
Select Page View
You can view the alert rules in two ways:
Tabular view
Coverage view
Tabular View
Select Tabular View to display additional columns that list the Log Source, Attack Category, and Attack Tag of the alert rules. You can also see whether the alert rule is active or inactive in the Name column.

Coverage View
Select Coverage view to view the categorization of the alert rules based on various attack categories and attack tags associated with the attack tactics, attack techniques and, attack sub-techniques of the MITRE attack framework. The attack categories are displayed as column headers with the respective attack tags listed under. You can further drill down the attack tags.

You can click the attack tags to view the list of associated alerts rules. The alert rules are listed as similar to the tabular view.

Click the Help (
) icon on the top of the dialog box to view the description of the attack tag associated with the attack techniques and sub-techniques of the MITRE attack framework.

View Actions
The tabular/coverage view consists of an action bar allowing you to perform the following actions:
Pool
Shows the pool name that you have selected for the view. You can click the pool name to open the Select Pool, Machine and User pop-up where you can make the necessary changes.
Machine
Shows the name of the machine that you have selected for the view. You can click the machine name to open the Select Pool, Machine and User pop-up where you can make the necessary changes.
User
Shows the name of the user that you have selected for the view. You can click the user name to open the Select Pool, Machine and User pop-up where you can make the necessary changes.
Close view
Allows you to close the tabular/coverage view and return to the My Alert Rules page.
Add
Allows you to create a new alert rule using the alert creation wizard. Go to Creating an Alert Rule for more details.
Select Log Source
Allows you to filter the alert rules according to the log sources using the drop-down. The drop-down is only available for tabular view.
Filter Active Rules
Allows you to view only the active alert rules by selecting the checkbox. This checkbox is only available for tabular view.
More
The More drop-down near the top-right corner of the tabular view page lists additional actions.

The Activate Selected Alert Rules option lets you activate multiple alert rules at once.
The Deactivate Selected Alert Rules option lets you deactivate multiple alert rules at once.
Create Alert Rules
Set Up Alert Notifications
After creating an alert rule on behalf of a Fabric-enabled Logpoint, you can set up the following notifications for the rule.
Email notification
SMS notification
Syslog notification
SNMP notification
HTTP notification
SSH notification
The message and command fields of the SMTP and SSH notifications support Jinja2 syntax. The message field of the Syslog notification supports Jinja syntax. For more information on how Jinja and Jinja2 syntaxes are implemented in the SMTP, SSH, and Syslog services, go to Setting Up Alert Notifications in Logpoint Alerts and Incidents.
In LPSM v2.2.0 and later, you can
Use the {{lpsm_search_link}} Jinja command to display the link to search for the logs that triggered the alert.
In Fabric-enabled Logpoint, the link redirects you to the LPSM search page.
In standard Logpoint, it redirects you to the Logpoint search page.
To use this Jinja command, Server Alias in
System Settings >> Generalmust be selected and a valid value specified. be empty and specified.For more information on supported Jinja syntax for alert notification setup, go to Logpoint Reserved Jinja Placeholders in Logpoint Alerts and Incidents.
Manage Alert Rules
After you create an alert rule and configure notifications, you can take additional actions on the generated alerts.
Share Alert Rules with Users
After you create an alert rule, you can share it with other users by assigning permissions through user groups.
Categories of Alert Rules
There are four categories of alert rules: My Rules, Shared Rules, Used Rules, and Vendor Rules. They can be accessed from the drop-down at the top-left corner of the panel.

My Rules
Lists all the alert rules created by the LPSM user or the Fabric-enabled Logpoint user.
Shared Rules
Lists all the shared alert rules.
Used Rules
Lists all the used alert rules.
Vendor Rules
Lists all the alert rules provided in your application packages.
Incidents
Incidents are used to identify, analyze, correct, and prevent information hazards in the future. Logpoint lets you find events such as a system crash, power down, cables unplugged, high disk usage, high CPU usage, and forensics by creating incidents for each of them. Incidents can be created from one of three incident sources; Alert Rules, Search or UEBA.
You can subscribe to incident sources of the connected Fabric-enabled instances from Investigation >> Incidents the navigation bar. Once the incidents of the subscribed sources are created, you can resolve, re-open, close, and comment on the incidents. The incidents are updated automatically in real time.

Subscribe or Unsubscribe to Incidents
Manage Generated Incidents
When a subscribed alert rule is triggered, an incident is generated and listed in Incidents section.

In the Incident feed, the list of all the incidents is displayed along with their corresponding status. You can perform actions such as: Resolve, Re-open, Close, Re-assign, and Comment on any incident. Additionally, you can send incident notifications for investigation if you have configured the Manual notification trigger for the corresponding alert rules.
Last updated
Was this helpful?




























































Comment on an Incident
You can post comments about the incidents seen in the incident feed. You can track the actions taken over an incident via the comments.
Go to
Incident >> Incidents.Click the Comment button of the incident.