Cases

Cases facilitate a more seamless Logpoint SIEM and SOAR workflow and allow you and your team to work collaboratively on SOAR automated threat investigations.

Alerts generate SIEM incidents. If the incident triggers an automated workflow, or playbook, a case is automatically created. Each case represents one or more incidents that make up a potential attack. A case is a series of events, an event corresponds to an individual action within a playbook. Using cases can help you and your team track and understand what happened through the course of an automated investigation.

Overview

Go to Investigation >> Cases from the navigation bar to open the Cases page.

_images/cases.png

Cases List

The list is an overview of all your organization’s cases. You can use the column titles to sort the list in ascending or descending order according to:

  • Owner

  • Severity

  • Status

  • Created date

  • Last Modified Dates

Enter criteria in Search to find specific cases or use Created from and Created to to search by date.

Ownership

Cases can have dedicated owners, individuals who manage a case. If you have the right permissions, you can assign a case to yourself or to someone else. You can also reassign a case to a new owner.

Severity

All cases are marked with their potential severity. Their level of severity depends on their severity score:

  • Low 0 - 30

  • Medium 31 - 60

  • High 61 - 80

  • Critical 81 - 100

You can sort the case list according to severity level.


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support