Working with Cases

Cases are made up of events. You use events to understand what happened for each action of a playbook. For example:

  • What was the trigger that started the playbook?

  • Who responded to a prompt action and what was their response?

Case Timeline

When you open a case, a timeline of all the events is on the left. For larger cases, you can scroll through the timeline. You can find specific case events by using the search filters at the top of Event Details.

_images/cases_lists.png

Cases List

Click on an event in the case, and the event’s details are listed on the right. Event details are the playbook’s action data. You can use event details as an audit log.

_images/cases_example.png

Cases Example

Case Ownership

Cases have owners, the individual who is managing the case. You can add an owner to a case or change the owner to someone else.

Assign an owner

  1. Open a case

  2. At the top of event details, use the owner field to:

    1. Select an owner from the drop-down.

    2. Change the owner to a new one from the drop-down.

A new event is added to the case detailing who the owner is or who the owner is changed to.

_images/add_or_change_case_owner.png

Add or change case owner

Tags

You can add tags to cases to help you group cases or find specific cases according to meaningful keywords. You add tags directly to an individual case.

Add a tag

  1. Open a case

  2. At the top of the case timeline, click + New Tag.

  3. Enter the tag name

  4. Click Enter.

The tag is added to the case. The case list also contains case tags; you can’t use the column to sort the list but can see the case’s tags.

Case Artifacts

When a playbook runs, the external references or resources it uses or accesses are termed artifacts. They are automatically added to the relevant case event when the playbook runs. You can also manually add an artifact to an event if you need to. Artifacts are grouped into the following out-of-the-box types:

  1. Domain

  2. Email

  3. File

  4. Generic Text

  5. Host

  6. IP Address

  7. Hash values

To view case artifacts

  1. Open the relevant case.

  2. Select or click on an event in the timeline.

  3. Click Artifacts at the top.

You can use the Artifacts column headers to sort the artifacts in ascending or descending order.

Add an artifact manually

  1. Open the relevant case.

  2. Select or click on an event in the timeline.

  3. Click Artifacts at the top.

  4. Next to the search field, click Add Artifact.

  5. Select a type. The type you select determines what happens next.

  6. Add the relevant data and external reference or file.

  7. Click Save when you are done.

Add an artifact type

If you want to add an artifact that does not fall under the out-of-the-box types, you can add your own.

  1. Open a relevant case

  2. Click on an event in the timeline

  3. Next to the search field, click Add Artifact.

  4. In Add Artifact, go to Add New Artifact Type.

  5. Enter the type’s name.

  6. Click Add.

The new type is added to the list.

Run playbooks

You can run SOAR playbooks directly from a case. You can also run a playbook using one of the case’s artifacts. When you run a playbook, from the case or from an artifact, it is added as an event to the case so you can view the details of the playbook’s run.

_images/add_or_change_case_owner.png

Run a playbook from a case

When you run a playbook from a case, you can search for the playbook you need or use the filters:

  • Tags

  • Category

_images/find_a_playbook.png

Find a playbook

Case Comments

You can add comments about the case to yourself or to someone else on your team. You can also tag another user in the comment.

Case comments are at the bottom of the case timeline. Add your comment directly and click Save. Your comment becomes part of the case timeline.

_images/add_a_comment.png

Add a comment

Trigger Event Data

Trigger Event is a specific incident, alert, or a series of incidents and/or alerts that trigger a playbook. You can use the logs of a Trigger Event to understand what triggered a playbook.

Searching Trigger Event Data

  1. Go to Investigation from the navigation bar and click Cases.

  2. Click on a Case and click Trigger Event.

  3. Click Search. You will be redirected to Logpoint Search.

_images/Search.png

Search

Add Search To Case

You can search the logs that triggered the playbook and then add the search results to the case.

  1. Go to Investigation from the navigation bar and click Cases.

  2. Click on a Case and click Trigger Event.

  3. Click Search. You will be redirected to Logpoint Search.

  4. Enter a query/queries to further drill down the Trigger Event Data.

  5. Click Add Search To.

  6. Click Case.

Note

If a search has no values in its results, you can’t add it to a case. Only 25 logs from a search can be saved to a case at a time.

MITRE

MITRE displays the details of the incidents associated with a case and their MITRE tactics and techniques. To learn more about Logpoint MITRE ATT&CK Coverage, go to MITRE.

_images/mitre.png

Mitre

Graph Overview

Graph Overview provides a visual representation of the connections among multiple events, incidents, and artifacts within a case.

_images/graph_overview.png

Graph Overview

Export Cases

Click Generate PDF to export the case details in PDF.

_images/Generate_PDF.png

Generate PDF


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support