Getting the incidents within a specific time period

To retrieve the incidents generated within a specific time period.

GET

https://Logpoint-IP/incidents

Parameter

Value Type

Description

username

String

A Logpoint username

secret_key

String

Secret key of Logpoint. Refer to Finding the Access Key.

requestData

JSON Object

A JSON objects containing the following parameters:

ts_from: Start timestamp value.

ts_to: End timestamp value.

Parameters

The parameters should be included in the request body as raw text.

{
        "username": "John",
        "secret_key": "a1b2c3d4e5f6g7h8i9j0k1",
        "requestData": {
                "version": "0.1",
                "ts_from": 1633085529,
                "ts_to": 1640595047
                }
        }

Note

Content-Type, Content-Length, and Host must be passed in the request header. Content-Type should be application/json.

Request Example

../_images/LP_API_Incident_Sample.png

Incident Request using Postman.

cURL Code

curl --location --request GET 'https://10.45.10.172/incidents' \
--header 'Content-Type: application/json' \
--data '{
        "username": "John",
        "secret_key": "a1b2c3d4e5f6g7h8i9j0k1",
        "requestData": {
                "version": "0.1",
                "ts_from": 1633085529,
                "ts_to": 1640595047
                }
        }'

Sample JSON response

{
"success": true,
"incidents": [incident1, incident2, …, incidentN]
}

Sample incident

{
    "type": "Alert",
    "alert_obj_id": "61b1cce5c472652e64a27cc5",
    "alertrule_id": "02df0d1b985ba3af48fdc4287c560d11",
    "incident_id": "52985081d974e636c930d7c604734705",
    "name": "Average severity per device alert",
    "description": "Fires an alert if the average severity per device is more than a certain threshold",
    "username": "5bebd9fdd8aaa42840edc853",
    "user_id": null,
    "assigned_to": "5bebd9fdd8aaa42840edc853",
    "visible_to": [],
    "tid": "",
    "rows_count": 100,
    "risk_level": "medium",
    "detection_timestamp": 1640599338.5200958,
    "loginspect_ip_dns": "101.45.45.45",
    "Logpoint_name": "Logpoint",
    "status": "unresolved",
    "comments": [],
    "commentscount": 0,
    "query": "action=*",
    "repos": [
        "127.0.0.1:5504"
    ],
    "time_range": [
        1640595600,
        1640599200
    ],
    "throttle_enabled": false,
    "attack_id": [
        "T1592",
        "T1608",
        "T1078",
        "T1003.002",
        "T1001"
    ],
    "attack_tag": [
        "Gather Victim Host Information",
        "Stage Capabilities",
        "Valid Accounts",
        "Security Account Manager",
        "Data Obfuscation"
    ],
    "attack_category": [
        "Initial Access",
        "Privilege Escalation",
        "Credential Access",
        "Resource Development",
        "Reconnaissance",
        "Defense Evasion",
        "Persistence",
        "Command and Control"
    ],
    "metadata": [],
    "log_source": [
        "Firewall",
        "Fortigate"
    ],
    "notifications": [
        {
            "dispatch_option": "manual",
            "email_emails": [
                "[email protected]"
            ],
            "email_template": "<pre style=\"text-align: left; text-size-adjust: auto;\"><font face=\"avenir, helvetica, arial, verdana, sans-serif\"><span style=\"caret-color: rgb(255, 255, 255);\">* - ::\r\n\r\n       {{alert_name}}\r\n     - Displays the name of the alert.\r\n   * - ::\r\n\r\n       {{user_id}}\r\n     - Displays the total count of log messages that triggered the alert.<br></span></font></pre>",
            "link_disable": false,
            "logo_enable": true,
            "logo_type": "default",
            "notify_email": true,
            "raw_emails": [
                "[email protected]"
            ],
            "simple_view": null,
            "subject": "Test",
            "template_file": "alert_5bebd9fdd8aaa42840edc853_b'IF3GK4TBM5SSA43FOZSXE2LUPEQHAZLSEBSGK5TJMNSSAYLMMVZHI==='.tmp",
            "threshold_option": null,
            "threshold_value": null,
            "type": "email"
        }
    ],
    "id": "61c98f2af2adef60601f5a86"
},

Filtering the incidents

You can filter incidents generated within a specific time period based on the following parameters:

Parameter

Value Type

Description

name

String

Identification parameter for incidents. The values supported are:

Name: Name of the incidents.

Incident ID: Unique identifier of the incidents.

AlertRule ID: Unique identifier of the alert rule that generates the incidents.

status

String

Resolution state of the incidents. The values are closed, resolved, and unresolved.

type

String

Source via which the incidents are generated. The values are alert, search, and ueba.

risk

String

Severity level of the incident. The values are critical, high, medium, and low.

attack_category

String

Attack category associated with the incidents.

attack_tag

String

Attack tag associated with the incidents.

log_source

String

Log source information associated with the incidents.

Metadata fields

String

A user-defined parameter associated with the Metadata field of Alert or Incident Categorization. Refer to Creating an Alert Rule or Creating an Incident for more detail.

You can insert the parameters in the endpoint URL as query parameters to form a query string. However, these parameters are not mandatory.

Sample Queries

https://Logpoint-IP/incidents?name=Windows Registry Value Change&risk=critical&risk=high&type=alert&status=unresolved

The above query filters the incidents named Windows Registry Value Change generated from alert having critical and high severity level and are in unresolved state.

https://Logpoint-IP/incidents?attack_category=Command and Control,Collection&attack_tag=Protocol Impersonation&log_source=Webserver&System=Microsoft Windows

The above query filters the incidents whose attack categories are Command and Control and Collection, attack tag is Protocol Impersonation, log source value is Webserver, and System value is Microsoft Windows. Here System is the custom metadata field provided by the user while categorizing the alert or incident.

Note

The only supported method to include multiple query parameters in the query string is by using an ampersand (&). You can also send multiple values in a single parameter by using a comma (,).


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support