Alert Detections
Alert Rules or Detections check log events as they occur and generate an incident if the conditions of the rule match a defined activity. They can be based on any detector or Logpoint query and are usually used to check log events for signs of malicious activity, or for certain operational messages and thresholds. At the same time an alert is generated, an incident correlating to the alert is also created.
Alert Rule criteria specifies the exact conditions or thresholds that must be met for the alert to trigger an incident. It is the logic of when the alert should trigger, typically based on log count metrics from the query in the Alert Rule. The condition of the Alert Rule is the level of risk combined with the number of times risky behaviour is detected.
Alerts Rule Detections are grouped or organized into:
Vendor Rules: Predefined alert rules that are included with some Log Source integrations. Logpoint maintains these detections, including alerts mapped to the MITRE ATT&CK framework and other common cyber-threat indicators.
My Rules: Alert rules that you create and own. You can build them from scratch or clone an existing vendor rule and modify it to create a new detection.
Shared Rules: Alert rules shared by multiple Logpoint users. You can clone a shared rule and customize it to create your own detection.
Used Rules: Alert rules that are currently active. This view helps you identify which rules are contributing to ongoing security monitoring.
Transferred Rules: Alert rules whose ownership has been transferred to you to support consistent ownership, proper access control, and centralized rule management.
View Existing Alert Rule Detections
View the Alert Rule list in either:
The Tabular View, which lists Alert Rule Detections and is displayed by default. Using the Tabular View list you can:
Filter and sort the contents
Create a new alert rule
Share alerts with other users
Unshare alerts
Transfer ownership
Clone an Alert Rule
Export & Import Alert Rules
Perform a search based on the alert
Change the timeframe and/or repo of the alert rule search
Edit an Alert Rule
Activate, Deactivate, and Delete an Alert Rule
Coverage View arranges and maps Logpoint Alert Rules to the MITRE ATT&CK Framework.
Drill down into each tactic and technique to see which alert rules detect them.
Activate an alert rule if it is not active
Filter and Sort the List
There are a large number of Detections/Alert Rules. To help you find the alert rule easily, you can filter the list according to what type of rule it is, filter the list according to the column names, or only view active alert rules.
Transfer Ownership
You transfer alert rule ownership from one user to another when a user who owns the alert rule becomes part of a different User Group and no longer needs to own the same alert rules. Or if a user leaves your organization and is deleted you must delete the shared alert rule or transfer the alert rule’s ownership to another user.
Export & Import Alert Rules
Export Alert Rules from one Logpoint instance or server and then import it into another. You can use Export and Import during migrations to transfer rules to a new instance or in disaster recovery to restore exported rules.
You can only export Alert Rules that are grouped under My Rules. When you import Alert Rules they are also listed under My Rules. When you export alert rules a .pak file is created, so when you import them they are in a .pak file. The configured repos are also included in the pak file.
When importing alert rules, only the repos from the alert rules exported from Logpoint are selected. You can only import alert rules exported from Logpoint with .pak extension. The imported alert rules are automatically shared with the users in the Logpoint Administrator User Group.
Change the Timeframe and/or Repo of the Alert Rule Search
Adjusting the time range and repo of alert rules is crucial for ensuring that alerts remain relevant and practical. For example, to narrow the time range of an alert to focus on a specific window where suspicious activity was detected. By doing so, you can prioritize the most relevant data, ensuring faster threat detection and response.
Changing the repo of an alert rule is essential when log sources change or when a broader or more specific dataset needs to be analyzed.
Important Considerations Before Changing the Timeframe
Shorter time ranges reduce query load and improve performance.
Longer time ranges provide deeper insights but can increase processing time and generate more alerts.
Real-time threats, for example, brute-force attacks or privilege escalation, the ideal immediate detection time is from 5 to 30 minutes.
High-frequency events, for example, failed login attempts, use a shorter time range to prevent excessive alerts and focus on the most recent activity.
Low-frequency events, for example, unauthorized admin access, use a longer time range to capture meaningful patterns.
Active security investigations use dynamic time range adjustments to analyze specific attack windows.
Important Considerations Before Changing the Repo
Repos must store logs that match the monitored event type. For example, an alert for failed login attempts must be assigned to a repo storing authentication logs, like Windows Event Logs, Active Directory logs, or VPN logs.
When an alert rule applies to multiple data sources, select a repo that includes all relevant logs to ensure no critical logs are missed.
For compliance, some alerts must be assigned to specific repos, for example, PCI DSS, GDPR, or ISO 27001.
When an alert is correlated across different log sources, for example, firewall, endpoint, and Logpoint logs, ensure the repo contains the necessary log types.
Large repos with extensive logs can slow down query performance.
Edit an Alert Rule
When you edit an Alert Rule, you can change the name, description, query, repos, time range, results limit, delay alert, flush on trigger, criteria, metadata, and notification template. You can also edit how users are notified when the Alert was triggered.
Manage Alert Rules
Set up an alert rule in advance for future use or activate it only during a specific time period. Deleting an alert rule is permanent, so instead of deleting it, you can deactivate the rule. This allows you to reactivate and reuse it later if needed.
Alert Rules & MITRE ATT&CK Framework
Coverage View arranges and maps Logpoint Alert Rule Detections to the MITRE ATT&CK Framework. Drill down in each tactic and technique to see which Logpoint alert rules detect which MITRE techniques and tactics they map to.
For example, in this image

You can see which alert rule is active to protect from Phishing attacks under the Initial Access category. Drill down in each category and technique to see all the alert rules that can detect that specific attack technique.
Last updated
Was this helpful?