Incident Management
An incident represents the individual circumstances or conditions that indicate a potential threat that requires investigation and potential action. An incident is generated automatically when the query defined in an alert rule detection, or alert criteria, finds a match in one or more log messages. You can use the incident to investigate whether there is a real threat or not. The incident contains all the log events detected, which can be mapped to identified MITRE ATT&CK techniques.
Incidents are detected separately or they can be used to build off each other to chain together a timeline of that describe the flow of an attack. You can view the log source the incident is based on ans also determine whether the incident was triggered by an alert rule or by a search query.
You are notified that an incident is generated through SSH, SNMP, HTTP, or Syslog.
When you view incidents, the background color tells you the incidents severity.

Critical
Red
High
Purple
Medium
Blue
Low
Gray
Incident Data
Incidents contain the data or details necessary to investigate whether there is a real threat or not. The incident contains all the log events detected, which can be mapped to identified MITRE ATT&CK techniques.
There are two ways to view incident data:
Incident Data lists the logs and the alert rule that generated the incident. If an incident was created manually, there won't be an Alert ID.
Incident Details takes you to the Alert Rule query that generated the incident. Incident details also include the timestamp when the incident was generated.
Incident Investigation
When an alert triggers an incident, Logpoint notifies users based on the configured Alert Notifications. If notifications are not configured or are set to manual, users can still access and investigate the incident directly in Logpoint. To send email notifications, you must first configure SMTP settings.
During an investigation, you can assign the incident to yourself to take ownership and track responsibility. As the investigation progresses, you and other Logpoint users can add comments to document findings, assumptions, and next steps. These comments are shared and visible to all users, ensuring transparency and effective collaboration throughout the incident response process.
Create an Incident
There are four ways to create an incident:
From the Search Interface based on a search query.
From an Alert Rule.
From Widgets in Dashboards.
From Widgets in Search Templates.
Create Incident from Search Interface
Any Logpoint user can create an incident. However, only users who are already part of an Incident User Group can assign an incident to other users. When you are assigned to an incident you are responsible for managing it.
If you are not part of the Incident User Group and you create an incident, you are automatically assigned to the incident yourself.
Create Incident from Alert Rule
Alert Rules or Detections check log events as they occur and generate an incident when the rule conditions match a defined activity. They can be based on any detector or Logpoint query and are typically used to check log events for signs of malicious activity or to monitor operational messages and thresholds. At the same time an alert is generated, an incident correlating to the alert is also created.
An alert is triggered, and an incident is generated whenever the search query meets all alerting criteria.
Close, Reopen & Resolve Incidents
Resolve the incident when its investigation concludes. Close an incident when you decide that the incident doesn't require investigation. When you close an incident, you can reopen it. Incidents cannot be closed without being resolved first.
You can only reopen incidents one-by-one.
Last updated
Was this helpful?

