Case management overview

Alerts generate SIEM incidents. If an incident triggers an automated workflow (playbook), a SOAR-based case is automatically created. Each case represents one or more incidents that make up a potential attack. A case is a series of events on a timeline, where each event corresponds to an individual action within a playbook.

Using cases helps you and your team track and understand what happened through the course of an investigation and automated response.

How it works

  • A case is created when an incident triggers an automated workflow (playbook).

  • A case contains a timeline of events. Each event reflects an action within the playbook.

  • Event details show the playbook’s action data and can be used as an audit log.

  • A case includes artifacts (external references or resources a playbook uses or accesses). Artifacts can be generated automatically and can also be added manually.

  • Cases are categorized by type: Threat or Risk.

  • Each case has an owner (the individual managing the case).

  • Cases are marked by severity based on a severity score.

Key components

Case type

A case type is a label given to a security incident to help organize and prioritize it based on its nature, urgency, or impact. You can assign a Threat or Risk type to a case, with Threat being the default.

Severity

Cases are marked with their potential severity based on their score:

  • Low (0–30)

  • Medium (31–60)

  • High (61–80)

  • Critical (81–100)

Artifacts

Artifacts are the external references or resources a playbook uses or accesses. Out-of-the-box artifact types include:

  • Domain

  • Email

  • File

  • Generic Text

  • Host

  • IP Address

  • Hash Values

Trigger event

A trigger event is a specific incident, alert, or a series of incidents and/or alerts that trigger a playbook. You can use trigger event logs to understand what triggered a playbook.

MITRE

MITRE shows the incidents associated with a case and their MITRE tactics and techniques. To learn more about Logpoint MITRE ATT&CK Coverage, go to MITRE.

Graph overview

Graph overview provides a visual representation of the connections among multiple events, incidents, and artifacts within a case.

Last updated

Was this helpful?