Skip to content

Investigate an alert

The alert detail page centralizes all information needed for a deep investigation, including event history, associated tasks, similar alerts, and graph visualization.

Alert detail page with urgency, status, and navigation tabs

To open the detail page, click any alert in the Alerts listing.

The header displays the alert urgency, name, and short ID, along with the following actions:

Action Description
Alert Status Move the alert through its lifecycle by changing its status.
Add to case Add the alert to a case for an extended investigation.
Playbooks View and trigger available on-demand playbooks.

Note

Only manual playbooks (with a Manual Trigger) that are enabled in the community appear in the Playbooks list.

The detail page is organized into four tabs: Details, Tasks, Events, and Graph Investigation.

Details tab

The Details tab contains two columns.

The left column includes:

  • Alert urgency (editable on hover)
  • Alert type
  • Impacted assets and entity
  • Similarity strategy of the rule
  • Related cases
  • Kill Chain phase (editable on hover)
  • Details about the triggered rule
  • Threat intelligence from the Intelligence Center

The right column is the timeline, which contains:

  • Alert status changes
  • Comments
  • Events represented by their Smart Descriptions
  • Completed and rejected tasks

You can filter the timeline to display only items of a specific type. To add a comment, click the button in the top-right of the timeline.

Tasks tab

The Tasks tab lists all tasks and subtasks associated with the alert.

Tasks tab showing complete and reject actions

Select Complete or Reject on a task to record the action. Completing a task decreases the alert urgency and the risk indicator.

Note

Subtasks with an OpenC2 specification can be viewed by clicking the automation icon next to the subtask.

Notebook tab

The Notebook tab provides a collaborative workspace to centralize your investigation queries, automation actions, and findings in a single document. Notebooks support markdown syntax, embedded queries, data visualizations, and image attachments.

notebook

Note

In a multi-tenant environment, notebooks are created in the parent workspace by default and are not visible to child tenants unless explicitly shared.

You can create a notebook from scratch or apply a pre-defined template tailored to specific threat types (e.g., phishing, malware analysis). A default template can be configured to standardize your team's response process across all alerts.

For full details on templates, formatting commands, PDF export, and sharing, see our Notebooks documentation.

Similar alerts tab

The Similar alerts tab displays all previously recorded alerts that match the current alert's similarity strategy.

Similar alerts tab with suggestion message and customizable table

The tab is divided into two sections:

  • Suggestion message - A callout summarizing the status of the majority of previous similar alerts, with an action button to apply that status to the current alert (unavailable for alerts in the Closed stage).
  • Similar alerts table - A customizable table of all similar alerts. Click the column selector icon to choose which columns to display.

Tip

Click any similar alert to open its detail page, or open several in new tabs to compare them side by side.

Note

If no previous similar alerts exist, a message is displayed to notify you.

Events tab

The Events tab lists all events that triggered the alert.

Events tab showing event list and value selection mode

When interacting with an individual value in an event, you can:

  • Filter for - Narrow the event list to events matching this value.
  • Filter out - Exclude events matching this value.
  • Search events with this value - Search all events within the alert timeframe (± 1 hour).

To work with multiple values at once, click Toggle value selection and select values across events. You can then:

  • Create an alert filter to suppress future false positives.
  • Click Perform a search to open a side panel with results across your environment.

Search events side panel with results