Quickstart

Security Detections Dashboard

The primary triage location is the Security Detections Dashboard, which displays alerts in a collapsed view for efficient review. Alerts are generated from various data sources and can be filtered, inspected and managed to establish closure or escalation. The platform supports AI-assisted triage, automation, and hunting for deeper investigations, helping SOC analysts focus on high-fidelity threats while reducing manual workload.

Key principles for triage:

  • Prioritise based on severity (e.g., High, Medium, Low).

  • Review td.alert.message for quick forensics, or use hunt for more depth.

  • Validate behaviors and close alerts only when confirmed benign or remediated.

  • Alerts can be reopened if new evidence emerges.

  • Leverage the AI Assistant for automated suggestions.

Overall diagram of an alert lifetime:

START
  |
  V
[ Access Security Detections Dashboard ]
  V
[ Step 1: Initial Review ]
  | - Set Time: Last 24 hours
  | - Check Table: Alert Name, Severity
  | - Check Charts: Techniques, Sites, Indicators, Top Assets At Risk
  V
[ Step 2: Inspect  a single Alert in Detections Feed ]
  | - Select an alert: Click next to alert name in security detections table
  | - Review Columns: Time, td.alert.name, td.alert.message
  | - Use td.alert.message for initial forensics
  |   - Benign? (e.g., maintenance) → Proceed to Close
  |   - Malicious? (e.g., unusual IP) → Investigate
  |   - Need more info? → Expand Alert
  V
[ Step 3: Deep Investigation (if needed) ]
  | - Click "Hunt" 
  |   - Real-time forensics, endpoint/NDR queries
  |   - Check artifacts (port, IP, User, Process), threat intel
  | - Cross-reference: Analyst Comments, AI Triage
  V
[ Step 4: Validate & Update/Close ]
  | - Click "Update" in Detections Feed
  | - Options: Close (with reason), Remediated, Prevented, Mitigated
  | - Choose custom reason, add comments (e.g., "Validated via Hunt")
  | - Use AI Assistant for comment suggestions
  | - Escalate if needed (mark Escalated)
  V
[ Step 5: Post-Triage Actions ]
  | - Monitor trends (Detection Sources by Severity)
  V
[ Re-open if New Evidence ]
  | - Search by Time/Name, click update, revert status
  V
END

Platform Navigation Overview

Access the platform analyst console. In summary, you can investigate, hunt, triage by using time filters(i.e. last 7 days, or now) and clicking on visualizations to narrow down your search. For more granular filtering, there is a text based search bar available.

  • Dashboard Filters and Views:

    • Time Range: Default to "Last 24 hours" (adjust via "Show dates" for custom periods, e.g., last 30 days) or customer time range.

*   **Menu Filters: Use predefined options like:

    * Alert Status (e.g., Open, Closed, In Progress).
    * Tenant (e.g., threatdefence, tdsoc, acme).
    * Root Cause, Data Source (e.g., Keycloak, O365, NDR, Dark Web, Mailgun, google\_workspace.drive, Network Intrusion).
    * Technique (e.g., Indicator, Exploit Public-Facing, Valid Accounts).
    * AI Outcome, MSP, Severity, Tags.
  • Key Sections:

    • Security Detections Table: Lists alerts by Name and Severity. Sort by severity, hover over any alert name to filter in/out and investigate a single alert:

    • Charts and Aggregations:

    • Anomalies (e.g., Open, High Risk).

    • Detection Types (e.g., Spikes, Informational).

    • Techniques (e.g., LOGIN_ERROR).

    • Impacted Sites/Tenants (e.g., threatdefence).

    • Indicators (e.g., IP addresses, geolocations like Australia/Germany).

    • Detection Sources by Severity (e.g., pie chart for Keycloak, HIDS).

    • Top 5: Highlights frequent entities (e.g., SOC-SNAP-1.SOC.LAB.LOCAL, users like Emily/Chris).

    • Detections Feed: Paginated table showing detailed alert rows. Expand for full inspection.

Triage Process

Step 1: Initial Review on Security Detections Dashboard

  • Log in and navigate to the Security Detections Dashboard.

  • Apply filters: Set time to Last 24 hours or 7 days.

  • Scan the Security Detections Table for top alerts by Severity.

  • Set some data filters to remove noise: from the header menu, choose tenant:"your site", Alert Status: Escalated, Data Source:O365, for example. If you prefer to use the keyboard, in the search bar any queries can be used:

    • user.name:john AND source.ip:10.10.10.10 AND (destination.port:(445 OR 446) OR destination:ip:"12.12.12.0/24")

    • Tip: Use asterisks (*) as wildcards and AND,OR to connect keywords.

  • Review aggregated charts for patterns: Check Techniques (e.g., LOGIN_ERROR), Impacted Sites (e.g., threatdefence), and Indicators (e.g., IPs, countries like India/Germany).

Step 2: Inspect Individual Alerts in Detections Feed

  • Click into the Detections Feed (paginated view).

  • For each row, examine columns:

    • Time: E.g., Sep 12, 2025 @ 11:50:01.370.

    • td.alert.name: Alert type (e.g., Spike Of KeyCloak Errors).

    • td.alert.message: High-level forensics (e.g., "KeyCloak Identity Server reports spike of LOGIN_ERROR events with user_temporarily_disabled, last seen user was ['acme.tester'], Australia, NA, IP, threatdefence."). Use this to establish initial closure:

      • Benign? (E.g., known maintenance.)

      • Malicious? (E.g., unusual IP/location.)

      • Needs more info? Proceed to expansion.

    • td.interactions: View related events or correlations.

    • td.alert.status: Default "-", update to In Progress.

  • Expand the alert (click row) for detailed data inspection: Logs, timelines, associated docs, and AI suggestions.

Step 3: Deep Investigation if Needed

  • If td.alert.message lacks context (e.g., to validate behavior over 30 days):

    • Click Hunt next to the alert name in the Detections Feed.

    • This opens a dedicated Hunting Dashboard for maximum depth: Real-time forensics, endpoint searches, NDR flows, threat intel integration, and AI-assisted hunting. Query across sources (e.g., endpoints, cloud) for timelines, artifacts (RAM, registry), or behaviors.

    • Use platform tools: Automated threat hunting, digital forensics (e.g., extract deleted files), and playbooks for containment.

  • Cross-reference with global views: Analyst Comments, AI Triage, or Escalated for team input.

  • For external validation: Check Dark Web leaks or supply chain exposures via integrated intel.

Step 4: Validate and Update/Close Alert

  • Once validated (benign, remediated, or mitigated):

    • Click Update in the Detections Feed.

    • Options: Set status to Closed (with reason, e.g., "False positive - legit user activity"), Remediated, Prevented, or Mitigated.

    • Add comments: E.g., "Validated via Hunt; no compromise."

    • Use AI Assistant for suggestions (e.g., auto-close low-risk).

  • If escalation needed: Mark as Escalated or create a Ticket (OverDue tracking available).

  • Alerts auto-update statuses.

  • Re-open if new evidence: Search by Time/Name and revert status.

Step 5: Post-Triage Actions

  • Review summaries: E.g., AI Triaged, Tickets.

  • Generate reports: Use executive-friendly insights for assurance.

  • Monitor trends: E.g., Detection Sources by Severity chart.

Best Practices and Tips

  • Prioritization: Start with High Severity alerts. Use Top 5 for frequent actors.

  • AI Leverage: Enable AI Triage for workload reduction; review outcomes before closing.

  • Evidence-Based Closure: Always document forensics from td.alert.message or Hunt to support audits.

  • Common Pitfalls: Avoid closing without Hunt if behavior spans >24 hours. Exclude #wl early to reduce noise.

  • Escalation Criteria: Impossible Travel, Volt-Typhoon tools, or Dark Web hits with internal matches.

  • Performance: The platform deploys in minutes; use 24x7 SOC for support if stuck.

  • Training: Practice with #demodata. For advanced queries, use platform's full features (e.g., geocode filters).

Troubleshooting

  • No alerts? Check filters (e.g., remove NOT #closed) or data ingestion.

  • Hunt not loading? Ensure tenant permissions; contact support via platform chat.

  • Re-open issues? Search by Time/Name and edit status.

  • For platform updates, visit https://docs.threatdefence.com or the interactive tour at threatdefence.com.

This manual ensures efficient, evidence-based triage, aligning with ThreatDefence's goal of transforming data into actionable security. Review quarterly or after platform updates.

Last updated