Quickstart
START
|
V
[ Access Security Detections Dashboard ]
V
[ Step 1: Initial Review ]
| - Set Time: Last 24 hours
| - Check Table: Alert Name, Severity
| - Check Charts: Techniques, Sites, Indicators, Top Assets At Risk
V
[ Step 2: Inspect a single Alert in Detections Feed ]
| - Select an alert: Click next to alert name in security detections table
| - Review Columns: Time, td.alert.name, td.alert.message
| - Use td.alert.message for initial forensics
| - Benign? (e.g., maintenance) → Proceed to Close
| - Malicious? (e.g., unusual IP) → Investigate
| - Need more info? → Expand Alert
V
[ Step 3: Deep Investigation (if needed) ]
| - Click "Hunt"
| - Real-time forensics, endpoint/NDR queries
| - Check artifacts (port, IP, User, Process), threat intel
| - Cross-reference: Analyst Comments, AI Triage
V
[ Step 4: Validate & Update/Close ]
| - Click "Update" in Detections Feed
| - Options: Close (with reason), Remediated, Prevented, Mitigated
| - Choose custom reason, add comments (e.g., "Validated via Hunt")
| - Use AI Assistant for comment suggestions
| - Escalate if needed (mark Escalated)
V
[ Step 5: Post-Triage Actions ]
| - Monitor trends (Detection Sources by Severity)
V
[ Re-open if New Evidence ]
| - Search by Time/Name, click update, revert status
V
ENDPlatform Navigation Overview

Triage Process
Step 1: Initial Review on Security Detections Dashboard

Step 2: Inspect Individual Alerts in Detections Feed
Step 3: Deep Investigation if Needed
Step 4: Validate and Update/Close Alert
Step 5: Post-Triage Actions
Best Practices and Tips
Troubleshooting
Last updated


