Skip to content

Alert

  • Centralized display of all alert records.
  • By default, all fields in an alert are read-only and cannot be edited.
  • Analysts do not modify alert data; they only conduct investigations and response activities based on alert data.

View

Supports various filtering and sorting functions.

img.png

img_8.png

Detail

img_1.png

Alert Operations Panel

  • Name

Human-readable alert name, briefly describing the alert content.

  • Reference

Alert reference link, usually pointing to relevant threat intelligence or original SIEM raw data link or security device alert link.

  • Source Data Identifier

Metadata used to uniquely identify the source data of the alert, such as log ID, event ID, etc., typically used to quickly locate the original data of the alert in SIEM and security devices.

  • Severity

Alert severity level, divided into four levels: Low, Medium, High, Critical.

  • Source

Alert source, categorized as NDR, EDR, DLP, etc.

  • Alert Date

Time when the original alert occurred.

  • Created Date

Time when the alert was created in the system.

  • Tags

Alert tags, used for classifying and marking Alerts. Can be used for searching and filtering.

  • Alert ID

Automatically generated unique alert number. Used only for readability display, not as a unique identifier.

  • Description

Detailed description of the Alert. Supports Markdown format.

  • Attachments

Attachments related to the alert.

  • Rule ID

According to ASP's design philosophy, alerts are created by rules in SIEM. Rule ID == Module script name == SIEM Rule name.

For Splunk, the Rule ID is essentially the Splunk Alert name. For Kibana, it's the Rule name. Refer to SIEM Integration.

  • Rule Name

Human-readable name of the Rule. Used to generate the Case Title.

Artifact

List of artifacts related to the alert.

img_3.png

AI

AI analysis results generated based on the alert content.

img_2.png

Case

Case associated with the alert.

img_4.png

Raw Log

Original log content of the alert. JSON format.

img_5.png

Playbook

History of playbook executions related to the alert.

img_6.png

System

System fields of the alert.