Skip to content

Artifact

  • An Artifact refers to specific data items or evidence related to a security incident, used to support investigation and response efforts.
  • Artifacts can include various types of data, such as IP addresses, domain names, file hashes, URLs, email addresses, etc.
  • Artifacts are mounted on Alerts to help analyze and investigate security incidents.
  • Operations such as querying, responding, and enriching are typically performed based on Artifacts, for example, querying the owner information of a hostname, querying threat intelligence for a file hash, or blocking an IP address.

View

Supports various filtering and sorting functions.

img.png

img_1.png

Detail

img_2.png

  • Type

Artifact type, such as ip, domain, hash, url, mail_from, etc.

  • Value

The specific value of the Artifact, such as a specific IP address, domain name, etc.

  • Artifact ID

Automatically generated unique Artifact number. Used only for readability display, not as a unique identifier.

  • Is Whitelisted

Whether it is in the whitelist.

  • Is Evidence

Whether it is used as evidence for investigation.

  • Enrichment

Stores and displays enrichment information in JSON format.

Playbook

List of Playbooks associated with the Artifact.

img_3.png