Anatomy of an Alert

Alerts represent specific events that could indicate a threat or an anomaly. The following article explains detailed information about alerts.

Evidence

Alert information is available on each of the tabs in the Alert Details panel.

For most alerts

For alerts other than Amazon GuardDuty and Azure Defender for Cloud alerts, the Evidence tab displays the primary information about the alert’s current state and how it was generated. The top of the tab provides an overview of the alert, including the Alert Title, Priority, Assignee, Disposition, and Status. If you’re an MDR customer and the alert is managed by Rapid7, this tab also displays the Rapid7 managed tag, as well as any other tags that the Rapid7 SOC has added to the alert. The expandable sections provide information about how the alert was generated, including:

  • Description and Recommendation - A brief description of the alert and recommendation(s) for triage.
  • Process Tree - Details about the process that occurred when the alert was generated and the processes that occurred before and after.
  • Rule Logic and Matched Data - Detection rule logic that generated the alert and the corresponding key-value payload data from your environment.
    • View the payload data as a table or in JSON format.
    • Select the Highlight matching keys and Filter matching keys toggles to quickly view the values that the detection rule alerted you to.
    • You can adjust your view using Show Rule Logic and Hide Rule Logic.
    • You can search the source IP address on IPHub by clicking the link in Payload.
    • You can analyze any additional IP addresses, domains, URLs, or file hashes by clicking the link in Payload.
    • Click View Log Entry in the alert payload to view the associated log entry in Log Search with the relevant log and time range selected.
  • Related alerts - Details about additional alerts that were generated for the same organization including those based on actors.
  • Users and Assets - Details about the users and assets associated with the alert. These details can be used to identify and locate the user or asset in the network or organization.
For Amazon GuardDuty alerts (open beta)

For GuardDuty alerts, the Evidence tab displays the same information as for other alerts, plus extra details specific to GuardDuty. The sub-tabs on the Evidence tab provide information, including:

  • Alert Overview - This tab displays information that is similar to a non-GuardDuty alert's Evidence tab, providing details about how and why the alert was generated.
  • Impacted Resources - Displays details about the resources that are potentially impacted by the alert.
  • Principal Attribution - Displays details about the principal that initiated the alert, including user name, ARN, and account ID, as well as any role changes made by the principal during the action that generated the alert.
  • Enrichment - Displays data related to the impacted resources collected from InsightCloudSec at the time the alert was triggered.
  • Remediation - Provides remediation steps as well as scripts and queries you can use to assist with remediation.
  • AWS GuardDuty JSON - Displays the full JSON of the AWS GuardDuty alert object.

Open beta

The experience for Amazon GuardDuty alerts is currently in open beta. It may continue to evolve over the coming months.

For Azure Defender for Cloud (ADC) alerts (open beta)

For ADC alerts, the Evidence tab displays the same information as for other alerts, plus extra details specific to ADC. The sub-tabs on the Evidence tab provide information, including:

  • Alert Summary - This tab displays information that is similar to a non-ADC alert's Evidence tab, providing details about how and why the alert was generated.
  • Impacted Resources - Displays details about the resources that are potentially impacted by the alert.
  • Enrichment - Displays data related to the impacted resources collected from InsightCloudSec at the time the alert was triggered.
  • Remediation - Provides remediation steps as well as scripts and queries you can use to assist with remediation.
  • Azure Defender for Cloud JSON - Displays the full JSON of the ADC alert object.

Open beta

This experience for Azure Defender for Cloud alerts is currently in open beta. It may continue to evolve over the coming months.

For Endpoint Prevention alerts

The evasion tactics with which Endpoint Prevention interferes can correspond to the solution’s Prevention Engines. While the alert includes fields that are general to other InsightIDR alerts, the Endpoint Prevention engine's alerts include additional details that are more specific to the Prevention Engines rules.

These additional fields are unique to Endpoint Prevention alerts:

  • Agent action - The action taken on the reported process or threat, based on the prevention group that the endpoint was assigned to during the time of the event.
  • Process full path - The full path of the file that triggered the alert.
  • Command line - The full command line of the process that triggered the alert.
  • Event type - The category of the rule name, corresponding to the prevention engine.
  • File hash - The SHA-256 hash of the file that triggered the alert.
  • Host name - The host name of the endpoint that reported the alert.
  • Certificate information - The certificate information of the file that triggered the alert, which is applicable for signed processes.
  • PID - The process ID of the file that triggered the alert.
  • PPID - The process ID of the parent process for the process that triggered the alert. Parent process full path - The full path of the parent process for the process that triggered the alert.
  • Armor version - The underlying component version of Endpoint Prevention, referred to as Armor.
  • Rule name - The name of the Endpoint Prevention rule responsible for the alert.
  • User name - The user that executed the process, which triggered the alert.
  • Prevention group - The name of the prevention group that the endpoint triggering the alert is assigned to.
  • Local IP - The local IP of the endpoint reporting the event.
  • Repeat counter - The number of similar events received in the last 24 hours.
  • First received time - The server time when the first similar event was received.
  • Additional info - Additional information regarding the endpoint action in the alert. Depending on the event type, different details display.
  • Alert type specific details - Additional forensic information about the alert.
  • Process hierarchy - All parent processes’ information about the triggered process, including PID, time created, hash, command line, and the user that created the process.

Exceptions

The Exceptions page displays information about any exceptions that exist in the detection rule that generated the alert. The detection rule exceptions provide additional context around the intent behind the rule and can help indicate whether the resulting alert represents suspicious behavior.

You can also create new exceptions on this tab for key-value pairs that are relevant to the specific alert. Visit Exceptions and Creating Detection Rule Exceptions for details.

Audit Log

The Audit Log tab includes a detailed chronological view of every action taken in relation to the alert, when the action was taken, and by which user.

Read more about viewing the alert audit log.

MITRE ATT&CK

The MITRE ATT&CK tab includes the MITRE ATT&CK tactic mapped to the detection rule that generated the alert. The MITRE ATT&CK tactic helps direct you to other areas in your environment that might be compromised by the threat, if the alert represents suspicious activity.

Read more about which ABA detection rules map to which MITRE ATT&CK tactics.