Alert Triage

Alert Triage

Pasted image 20251201135309.png

Initial Actions

Take ownership of the assigned alert and avoid interfering with alerts being handled by other analysts, and confirm that you are fully prepared to proceed with the detailed investigation. You achieve it by first assigning the alert to yourself, moving it toĀ In Progress, and then familiarising yourself with the alert details like its name, description, and key indicators.

Investigation

This is the most complex step, requiring you to apply your technical knowledge and experience to understand the activity and properly analyse its legitimacy inĀ SIEMĀ orĀ EDRĀ logs. To support L1 analysts with this step, some teams developĀ WorkbooksĀ (also known as playbooks or runbooks) - instructions on how to investigate the specific category of alerts. If workbooks are not available, below are some key recommendations:

  1. Understand who is under threat, like the affected user, hostname, cloud, network, or website
  2. Note the action described in the alert, like whether it was a suspicious login, malware, orĀ phishing
  3. Review surrounding events, looking for suspicious actions shortly after or before the alert
  4. Use threat intelligence platforms or other available resources to verify your thoughts

Final Actions

Your decisions here determine whether you found or missed the potential cyberattack. Some actions likeĀ EscalationĀ orĀ CommentingĀ will be explained in the following rooms, so don't worry if they sound complex right now. First, decide if the alert you investigated is malicious (True Positive) or not (False Positive). Then, prepare your detailed comment explaining your analysis steps and verdict reasoning, return to the dashboard and move it to theĀ ClosedĀ status.

Checking VirusTotal of the file hash is a must.

Alert Triaging

When multiple alerts appear, analysts should have a consistent method to assess and prioritise them quickly. There are many factors you can consider when triaging, but these are the fundamental ones that should always be part of your process of identifying and evaluating alerts:

Key Factors Description Why It Matters?
Severity Level Review the alert's severity rating, ranging from Informational to Critical. Indicates the urgency of response and potential business risk.
Timestamp and Frequency Identify when the alert was triggered and check for related activity before and after that time. Helps identify ongoing attacks or patterns of repeated behaviour.
Attack Stage Determine which stage of the attack lifecycle this alert indicates (reconnaissance,Ā persistence, or data exfiltration). It gives insight into how far the attacker may have progressed and their objective.
Affected Asset Identify the system, user, or resource involved and assess its importance to operations. Prioritises response based on the asset's importance and the potential impact of compromise.

They form a balanced foundation that's simple enough for analysts to apply quickly but comprehensive enough for informed decisions.

After reviewing these factors, decide on your next step: escalate to the incident response team, perform a deeper investigation, or close the alert if it's confirmed to be a false positive. A structured triage process like this helps ensure that time and resources are focused on what truly matters.

After Identifying Alerts