Skip to main content

Understanding Alerts & Severity

Learn how CastellanAI classifies and prioritizes security threats.

Severity Levels Explained

CastellanAI uses AI to analyze security events and assign severity levels based on multiple factors including threat indicators, MITRE ATT&CK tactics, affected systems, and historical patterns.

Critical (Red)

Immediate action required. Active threats that could cause significant damage to your organization.

ExamplesResponse Time
Confirmed malware execution0-15 minutes
Active ransomware detected
Data exfiltration in progress
Privilege escalation to domain admin

High (Orange)

Suspicious activity requiring prompt investigation. Potential threats that warrant immediate attention.

ExamplesResponse Time
Multiple failed authentication attemptsWithin 1 hour
Suspicious PowerShell execution
Unusual network connections
Lateral movement detected

Medium (Yellow)

Notable events that should be reviewed but don't require immediate action.

ExamplesResponse Time
Policy violationsWithin 4 hours
Non-standard software installations
Configuration changes
Minor security audit failures

Low (Blue)

Informational events for security awareness. Review during routine analysis.

ExamplesResponse Time
Successful authentication eventsDuring scheduled review
Normal system updates
Routine administrative actions
Standard security scans

How Severity is Determined

CastellanAI's AI engine analyzes multiple factors to assign severity:

Event Characteristics

  • Event type & category
  • MITRE ATT&CK tactics mapped
  • Known threat indicators

Context & Impact

  • Affected system criticality
  • User privilege level
  • Correlation with other events

What's Next?

Master Alert Prioritization

Understanding severity levels helps you prioritize your security operations and respond effectively to threats.

Learn Incident Workflows