Skip to main content

Understanding Alerts & Severity

Learn how CastellanAI classifies and prioritizes security threats.

AI-Powered Analysis

CastellanAI uses AI to analyze security events and assign severity levels based on multiple factors including threat indicators, MITRE ATT&CK tactics, and historical patterns.


Severity Levels Explained

Critical Severity

Immediate action required. Active threats that could cause significant damage.

ExamplesResponse Time
Confirmed malware execution0-15 minutes
Active ransomware detected
Data exfiltration in progress
Privilege escalation to domain admin
Immediate Response Required

Critical events require immediate investigation and response. Do not delay.


How Severity is Determined

CastellanAI's AI engine analyzes multiple factors to assign severity:

Event Characteristics

FactorDescription
Event Type & CategoryClassification of the security event
MITRE ATT&CK TacticsMapped threat techniques
Known Threat IndicatorsIOCs matching threat intelligence

Response Time Guidelines

SeverityResponse TimeEscalation
Critical0-15 minutesImmediate notification to security team
HighWithin 1 hourAlert on-call personnel
MediumWithin 4 hoursStandard ticket queue
LowScheduled reviewWeekly analysis
💡 Best Practices for Prioritization
  • Always review context - AI severity is a guide, consider your organization's specifics
  • Check for patterns - Multiple low-severity events may indicate a larger attack
  • Don't ignore lows - Low severity events can escalate or provide attack indicators
  • Document exceptions - Record when you override AI severity for future tuning

What's Next?

GuideDescription
Investigating EventsSystematic approach to investigating security events
Taking ActionAvailable response actions for different threat types
Notifications SetupConfigure alerts for high-severity events
Incident WorkflowsLearn standardized incident response procedures