Skip to main content

Investigating Security Events

Learn how to analyze and respond to security threats.

Investigation Workflow

When CastellanAI detects a potential security threat, it's important to investigate promptly and systematically. This guide walks you through the investigation process from initial detection to resolution.

StepAction
1Detect - Identify the security event
2Analyze - Review event details and context
3Respond - Take appropriate action
4Document - Record findings and actions

Step 1: Detect & Triage

Security events appear in your dashboard with AI-assigned severity levels. Start by reviewing high and critical severity events first.

Event Priority Matrix

SeverityResponse Time
Critical (Red)Investigate immediately (0-15 min)
High (Orange)Investigate within 1 hour
Medium (Yellow)Investigate within 4 hours
Low (Blue)Review during scheduled analysis
AI Severity

CastellanAI analyzes hundreds of factors to assign severity. However, always consider your organization's context when prioritizing.

Step 2: Analyze Event Details

Click on an event to view comprehensive details including MITRE ATT&CK mapping, AI analysis, and related events.

Key Information to Review

  • Event Type - What type of security event occurred (auth failure, malware detection, etc.)
  • Affected System - Which host/user/process was involved
  • Timestamp - When did the event occur (check for patterns)
  • MITRE Tactics - Which ATT&CK techniques were detected
  • AI Analysis - What did CastellanAI identify as suspicious
  • Correlation - Are there related events in the same timeframe

Apply filters to find related events and build a complete picture of the incident.

Useful Filter Combinations

FilterPurpose
Same HostFilter by hostname to see all activity on the affected system
Same UserFilter by username to track user behavior across systems
Time RangeNarrow to +/-30 minutes of the original event
Event TypeLook for authentication, process creation, or network events

Step 4: Take Action

Based on your investigation, take appropriate action to contain and remediate the threat.

Response Actions Available

ActionDescription
Block IP AddressPrevent traffic from malicious IPs
Isolate HostDisconnect compromised system
Quarantine FileMove malware to secure location
Create TicketEscalate to security team
Important

All actions are logged and can be rolled back if needed. Document your reasoning before taking action.

Investigation Best Practices

Do's

  • Document all findings and actions taken
  • Check for related events in the same timeframe
  • Consult AI analysis for additional context
  • Verify with affected users before taking disruptive action

Don'ts

  • Don't dismiss events without investigation
  • Don't take action without understanding impact
  • Don't ignore correlated events
  • Don't skip documentation for "minor" incidents

What's Next?

  • Taking Action - Learn about available response actions and when to use them
  • Incident Workflows - Establish standardized workflows for common incident types
  • False Positives - Learn how to identify and reduce false positive alerts

Master Security Investigation

Effective investigation is key to maintaining strong security. Practice these workflows regularly to build muscle memory for incident response.

Understand Alert Severity