Skip to main content

Investigating Security Events

Learn how to analyze and respond to security threats.

Systematic Approach

A structured investigation workflow ensures thorough analysis and proper documentation for compliance and future reference.


Investigation Workflow

StepAction
1. DetectIdentify the security event
2. TriagePrioritize by severity
3. AnalyzeReview event details and context
4. RespondTake appropriate action
5. DocumentRecord findings and actions

Step 1: Detect & Triage

Security events appear in your dashboard with AI-assigned severity levels.

Event Priority Matrix

SeverityResponse TimeAction
Critical (🔴)0-15 minutesInvestigate immediately
High (🟠)Within 1 hourInvestigate promptly
Medium (🟡)Within 4 hoursSchedule investigation
Low (🔵)Scheduled reviewReview during analysis sessions
AI Severity

CastellanAI analyzes hundreds of factors to assign severity. However, always consider your organization's context when prioritizing.


Step 2: Analyze Event Details

Key Information to Review

Click on an event to view comprehensive details:

FieldWhat to Look For
Event TypeClassification (auth failure, malware, etc.)
Affected SystemWhich host/user/process was involved
TimestampWhen it occurred (check for patterns)
MITRE TacticsWhich ATT&CK techniques were detected
AI AnalysisWhat CastellanAI identified as suspicious
CorrelationRelated events in the same timeframe

Apply filters to find related events and build a complete picture:

Useful Filter Combinations

FilterPurpose
Same HostSee all activity on the affected system
Same UserTrack user behavior across systems
Time RangeNarrow to +/-30 minutes of original event
Event TypeLook for auth, process, or network events
MITRE TechniqueFind events using same attack technique

Step 4: Take Action

Available Response Actions

ActionDescriptionUse Case
Block IP AddressPrevent traffic from malicious IPsExternal attacks
Isolate HostDisconnect compromised systemMalware/ransomware
Quarantine FileMove malware to secure locationSuspicious files
Add to WatchlistEnhanced monitoringSuspicious accounts
Create TicketEscalate to security teamInvestigation needed

Investigation Best Practices

Investigation Do's

PracticeReason
Document all findings and actionsAudit trail and future reference
Check for related events in timeframeIdentify attack scope
Consult AI analysis for contextLeverage automated insights
Verify with affected users firstAvoid disrupting legitimate activity
Review MITRE ATT&CK techniquesUnderstand attack methodology
📝 Investigation Checklist
  • Review event details and AI analysis
  • Check for correlated events
  • Identify affected systems and users
  • Review MITRE ATT&CK context
  • Determine scope of impact
  • Execute appropriate response action
  • Document findings and rationale
  • Update event status
  • Monitor for recurrence

What's Next?

GuideDescription
Taking ActionAvailable response actions and when to use them
Incident WorkflowsStandardized workflows for common incident types
False PositivesHow to identify and reduce false positives
Alerts & SeverityUnderstanding severity levels