Skip to main content

Event Monitoring

Monitor security events across your organization in real-time with AI-powered threat detection.

Real-Time Visibility

Events appear in your dashboard within seconds of occurring on any monitored device via SignalR streaming.


Overview

CastellanAI continuously monitors your endpoints for security events, providing instant visibility into potential threats.


What Gets Monitored

Authentication Events

Event TypeExamples
Login AttemptsSuccessful and failed logins, account lockouts
Privilege ChangesAdmin rights granted, group membership changes
Session ActivityRemote desktop connections, session logoffs
High-Risk Events

Multiple failed login attempts may indicate a brute force attack. These are automatically flagged as high priority.


Viewing Events in the Dashboard

Summary Cards

At the top of the Security Events page, four summary cards provide an at-a-glance overview:

CardDescription
Total EventsCount of all security events detected
Open EventsEvents requiring attention (Open or Investigating status)
Critical ThreatsHigh-priority security incidents needing immediate response
Average RiskMean risk score across all displayed events

Platform Filter

Filter events by operating system using the platform dropdown:

FilterShows
All PlatformsEvents from all agents
WindowsWindows events only
LinuxLinux events only
macOSmacOS events only

Event Details

Event List Information

Each event card displays:

FieldDescription
Risk Level BadgeColor-coded severity (Critical, High, Medium, Low)
Platform BadgeOperating system icon
Event TypeClassification of the security event
Event IDWindows Event ID (when applicable)
StatusCurrent investigation status
MessageDescription of what occurred
MachineDevice hostname
UserUsername involved
TimestampWhen the event occurred

Real-Time Updates

The Security Events page automatically refreshes every 30 seconds.

Connection Status

Look for the connection status indicator next to the platform filter. Green means you're receiving live updates.


Data Retention

Your event history is retained based on your subscription tier:

SubscriptionEvent Retention
Small Business24 hours
Medium Business7 days
Enterprise30 days
💡 Need Longer Retention?
  • Export events regularly - Download CSV/JSON exports for compliance
  • Upgrade your subscription - Higher tiers include longer retention
  • Use external SIEM - Forward events to your SIEM for extended storage

AI-Powered Analysis

CastellanAI automatically analyzes every event:

CapabilityDescription
Calculate risk scoresPrioritize the most critical threats
Identify patternsDetect attack sequences across multiple events
Map to MITRE ATT&CKClassify threats using industry-standard framework
Detect anomaliesFlag unusual activity that deviates from baselines
Identify burst activityDetect rapid event sequences indicating active attacks
Reduce noiseFilter out routine activity so you can focus on real threats

Best Practices

✅ Daily Monitoring Checklist
  • Check the dashboard for new high-severity events
  • Review critical threats requiring immediate attention
  • Verify all agents are connected and healthy
  • Check for correlated events indicating attack chains
  • Update event statuses as you investigate
🔔 Alert Configuration Tips
  • Configure alerts for critical and high-severity events
  • Don't rely solely on manual dashboard checks
  • Set up multiple notification channels (email, Slack, Teams)
  • Review and tune alert thresholds regularly

What's Next?

GuideDescription
Threat DetectionLearn how threats are identified
MITRE ATT&CKUnderstand threat classification
Alerts & SeverityConfigure alert thresholds