Skip to main content

Threat Detection

Understand how CastellanAI identifies and prioritizes security threats across your organization.

Multi-Layer Detection

CastellanAI uses rule-based detection, AI analysis, threat intelligence, and behavioral analysis simultaneously for comprehensive coverage.


Overview

CastellanAI uses multiple detection methods to identify threats. Detected threats appear in the Security Events page with severity ratings and recommended actions.


How Threats Are Detected

Rule-Based Detection

Windows Event Log patterns mapped to specific attack techniques.

CategoryDescription
AuthenticationLogin successes/failures, brute force attempts
Privilege EscalationUnauthorized elevation of user privileges
Process CreationSuspicious process execution and command lines
Service InstallationNew services installed (potential persistence)
Scheduled TasksTask scheduling for persistence or execution
Account ManagementUser/group creation, modification, deletion
Security Policy ChangesAudit policy and security setting modifications
PowerShell ExecutionScript execution and encoded commands

MITRE ATT&CK Mapping

Each detection rule maps to specific MITRE ATT&CK techniques:

EventTechnique IDTechnique Name
4625 (Failed logon)T1110Brute Force
4672 (Special privileges)T1078Valid Accounts
7045 (Service installed)T1543.003Windows Service
4698 (Scheduled task)T1053.005Scheduled Task

See MITRE ATT&CK for the complete framework mapping.


Understanding Threat Severity

Critical (Score 90-100)

Immediate investigation needed

Typical Recommendations
Isolate device immediately
Block user account
Escalate to security team
Response Time

Critical threats should be investigated within minutes, not hours.


Viewing Detected Threats

Security Events Page

Navigate to Security Events in the sidebar to see all detected threats.

Display ElementDescription
Summary CardsTotal events, open events, critical threats, average risk
Event ListAll events with severity badges and status
Platform FilterFilter by Windows, Linux, or macOS

Event Details

Click any event to see complete information:

SectionContent
Severity and PlatformRisk level and source OS
Event TypeCategory of security event
MITRE ATT&CK TechniquesMapped attack techniques
Machine and UserAffected device and user account
Behavioral ScoresCorrelation, burst, and anomaly scores
AI AnalysisAI-generated recommendations

Managing Detection Rules

Detection Rules Page

Navigate to Detection Rules in the sidebar to view and manage rules.

You can:

  • View all active detection rules
  • Enable or disable specific rules
  • See hit counts and last triggered times
  • Filter by category or threat level
🔧 Custom Rules (Enterprise)

Enterprise tier customers can create custom detection rules:

  1. Go to Detection Rules
  2. Click Add Rule
  3. Define the detection criteria
  4. Map to MITRE ATT&CK techniques
  5. Set severity and notification preferences

Detection Notifications

Configure notifications in Settings:

  1. Set severity thresholds for alerts
  2. Choose notification channels
  3. Select event types that trigger notifications

Best Practices

✅ Detection Best Practices
DoDon't
Review critical threats immediatelyLet high-severity alerts sit unaddressed
Check for event patternsInvestigate events in isolation
Use MITRE ATT&CK contextIgnore threat technique classifications
Monitor behavioral scoresFocus only on rule-based detections
Document your responseSkip documentation steps

What's Next?

GuideDescription
Malware ScanningFile-based threat detection
MITRE ATT&CKThreat classification framework
Investigating EventsDeep-dive investigation techniques