Skip to main content

Threat CenterThreat Center Guide

Respond to a Case

After you create a case, investigate, remediate, and close it. Document your response and track your progress.

  1. Find cases of interest. By default, Threat Center displays cases opened in the past week, and cases are sorted by risk score, from highest to lowest.

  2. Get an overview of cases of interest:

    A list of cases in Threat Center.
    • Risk Score – The case risk score and associated priority.

    • ID – The unique case ID assigned to the case.

    • Created – The date and time the case was created and the time elapsed since the case was created.

    • Grouped By – The attribute by which detections are grouped. If the detections are grouped by entity, to view the entity attributes, click the entity.

      A case in the list with the associated entity highlighted in a red rectangle.
    • Scope – The number of objects associated with the case:

    • Stage – The current case stage.

    • Queue – The queue assigned to respond to the case.

    • Assignee – The assignee assigned to respond to the case.

  3. To view more details about a case, select the case.

  4. In the Overview tab, get an overview of the case:

    • Exabeam Nova Threat Summary – An AI-generated summary of the case and recommended next steps. This summary is updated every time detections are added to the case.[8]

    • Risk Score – The case risk score and associated priority.

    • User Description – The case description.

    • Grouped By – The attribute by which detections are grouped. If the detections are grouped by entity, to view the entity attributes, click View Details.

    • Timeframe – Important markers of time associated with the case, including:

      • First Detection – The date and time the first detection was added to the alert.

      • Duration – The days, hours, and minutes elapsed between when the first and last detection was added to the alert.

      • Case Creation – The date and time the case was created.

      • Age – For an open case, the days, hours, and minutes elapsed between when the case was created and the current time; or, for a closed case, the days, hours, and minutes between when the case was created and last closed.

    • Users – Users associated with related detections.

    • Devices – The source and destination hosts associated with related detections.

    • Rules Triggered – The top seven triggered rules from which associated detections are created and the number of times they created associated detections. To view all triggered rules from which associate detections are created, click View all rules.

    • Latest Notes – The notes most recently added to the case.

    • MITRE TTPs – The ATT&CK tactics and techniques that best describe the case.

    • Use Cases – The Exabeam use cases that best describe the case.

    • Tags – Related tags you created.

    • Attachments – Files attached to the case.

  5. Under the Threat Timeline tab, understand the historical context around the case. Review a timeline of related detections; up to 100 associated parsed events; and key response moments, including when the associated alert was created, when the case was created, when the investigation started, when remediation ended, and when the case closed.

    • To continue your investigation and view the event in Search, click Open in Search.

    • To view all detection details, including the assigned risk score, ATT&CK tactics and techniques, Exabeam use cases, tags, and event fields associated with the detection, click View All.

    • To view all parsed event fields, click View All Fields.

    • For Advanced Analytics detections, to review all events for the user or asset in the Advanced Analytics Smart Timeline™, click View Timeline in Advanced Analytics.

    • For Correlation Rules detections, to review more information about the correlation rule that created the detection, click Rule Definition:

      • Name – The correlation rule name.

      • Author – Who created the correlation rule.

      • Severity – The rule severity: None, Low, Medium, High or Critical.

      • Use Case – The Exabeam use case most relevant to the rule.

      • MITRE Properties – The ATT&CK techniques most relevant to the rule.

      • Tags – Tags associated with the rule.

      • Repeating Triggers – The field values by which the rule is suppressed if the rule is over-triggered.

  6. As you work on a case:

    • Update the priority and case stage, assign the case to another queue or assignee, and add notes and attachments with your findings.

    • Expedite your case response and get answers to any question about the case or related entities using the Exabeam Nova Analyst Assistant. To navigate to the Exabeam Nova Analyst Assistant, click Open Analyst Assistant:

      threacenter-case-openanalystassistant.png

      In Exabeam Nova Analyst Assistant, enter a prompt, then press return or Enter or click A blue square with a white outline of a paper airplane in the center..

    • Deepen your investigation in Search and view all events associated with the attribute by which detections are grouped. To navigate directly to these events in the Search timeline view, click Open Investigation Timeline.

      threatcenter-case-openinvestigationtimeline.png



[7] MITRE ATT&CK and ATT&CK are trademarks of The MITRE Corporation ("MITRE"). Exabeam is not affiliated with or sponsored or endorsed by MITRE. Nothing herein is a representation of the views or opinions of MITRE or its personnel.

[8] This tool is designed to condense security event data into easy-to-understand language, focusing on important security details. It can also answer follow-up questions and discuss security tech topics, but its accuracy might vary outside these areas. Always double-check responses for crucial decisions. Your queries and data will only be retained temporarily and won't be used for AI training. Exabeam is actively improving this tool and welcomes feedback.