Alert Investigation
When rules match incoming logs, CHAD creates alerts. This guide covers the alert lifecycle from detection to resolution.Alert List
Navigate to Alerts in the sidebar to see all detections.Filtering
Filter alerts by:| Filter | Description |
|---|---|
| Status | New, Acknowledged, Resolved, False Positive |
| Severity | Critical, High, Medium, Low, Informational |
| Rule | Specific detection rule |
| Time Range | Last hour, day, week, custom |
| Index Pattern | Log source |
Sorting
Sort by:- Newest first (default)
- Oldest first
- Severity (critical → informational)
Alert Clustering
Similar alerts are grouped to reduce noise. Click a cluster to expand and see individual alerts.Alert Status
| Status | Meaning | Next Steps |
|---|---|---|
| New | Unreviewed detection | Triage and investigate |
| Acknowledged | Under investigation | Complete analysis |
| Resolved | Investigation complete | Document findings |
| False Positive | Not a real threat | Consider exception rule |
Changing Status
Single alert:- Open alert detail
- Select new status from dropdown
- Optionally add a comment
- Select multiple alerts with checkboxes
- Click Bulk Actions
- Choose new status
Alert Detail View
Click any alert to open the full investigation view.Alert Information
- Rule name - Which detection triggered
- Severity - Risk level
- Timestamp - When detected
- Index pattern - Log source
- MITRE ATT&CK - Associated techniques
Matched Log
The full log document that triggered the alert:Threat Intelligence Enrichment
If TI sources are configured, alerts include enrichment:- IP reputation - Malicious, suspicious, or clean
- Domain analysis - Known bad domains
- Hash lookups - Malware identification
- Risk score - Aggregated risk level
- VirusTotal
- AbuseIPDB
- MISP
- GreyNoise
- And more…
GeoIP Data
If GeoIP is enabled:- Country and city
- ASN and organization
- Coordinates (lat/long)
Investigation Workflow
1. Initial Triage
Review the alert to understand:- What triggered the detection?
- Is this expected activity?
- What’s the potential impact?
2. Context Gathering
Examine the matched log:- Who (user, system)?
- What (action, process)?
- When (timestamp)?
- Where (source, destination)?
- How (method, tool)?
3. Enrichment Analysis
Review threat intelligence:- Are any IOCs known malicious?
- What’s the overall risk score?
- Are there related indicators?
4. Correlation
Look for related activity:- Other alerts from same source
- Similar patterns across systems
- Timeline of events
5. Decision
Determine the alert status:- Acknowledge - Needs further investigation
- Resolve - Investigation complete, document findings
- False Positive - Not a real threat, consider tuning
Comments
Add investigation notes to alerts:- Open alert detail
- Scroll to Comments section
- Write your analysis
- Click Add Comment
Live Alert Feed
For real-time monitoring, use the Live Feed:- Navigate to Alerts > Live Feed
- Alerts appear as they fire
- Click any alert to investigate
Bulk Operations
Handle multiple alerts efficiently:- Select alerts with checkboxes
- Click Bulk Actions
- Available actions:
- Change status
- Add comment to all
- Export selected
Alert Notifications
Configure how you’re notified about new alerts:Browser Notifications
- Go to Account > Notifications
- Enable browser notifications
- Set severity threshold (e.g., High and above)
Webhooks
Send alerts to external systems:- Slack
- Discord
- PagerDuty
- Custom HTTP endpoints
Jira Integration
Automatically create tickets for alerts:- Maps severity to priority
- Includes alert context
- Links back to CHAD
Handling False Positives
When you identify a false positive:- Mark the alert as False Positive
- Consider creating an Exception Rule
- Document the tuning in the exception
Best Practices
Triage quickly
Triage quickly
New alerts should be triaged within your SLA. Even a quick “acknowledged” is better than ignored.
Document everything
Document everything
Use comments to record your investigation. Future you (or teammates) will thank you.
Look for patterns
Look for patterns
One alert might be noise. Ten similar alerts might be an attack.
Tune proactively
Tune proactively
If you see the same false positive repeatedly, create an exception rule.
Use severity appropriately
Use severity appropriately
Don’t let alert fatigue set in. Tune rules so high-severity alerts are actually high priority.