Incident and Risk Management
Incident tracking, risk assessment, and response playbooks within the SIEM module.
Incident Management
Navigation: ELS Console → SIEM → Incidents
The Incidents tab displays all triggered alert incidents in a time-filtered, searchable table. Each incident row contains the following information:
Column |
Description |
|---|---|
Timestamp |
Time when the alert was triggered |
Assignee |
User assigned to handle the incident |
Status |
Current incident status |
Risk Value |
Calculated risk score |
Incident Statuses
Each incident has one of the following statuses:
New — incident has been created but not yet reviewed
Ongoing — incident is being actively investigated
False — incident has been identified as a false positive
Solved — incident has been resolved
Incident Actions
For each incident you can:
Update status — change the incident status
Assign user — assign a team member to handle the incident
Add notes — attach investigation notes and comments
Verify against blacklist — check incident fields against the blacklist index (single field or whole document)
View document — inspect the original alert document
Manual Incident Creation
Navigation: ELS Console → Discover → Incident (top right)
Incidents are typically created automatically when alert rules are triggered. Additionally, you can create incidents manually from the Discover interface by clicking the Incident button in the top-right corner. This allows you to flag suspicious events found during manual log analysis.
Risk Management
Navigation: ELS Console → SIEM → Risks
Risk management allows you to categorize and score entities (users, hosts, IPs) by mapping field values to risk categories. The Risks tab has four sub-tabs: Create Category, Category List, Create Risk, and Risk List.
Risk Categories
A risk category defines a named risk level with a numeric value from 0 to 100.
Creating a category:
Go to the Create Category sub-tab.
Enter a Category name (e.g., “Critical Assets”, “High Risk Users”).
Set a Category value (0–100), where higher values represent higher risk.
Submit the category.
Note
A default uncategorized category with value 0 is created automatically on plugin initialization.
Risk Entries
A risk entry maps a specific field value from your data to a risk category.
Creating a risk entry:
Go to the Create Risk sub-tab.
Select an Index pattern and Time range to load available data.
Choose the Key field (e.g.,
source.ip,user.name).The system loads unique values for the selected field from the index.
Map each value to a risk category.
Risk Scoring on Alert Rules
Each alert rule can include risk scoring configuration:
Risk Key — the field used to calculate risk (e.g.,
source.ip)Multiple risks aggregation — how to combine multiple risk values: MAX, MIN, AVG, SUM, or CUSTOM
Risk boost [%] — a percentage multiplier applied to the calculated risk score (default: 100)
When an alert triggers, the system looks up the risk value for the entity identified by the Risk Key field and applies the aggregation method and boost percentage to calculate the final risk score. This score is visible in the Incidents tab.
Playbooks
Navigation: ELS Console → SIEM → Playbook
Playbooks provide a way to document response procedures and attach executable scripts to alert rules. The Playbook tab has two sub-tabs: Create Playbook and Playbook List.
Creating a Playbook
Go to the Create Playbook sub-tab.
Fill in the following fields:
Name — descriptive name for the playbook
Text — response procedure description (e.g., investigation steps, escalation instructions)
Script — executable script content to be run when the playbook is invoked
Submit the playbook.
Managing Playbooks
The Playbook List sub-tab displays all created playbooks in a table. Available actions for each playbook:
Show — view playbook details
Update — edit the playbook name, text, or script
Delete — remove the playbook
Associating Playbooks with Alert Rules
Playbooks are linked to alert rules through the alert creation form:
When creating or editing an alert rule (SIEM → Alert Rules → Create Alert Rule), enable the Playbooks toggle.
Select one or more playbooks to associate with the rule.
When the alert triggers, the associated playbooks are available for the incident responder to reference and execute.