Incident Responder Fundamentals
This section will help you comprehend and utilize the Incident Responder product's fundamental features. To access all details described in this section, please click on Incident Responder > Incident Responder.
- Widgets
- Top Rules
- Recent Investigations
- Reported Emails
- Use Cases
- FAQ
- Moving Forward: Investigations
Average hours saved per reported email(hours)
|
You can enter how much time a SOC team member spends time on each reported suspicious email to analyze, investigate, delete, etc.
|
Average total cost per hour($)
|
You can enter how much money it costs the company when a SOC team member spends time (hours) on each reported suspicious email to analyze, investigate, delete, etc.,
|
Subject
|
Name of the subject
|
Reported By
|
The email address of the user who reported the incident.
|
Case ID
|
It is the case number that is created specific to the case.
|
Analysis Source
|
Analysis source detail that is automatic or linked to a Playbook rule.
|
Result
|
Analysis result of the case.
|
Status
|
Analysis status of the case. The status can be open, close, false positive, or in progress.
|
Tags
|
This is the area where you can add reminder tag information.
|
Notes
|
This is the area where the analyst can write their notes for this case.
|
Notify Reporting User About This Update
|
A feature where the notification message can be sent to the person who reported the incident using default templates by default or custom templates by clicking the change button and choosing the custom template.
|
Add Custom Message
|
Area where you can add a custom message in the email notification to be sent to the person reported the incident.
|
Date Created
|
The report date of the incident.
|
Last Update
|
The date of the last update on the incident.
|
You have the option to see the incident, look over its specifics, begin researching it, and take actions like rescanning the incident for integrations. By selecting the three dots “︙” button next to the Action title, you can execute actions on the related titles below.
Details
|
This is the area where the details of the email are shown. In this field, the analysis date of the email, From, From Name, To, CC, BCC, Sender IP, Analysis Date, the name of the folder where the email is located, the number of attachments and the number of URLs in it and the location of the sender IP address.
At the same time, the email server IP address to which the email is sent, blacklist control is performed in analysis services. You can see the results on this screen under the Sender IP Blacklist Check title.
|
Header
|
The header information of the email is displayed in this field.
|
Email Preview
|
The preview of the email is shown in this area.
|
URLs
|
URLs and their analysis results in the email are displayed in this field.
|
Attachments
|
The name of the attachment files and their hash information as well as analysis results are displayed in this field.
|
Frequently Asked Questions
Q. Can I delete incident records from the platform?
A. You can update the status of the incidents as “closed”, but the incident cannot be deleted from the interface.
Q. Are the actions I take in the cluster view applied to all cases in the cluster?
A. Yes, the actions you take in the cluster view are effective in all the cases.
Q. What will happen if the email I reported is detected to be malicious?
A. If the analysis determines the data as malicious or phishing, an automatic investigation is launched, and any suspicious emails detected in other mailboxes are scanned. Additionally, you can also take steps like Investigate and Re-Analyze.
Q. Is the reported email sent to another service?
A. No, the email reported by your users is never sent to any other service.
Q. Does automatic analysis start when the analysis result of the reported email is Phishing, Malicious or Undetected?
A. Automatic analysis starts only when the analysis result is determined to be Phishing and Malicious, and the relevant malicious email is automatically searched throughout the company.
Q. How does the Sandbox analyze my suspicious emails?
A. We analyze suspicious email by header, body and attachments using our third-party analysis engines integrated into our platform. The reported email itself is not forwarded to the integrations. Our platform parses the URL, Attachment and Sender IP and makes the analysis.
Q. Can I integrate the reported emails with my SOAR products by obtaining the details using the API?
A. You can perform almost every operation in the Incident Responder product using API. You can refer to our Rest API document to see the details.
Q. Are the emails sent by users for analysis securely stored on the server?
A. The platform generates a random key that is unique for each customer, then encrypts all reported emails on disk with AES 256 algorithm.
Moving Forward: Investigations
In the next area of the Incident Responder, Investigations, you will learn how to handle Investigations and carry out Incident Response processes. Let's go... ➡️