Incident Detail with AI Analysis
Note: The new incident detail view is currently in Beta and subject to change.
The new Incident Detail page presents an overview of the AI analysis and evaluation of the incident, indicating whether it is likely a true or false positive threat. The AI assesses incidents in a manner similar to a human analyst, systematically forming and validating hypotheses. It analyzes individual detections, observables, indicators, and their combination, to identify a threat narrative consistent with the incident data. The final classification, along with reasoning, supporting evidence, and recommended response steps, is displayed in the incident detail view.
Note: The incident detail view with AI analysis is not available for legacy incidents, including incidents that are directly promoted from Secure Cloud Analytics and incidents created using Cisco XDR APIs (for example, via an Automate workflow). If possible, we recommend that you use the Custom Security Events feature instead of creating incidents directly via API. These events will generate detection findings in Cisco XDR, which are considered for incident correlation and the incidents are analyzed by AI.
On the Incident Detail page, click Launch new incident view in the upper right corner in incident detail to open the new incident detail view. To close the new incident detail view and return to the previous incident detail view, click Return to classic view in the upper right corner.
In the incident detail header of the Overview tab, you can view the incident name, status, who has been assigned to the incident, classification of the incident, confidence level, product sources that contributed to the data, and a list of the MITRE ATT&CK® tactics, techniques, and sub-techniques impacting the incident based on the Financial Risk Score (probability of financial impact if the MITRE ATT&CK® patterns are not mitigated). If three or more tactics, techniques, and sub-techniques are listed, the number of additional items is displayed beside the list. Click the + link to expand the list and click the View less link to collapse the list. For more information on MITRE ATT&CK®, see MITRE ATT&CK Matrix for Enterprise. It also displays the following tabs that open in the right panel: Response, Evidence, Worklog, and Report.
You can change the status of the current incident in the status drop-down list. For more information on the statuses, see Available Statuses. To assign or unassign users to an incident, click the avatar with the user's initials or Unassigned link in the upper right corner of the header. For details, see Assign Incident.
The incident classification tag at the top of the page is determined by analyzing compromised or suspicious devices, user behavior and activities, and individual detection events and their classifications. Click the
(Information) icon to view reasons for each factor on how the classification and confidence levels was determined. To hide the left panel, click the
(Hide) icon to the left of the classification tag.
Note: The incident classification excludes events found from the automatic enrichment that was performed when the incident was created.
-
Decisive True Positive - There is a high confidence that malicious activity has occurred with clear attack patterns.
-
Likely True Positive - There is strong evidence that malicious activity has occurred with some uncertainty.
-
Likely False Positive - There is an indication that the activity is likely benign with some suspicious elements.
-
Decisive False positive - There is a clear indication that a benign or authorized activity has occurred.
The incident overall confidence of the incident classification (High confidence, Medium confidence, or Low confidence) are based on the following factors:
|
Confidence Factor |
Description |
|---|---|
|
Completeness |
Measures the data availability and coverage.
|
|
Threat Intel quality |
Assesses the quality and relevance of the threat intelligence available during the investigation.
|
|
Narrative |
Evaluates how well the observed events form a coherent, evidence-based analytical story with relationships between events.
|
|
Behavioral coherence |
Measures the consistency and logical attack of the observed behavior.
|
The Summary area displays an AI-generated description of the incident, highlighting key assets, observables, and indicators. The Reasoning panel displays its significance and why the incident was flagged, with supporting evidence displayed in the Evidence panel.
The Detections panel displays a list of security events that have been analyzed and correlated by Cisco XDR to determine the relationships between events, such as shared observables, overlapping timelines, and related attack patterns. When events are determined to be part of the same threat, they are grouped and enriched with additional threat intelligence to create incidents in Cisco XDR. For more information on security events, see Detection Findings. Click View details to display details of the detection in the right panel. See View Detection Analysis for more information. Click View more or View less to display more or less detections.
Click the
(Reset timeline) icon to reset the view in the right panel to the default attack graph.
The Recommendations area displays a list of AI-generated recommended actions based on playbook tasks and the analysis of the detection findings, logs, and observables in the incident to help you respond quickly and effectively. The recommendations are organized by playbook phases that can be used to assist in identifying, containing, and eradicating the threat, and then restoring systems to recover from the threat. Each phase has prioritized and detailed response actions, offering guidance to resolve the incident, such as isolating compromised hosts, containing lateral movement, and acquiring forensic evidence. The status tag next to the recommendations indicate the urgency (Critical, Important, or Optional) based on the incident classification alignment. Click the View more or View less link to display or hide additional description details.
If applicable, click the Execute button to run the recommended workflow for the entire incident or specific observables within the incident. The recommended observables are automatically checked in the observables drawer. For more information, see Execute. The task status is displayed as a color-coded tag in the upper right corner. For details, see View Task Status.
Note: The Recommendations area does not list tasks with a Complete or Not applicable status.
The
(Add Note) icon allows you to manually add notes about the incident as you go through the recommended tasks. See Add Manual Note for details.
To view additional recommendations, click the Response tab at the top of the page. For more information, see Response.
The Analysis area displays a AI-generated summary of the device and user activities using insights from asset data in Assets and detection findings.
The asset classification tag at the top of the page is determined by analyzing compromised or suspicious devices and user behavior and activities. Click the
(Information) icon to view reasons for each factor on how the classification and confidence levels were determined.
-
Compromised - High confidence of successful adversarial data exfiltration. The asset has been taken over or abused by a threat actor.
-
Suspect - Indicators suggest potential compromise requiring immediate investigation. There are signs of malicious activity but confirmation is incomplete.
-
Clean - No credible evidence of compromise in the available data. The asset appears unaffected based on analyzed telemetry.
The asset overall confidence of the asset classification (High confidence, Medium confidence, or Low confidence) is based on the following factors:
|
Confidence Factor |
Description |
|---|---|
|
Completeness |
Measures the security data availability and coverage across controls, log sources.
|
|
Threat Intel quality |
Assesses the quality and relevance of the threat intelligence available during the investigation.
|
|
Narrative |
Evaluates how well the observed events form a coherent, evidence-based analytical story with relationships between events.
|
|
Behavioral coherence |
Measures the consistency and logical attack of the observed behavior.
|
Each asset includes a
(Pivot Menu) icon that enables you to take action on it. You can perform some actions directly in the Pivot menu or pivot to the integrated product to perform additional actions. For details, see Pivot Menu. Click the
(View details) icon to display the device or user details in the right panel.
The device or user details page in the right panel displays the following:
-
Device or User analysis - Summary of the activity with key findings and recommendations.
-
Device or User analysis timeline - The Device analysis timeline area displays the chronological timeline that combine findings from a group of detections. Click the detection link in the Reference detections area to display the detection details on the Detection Analysis page. For more information, see View Detection Analysis.
-
Device or User details - The Device details or User details area provides more information about the device or user. Click View all to list all the details on the device or user, including device ID or user ID. For more information on the asset details, see Devices and Users.
The Detection Analysis Details in the right panel displays a detailed analysis of the group of detections to determine the nature and significance of the detected activities. The detection classification tag in the Detection Analysis area is determined by analyzing individual detection events and their classifications. Click the
(Information) icon to view reasons for each factor on how the classification and confidence levels was determined.
-
Decisive True Positive - There is a high confidence that malicious activity has occurred with clear attack patterns.
-
Likely True Positive - There is strong evidence that malicious activity has occurred with some uncertainty.
-
Likely False Positive - There is an indication that the activity is likely benign with some suspicious elements.
-
Decisive False positive - There is a clear indication that a benign or authorized activity has occurred.
The detection overall confidence (High confidence, Medium confidence, or Low confidence) are based on the following factors:
|
Confidence Factor |
Description |
|---|---|
|
Completeness |
Measures the data availability and coverage.
|
|
Threat Intel quality |
Assesses the quality and relevance of the threat intelligence available during the investigation.
|
|
True Positive Narrative |
Assesses the strength of the evidence to support a malicious narrative.
|
|
False Positive Narrative |
Assess the strength of the evidence to support a benign narrative.
|
Related Detection Findings
The Related Detection Findings area displays a list of detection findings that contributed to the detection analysis. Click a detection finding link to open the finding details page that lists the finding details, such as a brief description, source product, finding ID, and associated MITRE ATT&CK® tactics and techniques. The Activity details area displays a list of related activities for the finding. Click an activity link to open a drawer with more information on the activity, including the activity in JSON format. Click Copy JSON to copy the activity displayed in JSON format.
The Finding JSON area displays the raw logs for the finding and related activities in JSON format. Click Copy or Download to copy or download the data displayed in JSON using the Industry Standard Open Cybersecurity Schema Framework (OCSF), version 1.4. You can also search for keywords in the Search field, with case sensitive, regular expression and whole word options to refine the search.
Analysis of Observables
The Analysis of observables area displays a detailed analysis of the observables from all the events related to the incident. The classification tag displayed the analysis of the individual observable: Malicious, Suspicious, Benign, or Inconclusive. Click View JSON to open a drawer that displays the observable in JSON format. Click Copy or Download to copy or download the data displayed in JSON. You can also search for keywords in the Search field, with case sensitive, regular expression and whole word options to refine the search.
The Event Timeline area provides a chronological view of the critical and high detection events listed in the Detection tab of the classic view. Click the
(View details) icon to highlight the event in the attack graph in the right panel.
Note: The data in the Event Timeline area may not match the data in the incident analysis.
The Overview tab displays the attack graph in the right panel. It provides a linear progression of the attack and a detailed view of the critical path and events to help users understand the relationships and progression of events that caused the incident to be promoted. The critical path is determined by the critical and high detection events in the incident only.
Note: The data in the attack graph may not match the data in the incident analysis.
The nodes on the graph represent the devices, entities, and resources that the threat has targeted, as identified by one or more observables (see Graph Icon Descriptions for more information). The disposition icon is displayed on the left side of the node, if applicable. The relationship between nodes is shown on the label of the directional arrow that connects to other nodes. When there are multiple nodes that have been unified into one object and share a directional arrow, you can hover over one node to highlight the other nodes that have a relationship to it. Click a single node in the attack graph to open the Node drawer and view additional details of the selected asset or observable.
Click the icons to adjust how you want the graph to be displayed:
|
Icon |
Description |
|---|---|
|
|
Fit to View - Click this icon to recenter the graph within the panel when the panel is expanded to full screen. |
|
|
Rearrange - Click this icon to reflow the nodes and recenter the graph. |
|
|
Pan or Select - Click this icon to pan or drag an object (default), or to select or click an object. |
|
|
Layout - Changes the layout to one of the following options:
|
|
|
Back - Click this icon to highlight the graph with the previous event in the Event Timeline. Forward - Click this icon to highlight the graph with the next event in the Event Timeline. |
|
|
Back to start - Click this icon to remove the highlight in the graph and reset the right panel to the default attack graph. |
The Response tab in the incident detail view displays AI-generated recommended tasks and playbook details to assist in building effective incident response plans, processes, and procedures. Use the response tasks on this page to identify, contain, and eradicate the threat, and then restore systems to recover from the threat. Workflows are available for execution to automate some of the response tasks; notes are available to document your findings throughout the incident response process.
For more information, see the Response help topic.
The Worklog tab in the incident detail view displays a list of notes about the incident and the audit log of changes that have been made to the incident.
For details, see the Worklog help topic.
The Evidence tab in the incident detail view allows you to acquire and view forensic data from assets within an incident and connect to the assets using a remote shell for remediation purposes. Use the acquired data for further analysis and investigation in the XDR Forensics UI.
For more information, see the Evidence help topic.
The Report tab in the incident detail view displays AI-generated incident summary information that can be downloaded in a report format. This information can be edited and formatted in markdown, and then downloaded in a single file to your local computer. If something changes in the incident, the sections can be regenerated to get fresh AI-generated content and then, if necessary, edited and downloaded again to get an updated report file.
For more information, see the Report help topic.







