Detection

The Detection tab in the incident detail displays data associated with the incident that is derived from security events, judgments, and indicators. By default, the table displays all events from when the incident was created (original events), auto-enriched, or manually investigated.

Security events generated by integrated products are analyzed by the correlation engine in Cisco XDR to determine the relationships between detections, such as shared observables, overlapping timelines, and related attack patterns. When events are determined to be part of the same threat, they are grouped and enriched with additional threat intelligence to create incidents in Cisco XDR. The resulting data is displayed in the Detection tab. For more information on security events, see Detection Findings.

You can filter the types of events to narrow the list of results in the table.

Screenshot of Cisco XDR Analytics incident details showing suspicious activities and data loss events on a Quartz device.

Each row in the table includes data from an event that was initially involved with the incident, or events and indicators included in the saved investigations that are linked to the incident.