Overview
Risk severity is highlighted throughout Incydr to show you the file activity with the greatest exposure and exfiltration risk. Risk severity is determined by Incydr's Proactive Risk Identification and Severity Model (PRISM), which analyzes 250+ risk indicators about data, users, and destinations to provide weighted severity scores.
Locations that display risk severity and PRISM scores include:
For more information about how severity is calculated, see Risk settings reference.
Considerations
The Exfiltration dashboard
The Top users by critical activity graph on the Exfiltration dashboard shows a prioritized view for all users of critical and high severity file events.
To view the Exfiltration dashboard, sign in to the Incydr console, then select Dashboards > Exfiltration. For complete details, see Top users by critical activity reference.
The Trends dashboard
The Risk in my environment graph on the Trends dashboard shows how the number of users causing critical and high severity events has fluctuated over time. Use this graph (along with the other graphs on the dashboard) to identify where to focus controls, training, and engagement to improve your organization's risk profile. To access the dashboard, select Dashboards > Trends.
Watchlists
Watchlists highlight user activity by severity. Use the quick filters at the top of the page to filter the list to show a specific severity. To see watchlists, go to User Activity > Watchlists, then select a watchlist to view events with increased severity.
All Users list
The All Users list shows all of the users in your Incydr environment sorted by the highest number of critical-severity file events, then by high-severity file events. On this list, you can see the risk indicators associated with a user's file events and see more details about their most recent file activity. To access the All Users list, go to User Activity > All Users.
Forensic Search
Forensic Search provides a Risk severity filter and displays PRISM scores and severity in the search results. To search file activity with the greatest exposure and exfiltration risk:
- Sign in to the Incydr console.
- Go to Search > Forensic Search.
- Choose a date range.
-
Select the search filter Risk severity and select the severity levels you want to review. To limit the type of risk, select the search filter Risk indicators.
- Select the operator includes any.
- Select one or more values.
- (Optional) Click the plus icon to add more search criteria.
- Click Search.
-
In the search results, review the PRISM score column to identify file events with the greatest risk potential. Icons provide a quick indication of a file event's overall risk severity, which is based on the following scoring ranges:
- From the search results, click View details > to show all metadata for an event. The Risk section displays the Risk severity, the PRISM score, and lists all applicable Risk indicators.
Cases
Cases displays PRISM scores and severity for each file event in the case. To view risk severity:
- Sign in to the Incydr console.
- Go to Cases.
- From the list of cases, select a case. Optionally, click the filter icon
to search by case status, date created, case name, or case subject.
The case details appear. -
In the File activity section, review the PRISM score column to identify file events with the greatest risk potential. Icons provide a quick indication of a file event's overall risk severity, which is based on the following scoring ranges:
- From the File activity list, click View details > to show all metadata for an event. The Risk section displays the Risk severity, the PRISM score, and lists all applicable Risk indicators.
Alerts
Add the Risk severity setting to alert rules to be notified when file events with increased risk occur. In turn, notifications and emails generated by rules with this setting identify those file events and their PRISM scores.
Alert rule setting
- Sign into the Incydr console.
- Go to Alerts > Manage Rules.
- From the list of alert rules, select a rule. Or, click Create rule to create a new rule.
- Add the Risk severity rule setting.
- If you're editing an existing rule, click Add setting on the View rule panel, then click Risk severity.
- If you're creating a new rule, click Risk severity on the Create rule panel.
- Select the severity of events that you want to be notified about and click Save.
- Complete the rule.
- If you're editing an existing rule, make any other changes needed and then close the View rule panel to return to the Manage Rules table.
- If you're creating a new rule:
- Click Next.
- Enter the rule name and description, select a severity to use to filter and prioritize this rule and its notifications, and then click Next.
- Enter the email addresses to use for alert notifications created from this rule, and then click Save.
The new rule is added to the Manage Rules table.
Alert notifications and emails
When file activity matching an alert rule that contains the new Risk severity setting is detected, the files associated with increased risk are identified in the alert notification and email.
-
Risk severity in the Review Alerts table and in the Overview of the alert notification or email identifies a file event's overall risk severity, which is based on the following ranges:
- Risk summary in the Overview of the alert notification or email quickly summarizes the number of file events associated with each severity and the type of activity that generated those events.
- Filename/Details and PRISM score in the Endpoint events and Cloud sharing events sections of the notification or email identify the filename involved in the event and type of activity that contributed to its PRISM score. Additional details list the date the file event activity was observed, and other information captured about the event (such as the URL a file was uploaded to or the browser tab that was active during the event).
Comments
Please sign in to leave a comment.