Incident
An incident is an event detected as a result of correlation search and containing abnormal activity indicators.
In Smart Monitor, there are two options for creating incidents: manually in the Incident Manager interface or using the active action Create Incident in Task Scheduler.
Incident Field Description
The composition of incident fields is configured in the incident card. By default, the incident entity is characterized by the following main fields:
Date and Time:
- Date and time when the incident occurred
Severity:
- Threat level indicator of the incident. Displayed as a circular icon of a specific color
Examples of values:
- Normal: 🟢
Green - Information: 🔵
Blue - Warning: 🟡
Yellow - Critical: 🔴
Red
You can configure your own severity levels in the Incident Manager module settings.
Incident:
- Brief description of the event that caused the incident
Status:
- Current incident status reflecting its state in the process. The list of statuses for incidents and transition rules between them are configured in the Workflow
Examples of values:
New- new incident received byIncident Manager, work with the incident has not startedIn Progress- incident taken for workVerification- agreement process for works required to eliminate the incident/is in the process of agreeing on the possibility of closing the incident after its eliminationRejected- incident postponed until the reason for rejection is eliminatedClosed- works for eliminating the incident are completed, incident closed by agreement
Responsible:
- Employee or group of employees responsible for eliminating the incident.
A history of work with each incident is available, where you can track the entire list of status changes, field values, as well as comments left.

Typical Incident Examples
Working with incidents in the Incident Manager module allows prompt response and application of various actions to emerging security events.
For example, an incident could be the detection of a potentially malicious shell script.
The image below shows an incident with the highest severity level Critical.

The system recorded an attempt to obtain configuration data of the SplunkForwarder service by user AndreevSA on workstation EKB-WS396. The user used system WMI tools and command line to execute the query write.service.SplunkForwarder get Pathname.
After taking it for work, this incident can be transferred to statuses Close, Cancel, marked as False Positive or Block User.