Authorizations
Bearer authentication header of the form Bearer <token>
, where <token>
is your auth token.
Path Parameters
Detection identifier
Body
New status for the detection
NEW
, PROCESSING
, ESCALATED
, HUNTING
, MONITORING
, CLOSED
Whether the detection was handled correctly
Verdict assigned to the detection
MALICIOUS
, SUSPICIOUS
, BENIGN
Notes or comments about the detection (max 100,000 characters)
Response
Unique identifier for the detection
ID of the team that owns this detection
Current status of the detection
NEW
, PROCESSING
, ESCALATED
, HUNTING
, MONITORING
, CLOSED
Timestamp when the detection was created
Types of containment actions performed
Whether this detection is in test mode
Timestamp when the detection was ingested by Wirespeed
Timestamp when the detection was originally detected by source
Chronological log entries for this detection
Raw detection data from the source system
Final verdict assigned to the detection
MALICIOUS
, SUSPICIOUS
, BENIGN
Display title for the detection
Source integration platform that generated this detection
microsoft-teams
, google-alert-center
, reversing-labs
, jamf-protect
, jamf-pro
, thinkst-canary
, generic-json
, box
, hyas-protect
, checkpoint-harmony
, wirespeed
, wiz
, microsoft
, ipinfo
, cisco-umbrella
, jira-data-center
, windows-event-logs
, crowdstrike-falcon
, cisco-duo
, cisco-meraki
, fortianalyzer
, jira-cloud
, microsoft-entra
, have-i-been-pwned
, manage-engine-ad-audit-plus
, google-directory
, okta
, sentinel-one
, slack
, aws
, kandji
, wordfence
, generic-syslog
, cisco-catalyst
, connectwise-psa
, email
, fortinet
Whether containment actions were performed on this detection
Whether this detection was reprocessed after initial ingestion
Whether the detected threat was successfully prevented
Whether to exclude this detection from MTTR and other metrics calculations
Short identifier for this detection
Whether this is the first time this detection has been processed
Whether to automatically contain if ChatOps workflow fails
Whether this detection was escalated to external systems
OCSF standardized detection finding data
Security category classification for this detection
OTHER__DIAGNOSTIC
, OTHER__INFORMATIONAL_EVENT
, OTHER__WARNING
, OTHER__UNKNOWN
, OTHER__DECEPTION
, OTHER__CUSTOM_DETECTION
, CLOUD__INVOCATION
, CLOUD__DISCOVERY
, CLOUD__DATA_TRANSFER
, CLOUD__PERSISTENCE
, ENDPOINT__DISCOVERY
, ENDPOINT__EXECUTION
, ENDPOINT__LIVE_OFF_THE_LAND
, ENDPOINT__NUISANCE
, ENDPOINT__MALWARE_DISCOVERY
, ENDPOINT__MALWARE_EXECUTION
, ENDPOINT__LATE_STAGE
, ENDPOINT__PERSISTENCE
, ENDPOINT__REMOTE_MANAGEMENT
, ENDPOINT__LATERAL_MOVEMENT
, ENDPOINT__IMPACT
, ENDPOINT__EVASION
, IDENTITY__LOGIN
, IDENTITY__REJECTED_MFA
, IDENTITY__DISCOVERY
, IDENTITY__BRUTE_FORCE
, IDENTITY__PUBLIC_CREDENTIAL_EXPOSURE
, IDENTITY__PRIVATE_CREDENTIAL_EXPOSURE
, IDENTITY__PERSISTENCE
, IDENTITY__ACCOUNT_COMPROMISE
, NETWORK__INBOUND_CONNECTION
, NETWORK__OUTBOUND_CONNECTION
, NETWORK__PHISHING
, NETWORK__NOISY
, EMAIL__PHISHING
, EMAIL__PHISHING_REPORTED
, EMAIL__MALWARE
, EMAIL__MALICIOUS_LINK
, EMAIL__GRAYMAIL
, EMAIL__SPAM
, EMAIL__BUSINESS_EMAIL_COMPROMISE
, DATA__DATA_TRANSFER
, DATA__DATA_SHARE
, POSTURE__POSTURE
Whether this detection is part of a ChatOps test scenario
Severity level of the detection
INFORMATIONAL
, LOW
, MEDIUM
, HIGH
, CRITICAL
Numeric representation of severity for sorting purposes
Whether this detection involves VIP users
Whether this detection involves high-value assets
Whether this detection is excluded by an exclusion rule
Name of the team that owns this detection
Description from the source system
User-added notes about the detection
Name of the source that generated this detection
Detailed description of the detection
ID of the case this detection belongs to
Timestamp when the detection verdict was assigned
Timestamp when the detection was last updated
Timestamp when the detection was closed
ID of the integration instance that generated this detection
ID of the original detection if this is a duplicate
AI-generated recommended next steps for this detection
Short identifier for the case this detection belongs to
Slug identifier for the action taken on this detection
ID of the exclusion rule that matches this detection
Short identifier for the exclusion rule that matches this detection
Whether this detection was automatically contained by the system
Verdict rule configuration that was applied to this detection
Email address for ChatOps testing notifications
Phone number for ChatOps testing notifications
ID of the custom detection that detected this detection