Skip to main content

Alerts Management

The Alerts page is the primary workspace for security analysts, providing real-time visibility into all security events detected by AuroraSOC's multi-source ingestion pipeline.

Alert Lifecycle

Status Definitions

StatusDescriptionWho Sets It
NEWJust ingested, not yet triagedSystem (Rust normalizer)
TRIAGEDAI agent has assessed severity and categorySecurity Analyst agent
INVESTIGATINGHuman or AI actively investigatingAnalyst / Orchestrator
ESCALATEDRequires senior analyst or incident responseAnalyst / Threshold rule
RESOLVEDRoot cause identified, remediated or false positiveAnalyst / Playbook
FALSE_POSITIVEConfirmed benign or expected behavior captured as a detection outcomeAnalyst / Detection feedback loop

Alert Table

The main alert table displays:

ColumnDescription
SeverityColor-coded badge (Critical/High/Medium/Low)
TitleDescriptive alert title
SourceOrigin system (Suricata, Wazuh, Velociraptor, etc.)
MITRE ATT&CKMapped technique ID(s)
StatusCurrent lifecycle state
CreatedTimestamp of first detection
ActionsView, acknowledge, create linked case, link to an existing case

Use the filter bar to narrow alerts:

  • Severity filter — Click severity badges to toggle
  • Status filter — Show only specific states
  • Date range — Custom time window
  • Search — Free-text search across title and description

Bulk Operations

Select multiple alerts using checkboxes for bulk actions:

  • Bulk Resolve — Mark selected as resolved
  • Bulk Escalate — Escalate selected to incident response
  • Create Case — Group related alerts into a single case

Runtime Mode Truth

The Alerts workspace now reads runtime truth from GET /api/v1/system/mode before operators act on the queue.

  • In dummy, the page labels the queue as showcase data and keeps acknowledge, case promotion, case linking, and agent dispatch in preview-only mode.
  • In dry_run, the page reads the live alert queue when the database is available, but acknowledge, promotion, linking, and dispatch actions still return preview results instead of mutating state.
  • In real, the alert queue is live and those same actions persist to the platform.

This is intentional. The table can look operational in every mode, but the effect of the action buttons changes with runtime mode and should be visible before the analyst clicks.

Degraded Live-Read Behavior

When AuroraSOC is running in dry_run or real without a database connection, the Alerts page stays available as a recovery surface instead of collapsing into a misleading empty queue.

In this degraded mode:

  • KPI cards switch to unavailable placeholders instead of showing zero alerts
  • Search and filter controls become read-only until live reads return
  • The queue body switches to a Live alert queue unavailable recovery card
  • The page exposes a direct Review runtime settings path back to Settings
  • Any pinned alert detail is cleared so stale triage data is not left onscreen

Restore the database connection for live alert reads, or switch to dummy mode if you only need showcase workflow walkthroughs while the database is offline.

Alert Detail View

Clicking an alert opens its detail pane:

Triage to IMS Workflow

The alert detail dialog is now the starting point for incident management:

  • Acknowledge moves the alert to TRIAGED
  • Create Linked Case promotes the alert into a new case and links it immediately
  • Link Existing Case attaches the alert to an already-open investigation
  • Linked Case metadata is shown directly in the alert detail pane so analysts can confirm handoff state without leaving triage

AuroraSOC now supports case-aware deep links from the SIEM workspace into alert triage.

  • SIEM promotions open /alerts?selectedAlert=<id> so the matching alert dialog opens immediately.
  • Closing the dialog clears the route parameter to return the analyst to the normal table view.
  • Detection feedback recorded from the SIEM workspace can mark the linked alert as FALSE_POSITIVE, preserving the analyst verdict on both the alert and the originating detection rule.

Overview Tab

  • Full alert description with raw event data
  • Extracted IOCs (IP addresses, domains, hashes, emails)
  • MITRE ATT&CK technique mapping with kill chain phases

Investigation Tab

When an AI investigation has been run:

  • Agent Reasoning — Step-by-step AI analysis
  • Correlated Events — Related alerts found by correlation
  • Recommended Actions — AI-suggested response steps

Timeline Tab

Chronological history of all actions taken:

  • Alert created
  • Agent triage performed
  • Status changes
  • Analyst comments
  • Playbook executions

Deduplication

AuroraSOC automatically deduplicates alerts using SHA-256 hashes:

dedup_hash = SHA256(source + title + mitre_techniques)

When a duplicate arrives within the dedup window (configurable, default 15 minutes), the existing alert's count increments rather than creating a new entry. This is why you may see a Count column showing values greater than 1.

Investigation Workflow

The fastest workflow: Filter by Critical + NEW → Review top alerts → Acknowledge the alert → Create or link a case from the alert detail pane → continue evidence, notes, and tasks in the Cases workspace.

Triggering AI Investigation

From any alert, click the Investigate button to:

  1. Alert is sent to the Orchestrator agent
  2. Orchestrator dispatches to Security Analyst for initial assessment
  3. If IOCs found → Threat Intel agent enriches them
  4. If network indicators → Network Security agent analyzes flows
  5. If endpoint indicators → EDR / Endpoint Security agent scans
  6. Results compiled into structured investigation report
  7. Alert status updated to INVESTIGATING

The investigation runs asynchronously—you'll see real-time progress via the WebSocket agent-thoughts stream.