Skip to main content

Investigating an Alert

When EDR detects suspicious activity on an endpoint, it creates an alert. This guide walks you through how to review, triage, and investigate alerts effectively.

Viewing open alerts

  1. Log in to https://cyberprotect.bamboozle.me.
  2. Click Monitoring then Alerts in the left sidebar.
  3. Filter by Status: Open to see alerts that have not yet been reviewed.
  4. Sort by Severity to prioritize Critical and High alerts first.

[SCREENSHOT: Alerts list filtered to open alerts sorted by severity]

Opening an alert

Click on any alert to open the alert detail view. This shows:

  • Alert summary — what was detected, on which device, and at what time
  • Severity and confidence — how serious the threat is and how certain the detection is
  • Affected process — the application or process involved in the suspicious activity
  • MITRE ATT&CK mapping — which attack technique this alert corresponds to
  • Timeline — a chronological view of events leading up to and following the detection

[SCREENSHOT: Alert detail view with summary, severity and timeline]

Understanding the MITRE ATT&CK framework

Bamboozle EDR maps detections to the MITRE ATT&CK framework, a globally recognized knowledge base of adversary tactics and techniques. The framework is organized into stages:

StageDescription
Initial AccessHow the attacker got into the system
ExecutionHow malicious code was run
PersistenceHow the attacker maintained access
Privilege EscalationHow the attacker gained higher permissions
Defense EvasionHow the attacker avoided detection
Credential AccessHow credentials were stolen or abused
DiscoveryHow the attacker learned about the environment
Lateral MovementHow the attacker moved to other systems
CollectionHow data was gathered
ExfiltrationHow data was removed from the environment
ImpactThe damage caused

Understanding which stage an alert falls into helps you assess how far along an attack may be.

[SCREENSHOT: MITRE ATT&CK technique mapping in the alert detail view]

Reviewing the process tree

The process tree shows the sequence of processes involved in the suspicious activity — which process started which, and what actions each took. This is key to understanding whether an alert represents a genuine threat or a false positive.

  1. In the alert detail view, click Process tree or Investigation view.
  2. Review the chain of processes. Legitimate software generally has predictable, clean process trees.
  3. Hover over any process to see additional details including the full file path, hash, and command line arguments used.

[SCREENSHOT: Process tree view showing suspicious process chain]

Signs of a genuine threat

  • An unusual parent process launching cmd.exe or PowerShell
  • Processes running from temporary folders such as %TEMP% or %APPDATA%
  • Processes with randomly generated names
  • Network connections to unusual IP addresses or domains
  • Attempts to access credential stores or the Windows registry

Signs of a false positive

  • A known and trusted application doing something slightly unusual
  • Security or IT management software performing expected administrative tasks
  • A scheduled task or script that runs regularly

Acknowledging an alert

If you are actively investigating an alert, acknowledge it so your team knows it is being handled:

  1. In the alert detail view, click Acknowledge.
  2. Optionally add a comment explaining who is investigating and what has been found so far.

[SCREENSHOT: Acknowledge button and comment field in alert detail view]

Next steps after investigation

Once you have reviewed an alert you have three options:

  • Resolve — if the activity was benign or has been remediated, mark the alert as resolved.
  • Escalate — if you need help, contact Bamboozle Support with the alert details.
  • Take action — if the threat is confirmed, proceed to Responding to an Incident.

Next steps

Was this page helpful?