Manage security threats using the Security Analyst Workspace
-
- UpdatedAug 1, 2024
- 6 minutes to read
- Xanadu
- Security Incident Response Analysis
Security Incident Response includes a new user interface called the Security Analyst Workspace that features powerful tools for assisting in analysis, including the playbook, peek view, and tabs for working on multiple security incidents.
Purpose-built for security analysts, the powerful tools in the Security Analyst Workspace allow you to analyze the ever-growing volume of data associated with security incidents. And automated actions significantly reduce the security incident investigation time, which can be the difference between stopping an attack and suffering a breach.
Before using the Security Analyst Workspace
Access the Security Analyst Workspace
To access this new workspace, navigate to
.
The workspace opens in a separate browser tab.

Locate the security incidents you want to analyze with Quick Filters

Simply click the quick filter you want to use.
You can define additional quick filters, as well as primary filters for the Security Analyst Workspace, using the classic environment. For more information, see Set up primary and secondary filters for Security Analyst Workspace.
Personalize the security incident list

Save time with Peek view
Before opening a security incident record, you can save time using the Peek view. This feature allows you to quickly locate vital security artifacts without having to reload the entire page. Simply click the > icon to the left of a security incident number to take a peek.


Perform quick actions on a security incident
- If you security incident is open, click the Edit Record icon to make quick changes to any of its fields. If the record is closed, you can change only its tag.
- Click Manage Attachments to attach files to the security incident. You can also download or remove attached files and edit the encryption applied to the attachments.
- Click Compose Email to send a quick email to a colleague. Emails can
be free-form, or you can send canned emails selected from a list of templates. Emails sent and
replies received are captured in the Incident Timeline.Note: You can create custom templates that contain reusable content for emails and email notifications. Variables can be used for inserting information specific to the security incident or alert, such as the subject line, priority, or threat category. Use the Security Incident [sn_si_incident] table for emails and email notifications related to Security Incident Response. For more information, see Email templates
- Click More to view a quick snapshot of the security incident, such as the description, business impact, and priority. You can also click the down-arrow in the Assignment group and Assigned to fields to make on-the-fly changes to those fields.

Work with multiple security incidents

View analysis information in the security incident tabs
- Overview
- Explore
- Incident Timeline
Overview tab


Explore tab

- Observables
- Threat Lookup Results
- Security Scan Results
- Domain Lookups
- Observable Enrichment
Additional related lists are available under Users, Configuration Items, and Incidents.
Incident Timeline tab
- You can also manually add worknotes to the timeline by typing them in the Add work notes box and clicking Post.
- You can search for a specific timeline activity using the Search box.
- The Filter Activity icon allows you to display only the types of timeline activity you want to see (for example, only incidents created by a specific analyst).
- You can add or remove the Incident Timeline from the Overview tab using the Pin/Unpin icon.

Handle security incidents using the Playbook
Resolve certain types of security threats in a step-by-step manner using the built-in Security Analyst Playbooks. For example, an analyst can use the playbook to resolve phishing attacks and threats caused by malicious code activities. For more information, see Resolve security threats with the playbook.
On this page
- Before using the Security Analyst Workspace
- Access the Security Analyst Workspace
- Locate the security incidents you want to analyze with Quick Filters
- Personalize the security incident list
- Save time with Peek view
- Perform quick actions on a security incident
- Work with multiple security incidents
- View analysis information in the security incident tabs
- Overview tab
- Explore tab
- Incident Timeline tab
- Handle security incidents using the Playbook