View Alerts
    • 25 Sep 2025
    • 4 Minutes to read
    • PDF

    View Alerts

    • PDF

    Article summary

    Use the Alerts page to view all the potential threats Red Canary has identified in your organization. You can drill down into individual alerts for additional information.

    The top-level Alerts page displays three cards that provide a summarized view of alert activity across key dimensions within the last 72 hours:

    • Top Sources: Highlights the security products or tools generating the most alerts. Each source is displayed along with its corresponding alert count, helping you identify which integrations are producing the majority of alerts.

    • Top Endpoints: Lists endpoints (devices, sensor IDs, etc.) associated with the highest number of alerts. Each entry includes an identifier for the endpoint and its alert count, allowing you to pinpoint affected devices quickly.

    • Top Identities: Displays identities or user accounts linked to the most alerts. Each identity is shown alongside its alert count, providing you visibility into potentially suspicious account activity.

    Click on any of these cards to drill down into the associated data for further investigation, or use the details to filter alerts and focus on those that are most impactful.

    Filtering Alerts

    The Alerts page is designed to simplify your analysis to focus on specific or actionable data. To refine your view and locate relevant alerts, you’ll need to apply filters based on specific attributes and a defined time range.

    Using the Search Box

    To manually build a filter:

    1. Enter your filter attributes in the Search with query or keyword box. Note that you can click on the example searches in the UI to paste the text as a template.

    2. Press Enter to apply the filter.

    Note: Multiple attributes are applied with the AND logical operator, so each attribute further narrows the filter.

    For alerts, the following filter attributes are available:

    Attribute

    Description

    Example

    Keywords

    Plain keyword filtering (with no attribute specified) works against certain text fields in the alert, for example identity and endpoint names. Unlike the defined attributes filters, keywords match on partial values.

    admin

    test.user

    Alert ID

    Filter by the alert ID of the alert. Use | as an "OR" to filter for multiple values.

    alert_id:123

    alert_id:123|578

    Assigned To

    Filter by the assignee of the alert.

    assigned_to:customer

    assigned_to:red_canary

    Created At

    Filter by the data and time the alert was ingested at.

    assigned_to:customer

    assigned_to:red_canary

    created_at:2025-05-27..

    Endpoint

    Filter by the current host name, sensor ID, or Red Canary ID of the endpoint. Use | as an "OR" to filter for multiple values.

    endpoint:admin-pc

    endpoint:2000000001

    endpoint:123

    Identity

    Filter by the username, UID, or Red Canary ID of the identity. Use | as an "OR" to filter for multiple values

    identity:test.user

    identity:S-1-5-3

    identity:123

    Provider Source

    Filter by the individual source of the alert. Use | as an "OR" to filter for multiple values.

    provider_source:"Red Canary"

    provider_source:"Red Canary"|"Microsoft Azure Sentinel"

    Provider Classification

    Filter by the provider source given classification.  Use | as an "OR" to filter for multiple values.

    provider_classification:"Suspicious PowerShell command line"

    Provider Severity

    Filter by the provider source given severity. Use | as an "OR" to filter for multiple values.

    provider_severity:high

    provider_severity:medium

    provider_severity:low

    provider_severity:informational

    provider_severity:unknown

    Raw Data

    Filter by raw data contained in the alert.

    raw_data:"Data Exfiltration"

    State

    Filter by the state of the alert. Use | as an "OR" to filter for multiple values.

    state:new

    state:investigating

    state:threat

    state:not_a_threat

    state:remediated

    state:remediation_unwarranted

    state:sanctioned_activity

    state:false_positive

    state:authorized_testing

    state:filtered_by_customer

    Dates/Times
    Date-based attributes are specified using from..to syntax, where from and to are date-times or ISO 8601 dates. You can omit either from or to to filter for unbounded times. For example:

    • 2025-01-01.. matches on or after (>=) the from date

    • ..2025-01-01 matches on or before (<= the to date

    • 2025-01-01..2025-01-31 matches on or after (>=) the from date and on or before (<=) the to date

    Alerts are listed with eight sortable columns of data:

    • Alert: The Red Canary alert ID

    • Status: The state of the alert (i.e., Under Investigation, Threat, Not a Threat)

    • Assigned To: The team assigned to investigate the alert (i.e., Your Team, Red Canary)

    • Created at: The date and time (UTC) of when Red Canary received the alert

    • Resources: The identities and endpoints affected by the alert

    • Classification: The reported classification provided directly by the alert source, representing the "category" or type of activity detected

    • Severity: The importance level of the alert as assigned by the originating provider (i.e., Informational, Low, High). In cases where the provider's severity doesn't align with standardized levels, Red Canary maps it to the most appropriate category.

    • Source: The security platform generating the alert

    Using the Filter Icon

    As an alternative to entering attributes manually in the Search with query or keyword box, you can use the UI to create your filter attributes.

    1. Click the filter icon to show available options.

    2. Use the dropdowns and text boxes to define the filters.

    3. Click Apply Filters to build the filter string and apply it.

    Viewing Alert Details

    You can examine the details for an individual alert by clicking on the Alert ID.

    The summary at the top of the page describes the alert and provides a link to the investigation (if available).

    The alerts details are presented on four tabs:

    Overview Tab

    The Overview tab contains a summary of the alert, including affected identities and endpoints.

    • Navigate to the Activity section to access key investigative tools and insights. Here, you can:

    • Review a timestamped history of the alert’s investigation and activity

    • Track changes to the alert’s state (i.e., NewInvestigatingNot a Threat)

    • Determine if the alert is correlated with other alerts for further context

    • Add comments for your team (requires an Analyst role)

    Original Alert Tab

    The Original Alert tab shows the alert’s raw data, which you can use for further analysis.

    Recommendations Tab

    The Recommendations tab, powered by Red Canary Copilot, offers actionable response and mitigation steps tailored to the alert's details.

    Insights Tab

    The Insights tab leverages Red Canary Copilot to enrich alert data with contextual details, baseline information, and additional enrichment, providing deeper insights to support your investigations.

    Changing the Alert Status

    In the top-right corner, you can update the alert status to reflect actions taken by your team.  

    Contacting Us

    If you have questions or need assistance, click the Contact Us button at the top of the alert.

    Taking Actions

    Click the Actions tab to:

    • Filter Alerts Like This: Create a Workflow Rule to define custom actions for the status or resolution of similar alerts.

    • Automate Alerts Like This: Build an Automation Playbook to set up an automated response for similar alerts.


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.