Cases vs. alerts
| Term | What it is |
|---|---|
| Alert | A single detection event — for example, one suspicious login from an unusual location |
| Case | A group of related alerts for the same user, treated as one investigation with an AI-generated report |
Alert severity levels
Every alert carries a severity level that tells you how urgently it needs attention.| Severity | Meaning | When to act |
|---|---|---|
| Critical | Active or confirmed account compromise | Immediately |
| High | Strong indicators of attack | Today |
| Medium | Suspicious but unconfirmed | Within 48 hours |
| Low | Unusual activity, low risk | Monitor |
| Info | Contextual data, no direct risk | No action needed |
Responding to a real threat
When a case looks like a genuine threat, work through it in this order:Read the AI-generated investigation report
Open the case and read the report at the top. It summarises all related alerts and evidence in plain language, written for IT admins rather than security analysts.
Take action from the Remediation panel
Use the RAIDEN Actions buttons in the Remediation panel to contain the threat directly — revoke sessions, disable the account, or delete malicious inbox rules — without opening a separate admin portal. See Response Actions for details on each action.
Document what you did
Use Case Notes to record what actions you took and when. This creates an audit trail and helps teammates who pick up the case later.
Case statuses
Cases have two statuses you can set manually:| Status | When to use it |
|---|---|
| Investigating | The case is open and actively being worked |
| Closed | The threat has been resolved or determined to be a false positive |
Marking a false positive
If an alert fired on known-safe activity, mark it as a false positive and suppress future alerts for that entity.Suppression options
When marking a false positive, you can suppress future alerts by:- IP address — RAIDEN will not alert on that detection rule when activity originates from this IP
- Application — suppresses the rule for a specific application
- User — suppresses the rule for a specific user account
Suppression applies per detection rule. It prevents that specific rule from firing against the suppressed entity — other rules continue to run normally.
Case Notes
Every case has a Case Notes section where you can add free-text entries. Use it to:- Record what actions you took and the timestamps
- Note context that is not visible in the alert data
- Leave handover information for teammates