This section consists of the related lists items that are grouped into sections such as associated observables and configuration items.

The following related lists groups that are available as a part of the base system. You can modify these groups or create groups within the application and their respective actions.

You can modify these groups or create new groups. For more information, see Configure Security Incident Related List on how to configure and group the related list for security incidents and response tasks. Each related list is fully functional within the SIR Workspace.
Related list Grouped item
Business Impact
  • Configuration Items
  • Affected Users
  • Related Configuration Items
  • Related Users
  • Affected Services
Threat Intel
  • Associated Observables
  • Threat Lookup Results
Phishing
  • Associated Phish Emails
  • Associated Phish Headers
Related Security Incidents
  • Parent Security Incident
  • Child Security Incident
  • Similar Security Incident
SLA Records Task SLAs
Source Events/Alerts Source events or alerts are the SIEM integration enabled related list such as Source Email, LogRhythm Drill Down Logs, LogRhythm Events, Aggregated IBM QRadar Offense and so on.
Note: This list is completely dependent on the integration that you have in your instance. To view the relevant SIEM integration related list, you must install the latest version.
Sighting Search
  • Sightings Search Results
  • Sightings Search Details
  • Sighting
Observable Enrichment
  • Observable Enrichment Results
  • Associated MISP Events
  • MISP Enrichment Results
Endpoint Detection and Response (EDR
  • Host Details
  • Running Processes
  • Running Services
  • Logged On Users
  • Network Statistics
  • Get File
  • Isolate Host Entries
  • Additional Actions On Endpoint
  • Microsoft Defender for Endpoint-Related Machines Details
Related Records
Note: In general, you'd be able to create new records, link, or unlink existing records or new records against the related list group as applicable.