Map incident fields

  • Release version: Zurich
  • Updated November 10, 2025
  • 6 minutes to read
  • Map Cortex XSIAM Incident, Alert, and Event Fields to SIR Incident Target Fields.

    Before you begin

    Role required: sn_si.admin, sn_si.ingestion_profile_admin

    Procedure

    1. Select one of the Sample Ingestion Methods in the Field Mapping section.
      Table 1. Sample Ingestion Methods
      Field Description
      All default Incident and Alert Fields Use this ingestion method to view the static list of all the Incident, Event, and Alert fields. This method contains only default field names without any values.
      Retrieve Recent Incidents Use this ingestion method to import the most recent Incidents and alerts.

      If the XSIAM incident contains multiple alerts, the earliest alert that is part of the incident is shown in the mapping section. During ingestion as well the earliest security alert field values will be used.

      You can ingest 5 sample incidents.

      The sample field values populate when the profile ingests the sample incidents. You can map these incidents to the SIR Incident Target Fields. The Incident fields and values appear as individual tabs.

    2. To add fields to the default fields that are displayed on the security incident, do the following actions:
      1. Select Map another field button. in the SIR Incident Target Fields section.
        It shows a list of SIR fields, from which you can select a new field.
      2. In the Security Incident column, expand the list that is displayed and then select a field.
        Note:
        Multiple observables can be displayed on the same security incident. For example, the Observable field can be mapped multiple times with different values. Similarly, the Configuration Item and Work notes fields support multiple values. If you try to map two values to a field that can't support multiple values, you see an error message that this field does not support multiple values. Similarly, if a field on a security incident has a list from which you can choose multiple options, and you try to map an option to that field that is not displayed on the list, the field does not populate on the security incident.
      3. From the Incident and Alert Fields section, drag and drop your field to map it to your new field.
      4. When you select the check box that corresponds to a field, any new or updated changes made in XSIAM will automatically update the respective SIR incident data with the new incident data.
        Note:
        In the base system, the system property sn_sec_pan_xsiam.incident_updates is by default set to False to receive the XSIAM updates related to new alerts that are linked to SIR.
        • By default, the Affected Users, Configuration items, and Observables fields are checked. This means that whenever there are new observables or associated configuration items, or affected users that gets added to the incident then that information is automatically extracted and populated in the respective related lists in the Security Incident Response (SIR) during that polling interval.
        • For any other fields, you must select the check box that corresponds to a field for any new or updated changes made in the XSIAM incident record within XSIAM. This will automatically replace the respective SIR incident data with the new incident data.
        Important:
        Due diligence is required to be done before selecting this functionality as overriding the existing data may result in unstable data for the analyst to work with and any other automation that is set even by the field values of security incident may also get affected. So, it is very important to do the due diligence before you select any override functionality.
    3. To remove a field, use the Remove button Remove item button next to the input expression field in the SIR Incident Target Fields section.
    4. To map a field value from the Incident and Event Fields section to a field on the SIR incident Target Fields section, use one of the following actions:
      1. Drag the Incident field name (for example, id) and drop it next to a field name in the SIR incident Target Fields column.

        You can match any value from the Incident, Event, and Alert fields section to a field on the SIR incident Target Fields section. Fields are color-coded so that you do not overlook or duplicate incident fields in the mapping process. Light blue fields indicate that an incident field is not yet selected and mapped on the security incident. You may prefer to associate an incoming incident fields with more than one field on a security incident. A gray field indicates that a field has been selected and mapped to a field on the security incident. This way, you can visualize which field values have been added to the security incident and if any remaining important incident information remains unmapped.

      2. You can add a combination of text and field.
        For example, Incident name is ${Incidents: name}$. Here Incident name is can be manually entered while ${Incidents: name}$ is mapped from the Incident and Event Fields section.
      3. You can manually enter and map a source Incidents or Events fields to a target field.
        • To manually map a source incident field use the $⁠{field name}$ format. For example, to map an incident field Severity, the format is${Incidents: severity}$.
        • To manually add Incident, Event, and Alert fields, use the $⁠{Source: field}$ format. For example, $⁠{Incidents: incident_name}$.
      This integration classifies certain observable sub-types. When you map a Cortex XSIAM field with the SIR observable field, the auto-classifies the observable. If you want to generically map the incoming Cortex XSIAM observable to the observable type in, then drag and drop the Incident and Event field in the Observable field. However, if you aware of the observable type for the incoming Cortex XSIAM observable, then map specifically to the Observable type field. Some examples of specific observable types in include Observable(Domain name), Observable(Email address), Observable(IP address (V4)), and Observable(Host name).

      Sometimes, incident field values in Cortex XSIAM may not translate directly to the fields on the SIR security incident. For these values, you can use a script editor to format field values on the security incident during the mapping step. Use the script editor if you want to format values that are similar, but not identical.

    5. To format a field translation for a new field from a Cortex XSIAM Incident to match a field value on a Security Incident, select the Click here link in the SIR Incident Target Fields header.
    6. To modify the fields which support field translation, select the Field format button script format field translation icon.
      The fields that support field translation are Affected user, Configuration Item, and Priority. For example, click on Field format button icon next to the Category. The Cortex XSIAM Field Translation script editor opens.
    7. Enter any changes to the script and select Update to save the changes and return to the Mapping page.
      For example, for Category define the following in the script editor:
      "<Incoming Cortex XSIAM Field Value>":"<Category to assign to the Security Incident>".
      This mapping ensures that a profile uses only configured categories.
    8. Continue mapping by adding or removing field values.
      You can use the same field values in the Incident Generation Conditions builder to define additional criteria that an incoming Incident must satisfy to create a security incident.

      Map Incident Fields to SIR Incident Target Fields

    9. Select Continue.

    What to do next

    Define and set filter conditions to specify which incidents should create security incidents. You can use the same field values (defined in the Mapping section) in the incident Generation Conditions builder (in the Filtering and Aggregation section) to define additional criteria that an incoming incident must satisfy to create a security incident.

    For more information, see Define filter and aggregation criteria