Understanding Detection Alerts
LiteSOC uses behavioral AI to automatically detect security threats in your application. This guide explains the different types of alerts and how to respond to them.
Alert Types
LiteSOC detects several types of security threats:
🔴 Brute Force Attack
What it is: Multiple failed login attempts from the same IP or targeting the same account.
Trigger conditions:
- 5+ failed logins in 5 minutes from same IP
- 10+ failed logins targeting same account in 1 hour
Recommended actions:
- Check if it's a legitimate user who forgot their password
- Consider temporarily blocking the IP
- Enable rate limiting on your login endpoint
- Require CAPTCHA after failed attempts
🟠Impossible Travel
What it is: A user logging in from two geographically distant locations in an impossibly short time.
Trigger conditions:
- Login from Location A, then Location B
- Distance/time ratio exceeds 500 mph (physically impossible)
Example:
- Login from New York at 10:00 AM
- Login from London at 10:30 AM
- Distance: ~3,500 miles in 30 minutes = impossible
Recommended actions:
- Verify the user hasn't shared credentials
- Check for VPN usage (may trigger false positives)
- Contact the user to confirm legitimate access
- Consider forcing password reset
🟡 Geo-Anomaly
What it is: Login from an unusual location for that user.
Trigger conditions:
- First login from a new country
- Login from a country on your blocklist
- Unusual location pattern for the user
Recommended actions:
- Send the user a "new login location" notification
- Require additional verification (MFA)
- Review if the location is expected (travel, remote work)
🔴 Suspicious Network
What it is: Login from a high-risk network (VPN, Tor, datacenter IP).
Trigger conditions:
- Connection through known VPN provider
- Tor exit node detected
- Datacenter/cloud provider IP (not residential)
Recommended actions:
- Assess your risk tolerance for VPN users
- Consider blocking Tor access for sensitive operations
- Require additional authentication steps
Alert Severity Levels
| Severity | Color | Response Time | Examples |
|---|---|---|---|
| Critical | 🔴 Red | Immediate | Active brute force, account takeover |
| High | 🟠Orange | Within 1 hour | Impossible travel, suspicious network |
| Medium | 🟡 Yellow | Within 24 hours | Geo-anomaly, new device |
| Low | 🟢 Green | Review weekly | Info events, successful logins |
Managing Alerts
Viewing Alerts
- Go to Dashboard → Alerts
- Alerts are sorted by severity and time
- Click any alert for full details
Resolving Alerts
- Click the alert to open details
- Review the evidence and context
- Choose an action:
- Dismiss - False positive, no action needed
- Acknowledge - Noted, will monitor
- Escalate - Requires immediate action
- Add notes for your team
Setting Up Notifications
- Go to Settings → Integrations
- Connect Slack, Discord, or email
- Configure which severity levels trigger notifications
Reducing False Positives
VPN Users
If your users commonly use VPNs:
- Go to Settings → Detection Rules
- Adjust VPN sensitivity or whitelist known providers
Remote Teams
For distributed teams:
- Add expected countries to your allowlist
- Adjust impossible travel thresholds
- Consider user-specific baselines
Service Accounts
For automated systems:
- Tag service accounts appropriately
- Exclude them from certain detection rules
- Use dedicated IP allowlists
Need help tuning your alerts? Contact support or check our API documentation.
, }, { title: "Responding to Security Incidents", slug: "incident-response", excerpt: "Step-by-step guide to handling security alerts and incidents.", lastUpdated: "2026-03-01", content:
Responding to Security Incidents
When LiteSOC detects a potential security threat, quick and effective response is crucial. This guide provides a framework for handling security incidents.
Incident Response Framework
1. Identify
Goal: Confirm the alert is a real threat.
Steps:
- Review the alert details in LiteSOC
- Check the actor's recent activity
- Look for patterns (multiple alerts, unusual behavior)
- Gather context (time, location, device)
Questions to ask:
- Is this a known user or attacker?
- Does the activity match normal behavior?
- Are there other related alerts?
2. Contain
Goal: Stop the threat from spreading.
Immediate actions:
- Disable compromised accounts
- Revoke active sessions
- Block suspicious IPs
- Disable affected API keys
In LiteSOC:
- Go to the alert details
- Click "View Actor"
- Use quick actions to disable/block
3. Investigate
Goal: Understand the full scope.
Steps:
- Export affected events from LiteSOC
- Review the timeline of activity
- Identify all affected resources
- Check for data access or exfiltration
Key evidence to collect:
- Login timestamps and locations
- Actions performed during session
- Data accessed or exported
- IP addresses and user agents
4. Remediate
Goal: Fix vulnerabilities and restore security.
Common remediation steps:
- Force password reset for affected users
- Rotate compromised API keys
- Patch identified vulnerabilities
- Update firewall rules
- Enable additional MFA requirements
5. Document
Goal: Create a record for compliance and learning.
Document:
- Incident timeline
- Root cause analysis
- Actions taken
- Lessons learned
- Prevention measures
In LiteSOC:
- Add notes to the resolved alert
- Export incident report
- Store in your compliance records
Common Incident Scenarios
Scenario 1: Brute Force Attack
``` Alert: 50 failed login attempts in 10 minutes Actor: unknown@attacker.com IP: 203.0.113.50 ```
Response:
- ✅ Block the IP immediately
- ✅ Check if any attempts succeeded
- ✅ Review other accounts targeted
- ✅ Enable rate limiting
- ✅ Consider CAPTCHA implementation
Scenario 2: Impossible Travel
``` Alert: Login from NYC, then Tokyo in 30 minutes Actor: john@company.com Risk: Account may be compromised ```
Response:
- ✅ Contact the user directly
- ✅ Check if one login was via VPN
- ✅ If suspicious, force logout all sessions
- ✅ Require password reset
- ✅ Review recent account activity
Scenario 3: Data Export by Unknown IP
``` Alert: Large data export from new location Actor: admin@company.com Data: 10,000 records exported ```
Response:
- ✅ Verify with admin user immediately
- ✅ If unauthorized, disable account
- ✅ Revoke data export if possible
- ✅ Assess data sensitivity
- ✅ Prepare breach notification if required
Post-Incident Checklist
After resolving an incident:
- All affected accounts secured
- Compromised credentials rotated
- Root cause identified
- Incident documented
- Team debriefed
- Detection rules updated
- Monitoring enhanced
- Compliance notified (if required)
When to Escalate
Escalate to leadership or legal when:
- Personal data may have been accessed
- Financial systems were compromised
- Regulatory notification may be required
- Attack is ongoing and sophisticated
- You're unsure of the scope
Need immediate help with an incident? Contact our security team or call our emergency hotline.