Skip to content

Security Alarms

Security Alarms is the SOC-grade alarm management interface that unifies detections from two sources — RhythmX Intelligence (Sigma behavioral detections and ML anomalies) and LogRhythm Signals (native SIEM alarms) — into a single investigation cockpit. Alarms are automatically grouped by actor, enriched with MITRE ATT&CK mappings, and scored using a multi-factor risk model.

Access Security Alarms from the top navigation bar by clicking Alarms.

Navigation Bar


How Alarms Work

RhythmX ingests alarms from two detection engines and stitches them together per actor:

Source What It Detects Where It Comes From
RhythmX Intelligence Behavioral detections from Sigma rules and ML anomaly detection RhythmX's own detection engine — behavioral rules, ML-powered anomaly scoring, and automated threat correlation
LogRhythm Signals Native SIEM alarms and operational detections LogRhythm's alarm history — provides access to 90+ days of alarm data

Both sources are merged under each actor (user, host, or IP) to provide a unified view of all suspicious activity associated with that identity.


Alarm Views

Card View

Alarm Cards

The default view displays alarms as cards grouped by alarm rule. KPIs at the top show aggregate counts across all alarms.

Actor View

Actor View

Switch to the actor-based view to see alarms grouped by user identity. Each actor card shows:

Element Description
Actor name The user, host, or IP address
Risk badge Color-coded risk level
Alarm count Total alarms and MITRE technique count
MITRE tactic badges Color-coded pills showing detected tactics (Discovery, Lateral Movement, Credential Access, Persistence, Privilege Escalation, etc.)
Risk bar Visual gradient showing the risk distribution across alarms
Date range First seen to last seen timestamps
Entity Which LogRhythm entity the activity was detected in

Incidents View

Incidents with Entity Filter

The Incidents tab groups alarms into incidents per actor. Use the Entity dropdown to filter by organization (e.g., Global Entity, NextGen-SOC). Each incident card includes:

  • 6-FACTOR RISK score with CRITICAL/HIGH/MEDIUM/LOW badge
  • Alarm status breakdown (New, Opened, Escalated, Resolved, False Alarm)
  • SLA status indicator (Breached, On Track, At Risk)
  • MITRE tactic coverage
  • Alarm IDs for reference

Status Filtering

Status Filter

Filter alarms by lifecycle status:

Status Description
All Show all alarms
New Newly created, not yet reviewed
Opened Analyst has opened for review
Escalated Escalated to a higher tier
Closed Investigation complete
False Alarm Determined to be benign
Resolved Issue has been remediated
Unresolved Investigation inconclusive
Reported Reported to management
Monitor Under ongoing monitoring

Actor Investigation

Source Split

Actor Sources

Click any actor card to open the detail view. The actor header shows:

  • Actor name and total alarm count with unique rule count
  • First seen / Last seen timestamps with relative age
  • Total alarms across both sources

Below, the two detection sources are displayed:

Source What It Shows
RhythmX Intelligence Behavioral detections and ML anomalies — cases, outliers, and alert counts
LogRhythm Signals SIEM alarms and operational detections — alarm count and rule count

This split view is the core of how RhythmX stitches together multiple detection engines for a single actor.

RhythmX Intelligence

RhythmX Intelligence

Expand RhythmX Intelligence to see:

Threat Cases — Correlated attack patterns detected by the RhythmX Analytics correlation engine. Each case shows:

  • Case type and severity (e.g., RAPID FIRE — CRITICAL, PRIVILEGE ESCALATION — HIGH)
  • Status badge (OPEN)
  • Alert count and risk score
  • Date range
  • Description of the detected pattern (e.g., methods used, succession timing)

Click any case to open the full Case Management detail view.

Case Detail

RhythmX Timeline

RhythmX Timeline

The RhythmX Timeline shows all behavioral detections chronologically. Each rule row displays:

Element Description
Rule name Sigma detection rule that triggered
Performed Action badge Indicates the alert type
Event count Number of events matching this rule
Computers Systems where the rule fired
First / Last seen Time range of detections
Risk bar Visual severity distribution
ML outlier count Number of events flagged as anomalies by the ML engine
Risk score Calculated risk for this rule
MITRE tactic tags defense-evasion, privilege-escalation, persistence, execution, etc.

LogRhythm Signals

LogRhythm Signals

Expand LogRhythm Signals to see all SIEM alarm rules that fired for this actor. Each rule shows:

  • Alarm rule title (e.g., TT04.002: Access Token Manipulation, UEBA: Potential Ransomware Behavior)
  • Total alarm count
  • First / Last seen timestamps
  • Risk bar visualization
  • RSP score (Risk Score Priority) — the LogRhythm-assigned risk rating

Alarm Instance Drill-Down

Alarm Instances

Click any alarm rule to expand the list of individual alarm instances. Each instance shows:

  • Alarm ID
  • Timestamp
  • Log count
  • Entity
  • RSP score

Log Detail Table

Alarm Logs

Expand any alarm instance to see the underlying log events in a table:

Column Description
Time Event timestamp
Origin Source system or IP
Target Destination system or IP
Classification Event type (e.g., User Login)
User Associated user account
Entity LogRhythm entity

Event Details Panel

Event Details

Click any log row to open the Event Details panel on the right side, showing all fields for the selected event as key-value pairs.

Event JSON

Scroll down to see the Full Event JSON — the complete raw event data with search, copy, and expand controls.


Risk Score Calculation

Risk Score

Click the risk score badge on any actor to see the full Risk Score Calculation breakdown. The score is a 0–100 integer computed using a 6-factor model:

Factor Weight What It Measures Scoring
Volume 20% Total alarm count across all rules More alarms across more rules = higher score
Velocity 15% Alarms per hour — burst rate Sustained rapid activity indicates automation or active attack
Diversity 15% Number of unique rules triggered High diversity indicates varied attack techniques, not single-rule noise
MITRE ATT&CK 20% Kill chain stage coverage Multiple tactics across the kill chain suggest coordinated/sophisticated attacks
Recency 15% Time since last alarm Recent activity scores higher than stale alerts
Threat Cases 15% Active correlation cases involving this actor Active cases from the RhythmX Analytics engine increase risk

Each factor is scored 0–100 independently, then weighted to produce the final composite score.

Risk Tiers:

Score Level Color
76–100 Critical Red
51–75 High Orange
26–50 Medium Yellow
0–25 Low Green

Rule Analytics

Rule Analytics

The Rule Analytics modal analyzes detection quality for an actor:

Metric Description
Total Total alarms analyzed
Escalated Alarms that were escalated
False Alarm Alarms marked as false positives
Noise Score Aggregate noise rating (0–100)

Rule Breakdown shows the top firing rules with their percentage of total volume.

Noise Score is a composite metric (0–100) that factors in false alarm rate, alert volume, and rule effectiveness to identify rules that need tuning.

Range Classification
0–30 Low noise — detections appear legitimate
30–60 Medium noise
60–80 High noise
81+ Critical noise — likely needs tuning

SLA Tracking

SLA Status

The SLA Status modal tracks response time targets for each incident:

Field Description
Current Status On Track, At Risk, Breached, or Resolved
Target SLA target time based on severity
Elapsed Time since incident creation
% Used Percentage of SLA time consumed

SLA Targets by Severity:

Severity RBP Range Target
Critical RBP >= 80 2 hours
High RBP 60–79 4 hours
Medium RBP 40–59 24 hours
Low RBP < 40 48 hours

How SLA is Calculated:

  • Clock starts — When the first alarm in the incident is created
  • Severity — Based on the maximum RBP (Risk Based Priority) of all alarms in the incident
  • Resolved — When ALL alarms in the incident are closed
  • At Risk — When 75%+ of the target time has elapsed

Analytics View

Analytics View

The Analytics tab provides aggregate analysis of alarm data:

  • KPIs — Total alarms, new, escalated, false alarm, resolved counts
  • Top Firing Rules — Horizontal bar chart of the most active alarm rules
  • Alarms by Entity — Distribution across LogRhythm entities with percentages
  • 7-Day Trend — Daily alarm volume bar chart

Rule Effectiveness Details

Rule Effectiveness

The Rule Effectiveness Details table tracks detection quality per rule:

Column Description
State Rule lifecycle state — TRUSTED (green) or NEW (blue)
Rule Name The alarm rule name
Noise Noise score for this rule
Total Total alarm count
Escalated How many were escalated by analysts
False Alarm How many were marked as false positives
Effectiveness Percentage of alarms that led to escalation — higher = more effective

Rule lifecycle states help identify which rules are delivering value and which need tuning.