Skip to content

RhythmX Investigator

RhythmX Investigator is the signal-driven, alert-centric investigation interface. While RhythmX Hunt searches raw logs, the Investigator focuses specifically on detection alerts — providing a targeted view of all behavioral detections associated with a user, computer, IP address, or process.

Access RhythmX Investigator from the top navigation bar by clicking RhythmX Investigator, or from within the Hunt interface.


Investigator Search

The search bar supports searching for users, computers, IPs, and processes. As you type, the Investigator provides contextual autocomplete with:

  • Matching results grouped by type (e.g., Processes)
  • Event count per match (e.g., 356 events)
  • Risk level badge per match (LOW, MEDIUM, HIGH)

The search auto-detects the type of entity you're looking for:

Input Pattern Detected As Example
IP address format IP 192.168.1.50
Windows/Unix path Process C:\Windows\System32\net.exe
FQDN with domain Computer jumpserver.imeta.lr
Plain username User ramy.ahmad
Hex string (32-64 chars) Hash a1b2c3d4...
1-5 digit number Event ID 4625
Ambiguous text General Searches across all field types

Filters

Filter Options
Time Range 7 days, 30 days, and other presets
Entity All Entities or a specific LogRhythm entity
Detection Mode Auto Detect (default) — automatically determines the best search strategy

Investigation Overview

Investigator Overview

After searching, the Investigator displays a comprehensive overview of all detections for the searched entity.

KPIs

KPI Description
Total Events Total detection events matching the search
Unique Users Distinct user accounts involved
Unique Computers Distinct systems involved
Unique IPs Distinct IP addresses involved
High-Risk Events classified as high risk
Critical Events classified as critical risk

Event Timeline

An area chart showing detection volume over time with two overlaid metrics:

  • Orange bars — Event count per time period
  • Blue line — Maximum risk score trend

This visualization reveals when activity spiked and whether the risk level increased with volume — a key indicator of escalating attack behavior versus steady-state noise.

The Related Entities section shows all identities connected to the searched entity:

Category What It Shows
Users (Origin) User accounts that initiated the detected activity — each with event count badges
Users (Impacted) User accounts that were targeted by the activity
Computers Systems where the detections occurred — each with event count badges

Click any related entity badge to pivot the investigation to that user, computer, or IP.


Alert Table

Alert Table

The alert table shows every detection event in detail. Filter by severity using the buttons at the top: Critical, High, Medium, Low.

Columns

Column Description
TIME Event timestamp
FIRST SEEN When this alert type was first observed for this entity
RULE The Sigma detection rule that triggered
COMPUTER System where the event occurred
USER ORIGIN User account that performed the action
USER IMPACTED User account that was targeted
IP ADDRESS Associated IP address
SUBJECT Subject account or object
PROCESS Process path involved in the detection
TACTICS MITRE ATT&CK tactics (e.g., privilege-escalation, defense-evasion)
ENTITY LogRhythm entity

Actions

  • Refresh — Reload the alert data
  • Generate Report — Export the investigation findings as a report
  • Export JSON — Download the raw alert data in JSON format

Active filters appear as chips below the search bar (e.g., computer:jumpserver.imeta.lr, victim-os.imeta.lr). Click any chip to remove the filter.


Raw Log Data

Raw Log Data

Click any alert row to open the Raw Log Data panel on the right side. This shows:

  • Event title — The Sigma rule that triggered (e.g., "Elevated System Shell Spawned From Uncommon Parent Location")
  • Event ID — Unique event identifier
  • Raw Log Data — Complete JSON payload containing:
  • Detection metadata (title, rule level, detection tags)
  • Process information (parent process, command line, image path)
  • MITRE ATT&CK mappings (tactics, techniques)
  • System context (computer name, user, timestamps)
  • Full event fields for forensic analysis

Use the search, copy, and expand buttons to work with the raw data.


Investigation Workflow

flowchart TD
    A[Alert or Alarm Triggers<br><b>Detection Event</b>] --> B[RhythmX Investigator<br><b>Search by User/Computer/IP/Process</b>]
    B --> C[Overview<br><b>KPIs, Timeline, Related Entities</b>]
    C --> D[Alert Table<br><b>Filter by Severity</b>]
    D --> E[Raw Log Data<br><b>Full Event Detail</b>]
    C --> F[Pivot<br><b>Click Related Entity</b>]
    F --> B
    D --> G[Generate Report<br><b>Export Findings</b>]
    D --> H[Export JSON<br><b>Raw Data Download</b>]
Step What the Analyst Does Key Decision
1. Search Enter a user, computer, IP, or process to investigate What entity triggered the alert?
2. Review Overview Check KPIs, timeline shape, and risk trend Is this a spike or steady noise?
3. Check Related Entities See which users, computers, and IPs are connected Is this activity isolated or spreading?
4. Filter Alerts Narrow by severity to focus on high/critical detections Which alerts matter most?
5. Examine Raw Logs Read the full event data and MITRE mappings What exactly happened?
6. Pivot Click a related entity to follow the investigation trail Where did the attacker go next?
7. Report Generate a report or export JSON for documentation How do we capture the findings?