Skip to main content

Incident Attributes

The incidents table includes the various attributes that describe the incident. Some attributes depend on the settings selected when the policy was configured, for example, severity, dataset, and policy that triggered the incident. Some attributes are captured at the time of the incident, for example, the policy response, user response, file, timestamp etc.

The following table provides the list of attributes that are displayed in the incidents table.

Attribute NameDescription
AIAssessed RiskThe risk level assigned to an incident by Linea AI. The risk level is calculated based on the dataset sensitivity, policy severity, and the historical data flows associated with the event.
App command lineThe command line that started the application for accessing the data.
App descriptionThe description of the application used to access the data.
App main window titleThe title of the main application window.
App nameThe name of the application used to access the data.
App package nameThe package name for Modern Windows applications.
Assigned toThe user assigned to the incident. You can filter this column by selecting users.
BlockedAflag indicating whether the event was blocked.
Browser page domainThe domain as extracted from the referrer URL.
Browser page titleThe page title of the website.
Browser page urlThe referrer URL.
Cloud appThe type of cloud application, for example, OneDrive, SharePoint, Google Drive, etc.
Cloud app accountThe user account used to login to the website.
Cloud destination groupsGroup name in the cloud app that has been granted sharing access.
Cloud domainCloud app domain.
Cloud messaging groupsThe source or destination group name in the cloud messaging app.
Cloud messaging usersThe source or destination username in the cloud messaging app.
Cloud providerThe type of cloud provider storing data, for example, Office 365, Salesforce, etc.
Cloud shared roleThe cloud sharing access role type, for example, viewer, editor, commenter, etc.
Cloud shared typeThe scope of users with cloud sharing access, for example, user, group, anyone.
Cloud shared withThe cloud app account email addresses that have been granted sharing access.
Cloud workspaceWorkspace name of the cloud app, for example, the workspace name in Slack.
Content attributesThe content attributes that match the dataset in the policy. This column cannot be filtered.
Content repository nameThe name of the repository containing the data.
Content repository orgThe organization structure of the content repository.
Content uriThe URL path of the content.
Created byIndicates whether the incident was created by a user-defined policy, Linea AI, or a combination of the two. See Linea AI Incidents.
Data sizeThe size of a piece of data, for example, when copy and pasted.
DatasetThe dataset that was used to classify the data which was referenced in a policy that matched the event and triggered the incident. You can sort or filter this column by selecting dataset names.
Destination file pathThe specific location where data resides.
Destination location outlineThe type of destination location where data resides (e.g., endpoint, website, etc.)
Destination typeAshort outline of the destination location that triggered the incident such as node, hostname for endpoint, email for cloud, device name for removable media.
Document tagsThe document tags that are applied to the document containing the sensitive data.
DomainThe domain name, in the form .sub.domain.tld .
Domain categoryAclassification that Cyberhaven maintains to categorize domains based on the type of content, purpose, or industry.
Edm attributesThe exact data match attributes that matched and triggered the incident.
Email accountThe email address identifying a mailbox where the data resides.
Email groupsThe geographic location of the email account.
Endpoint idIdentifier for the endpoint where the event was generated.
Event timeThe time at which the event that caused the incident occurred.
Event typeThe type of event that led to data arriving or leaving a location.
ExplanationThe user explanation provided in the policy response pop-up window.
FileThe name of the file that caused the incident. You can sort or filter this column by selecting filenames.
File extensionThe file type or the extension of the file.
File sizeThe size of a file in bytes.
Group nameThe list of Active Directory groups to which the user accessing the file belongs.
HostnameThe hostname of an endpoint or share where the data resides.
Incident IDThe unique identifier assigned to an incident.
Local machine nameThe hostname of the machine where the event happened.
Local time UTCThe time in UTC when the data arrived in the silo.
Local user nameThe username of the user accessing the data.
Local user sidThe SID of the user accessing the data.
LocationThe type of location where data resides, for example, endpoint, website, etc.
Md5 hashThe MD5 hash of a file at a location.
Media categoryThe type of removable media.
PolicyThe policy that matched the event and triggered the incident. You can sort or filter this column by selecting policy names.
Printer nameThe name of the printer used to access data.
Reaction time UTCThe time taken by the end user to respond to the policy response pop-up window.
Removable device nameThe name of the removable device used to access data.
Removable device product idThe 16-bit number assigned to specific USB device models by the manufacturer.
Removable device vendor idThe 16-bit number assigned to USB device manufacturers by the USB Implementers Forum.
Resolution statusThe incident resolution status.
Resolution time UTCThe time in UTC when this incident was resolved.
Resolved byThe admin user who resolved the incident.

The policy response to the incident and the status of the pop-up window that displays the policy response message. This column cannot be filtered. The following are the possible values.

ResponseN/AWhen the "Response" option in the policy is set to "Monitor", then this attribute is shown as N/Ain the table.
Response skipped: throttledIf the policy is triggered more than once within 5 seconds, then the pop-up window is not displayed due to throttling.
Response skipped: timeoutIf the pop-up window was not displayed to the user due to the session timing out. The possible scenarios could be that the device was rebooted or lost network connectivity.
Response pendingAn incident was created but the response from the user popup message was not yet received. The possible scenario could be that the sensor lost network connectivity and did not receive the new incident notification.
Warning shownThe warning message defined in the policy was displayed to the user.
Warning received by endpointIf the blocking policy for the user action failed, or the user was able to override blocking for this action and perform the next action, then a warning message is still displayed to the user and an incident is created.
BlockedThe policy response pop-up window was displayed to the user and the user action was blocked as per the policy.
Blocked, Response skipped: throttledIf the policy is triggered more than once within 5 seconds, then the user action is blocked but the pop up window is not displayed due to throttling.
Salesforce account domainsSalesforce domain name from user's email address.
Salesforce account nameName of the Salesforce account.
SensitivityThe sensitivity rating assigned in the dataset definition. The following are the possible values. Critical High Moderate Low Unrestricted You can filter this column by selecting different sensitivity ratings.
Sensor TypeThe type of Cyberhaven sensor that generated the incident, for example, Endpoint Sensor, Cloud Sensor, or Browser Extension.
Severitypossible values. Critical High Medium Low InformationalThe severity of the incident as defined in the policy. The following are the You can filter this column by selecting severity types.
SHA256 HashThe SHA256 hash of a file at a location.
Source file pathThe file path location of the source containing the data.
Source location outlineThe type of source location where data resides, for example, endpoint, website, etc.
Source typeAshort outline of the source location that triggered the incident such as node, hostname for endpoint, email for cloud, device name for removable media.
TimestampThe time in UTC when the incident occurred. You can sort this column by the latest or oldest incidents.
Trigger timeThe time taken to trigger an incident.
URLThe exact URL used to access the data.
UserThe user who caused the incident. You can sort or filter this column by selecting usernames.
User reactionThis column displays the status of the user's reaction to the policy response pop-up window. This column cannot be filtered. The following are the possible values.
N/AWhen the "Response" option in the policy is set to "Monitor", then this attribute is shown as N/Ain the table.
NoneThere was no user reaction because the pop-up window was not displayed for instance, due to throttling.
Viewed the warningThe user clicked the "I understand" button and did not provide an explanation.
Provided an explanationThe user entered an explanation in the pop-up window.
AcknowledgedThe user clicked the "Acknowledge" checkbox on the warning message.
Requested reviewThe user has requested a policy review.
Self-unblockedThis status applies when a user action is blocked but the user chooses "Allow" in the pop-up window.