Documentation

Forensic Drawer

The forensic drawer is SOCWarden's deep-dive investigation panel. Click any event in the events table to open a full forensic breakdown: AI-generated summaries, risk score decomposition, GeoIP mapping, OSINT intelligence, MITRE ATT&CK mapping and one-click response actions.

1

Overview

The forensic drawer slides in from the right side of the events page when you click any event row. It provides a complete investigation context without leaving the events list. The drawer is divided into multiple collapsible panels, each providing a different dimension of intelligence about the event.

When does it appear?

  • Click any row in the Events table
  • Click an event in the Actor Timeline or Alert Detail view
  • Click a linked event from within another forensic drawer (e.g. related brute-force attempts)
2

Panels Explained

Each panel in the forensic drawer reveals a different layer of enrichment data. Panels are collapsible and remember their open/closed state.

AI Summary

LLM

An LLM-generated natural language summary explaining what happened, why it matters, and recommended next steps. Generated asynchronously during Layer 3 enrichment. Includes confidence level and key observations.

Risk Score Breakdown

0-100

Visual decomposition of the composite risk score (0-100). Shows every individual signal that contributed to the final score: base event score, threat feed matches, behavioral detections, OSINT findings. Each signal shows its point value and source.

GeoIP + Map

Layer 1

Embedded Google Maps view showing the geographic location of the source IP. Displays country, region, city, coordinates, ISP, ASN and organization. For impossible travel events, shows both locations with a connecting line and the calculated speed.

Network Intelligence

Layer 1

IP reputation data including: Tor exit node status, VPN detection, proxy detection, datacenter/hosting detection, and ASN classification. Shows whether the IP belongs to a residential ISP, cloud provider, or known anonymization network.

OSINT Card

Layer 2

Threat feed match results across all 15 integrated feeds: Spamhaus DROP/EDROP, Feodo Tracker, Emerging Threats, CINS Army, blocklist.de, GreenSnow, URLhaus, SC Malaysia Investor Alerts, and more. Each match shows the feed name, listing reason, and when the IP was last reported.

GreyNoise

Layer 3

RIOT classification (known good service), noise detection (background scanner), and malicious scanner badge. Helps distinguish targeted attacks from internet-wide scanning noise.

InternetDB (Shodan)

Layer 3

Open ports list, CVE count, hostnames, and CPE identifiers for the source IP. Provides infrastructure fingerprinting without requiring a Shodan API key.

Pulsedive

Layer 3

Risk score (none/low/medium/high/critical), threat associations, and feed sources. Community-driven threat intelligence with indicator linking.

AbuseIPDB

Layer 3

Abuse confidence percentage (0-100%), total reports count, last reported date, and abuse categories. High-confidence IPs (>90%) are flagged prominently. Fetched asynchronously.

MITRE ATT&CK Mapping

Detection

Maps detected threats to MITRE ATT&CK techniques and tactics. Shows technique ID (e.g. T1110.001), technique name, tactic phase, and a brief description. Helps security teams understand the attack in the context of known adversary behavior.

OWASP Mapping

Detection

For request-layer attacks (SQLi, XSS, path traversal, SSRF), maps findings to OWASP Top 10 categories. Shows the matched payload pattern and the specific OWASP category (e.g. A03:2021 Injection).

Request Context

SDK

HTTP request details captured by the SDK middleware: method, path, query parameters, status code, request ID, and response time. Shows the full URL and any suspicious patterns detected in the request.

Client Context

Browser

Browser-side context relayed via the browser SDK: timezone, language, languages list, touch capability, platform, screen resolution, viewport size, color depth, cookie status, Do Not Track, connection type, downlink speed, page URL (sensitive query params redacted), page referrer, and page title.

Server Context

SDK

Server-side metadata auto-collected by the SDK: hostname, runtime version, process ID, and SDK name/version. Helps identify which server instance processed the request.

SDK Info

Meta

Shows which SDK sent the event, its version, the source type (sdk, agent, or api), and the ingestor processing timestamp. Useful for debugging SDK configuration issues.

Device / User-Agent

Layer 1

Parsed user-agent string showing browser name and version, OS name and version, device type (desktop, mobile, tablet, bot), and the raw user-agent string for reference.

Actor Timeline

History

Recent event history for the same actor (user). Shows the last 20 events with timestamps, event types, risk scores, and IP addresses. Helps identify patterns like repeated failures followed by a success (account compromise indicator).

3

Action Buttons

The forensic drawer header includes one-click response actions. These actions are available to users with the appropriate role permissions.

Block IP

Immediately adds the source IP to your account blocklist. Future events from this IP are flagged with maximum risk score. Can be reversed from the Blocklist settings page.

Add to Watchlist

Adds the actor or IP to a watchlist for enhanced monitoring. Future events from this entity trigger additional alerts regardless of their risk score.

Create Incident

Opens the incident creation form pre-filled with event data. The incident links to the event and includes all enrichment context for your team to investigate.

Dismiss

Marks the event as reviewed and not actionable. Dismissed events are hidden from the default view but remain in the database for audit purposes. Dismissal is logged with the user who dismissed it.

4

Google Maps & Impossible Travel

The GeoIP panel includes an embedded Google Maps view centered on the source IP's location. For impossible travel detections, the map visualization is enhanced to show the attack context.

Standard events

A single marker on the map showing the source IP's geographic location. Clicking the marker shows the full GeoIP details: city, region, country, coordinates, ISP, and ASN.

Impossible travel events

Two markers connected by a dashed line: the previous login location and the current login location. The map auto-zooms to fit both markers. An info overlay displays:

  • Distance: Haversine distance in kilometers between the two locations
  • Time delta: Time elapsed between the two logins
  • Required speed:Calculated travel speed (flagged if >800 km/h)
  • Previous event: Link to the previous login event for comparison
5

Integration with Events Page

The forensic drawer is tightly integrated with the events list. The interaction model is designed for fast triage workflows.

Click-through from events table

Click any event row to open the drawer. The selected row is highlighted. Use keyboard arrow keys to navigate between events while the drawer is open.

URL state preservation

Opening the drawer updates the URL with the event ID (e.g. /events?id=evt_abc123). This means you can share a direct link to a specific event investigation.

Filter by actor or IP

Click the actor ID or IP address in the drawer to filter the events table by that value. This quickly shows all events from the same user or IP.

Keyboard shortcuts

Press Escape to close the drawer. Press J/K to move to the next/previous event. Press B to block the IP, W to add to watchlist, I to create an incident.

Enrichment Layers

Each panel in the drawer corresponds to data from a specific enrichment layer. Understanding these layers helps you interpret which data is available immediately versus asynchronously.

Layer 1

Realtime

<1ms

  • GeoIP + Map
  • User-Agent parsing
  • Tor/VPN/Proxy detection
  • Network Intelligence
Layer 2

Threat Intel

<10ms

  • 15 OSINT threat feeds
  • Behavioral detections
  • MITRE ATT&CK mapping
  • Request anomaly scan
Layer 3

Async External

Fire-and-forget

  • AbuseIPDB score
  • GreyNoise / Shodan InternetDB
  • Pulsedive / HIBP / WHOIS
  • LLM AI summary