Event score calculation plays a vital role in helping security analysts and IT teams quickly assess the severity of an event and prioritize which ones to investigate or respond to first. In environments where hundreds or thousands of events are generated every day, having a calculated score helps cut through the noise and focus on what truly matters. By assigning a numerical score to each event, the system gives you a clear indication of its potential impact or threat level. Higher scores typically signal more critical or suspicious activity that may require immediate attention.
The event score is computed using a weighted model that considers four key factors. Each factor adds context to the event, helping define how urgent or dangerous it might be.
Every event is tied to a rule that was violated. Rules are predefined based on the severity of behavior they detect . For example, a rule that detects lateral movement or port scan is more serious than one that detects a excess broadcast/networkcast flows.
This factor reflects how many unique entities (such as IP addresses, users, or devices) are involved in the event.
Each rule has a ML-based threshold — a limit that, when crossed, indicates unusual activity. This factor captures how far an event has surpassed that threshold.
Older events are typically less relevant than recent ones. This factor ensures that newer events are given higher priority over time, helping security teams focus on active or emerging issues.
Thank you for your feedback!