Overview
This endpoint allows security analysts to convert selected alerts into a formal security incident. This is useful when multiple related alerts need to be investigated together or when an alert requires escalation to incident response procedures.Authorization Required: Include a valid Bearer Token in the Authorization header.
Endpoint Details
POST /api/utm-alerts/convert-to-incident
Method: POST
Content-Type: application/json
Authentication: Bearer Token required
Response: Incident creation confirmation
Content-Type: application/json
Authentication: Bearer Token required
Response: Incident creation confirmation
Request Body
Array of alert UUIDs to convert into an incident
Descriptive name for the new incident
Unique identifier for the incident (must be unique in the system)
Source or origin description for the incident
JSON Schema
Request & Response Examples
Additional Code Examples
Response Details
Successful Conversion
- Success Response
- Error Response
Status Codes
Incident created successfully from the provided alerts
Invalid request payload, duplicate incident ID, or invalid alert IDs
Missing or invalid Bearer token
One or more alerts not found with the specified IDs
Internal server error during incident creation
Usage Examples
Single Alert to Incident
Multiple Related Alerts
Malware Investigation
When to Convert to Incident
Single Complex Alert
Single Complex Alert
Convert when:
- Alert requires extensive investigation
- Multiple teams need to collaborate
- Formal incident response procedures required
- Compliance documentation needed
Multiple Related Alerts
Multiple Related Alerts
Escalation Scenarios
Escalation Scenarios
Convert when:
- Alert severity requires management attention
- Potential data breach or compromise
- Customer-impacting security event
- Regulatory reporting required
Best Practices
Incident Naming
Incident Naming
Use descriptive names:
- Include attack type: “Brute Force Attack Investigation”
- Reference affected systems: “Web Server Compromise - Server01”
- Add timeline context: “Ransomware Incident - Oct 2024”
- Be specific but concise
Incident ID Management
Incident ID Management
ID assignment strategy:
- Use sequential numbering for easy tracking
- Consider year/month prefixes: 202410001
- Reserve ID ranges for different incident types
- Ensure uniqueness across the organization
Source Documentation
Source Documentation
Provide clear sources:
- “SOC Team Escalation” for manual escalations
- “Automated Correlation Engine” for system-detected patterns
- “Customer Report” for externally reported issues
- Include analyst name for accountability
Integration with Incident Management
Platform Integration:
- Converted incidents appear in the UTMStack incident management interface
- Original alerts remain linked to the incident for reference
- Incident timeline includes all alert details and timestamps
- Case management workflow is automatically initiated
- Notifications sent to configured incident response team members
Security Considerations
Security Notes:
- Requires Bearer token authentication
- Incident creation is audited for compliance
- Only authorized users can convert alerts to incidents
- Incident IDs must be unique to prevent conflicts
- Alert IDs must exist and be accessible to the user