Introduction to Custom Security Events

In Cisco XDR, Incidents represent a consolidated view of a potential security breach, based on the correlation of multiple Detection Findings. These Detections, also known as Security Events, are collected from various Detection Sources and evaluated together in real time. Cisco XDR’s correlation engine analyzes relationships between Detections, such as shared observables, overlapping timelines, or related attack patterns, to determine whether they represent parts of the same threat. When a set of Detection Findings is determined to be related, they are grouped, enriched with other Threat Intelligence, and presented as Incident in Cisco XDR.

Prior to Custom Security Events, Cisco XDR could only ingest Security Events from Cisco Managed Detection Sources, identified and supported by Cisco’s XDR engineering team. Examples of these Detection Sources:

Category Examples
Endpoint Detection Sources CrowdStrike, Microsoft Defender for Endpoint, Cisco Secure Endpoint, SentinelOne, ...
Email Detection Sources Microsoft Defender for O365, Proofpoint, Cisco Email Threat Defense, ...
Network Detection Sources Cisco Secure Access, ...

With this new ingestion method, customers themselves can identify and support additional Detection Sources that Cisco may have no plans to support. It is important to call out that some Detection Sources offer different levels of information:

Level Notes XDR Ingests?
Incidents May represent grouped threats or cases. No
Security Events Represent individual detections or findings. Yes
Activities (Base Telemetry) Raw event or behavior data. No

Note: Detection Sources may use different terms, such as Alerts, Alarms, Detections, or Behaviors. It is important to focus on Security Events conceptually for this feature, whatever they may be called by the source.


Ingestion: What You Should Know

To successfully integrate a Detection Source and bring new Security Events into XDR, you need to understand these key concepts of the ingestion pipeline:

Attribute Description
7x24 Operation Continuous operation without scheduled downtime.
Near Real-time Events ingested as quickly as possible after occurrence.
Steady Rate Event ingestion avoids excessive bursts.
Data Loss Handling Ensures no events are lost, even in case of temporary outages.

API-based Ingestion Process

Most Detection Sources offer an API to request Security Events created or updated in the past n minutes. To retrieve these systematically, perform the steps below:

  1. API calls typically occur every n minutes (n ≤ 5), producing a steady event stream.
  2. The number of events returned per call may vary depending on activity levels.
  3. Overlapping windows may be used (e.g., request past 5.5 minutes every 5 minutes) to avoid missing Security Events.
  4. XDR de-duplicates overlapping events, as long as you are able to use the same Detection ID to refer to the same event.
  5. Outage recovery is handled by requesting the time window missed, avoiding excessive bulk ingestion. For example: API failure for 3 hours → request past 3 hours of Security Events after recovery.

Push-based Ingestion Process

Some Detection Sources use a push model instead of, or in addition to, an API pull model (e.g. via Webhooks). In most cases, this method is preferred over API-based ingestion, as it is usually more efficient, and more real-time. Below are some considerations for this process:

Consideration Action
Steady Real-time Delivery Ensure constant ingestion flow.
Data Loss Prevention Monitor successful delivery and capture missed events.
Outage Recovery Resume and backfill any gaps after downtime.

Why This Design Matters

Incoming Security Events feed Incident Correlation in XDR. This roughly follows the below process:

Step Purpose
Correlate Security Events with one another Identify patterns and relationships.
Correlate with XDR Native Detections Combine different detection types for a holistic threat view.
Time-sensitive analysis Late-arriving events are excluded from correlation.

Cisco’s Typical Integration Steps

When Cisco integrates a Detection Source, the majority of the work is to:

Step Description
1 Identify the API (or method) for 7x24 Security Event ingestion without data loss, near real-time.
2 Understand the Security Event data provided by the source.
3 Map source data to a single, normalized format.

Final note: When adding your own Detection Sources, you are responsible for completing the three integration steps described above. See the guide in the next section to create a Custom Security Events integration.