About Cases#
A case is a structured entity used to track, investigate, and respond to security incidents, threats, or suspicious activities. It serves as a central repository where security teams organize information, collaborate on investigations, and document their findings.
Sources#
TheHive supports creating cases from the following sources:
-
Manual entry: Cases created through direct input by users.
-
Merging cases: A new case created by merging two existing cases.
-
Case templates: Predefined structures used to standardize case creation.
-
Archived cases: Restored cases from previous investigations in TheHive.
-
Malware Information Sharing Platform (MISP) event files: Cases created by manually importing MISP events.
-
5.5 Alert feeders: Cases created from data retrieved from external systems using an alert feeder.
-
Alerts: Cases generated from alerts received via connected detection tools (SIEM, EDR, IDS, or firewalls), threat intelligence platforms (like MISP), or email servers.
-
Detection tools (SIEM, EDR, IDS, or firewalls): Cases created automatically by trusted detection tools, used when alert triage is managed within the tool or when the tool generates mostly true positives.
Key components#
In TheHive, a case includes the following elements:
-
Observables: Data points such as IP addresses, file hashes, domains, and email addresses that are relevant to an investigation.
-
Tasks: Actions assigned to analysts to analyze, assess, and mitigate threats.
-
TTPs: The methods and strategies used by attackers, based on the MITRE ATT&CK knowledge base.
-
Attachments: Files attached to a case. Adding an image to a case description, summary, or task log automatically saves it in the Attachments tab of the case. Attachments can also be added manually.
Merging cases#
Cases can be merged if they're similar or part of the same investigation, enabling data centralization.
To merge cases, they must belong to the same organization and share the same permission profile pairs. Merging consolidates two cases into a new one, combining their contents and deleting the originals.
To learn how to merge cases, see Merge Cases.
Merging also impacts:
Linking elements#
Alerts as linked elements
Alerts can't be added to linked elements. An alert link is created automatically when a case is created from an alert or an alert is added to an existing case. To view alerts linked to a case, see View Alerts linked to a Case.
Cases can be linked to other TheHive cases or external resources. These links enhance traceability and help visualize relationships between related incidents.
Link categories#
Links require categorization to indicate the type of relationship. If no category is specified, Internal link applies automatically for links between TheHive cases, and External link applies for links to external resources.
Link display#
Users can only view links to cases in their organization and cases they have access to.
Links automatically appear in both linked cases. Deleting a case automatically removes its related links.
Case links aren't included in case exports, reports, or dashboards.
Actions#
Links can be added or removed in a case, but can't be modified once added.
Merging cases with links#
-
Merging cases combines links from both cases and removes duplicates based on the link and its type. Links pointing to the source merged cases are automatically removed.
-
Creating a case from a MISP alert or merging a MISP alert into a case adds the MISP URL as an external link with the External alert link type. This link remains even if the alert is later unlinked from the case.
Closing cases#
Cases can be closed once the investigation is complete.
Custom fields completion#
Cases can't be closed if any required custom fields remain empty. Users can add or update values in custom fields during the closing process. However, they can't remove custom fields themselves.
Access control#
TheHive provides three distinct mechanisms for controlling who can access cases:
- Case visibility restriction: Restricts access among internal users of the main TheHive interface
- Organization-to-organization sharing: Shares cases between different organizations within the main TheHive interface
- TheHive Portal sharing: Grants access to external stakeholders through a separate portal interface
Case visibility restriction#
5.5 Platinum
Usage#
Restricted case visibility controls access by limiting case viewing to specific team members and managers. This feature protects sensitive information and reduces the risk of unauthorized access.
Access level compatibility
Cases with restricted visibility can't be shared with external users. Similarly, once a case is shared with external users, its visibility can't be restricted.
Configuration#
By default, cases created through the user interface are visible to all users in the organization.
Visibility can be restricted to a specific group of users to secure sensitive cases and later restored if necessary.
The case assignee and the user performing the action always have access and can't be removed.
Expected behavior#
When a case is set to restricted visibility, it doesn't appear in linked elements, case lists, search results, or dashboards for unauthorized users. However, alerts linked to restricted cases still display, marked with a symbol.
All related elements, including observables, tasks, and attachments, remain hidden as well.
Unauthorized users can't be assigned to the case.
Notifications behavior
A case with restricted visibility still triggers configured notifications, regardless of who can view the case.
Audit logs behavior
When visibility is restricted on a case:
- If you're using the default configuration with Apache Cassandra (JanusGraph) to store your audit logs, all associated audit logs, including those created earlier, immediately become private.
- If you're using Elasticsearch to store your audit logs, all associated audit logs remain public. Audit logs retain the visibility they had at the time of creation, regardless of the current visibility of the case.
Visual indicators#
For authorized users, a restricted case is identifiable by the symbol in case descriptions, case lists, and linked elements, with an orange background color.
Organization-to-organization sharing#
Organization sharing enables collaboration between different internal organizations within TheHive. Cases shared between organizations appear in both organizations' case lists, with users accessing them through the main TheHive interface.
Sharing is controlled through organization sharing rules that define:
- Partner organizations: Which organizations can share cases with each other
- Shared elements: Whether observables and tasks are included alongside shared cases
- Application scope: Whether rules apply only to newly created cases or include existing cases
- Permission levels: What level of access users have to shared cases
Cross-organization sharing
When a case is shared between internal organizations and also shared with external users, external users in the receiving organization automatically gain access if they have matching external user accounts in that organization.
TheHive Portal sharing#
5.6 Platinum
TheHive Portal provides controlled access for external stakeholders, such as HR, Legal, clients, or partners, who need visibility into specific cases without accessing the main TheHive interface.
External users access a dedicated portal with a simplified interface. Security Operations Center (SOC) teams maintain complete control over what information each external user can see and how they can interact with cases.
See About TheHive Portal for complete details on usage.
Access level compatibility
Cases with restricted visibility can't be shared with external users. Similarly, once a case is shared with external users, its visibility can't be restricted.
Merging rules#
When merging cases with different access levels, the resulting case inherits the most restrictive access configuration to prevent unintended information exposure.
Incompatible merge
Merging a case with restricted visibility with a case shared with an external user isn't permitted.
| Case Type 1 | Case Type 2 | Resulting Case | User Access |
|---|---|---|---|
| Internal | Internal | Internal | All organization users |
| Internal | External | Internal | Organization users only—external access removed |
| Internal | Restricted | Restricted | Authorized users from the restricted case |
| Internal | Organization-shared | Organization-shared | Users from sharing organizations |
| Restricted | Restricted | Restricted | Union of authorized users from both cases |
| Restricted | External | Not permitted | N/A |
| Restricted | Organization-shared | Organization-shared and Restricted | Authorized restricted users from sharing organizations |
| External | External | External | Union of external users from both cases |
| External | Organization-shared | Organization-shared and External | Authorized external users from sharing organizations |
| Organization-shared | Organization-shared | Organization-shared | Users from all sharing organizations |
Statistics#
Predefined statistics in dashboards are available from the cases list. For custom statistics and dashboards, refer to About Dashboards.