Skip to main content
Question

Case generated with older events

  • April 20, 2026
  • 3 replies
  • 38 views

EP0
Forum|alt.badge.img+5

I recently created detection rules that look for possible suspicious activities for a terminated user. The idea was to only escalate when we see these rules fire after the termination timestamp. 

The logic are not complex, essentially single event rules looking at certain event_types along with principal and target userids of the user, and no match section therefore running NRT. 

I did my tests to exclude possible offboard related events. However, after I enabled Alerting, cases were generated with events that occurred days before the rules were set to Alerting. I noticed that the Alerts tied to the cases had the tooltip information below:

 



Now based from what I’ve gathered, this is something to do with how the detection rules pipeline making sure that even “older” events are properly surfaced and is essentially a continuous stream processor. Some of it covered here Latency Analysis in Google SecOps | by Chris Martin (@thatsiemguy) | Medium 

The tooltip information is a good indicator, but the problem is that we have an MSSP setup where we forward cases from the client instance to our MSSP instance. And these tooltip information do not get carried over to the case generated in the MSSP instance. The event timestamp from the detection itself is obviously an indicator, but it defeats the purpose of this tooltip.

In theory the approach to prioritize recall vs. precision is understandable, but in practical terms it can cause issues. My questions are:

1. How can we exclude events that happened prior to enabling Alerting? Will adding filter on metadata.event_timestamp work? Although the timestamp filter approach is only relevant to use-cases where we have a cut-off time.
2. Is there any other way to highlight older events that are being surfaced with significantly different case generation time? 
3. Any other useful tidbit to keep in mind when handling scenarios like this?

3 replies

dnehoda
Staff
Forum|alt.badge.img+16
  • Staff
  • April 20, 2026

Can you share your rule and more specifically how far back it looks?


cmorris
Staff
Forum|alt.badge.img+12
  • Staff
  • April 20, 2026

For 2/3, Detection Timing Details is the field that you want  - https://docs.cloud.google.com/chronicle/docs/secops/release-notes#:~:text=detectionTimingDetails

DETECTION_TIMING_DETAILS_REPROCESSING is for rule replays/reprocessing and DETECTION_TIMING_DETAILS_RETROHUNT is for retrohunts.


cmorris
Staff
Forum|alt.badge.img+12
  • Staff
  • April 21, 2026

​​​​For 1, looking at the timestamp should work.

Another option could be using a condition in your playbook to look at the detection timing details. This won’t stop the alert from firing, like your rule update would, but would allow you to act on reprocessing and/or Retrohunt alerts. May or may not help for your use case, but may be useful to know regardless.

So for the example here, I created a condition to check if the alert was generated by a Retrohunt:

I ran a Retrohunt to validate and after the condition had two options for Case comments, “Retrohunt” or “Not Retrohunt”. Looks like this works: