Understanding the Alert Detail page
NAVIGATION Alerts
SECURITY Datto EDR subscription with administrator or analyst-level platform access
IMPORTANT Specific retention periods apply to all record types in Datto EDR and Datto AV. For more information, refer to Datto EDR and Datto AV data retention policies.
The Alert Detail page provides granular information about the conditions that triggered an alert and the endpoint from which it originated. From this page, you can quickly conduct incident investigations and carry out response actions to keep your customers safe.
This article describes the page's layout and functions.
For more information about working with alerts, refer to Working with the Alerts page, Configuring email alerts, Suppressing alerts, and Responding to alerts.
Overview
To access the Alert Detail page, perform the following steps:
-
As you navigate, you'll see the following features and fields:

Feature | Definition |
Open device in RMM |
For tenants with the RMM + EDR integration configured, opens the endpoint's device detail page in RMM; learn more in our Understanding the Datto EDR + Datto RMM integration article |
Web Remote |
For tenants with the RMM + EDR integration configured, opens a remote connection to the endpoint via RMM Web Remote; this option is only available to endpoints that have the Web Remote option available in Datto RMM; for details, refer to Web Remote in the Datto RMM Help system |
Acknowledge |
Acknowledges this alert and clears it from the default view on the Alerts page |
Unacknowledge |
Restores the alert to an unactioned state and returns it to the view on the Alerts page |
Respond |
Opens the response extension modal, enabling you to select and deploy collection and response extensions to the impacted endpoint; for more details, refer to Leveraging collection and response extensions |
Create Suppression Rule |
Click to create a new suppression rule; for more details, refer to Suppressing alerts |
Create Custom Response |
Click to create a custom automated response for the rule and policy. |
Export |
Exports the details of the current alert to a Comma-Separated Values (CSV) file |

Field name | Definition |
Severity |
Indicates the perceived level of the threat; possible values are None, Low, Medium, High, and Severe |
Source |
Details the measure by which the platform determined it should surface an alert for this record; possible values are:
NOTE If your subscription does not include Datto EDR service, you will only see the Datto AV alert type. |
Threat Type |
Further categorizes the source |
Threat Name |
Name of the threat detection rule that triggered the alert |
Detection Time |
Date and time Datto EDR generated the alert |

Field name | Definition |
Host Name |
Assigned hostname of the endpoint |
IP Address |
Endpoint's IP address |
Device Group |
Name of the device group to which the endpoint belongs, if any |
Operating System |
Operating system installed on the endpoint |
Organization |
Name of the organization |
Location |
Location of the endpoint |
AV Policy |
Name of the AV policy |
EDR Policy |
Name of the EDR policy |
Ransomware Policy |
Name of the Ransomware policy |
Automated Response |
Name of the Automated Response policy |

Field name | Definition |
Process Name |
The identity of the file or reference to the file that recently executed some time in the past |
Process Path | Path to the impacted file |
Command Line
|
The full command (program path plus arguments) that was executed on the device. This helps you see what the process actually tried to run. |
Process Owner | Name of the process owner |
File Reputation | Shows whether the file (identified by its SHA1) is considered malicious or suspicious based on aggregated intelligence |
Description | Name of the MITRE ATT&CK that applies to the threat |

If applicable, this pane illustrates the processes and command line arguments involved in the execution of the suspicious object.

Provides granular information about the item that caused the alert.

If the alert was triggered by a rule, this tab provides the rule's details.

Recommended steps for identification, containment, and eradication of the threat appear here.

Frequently, alerts come from a single host. If that scenario is the case, we include recent surrounding alerts from the same host for context. Click any alert to pivot to its detail page.
NOTE This pane is not visible when viewing the details of a correlated alert.
Field name | Definition |
Process Name |
Filename for most file-based objects, the hash of the memory content for memory injections, and the username for accounts |
Source | Name of the threat detection rule that triggered the alert |
Severity |
Indicates the perceived level of the threat; possible values are None, Low, Medium, High, and Severe |
Host |
Assigned hostname of the endpoint |
Context |
The file-based reputation of the object; for more information, refer to Understanding context |
Event Time | Date and time that the event occurred on the endpoint |
Created On | Date and time the alert was created |

This free-text field enables you to create notes about this alert and view notes posted by other administrators or analysts.

Smart Investigate offers an AI interface with preloaded, one-click questions. It automatically curates relevant queries and includes alert-specific metadata to provide clear feedback to users. The feature is provided for the Rule Source alert type only. Select a question in the left pane to display the answer in the right pane.
Revision | Date |
---|---|
Added redesigned Alert Details content. | 9/18/25 |