﻿---
title: Cases for Elastic Security
description: Create and manage security cases to track incidents, attach alerts, and collaborate with your SOC team using Security-specific features.
url: https://www.elastic.co/elastic/docs-builder/docs/3016/solutions/security/investigate/security-cases
products:
  - Elastic Cloud Serverless
  - Elastic Security
applies_to:
  - Serverless Security projects: Generally available
  - Elastic Stack: Generally available
---

# Cases for Elastic Security
Create cases to collect and share information about security incidents and investigations. You can attach alerts, document findings, and collaborate with your SOC team, all in one place. Cases also integrate with external ticketing systems like Jira, ServiceNow, and IBM Resilient, so you can escalate and track incidents across your security workflow.
Beyond the [core case functionality](https://www.elastic.co/elastic/docs-builder/docs/3016/explore-analyze/cases), Elastic Security lets you view case metrics, attach events from Timeline, add threat intelligence indicators, and link Timelines to preserve investigation context.
<agent-skill url="https://github.com/elastic/agent-skills/tree/main/skills/security/case-management">
  A skill is available to help AI agents with this topic.
</agent-skill>


## View case metrics

Select an existing case to access its summary. The case summary, located under the case title, contains metrics that summarize alert information and response times:
- **Total alerts**: Total number of unique alerts attached to the case
- **Associated users**: Total number of unique users represented in the attached alerts
- **Associated hosts**: Total number of unique hosts represented in the attached alerts
- **Total connectors**: Total number of connectors added to the case
- **Case created**: Date and time the case was created
- **Open duration**: Time elapsed since the case was created
- **In progress duration**: How long the case has been in the `In progress` state
- **Duration from creation to close**: Time elapsed from case creation to closure

Use these metrics to assess incident scope, track response efficiency, and identify trends across cases for process improvements.

## Add events

<applies-to>
  - Elastic Stack: Generally available since 9.2
</applies-to>

Attach events to cases to document suspicious activity and preserve evidence for your investigation. You can add events from Timeline or from the **Events** tab on the **Hosts**, **Network**, or **Users** pages. This helps you build a chronological record of what happened, share findings with your team, and support post-incident analysis.
View attached events in the case's **Events** tab, where they're organized from newest to oldest. You can find the **Events** tab in the following places:
- <applies-to>Elastic Stack: Generally available since 9.3</applies-to>: Go to the case's details page, then select the **Attachments** tab.
- <applies-to>Elastic Stack: Generally available from 9.0 to 9.2</applies-to>: Go to the case's details page.


## Add indicators

Attach [threat intelligence indicators](https://www.elastic.co/elastic/docs-builder/docs/3016/solutions/security/investigate/indicators-of-compromise) to cases to document evidence of compromise and connect your investigation to known threats. This helps you correlate alerts with threat actor tactics, track IOCs across related incidents, and build a complete picture of an attack.

## Add Timelines

Attach [Timelines](https://www.elastic.co/elastic/docs-builder/docs/3016/solutions/security/investigate/timeline) to cases to preserve your investigation context and share it with your team. When you link a Timeline, other analysts can see the exact queries, filters, and events you examined, making it easier to collaborate, hand off investigations, or document your evidence trail.
<tip>
  To insert a Timeline link in the case description, click the Timeline icon `timeline`.
</tip>