Product Identity
ZelXDR is an AI-powered extended detection and response platform designed to unify detection, investigation, triage, incident handling, threat hunting, endpoint visibility, telemetry analysis, response orchestration, governance, and reporting inside one premium security operations experience.
ZelXDR is not just an alert console. It is a full cyber operations command platform where defenders can:
detect threats
understand risk
investigate deeply
correlate signals
hunt proactively
take response actions
generate executive-ready output
operate with AI assistance through AINA
Core Platform Objective
The platform must solve these major operational problems:
too many alerts with too little context
fragmented tools across endpoint, identity, cloud, network, email, and threat intelligence
slow triage
slow incident understanding
weak visibility into entity relationships
inconsistent reporting
weak governance around detections, tuning, exceptions, and integrations
difficulty operationalizing AI in real SOC workflows
ZelXDR should give users one operational surface where signals become decisions and decisions become action.
Primary User Types
Analyst
Consumes alerts, events, anomalies, entity pivots, IOC searches, and investigations.
Needs fast triage, good context, AI support, and clear next actions.
Threat Hunter
Uses hunt workspace, queries, saved hunts, hunt templates, IOC and entity pivots, historical search, baselines, and anomalies.
Needs speed, flexibility, and reusable logic.
Incident Responder
Needs incident summaries, blast radius, linked evidence, endpoint state, containment actions, case workflows, and executive-ready reporting.
Detection Engineer
Builds and tunes rules, correlation logic, behavioral detections, scheduled rules, severity mappings, threat scoring, MITRE mappings, detection packs, QA, and change logs.
SOC Lead / Manager
Needs dashboards, workload visibility, SLA views, reporting, trend summaries, analyst pressure, and executive communication support.
Administrator
Manages users, RBAC, teams, groups, approvals, secrets, certificates, retention, backups, audit logs, settings, AI configuration, and integrations.
Executive / Leadership
Consumes executive summaries, business impact, board-level risk reporting, incident briefings, and business-priority exposure views.
Platform Navigation Model
ZelXDR should be organized into these primary navigation domains:
Command Center
Incidents
Alerts
Investigations
Cases
Detections
Threat Hunt
Telemetry
Assets
Endpoints
Identity
Cloud
Network
Email Security
Threat Intelligence
Response and Automation
AINA
Reports
Dashboards
Search
Knowledge Center
Integrations
Tenants
Administration
System
Settings
Each domain must feel distinct but interconnected.
Command Center
The Command Center is the high-level operational hub.
It should include:
SOC Overview
Executive Overview
Live Activity
Open Risk Snapshot
Detection Health
Incident SLA
Analyst Workload
AINA Highlights
Recently Contained Threats
Threat Graph
Zelfire page if used as an integration fabric
Command Center should answer:
What is happening now
What is most urgent
What is degrading
What needs action first
What is the AI saying
What is the business impact
Incidents Module
This module manages incident-level workflows.
Required capabilities:
open incidents
critical incidents
major incidents
escalated incidents
merged incidents
closed incidents
incident timeline
SLA tracking
post-incident reviews
related incidents
linked evidence
linked alerts
linked entities
linked vulnerabilities
linked anomalies
linked hunts
linked cases
containment readiness
business impact view
blast radius view
executive summary generation
incident note generation
assignment
status changes
priority changes
merge and split logic
AI incident understanding
Incident details should show:
incident title
severity
confidence
status
owner
created time
updated time
affected entities
linked evidence
timeline of events
recommended next actions
AI summary
AI explainability
blast radius
related objects
Alerts Module
This is the entry point for large alert volume.
Required capabilities:
live alert feed
correlated alerts
unassigned alerts
acknowledged alerts
escalated alerts
suppressed alerts
duplicate alerts
closed alerts
exceptions
search
filtering
bulk actions
AI triage
duplicate detection
entity clustering
alert-to-incident promotion
false positive analysis
Alert details should show:
alert title
source
severity
status
confidence
linked rule
linked tactic
linked entities
linked evidence
AI summary
duplicate likelihood
escalation candidate state
analyst actions
Investigations Module
This is the deep operational workspace for evidence and reasoning.
Required capabilities:
investigation queue
my investigations
entity timeline
process tree view
user session view
evidence locker
notes
tasks
related events
related incidents
related assets
timeline view
AI reasoning
manual and AI enrichment
linked reports
linked case handoff
Investigation objects should support:
open
edit
assign
tag
link evidence
link entities
link cases
link incidents
generate note
generate executive summary
close
escalate
Cases Module
Case management must support:
open cases
in progress cases
awaiting approval
awaiting response
closed cases
case templates
case collaboration
attachments
legal hold
lessons learned
Case functionality:
owner assignment
priority
status
approval steps
response tracking
attachments
linked investigations
linked incidents
linked notes
tasks
comments
watchers
subtasks
history
timeline
AI summaries
case recommendations
exportable case reports
Detections Module
This is the full detection engineering and governance center.
Required sections:
Detection Rules
Correlation Rules
Behavioral Detections
Analytics Rules
Scheduled Rules
Threat Scoring Logic
Severity Mapping
MITRE Mappings
Detection Packs
Detection QA
Rule Tuning
Rule Exceptions
Detection Change Log
This area must support:
authoring
editing
cloning
enabling
disabling
testing
simulation
tuning
version history
change tracking
approval flows
QA workflows
mapping to ATT&CK
linking to playbooks
performance measurement
noise tracking
false positive tracking
coverage gap tracking
Threat Hunt Module
This module must feel like a full proactive hunt platform.
Required sections:
Hunt Workspace
Query Builder
Saved Hunts
Hunt Templates
IOC Search
Entity Pivot Search
Historical Search
Baselines
Anomalies
Hunt Results
Hunt Notes
Core capabilities:
hypothesis management
query authoring
saved logic
reusable templates
IOC enrichment and lookup
entity pivots
historical search
baseline comparison
anomaly review
cluster review
hunt result scoring
note writing
escalation to incident or case
AI hunt suggestions
AI pivot suggestions
AI summary and action generation
Telemetry Module
This module manages raw and processed security data.
Required sections:
Event Explorer
Raw Logs
Normalized Events
Enriched Events
Parser Health
Collector Health
Ingestion Pipelines
Event Replay
Data Latency
Retention Status
Required capabilities:
live stream
historical search
raw payload viewing
normalized event browsing
schema awareness
field completeness
parser status
collector status
replay controls
latency analysis
duplicate detection
malformed record review
event pivots to alerts, incidents, hunts, entities, and rules
Assets Module
Asset visibility and exposure must be first-class.
Required sections:
Asset Inventory
Critical Assets
High-Risk Assets
New Assets
Unmanaged Assets
Asset Relationships
Risk Scoring
Owners and Tags
Asset Groups
Exposure View
Capabilities:
asset discovery
criticality scoring
business ownership
tagging
relationship graph
grouping
identity linkage
vulnerability linkage
incident linkage
threat history
policy coverage
environment tagging
risk prioritization
Endpoints Module
Required sections:
Agent Management
Agent Downloads
Agent Groups
Agent Policies
Endpoint Activity
Endpoint Timeline
File Integrity
Vulnerability View
Isolation Actions
Response History
Health and Heartbeat
Version Compliance
Capabilities:
endpoint enrollment
health monitoring
policy sync
timeline history
heartbeat visibility
version tracking
group assignment
quarantine/isolation
recovery
remote state awareness
agent health
tamper signals
vulnerability linkage
response history
Identity Module
Required sections:
User Risk
Sign-In Activity
Impossible Travel
Privileged Accounts
MFA Coverage
Account Lockouts
Suspicious Sessions
Lateral Movement Signals
Entitlement Changes
Service Accounts
Identity Timeline
Capabilities:
identity-centric risk scoring
privileged identity visibility
session history
authentication anomalies
role and entitlement changes
linked endpoint activity
linked cloud activity
impossible travel logic
service account behavior
identity-to-incident linkage
Cloud Module
Required sections:
Cloud Accounts
Subscriptions and Projects
Workloads
Cloud Activity
Cloud Detections
Resource Exposure
Storage Exposure
IAM Changes
Cloud Timeline
Cloud Response Actions
Cloud Posture Summary
Capabilities:
cloud activity visibility
multi-cloud support
resource relationships
identity and access linkage
storage exposure tracking
workload security context
cloud incident linkage
cloud posture visibility
response action support
cross-account or cross-project analysis
Network Module
Required sections:
Network Alerts
Connections
DNS Activity
East-West Traffic
Firewall Events
IDS and NDR Signals
VPN Activity
Blocked Traffic
Beaconing Detection
Network Timeline
Network Maps
Capabilities:
flow analysis
DNS intelligence
beaconing visibility
east-west risk
blocked traffic review
network alert linkage
network-to-endpoint and network-to-identity correlation
map view
threat route visualization if applicable
Email Security Module
Required sections:
Phishing Incidents
Malicious Attachments
Malicious Links
User Reported Emails
Quarantined Messages
Sender Intelligence
Mailbox Abuse
Executive Impersonation
Email Timeline
Capabilities:
email event review
message-level detail
user-report handling
sender reputation
attachment and link analysis
mailbox abuse investigation
executive impersonation tracking
incident creation from email events
Threat Intelligence Module
Required sections:
IOC Feeds
Watchlists
Indicators
Malware Families
Threat Actors
Campaigns
TTP Library
Intel Sources
Feed Health
Enrichment History
Custom Intelligence
Capabilities:
indicator ingestion
threat actor mapping
malware family linkage
campaign modeling
watchlist management
feed health
enrichment history
custom intel entry
internal and external feed blending
Response and Automation Module
Required sections:
Playbooks
Active Response
Approval Queue
Containment Actions
Host Isolation
User Disable Actions
IP and Domain Blocking
Ticketing Actions
Automation Logs
Rollback History
Response Templates
Capabilities:
manual response
assisted response
playbook execution
response approval gating
rollback support
action history
AI-recommended response
safe mode execution
containment workflows
ticketing integration
AINA Module
AINA is the AI layer across the entire platform.
Required sections:
AI Triage
AI Incident Summary
AI Correlation Reasoning
AI Next Best Action
AI Root Cause View
Ask AINA
Prompt Templates
Confidence and Explainability
AI Audit Log
AI Output Review
AINA must support:
triage
incident summarization
root cause reasoning
blast radius estimation
duplicate analysis
false positive review
MITRE suggestions
executive brief generation
analyst note generation
case summary writing
report narrative generation
recommendation engine
uncertainty explanation
model selection from settings
real provider configuration
audit trail
safe server-side usage
Reports Module
Reports must support:
executive reports
SOC reports
incident reports
detection reports
hunt reports
response reports
compliance reports
MTTR and MTTD
scheduled reports
export center
report templates
Branding support must include:
logo
title
subtitle
classification label
footer
watermark
report theme
cover page
brand colors
customer-safe mode
executive-ready mode
internal mode
Dashboards Module
Required sections:
Executive Dashboard
SOC Dashboard
Detection Dashboard
Incident Dashboard
Endpoint Dashboard
Identity Dashboard
Cloud Dashboard
Network Dashboard
Threat Intel Dashboard
Custom Dashboards
Capabilities:
save custom layouts
role-aware dashboards
widget pinning
time filters
business unit filters
tenant filters
AI summary overlay
export view
Search Module
Required sections:
Global Search
Search Alerts
Search Incidents
Search Entities
Search IOCs
Search Users
Search Assets
Search Saved Queries
Capabilities:
cross-domain search
faceted filtering
saved searches
recent searches
search pivots
AI query suggestions
ZelC query integration
Knowledge Center Module
Required sections:
Runbooks
Investigation Guides
Response Guides
Detection Library
MITRE Knowledge
Analyst Notes
Internal Playbooks
Lessons Learned
FAQ
Capabilities:
knowledge article creation
search
versioning
link to incidents and cases
AI-assisted summary
AI-assisted article drafting
team sharing
Integrations Module
Must support:
Data Sources
Connectors
API Keys
Webhooks
Syslog Sources
Cloud Connectors
Identity Connectors
Email Connectors
Ticketing Connectors
SOAR Integrations
Third-Party Actions
Integration families should include:
API
webhook
cloud platforms
endpoint tools
identity tools
SIEM
ticketing
threat intel
network tools
email tools
custom enterprise systems
Each connector should support:
add
edit
configure
test connection
sync now
replay
rotate secret
disable
delete
clone
logs
mapping
health
owner
Tenants Module
Required sections:
Tenant Overview
Tenant Settings
Tenant Branding
Tenant Users
Tenant Roles
Tenant Data Sources
Tenant Policies
Tenant Quotas
Tenant Audit Logs
Capabilities:
multi-tenant isolation
tenant branding
tenant-specific rules
tenant-specific integrations
tenant policies
tenant user scopes
tenant quotas
Administration Module
Required sections:
Users
Roles and RBAC
Teams
Groups
Notifications
Tags and Labels
Approvals
Secrets Management
Certificates
Data Retention
Backup and Restore
Audit Logs
Capabilities:
user lifecycle
RBAC
approvals
secret rotation
certificate tracking
retention management
backup/restore
audit logging
notification routing
group and team organization
System Module
Required sections:
Cluster Health
Services
Node Status
Queue Health
Index Health
Storage Health
Upgrade Center
License
Diagnostics
Maintenance Mode
Capabilities:
system health
service status
queue monitoring
license status
upgrade workflow
diagnostics
maintenance control
Settings Module
Required sections:
General Settings
UI Preferences
Time Zone and Locale
Severity Colors
Default Views
Notification Preferences
API Preferences
Branding
Sidebar Preferences
AINA settings must also support:
provider
API key
allowed models
default model
capability toggles
test connection
usage status
latency
model health
ZelC Query Module
ZelC Query should be a premium editor-terminal experience:
left Monaco-style editor
right live terminal simulation
templates
sample file loading
saved scripts
execution history
realistic simulated output
different output each run
component targeting
safe sandbox behavior
ZelC templates for operations workflows
Threat Graph Module
Threat Graph under Command Center should be a large animated map experience:
vector map
animated routes
origin/destination pulses
heat zones
wallboard mode
live feed
campaign highlights
region focus
SOC center visual design
Product Fabric Page
Zelfire page should provide:
product family boxes
clickable product cards
API config
webhook config
auth
routes
mapping
logs
audit
test event
secret rotation
product-to-product routing
Design Language
Across ZelXDR:
premium dark
high contrast but elegant
warm action buttons
glass-like panels where suitable
motion used subtly
dense but readable
strong hierarchy
distinct visual identity per page
no repetitive generic layouts
each page should feel purpose-built
Workflow Principles
Every page should help users move from:
signal to context
context to decision
decision to action
action to documentation
documentation to learning
learning to platform improvement
Security and Governance Expectations
ZelXDR must include:
RBAC
approvals
audit trails
change history
AI audit log
report access control
customer-safe reporting controls
secret and cert visibility
retention controls
backup and restore
role-aware page visibility
Object Relationship Model
The platform must maintain relationships between:
alerts
incidents
investigations
cases
entities
IOCs
assets
endpoints
vulnerabilities
anomalies
hunts
events
detections
rules
reports
notes
playbooks
integrations
users
This relationship fabric is one of ZelXDR’s biggest strengths.
AI Requirements
AINA must never feel like a toy.
It must behave like an operational security intelligence layer.
It should always provide:
summary
reasoning
confidence
uncertainty
next steps
action options
executive communication support
analyst communication support
Reporting Requirements
Every major platform domain should be reportable.
Reports must support:
operational audience
executive audience
customer-safe audience
internal governance audience
compliance audience
Product Character
ZelXDR should feel:
premium
serious
operational
AI-assisted
investigation-ready
boardroom-ready
SOC-ready
engineer-friendly
hunt-friendly
beautiful enough for display
useful enough for daily operations
Minimum “Wow” Factor Requirement
The platform must not look like a generic admin panel.
Every core page should feel like a premium specialized command surface.
Pages must be visually distinct from one another.
Top status sections must not be repetitive clones.
The system should feel designed, not assembled.
Key Promise of ZelXDR
ZelXDR is a platform where:
signals become context
context becomes decisions
decisions become response
response becomes intelligence
intelligence becomes reporting
reporting becomes trust