Welcome to Responses


A Response is how the Secure60 platform connects to external systems and sources.

Responses can be as simple as an email or could be an HTTP request to an API endpoint to trigger a specific action.

A Response is an Object in the Secure60 platform that is triggered by a Rule

Response Types

There are 2 main types of Response action within Secure60

Response Scope, Severity and Overrides

Scope

A response by default has a scope which indicates whether the Response should fire on a matching Rule.

The scope can be All, SIGNAL or THREAT.

This allows for Responses to only be executed for Theats for example.

Severity

A response has a severity (default INFO) which indicates whether the Response should fire based on the Severity level of a Threat.

severity valid values are: INFO, LOW, MEDIUM, HIGH.

This allows for Responses to only be executed for Theats of a specific level of importance / risk for example. This allows different teams or workflows to handle Threats of varying criticality.

Overrides

Organisations often need to be more specific about how and when a response should be executed, Common scenarios include:

Response Overrides offer a solution to all of these scenarios and more.

Once a Response has been created you may add Overrides to fine tune the execution scenarios

Example Response Overrides:

Secure60 Response Override

Response templating

Within the content of every Response we allow templating. This enables the insertion of dynamic content into the Response data that is sent.

Scenarios where this is useful include:

Response templating syntax

Within response fields we support a templating system that gives access to the data related to the rule, signal or threat that generated the response.

Key syntax details:


Email Send Mode: Real-time vs Digest

An email Response operation has a Send Mode that decides how matching threats are delivered to recipients.

Response edit panel showing the Send Mode toggle, Digest Cadence, and Bypass Severity controls in Digest mode

Real-time

Each matching threat produces one email per recipient immediately — this is the original Response behaviour, suitable for low-volume high-priority alerting (a single critical rule, a specific IoC list, etc.).

Use real-time when you want every matching threat to generate its own email — for example a named “CRITICAL vuln watch” response that pages an on-call email alias.

Digest (default for new email operations)

Matching threats are queued and delivered as a single grouped email per recipient on a schedule.

This is the right default for most Responses — particularly anything that can match tens or hundreds of threats in a short time window (vulnerability scanner output, bulk IoC matches, noisy rule groups). Without digest mode, a single vulnerability scan across a new host can fire thousands of emails to the same recipient.

Controls available in Digest mode

In digest mode the Subject, Body, and Content Type fields are hidden. The subject and body are auto-generated from the Response name and the list of findings. If you flip back to Real-time later the stored template values are restored — your customisations aren’t lost.

Example digest email showing findings grouped by source, host, severity and CVE with one row per threat

What the digest email looks like

When digest emails fire

The response-digest cron runs every hour on the hour (UTC). For each queued (response, recipient) pair, the cron decides whether to fire based on the configured cadence and the recipient’s Time Zone (set on the User record — see User Management):

If a recipient’s email address doesn’t map to a User record, or the User has no Time Zone set, scheduling falls back to UTC. See User Management → Digest Emails and Timezones for the full model.

Choosing the right mode for a Response

Goal Use
Alert one or two on-call emails about every critical detection Real-time, optionally filter severity down to HIGH on the Response itself
Notify a team about bulk vulnerability/threat-intel findings without flooding them Digest, DAILY, bypass NONE
Same as above but escalate HIGH severity immediately Digest, DAILY, bypass HIGH
Time-sensitive review cadence (e.g. every hour during an incident) Digest, HOURLY
Weekly summary for a stakeholder who doesn’t triage day-to-day Digest, WEEKLY

Back to top