Skip to content

Ticketing

Closed Beta

Ticketing is currently in closed beta. Please contact LimaCharlie to request access.

The Ticketing extension is a purpose-built SOC triage system that automatically converts LimaCharlie detections into trackable tickets with SLA enforcement, investigation tooling, and performance reporting. It is designed for high-volume environments where every detection needs to be acknowledged, investigated, classified, and resolved within measurable timeframes.

Once subscribed, all detections from the organization are automatically ingested and converted into tickets. Analysts work the ticket queue through a defined lifecycle, attach investigation evidence, and classify outcomes. SOC managers get real-time dashboards and MTTA/MTTR reports.

Enabling the Extension

Navigate to the Ticketing extension page in the marketplace. Select the organization you wish to enable it for, and select Subscribe.

On subscription, the extension automatically:

  1. Creates a detection output that forwards all detections to the ticketing system
  2. Initializes the organization with default configuration (severity mapping, SLA targets, retention)

No additional setup is required to begin receiving tickets. Detections start flowing immediately.

The full API specification is available as an OpenAPI document at ticketing.limacharlie.io/openapi.

Permissions

The ticketing extension uses LimaCharlie's existing RBAC permissions. Analysts need investigation.get to view tickets and reports, and investigation.set to update tickets, add notes, and manage investigation data. Configuration management requires org.conf.get to read and org.conf.set to update organization settings.

How Tickets Are Created

Every detection generated by D&R rules in a subscribed organization automatically becomes a ticket. The mapping is one detection to one ticket by default.

Each ticket captures from the detection:

  • Detection category (the D&R rule name)
  • Detection source (the rule namespace)
  • Detection priority (mapped to severity)
  • Sensor ID and hostname of the affected endpoint
  • Detection ID (used for deduplication)

Duplicate detections (same detection_id) are silently dropped to prevent ticket duplication.

Auto-Grouping

When auto-grouping is enabled in the organization configuration, detections that share the same category and sensor within a one-hour window are automatically grouped into a single ticket instead of creating separate tickets. This significantly reduces ticket volume for noisy rules.

When a detection is grouped into an existing ticket:

  • The ticket's detection_count increments
  • The severity may be upgraded if the new detection has a higher priority
  • An event is recorded in the ticket's audit trail

Ticket Lifecycle

Tickets follow a defined state machine that tracks progress from creation through resolution.

stateDiagram-v2
    [*] --> new
    new --> acknowledged
    new --> in_progress
    new --> escalated
    new --> closed
    new --> merged
    acknowledged --> in_progress
    acknowledged --> escalated
    acknowledged --> closed
    acknowledged --> merged
    in_progress --> escalated
    in_progress --> resolved
    in_progress --> closed
    in_progress --> merged
    escalated --> in_progress
    escalated --> resolved
    escalated --> closed
    escalated --> merged
    resolved --> closed
    resolved --> in_progress: reopen
    resolved --> merged
    closed --> [*]
    merged --> [*]

Status Definitions

Status Description
new Ticket created, not yet reviewed by an analyst
acknowledged Analyst has seen and accepted the ticket. Records MTTA timestamp
in_progress Active investigation underway
escalated Escalated to a senior analyst or specialized team
resolved Investigation complete, findings documented. Records MTTR timestamp
closed Ticket fully closed. Terminal state
merged Ticket was merged into another ticket. Terminal state

Key Timestamps

  • created_at -- Set when the ticket is created from a detection
  • acknowledged_at -- Set on first transition to acknowledged (used for MTTA calculation)
  • resolved_at -- Set on first transition to resolved (used for MTTR calculation)
  • closed_at -- Set on transition to closed

Severity and SLA

Severity Mapping

LimaCharlie detection priorities (integer 0--10) are mapped to four severity levels. The thresholds are configurable per organization.

Severity Default Priority Range Description
critical 8--10 Requires immediate response
high 5--7 Urgent, handle promptly
medium 3--4 Standard priority
low 0--2 Informational, handle when available

SLA Targets

Each severity level has two SLA targets:

  • MTTA (Mean Time To Acknowledge) -- Maximum time from ticket creation to first acknowledgement
  • MTTR (Mean Time To Resolve) -- Maximum time from ticket creation to resolution

Default SLA targets:

Severity MTTA Target MTTR Target
critical 15 minutes 4 hours
high 15 minutes 12 hours
medium 1 hour 24 hours
low 100 minutes ~47 hours

SLA breaches are tracked in the dashboard and reporting views.

Configuration

Each organization has its own configuration that controls severity mapping, SLA targets, retention, and optional features.

Configuration Options

Setting Type Default Description
severity_mapping.critical_min int 8 Minimum detection priority for critical severity
severity_mapping.high_min int 5 Minimum detection priority for high severity
severity_mapping.medium_min int 3 Minimum detection priority for medium severity
sla_config.critical.mtta_minutes int 15 MTTA target for critical tickets (minutes)
sla_config.critical.mttr_minutes int 240 MTTR target for critical tickets (minutes)
sla_config.high.mtta_minutes int 15 MTTA target for high tickets (minutes)
sla_config.high.mttr_minutes int 720 MTTR target for high tickets (minutes)
sla_config.medium.mtta_minutes int 60 MTTA target for medium tickets (minutes)
sla_config.medium.mttr_minutes int 1440 MTTR target for medium tickets (minutes)
sla_config.low.mtta_minutes int 100 MTTA target for low tickets (minutes)
sla_config.low.mttr_minutes int 2800 MTTR target for low tickets (minutes)
retention_days int 90 Days to retain resolved/closed tickets before archival
auto_close_resolved_after_days int 7 Automatically close resolved tickets after this many days
auto_grouping_enabled bool false Enable auto-grouping of related detections into single tickets

Get Configuration

curl -s -X GET \
  "https://ticketing.limacharlie.io/api/v1/config/YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT"
limacharlie ticket config-get

Update Configuration

curl -s -X PUT \
  "https://ticketing.limacharlie.io/api/v1/config/YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT" \
  -H "Content-Type: application/json" \
  -d '{
    "severity_mapping": {
      "critical_min": 8,
      "high_min": 5,
      "medium_min": 3
    },
    "sla_config": {
      "critical": {"mtta_minutes": 15, "mttr_minutes": 240},
      "high": {"mtta_minutes": 30, "mttr_minutes": 480},
      "medium": {"mtta_minutes": 60, "mttr_minutes": 1440},
      "low": {"mtta_minutes": 120, "mttr_minutes": 2880}
    },
    "retention_days": 90,
    "auto_close_resolved_after_days": 7,
    "auto_grouping_enabled": true
  }'
limacharlie ticket config-set --input-file config.yaml

Working with Tickets

Creating a Ticket

While detections are automatically converted to tickets, you can also create tickets manually via the CLI or SDK. This is useful for ad-hoc investigations or when integrating with external detection sources.

# Create from a detection ID
limacharlie ticket create --detection-id DETECTION_ID

# Create with full metadata
limacharlie ticket create --detection-id DETECTION_ID \
    --detection-cat "lateral_movement" --severity high \
    --sensor-id SENSOR_ID --hostname DESKTOP-001
from limacharlie.sdk.ticketing import Ticketing
from limacharlie.sdk.organization import Organization
from limacharlie.client import Client

client = Client(oid="YOUR_OID")
org = Organization(client)
t = Ticketing(org)

result = t.create_ticket(
    "DETECTION_ID",
    detection_cat="lateral_movement",
    severity="high",
    sensor_id="SENSOR_ID",
    hostname="DESKTOP-001",
)
print(result["ticket_number"])

Listing Tickets

Query the ticket queue with filtering, sorting, and pagination. Supports cross-organization queries for multi-tenant SOCs.

# List open tickets, most recent first
curl -s -X GET \
  "https://ticketing.limacharlie.io/api/v1/tickets?oids=YOUR_OID&status=new,acknowledged&sort=created_at&order=desc&page_size=50" \
  -H "Authorization: Bearer $LC_JWT"
limacharlie ticket list --status new --status acknowledged --sort created_at --order desc
limacharlie ticket list --severity critical --severity high --search "mimikatz"

Available query parameters:

Parameter Description
oids Organization IDs (comma-separated, required)
status Filter by status (comma-separated: new, acknowledged, in_progress, escalated, resolved, closed)
severity Filter by severity (comma-separated: critical, high, medium, low)
classification Filter by classification (comma-separated: pending, true_positive, false_positive)
assignee Filter by assigned analyst email
search Search text (matches against detection category and hostname)
tag Filter by tags (comma-separated, AND logic: all specified tags must be present)
sort Sort field (created_at, severity, ticket_number)
order Sort order (asc, desc)
page_size Page size, 1--200 (default 50)
page_token Pagination token from previous response

Getting a Ticket

curl -s -X GET \
  "https://ticketing.limacharlie.io/api/v1/tickets/42?oid=YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT"
limacharlie ticket get --id 42

Returns the full ticket including the event timeline (audit trail of all changes).

Exporting a Ticket

Export a ticket with all its components (ticket record, event timeline, detections, entities, telemetry, and artifacts) in a single JSON object.

# Export as JSON to stdout
limacharlie ticket export --id 42

# Export with full data (detection records, telemetry events,
# artifact binaries) to a local directory
limacharlie ticket export --id 42 --with-data ./ticket-export
t = Ticketing(org)
data = t.export_ticket(42)
# data contains: ticket, events, detections, entities, telemetry, artifacts

Without --with-data, the combined metadata JSON is printed to stdout. With --with-data <DIR>, the command creates a directory containing:

  • ticket.json -- ticket record, event timeline, entities
  • detections/ -- one JSON file per linked detection (fetched from Insight)
  • telemetry/ -- one JSON file per linked telemetry event (fetched by atom+sid)
  • artifacts/ -- downloaded artifact binaries

Fetches that fail (e.g. expired or retained data) emit a warning and are skipped.

Updating a Ticket

curl -s -X PATCH \
  "https://ticketing.limacharlie.io/api/v1/tickets/42?oid=YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT" \
  -H "Content-Type: application/json" \
  -d '{
    "status": "acknowledged",
    "assignee": "analyst@example.com"
  }'
limacharlie ticket update --id 42 --status acknowledged --assignee analyst@example.com
limacharlie ticket update --id 42 --status resolved \
    --classification true_positive --conclusion "Contained via network isolation"

Updatable fields:

Field Type Description
status string New status (must be a valid transition)
assignee string Analyst to assign the ticket to
classification string true_positive, false_positive, or pending
escalation_group string Team or group to escalate to
investigation_id string Link to a LimaCharlie Investigation
summary string Investigation summary narrative (max 8192 characters)
conclusion string Final conclusion (max 8192 characters)
tags string[] Arbitrary tags for categorization (see Tags)

Bulk Updates

Update multiple tickets at once, useful for bulk-closing false positives or reassigning workload.

curl -s -X POST \
  "https://ticketing.limacharlie.io/api/v1/tickets/bulk-update" \
  -H "Authorization: Bearer $LC_JWT" \
  -H "Content-Type: application/json" \
  -d '{
    "oid": "YOUR_OID",
    "ticket_numbers": [1, 2, 3],
    "update": {
      "status": "closed",
      "classification": "false_positive"
    }
  }'
limacharlie ticket bulk-update --numbers 1,2,3 \
    --status closed --classification false_positive
limacharlie ticket bulk-update --input-file ticket_numbers.txt --status resolved

Up to 200 tickets can be updated in a single bulk operation.

Tags

Tickets support arbitrary string tags for custom categorization and workflow organization (e.g., "phishing", "ransomware", "shift-b").

Constraints:

Constraint Value
Max tag length 128 characters
Max tags per ticket 50
Case sensitivity Case-preserved, case-insensitive deduplication
Allowed characters Any printable character (no control characters)

Setting Tags

Tags are set by replacing the full tag array on the ticket.

curl -s -X PATCH \
  "https://ticketing.limacharlie.io/api/v1/tickets/42?oid=YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT" \
  -H "Content-Type: application/json" \
  -d '{"tags": ["phishing", "urgent"]}'
limacharlie ticket update --id 42 --tag phishing --tag urgent --oid YOUR_OID
t = Ticketing(org)
t.update_ticket(42, tags=["phishing", "urgent"])

Tag Management CLI

The CLI provides convenience commands for adding or removing individual tags without replacing the full array.

# Replace all tags
limacharlie ticket tag set --id 42 --tag phishing --tag urgent --oid YOUR_OID

# Add a tag (preserves existing tags)
limacharlie ticket tag add --id 42 --tag new-label --oid YOUR_OID

# Remove a tag
limacharlie ticket tag remove --id 42 --tag old-label --oid YOUR_OID

Filtering by Tag

Filter the ticket list to only tickets that have all specified tags (AND logic).

curl -s -X GET \
  "https://ticketing.limacharlie.io/api/v1/tickets?oids=YOUR_OID&tag=phishing,urgent" \
  -H "Authorization: Bearer $LC_JWT"
limacharlie ticket list --tag phishing --tag urgent --oid YOUR_OID
t = Ticketing(org)
t.list_tickets(tag=["phishing", "urgent"])

Tag changes create a tags_updated event in the ticket's audit trail with old and new tag values in the event metadata.

Classification

Tickets are classified to track detection accuracy. Classification can be set at any status.

Classification Description
pending Not yet classified (default)
true_positive Confirmed malicious or policy-violating activity
false_positive Benign activity incorrectly flagged

Classification rates are tracked in reports and feed into detection rule tuning.

Detections

Each ticket is created from a detection and can have additional detections linked to it (for example, when auto-grouping is enabled or when manually associating related detections).

curl -s -X POST \
  "https://ticketing.limacharlie.io/api/v1/tickets/42/detections?oid=YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT" \
  -H "Content-Type: application/json" \
  -d '{
    "detection_id": "DETECTION_ID",
    "detection_cat": "lateral-movement",
    "detection_source": "dr-general",
    "detection_priority": 7,
    "sensor_id": "550e8400-e29b-41d4-a716-446655440000",
    "hostname": "DESKTOP-001"
  }'
limacharlie ticket detection add --ticket 42 \
    --detection-id DETECTION_ID --detection-cat lateral-movement

List Linked Detections

curl -s -X GET \
  "https://ticketing.limacharlie.io/api/v1/tickets/42/detections?oid=YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT"
limacharlie ticket detection list --ticket 42
curl -s -X DELETE \
  "https://ticketing.limacharlie.io/api/v1/tickets/42/detections/DETECTION_ID?oid=YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT"
limacharlie ticket detection remove --ticket 42 --detection-id DETECTION_ID

Investigation

Each ticket supports structured investigation evidence that creates a documented chain of analysis.

Entities (IOCs)

Attach indicators of compromise and other artifacts of interest to a ticket.

# Add an entity
curl -s -X POST \
  "https://ticketing.limacharlie.io/api/v1/tickets/42/entities?oid=YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT" \
  -H "Content-Type: application/json" \
  -d '{
    "entity_type": "ip",
    "entity_value": "203.0.113.50",
    "name": "Suspected C2 Server",
    "verdict": "malicious",
    "context": "Outbound connections observed from compromised host"
  }'
limacharlie ticket entity add --ticket 42 \
    --type ip --value "203.0.113.50" --verdict malicious \
    --context "Outbound connections observed from compromised host"
limacharlie ticket entity list --ticket 42
limacharlie ticket entity update --ticket 42 --entity-id ENTITY_ID --verdict benign
limacharlie ticket entity remove --ticket 42 --entity-id ENTITY_ID

Supported entity types: ip, domain, hash, url, user, email, file, process, registry, other

Verdict values: malicious, suspicious, benign, unknown, informational

Find all tickets containing a specific indicator. This is critical for understanding the blast radius of an IOC across the organization.

curl -s -X GET \
  "https://ticketing.limacharlie.io/api/v1/entities/search?oids=YOUR_OID&entity_type=ip&entity_value=203.0.113.50" \
  -H "Authorization: Bearer $LC_JWT"
limacharlie ticket entity search --type ip --value "203.0.113.50"

Telemetry References

Link specific LimaCharlie events to the ticket by their atom and sensor ID. This creates a direct reference back to the raw telemetry for forensic review.

curl -s -X POST \
  "https://ticketing.limacharlie.io/api/v1/tickets/42/telemetry?oid=YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT" \
  -H "Content-Type: application/json" \
  -d '{
    "atom": "abc123def456",
    "sid": "550e8400-e29b-41d4-a716-446655440000",
    "event_type": "NEW_PROCESS",
    "event_summary": "powershell.exe launched with encoded command",
    "verdict": "malicious",
    "relevance": "Initial payload execution"
  }'
limacharlie ticket telemetry add --ticket 42 \
    --atom abc123def456 --sid SENSOR_ID \
    --event-type NEW_PROCESS --verdict malicious
limacharlie ticket telemetry list --ticket 42

Artifacts

Attach references to forensic artifacts such as memory dumps, packet captures, or disk images.

curl -s -X POST \
  "https://ticketing.limacharlie.io/api/v1/tickets/42/artifacts?oid=YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT" \
  -H "Content-Type: application/json" \
  -d '{
    "artifact_type": "memory_dump",
    "description": "Full memory dump of PID 4832 from DESKTOP-001",
    "verdict": "malicious"
  }'
limacharlie ticket artifact add --ticket 42 \
    --type memory_dump --description "Full memory dump of PID 4832" --verdict malicious
limacharlie ticket artifact list --ticket 42

Notes

Add structured notes to document analysis, remediation steps, and handoff information.

curl -s -X POST \
  "https://ticketing.limacharlie.io/api/v1/tickets/42/notes?oid=YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT" \
  -H "Content-Type: application/json" \
  -d '{
    "content": "Confirmed lateral movement to DESKTOP-002 via PsExec. Isolating both endpoints.",
    "note_type": "analysis"
  }'
limacharlie ticket add-note --id 42 --type analysis \
    --content "Confirmed lateral movement to DESKTOP-002 via PsExec."
echo "Handoff notes" | limacharlie ticket add-note --id 42 --type handoff

Note types: general, analysis, remediation, escalation, handoff

Ticket Merging

Related tickets can be merged when multiple detections are part of the same incident. Merging consolidates the investigation into a single primary ticket.

curl -s -X POST \
  "https://ticketing.limacharlie.io/api/v1/tickets/merge" \
  -H "Authorization: Bearer $LC_JWT" \
  -H "Content-Type: application/json" \
  -d '{
    "oid": "YOUR_OID",
    "target_ticket_number": 10,
    "source_ticket_numbers": [11, 12]
  }'
limacharlie ticket merge --target 10 --sources 11,12

Up to 20 source tickets can be merged at once.

When tickets are merged:

  • The target ticket inherits all detections from source tickets
  • Merged tickets transition to the merged status (terminal)
  • The merged_into_ticket_id field on merged tickets references the primary ticket
  • Merge events are recorded in the audit trail of all affected tickets

Escalation

Tickets can be escalated to specialized teams or senior analysts by setting the escalation_group field and transitioning to escalated status.

curl -s -X PATCH \
  "https://ticketing.limacharlie.io/api/v1/tickets/42?oid=YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT" \
  -H "Content-Type: application/json" \
  -d '{
    "status": "escalated",
    "escalation_group": "tier-3-malware"
  }'
limacharlie ticket update --id 42 --status escalated \
    --escalation-group tier-3-malware

Tickets can be filtered by escalation_group in the listing endpoint. Escalation rates are tracked in reports.

Assignees

List all unique assignee emails across your accessible organizations. Useful for populating assignment dropdowns.

curl -s -X GET \
  "https://ticketing.limacharlie.io/api/v1/assignees" \
  -H "Authorization: Bearer $LC_JWT"
limacharlie ticket assignees

D&R Rule Integration

The ticketing extension exposes request handlers that can be used in D&R rule response actions. This enables automated ticket management based on detection logic.

Create a Ticket Manually

Create a ticket from a D&R rule response action, useful for rules that need tickets for specific scenarios beyond the default auto-ticketing.

respond:
  - action: extension request
    extension name: ext-ticketing
    extension action: create_ticket
    extension request:
      detection_cat: '{{ .cat }}'
      detection_source: manual
      detection_priority: 5
      sensor_id: '{{ .routing.sid }}'
      hostname: '{{ .routing.hostname }}'

Query Open Ticket Count

Use as a condition in D&R rules to trigger actions based on ticket volume. For example, escalate when a sensor has too many open tickets.

detect:
  event: detection
  op: extension
  extension name: ext-ticketing
  extension action: get_ticket_count
  extension request:
    sensor_id: '{{ .routing.sid }}'
    status: new,acknowledged,in_progress
  path: count
  value: 10
  op: is greater than

Dashboard

The dashboard provides real-time visibility into the ticket queue.

curl -s -X GET \
  "https://ticketing.limacharlie.io/api/v1/dashboard/counts?oids=YOUR_OID" \
  -H "Authorization: Bearer $LC_JWT"
limacharlie ticket dashboard

Returns:

  • Ticket counts by status
  • Ticket counts by severity
  • SLA breach counts (tickets exceeding MTTA or MTTR targets)

Reporting

SOC performance reports provide aggregated metrics for measuring team effectiveness and detection quality.

Summary Report

curl -s -X GET \
  "https://ticketing.limacharlie.io/api/v1/reports/summary?oids=YOUR_OID&from=2025-01-01T00:00:00Z&to=2025-02-01T00:00:00Z" \
  -H "Authorization: Bearer $LC_JWT"
limacharlie ticket report \
    --from 2025-01-01T00:00:00Z --to 2025-02-01T00:00:00Z
limacharlie ticket report \
    --from 2025-01-01T00:00:00Z --to 2025-02-01T00:00:00Z --group-by severity

Query parameters:

Parameter Description
oids Organization IDs (comma-separated)
from Start of reporting period (RFC 3339 timestamp)
to End of reporting period (RFC 3339 timestamp)

The summary report includes per-organization and aggregate metrics:

  • MTTA -- Average and median time to acknowledge, with SLA compliance
  • MTTR -- Average and median time to resolve, with SLA compliance
  • Volume -- Total ticket counts, true positives, and false positives
  • Classification rates -- True positive vs false positive percentages

Webhook Notifications

The extension automatically sends webhook notifications for ticket events via LimaCharlie's extension hooks mechanism. These are delivered as gzip-compressed HTTP POST requests to the organization's configured webhook adapter endpoint.

Events forwarded via webhook include: ticket creation, status changes, assignments, escalations, classifications, notes, and investigation updates.

Each webhook payload includes:

  • action -- The event type (e.g. created, status_changed, assigned)
  • ticket_id -- The affected ticket ID
  • ticket_number -- The human-readable ticket number
  • oid -- The organization ID
  • by -- The user who performed the action
  • ts -- Timestamp of the event
  • metadata -- Event-specific details (e.g. old/new status values)

Audit Trail

Every action on a ticket is recorded as an immutable event in the ticket's timeline. This provides a complete chain of custody for compliance and review.

Tracked event types:

Event Description
created Ticket created from detection
acknowledged Ticket first acknowledged
status_changed Status transition
assigned Analyst assigned
escalated Ticket escalated to a group
classified True positive / false positive classification set
resolved Ticket resolved
closed Ticket closed
reopened Resolved ticket reopened
note_added Note added to ticket
investigation_linked LimaCharlie investigation linked
detection_added Detection grouped into ticket
detection_removed Detection removed from ticket
severity_upgraded Severity increased due to higher-priority detection
merged_into Ticket merged into another ticket
merged_from Ticket received merge from another ticket
entity_added IOC/entity attached
entity_updated Entity verdict or context updated
entity_removed Entity removed
telemetry_added Telemetry reference linked
telemetry_updated Telemetry metadata updated
telemetry_removed Telemetry reference removed
artifact_added Forensic artifact attached
artifact_removed Artifact removed
tags_updated Tags modified (old and new values in metadata)
summary_updated Investigation summary edited
conclusion_updated Investigation conclusion edited

Data Retention

Resolved and closed tickets are retained for the configured retention_days (default 90 days). After the retention period, tickets are archived to long-term storage and removed from the active ticket store.

Archived data is retained for 2 years in long-term storage for compliance and historical reporting.

Unsubscribing

Unsubscribing from the extension removes the detection output and deletes all ticket data for the organization. This action is irreversible.


See Also