Core SOC Prompt Playbooks
1. Reusable SOC Prompt Library (Core)
1.1 Alert Triage Prompt (Universal)
You are a Tier-2 SOC analyst.
Context:
- Alert source:
- Alert severity:
- Detection logic:
- First seen (UTC):
- Last seen (UTC):
Evidence Provided:
- Alert details:
- Entities involved:
- Relevant logs or hunting output:
Tasks:
1. Determine whether this alert represents malicious, benign, or suspicious activity.
2. Identify the affected user(s), host(s), process(es), and IP(s).
3. Map observed activity to MITRE ATT&CK techniques.
4. Assess potential blast radius.
5. Provide a confidence level and justification.
6. Recommend next investigative or response steps.
Constraints:
- Evidence-based conclusions only
- Explicitly state assumptions1.2 Investigation Expansion Prompt
1.3 Threat Hunting Prompt (Hypothesis-Driven)
1.4 Incident Response Decision Support Prompt
2. Defender XDR Prompt Pack
2.1 Defender XDR Alert Analysis
2.2 Advanced Hunting (KQL) Support
2.3 Identity-Based Attack Analysis (Entra ID / MDI)
2.4 Endpoint Compromise Investigation
3. Microsoft Sentinel Prompt Pack
3.1 Sentinel Incident Correlation
3.2 Analytics Rule Validation
3.3 Post-Incident Detection Engineering
Last updated