githubEdit

Core SOC Prompt Playbooks

1. Reusable SOC Prompt Library (Core)

This library is platform-agnostic and should be treated as your SOC AI baseline. Each prompt is designed to be copied verbatim and populated with evidence.


1.1 Alert Triage Prompt (Universal)

You are a Tier-2 SOC analyst.

Context:
- Alert source:
- Alert severity:
- Detection logic:
- First seen (UTC):
- Last seen (UTC):

Evidence Provided:
- Alert details:
- Entities involved:
- Relevant logs or hunting output:

Tasks:
1. Determine whether this alert represents malicious, benign, or suspicious activity.
2. Identify the affected user(s), host(s), process(es), and IP(s).
3. Map observed activity to MITRE ATT&CK techniques.
4. Assess potential blast radius.
5. Provide a confidence level and justification.
6. Recommend next investigative or response steps.

Constraints:
- Evidence-based conclusions only
- Explicitly state assumptions

1.2 Investigation Expansion Prompt


1.3 Threat Hunting Prompt (Hypothesis-Driven)


1.4 Incident Response Decision Support Prompt


2. Defender XDR Prompt Pack

These prompts are optimised for Defender XDR telemetry and workflows.


2.1 Defender XDR Alert Analysis


2.2 Advanced Hunting (KQL) Support


2.3 Identity-Based Attack Analysis (Entra ID / MDI)


2.4 Endpoint Compromise Investigation


3. Microsoft Sentinel Prompt Pack

Optimised for SIEM correlation, analytics rules, and incidents.


3.1 Sentinel Incident Correlation


3.2 Analytics Rule Validation


3.3 Post-Incident Detection Engineering

Last updated