githubEdit

Security OPerations Prompt Library

Introduction

This library supports operationalising AI as an analyst, investigation assistant, and threat-hunting co-pilot in enterprise environments (cloud, hybrid, on-prem). Focus areas include Windows endpoints/servers, Entra ID, MDE, and hybrid deployments.

Prompts enforce discipline to minimise hallucinations: base conclusions on evidence, separate facts from assumptions, highlight uncertainties, and recommend next steps.

The following are concrete, copy-paste-ready prompt examples for cybersecurity defenders to utilise as a starting point. Each example is written as a full, standalone prompt that an analyst can directly use with an AI assistant (e.g., Grok, Copilot, ChatGPT, Claude) during real investigations.

1. Foundational Prompt Structure (Base Template)

You are a senior DFIR and SOC analyst.

Context:
- Environment: Hybrid (Entra ID + on-prem AD)
- Platform(s): Microsoft Defender XDR, Microsoft Sentinel
- Time window: 2026-01-15 00:00 – 2026-01-20 18:00 UTC
- Scope: Europe tenant, devices tagged "Finance" and "Domain Controllers"

Objective:
- Full investigation of suspected credential compromise and lateral movement

Data Provided:
- Defender XDR alert JSON: [paste full alert JSON here]
- Advanced Hunting KQL results (DeviceProcessEvents, DeviceLogonEvents): [paste output]
- Entra ID sign-in log excerpt for user svc-finance@company.com
- Suspicious process tree screenshot/text export

Constraints:
- Enterprise Windows 10/11 & Server 2022 environment
- Map all activity to MITRE ATT&CK (include sub-techniques where possible)
- Evidence-based only β€” clearly label assumptions
- State confidence level (High / Medium / Low) for each major conclusion

Output Required:
- Executive Summary (3–5 sentences)
- Detailed Findings & Timeline
- MITRE ATT&CK Mapping table
- Indicators of Compromise (IOCs)
- Likely attacker objectives & current stage
- Recommended immediate & medium-term actions
- Follow-up queries/artefacts to collect

2. Core SOC Prompt Categories

2.1 SOC Alert Triage

2.2 Incident Correlation

2.3 DFIR Investigation

2.4 Threat Hunting (Hypothesis-Driven)

2.5 Log Analysis and Query Generation

2.6 Incident Response & Containment Strategy

2.7 Executive and Reporting

3. Microsoft Defender XDR-Specific Prompt Pack

3.1 Alert Deep Analysis Example

4. Microsoft Sentinel-Specific Prompt Pack

4.1 Incident Investigation

4.2 KQL Analytics Rule Review / Detection Engineering

4.3 Cross-Workspace Correlation

4.4 Threat Hunting

4.5 Automation & SOAR Review

5. Junior Analyst AI Playbooks

5.1 Alert Handling Playbook

5.2 β€œWhat Should I Check Next?” Playbook

5.3 False Positive Validation Playbook

6. MITRE ATT&CK–Aligned Prompt Examples

6.1 Technique-Specific (T1059 – Command & Scripting Interpreter)

6.2 Tactic-Driven (Lateral Movement)

Last updated