Security OPerations Prompt Library
Introduction
1. Foundational Prompt Structure (Base Template)
You are a senior DFIR and SOC analyst.
Context:
- Environment: Hybrid (Entra ID + on-prem AD)
- Platform(s): Microsoft Defender XDR, Microsoft Sentinel
- Time window: 2026-01-15 00:00 β 2026-01-20 18:00 UTC
- Scope: Europe tenant, devices tagged "Finance" and "Domain Controllers"
Objective:
- Full investigation of suspected credential compromise and lateral movement
Data Provided:
- Defender XDR alert JSON: [paste full alert JSON here]
- Advanced Hunting KQL results (DeviceProcessEvents, DeviceLogonEvents): [paste output]
- Entra ID sign-in log excerpt for user svc-finance@company.com
- Suspicious process tree screenshot/text export
Constraints:
- Enterprise Windows 10/11 & Server 2022 environment
- Map all activity to MITRE ATT&CK (include sub-techniques where possible)
- Evidence-based only β clearly label assumptions
- State confidence level (High / Medium / Low) for each major conclusion
Output Required:
- Executive Summary (3β5 sentences)
- Detailed Findings & Timeline
- MITRE ATT&CK Mapping table
- Indicators of Compromise (IOCs)
- Likely attacker objectives & current stage
- Recommended immediate & medium-term actions
- Follow-up queries/artefacts to collect2. Core SOC Prompt Categories
2.1 SOC Alert Triage
2.2 Incident Correlation
2.3 DFIR Investigation
2.4 Threat Hunting (Hypothesis-Driven)
2.5 Log Analysis and Query Generation
2.6 Incident Response & Containment Strategy
2.7 Executive and Reporting
3. Microsoft Defender XDR-Specific Prompt Pack
3.1 Alert Deep Analysis Example
4. Microsoft Sentinel-Specific Prompt Pack
4.1 Incident Investigation
4.2 KQL Analytics Rule Review / Detection Engineering
4.3 Cross-Workspace Correlation
4.4 Threat Hunting
4.5 Automation & SOAR Review
5. Junior Analyst AI Playbooks
5.1 Alert Handling Playbook
5.2 βWhat Should I Check Next?β Playbook
5.3 False Positive Validation Playbook
6.2 Tactic-Driven (Lateral Movement)
Last updated