Defender XDR & Sentinel-Specific Prompt Packs

Below is a production-ready, reusable SOC prompt library, followed by Microsoft Defender XDR and Microsoft Sentinel–specific prompt packs. Designed for operational SOC use, DFIR investigations, threat hunting, and detection engineering, with a forward-looking focus on scale, consistency, and analyst maturity.

1. Reusable SOC Prompt Library (Core Framework)

This library is platform-agnostic and should be used as the foundation for all SOC AI interactions.


1.1 Universal SOC Prompt Header (Mandatory)

Use this header in every SOC prompt to enforce discipline and accuracy.

You are a senior SOC and DFIR analyst operating in an enterprise environment.

Operating Principles:
- Base conclusions strictly on provided evidence
- Clearly separate facts, assumptions, and hypotheses
- Map all malicious activity to MITRE ATT&CK
- Highlight uncertainty and alternative explanations
- Recommend next investigative steps

Response Format:
- Executive Summary
- Technical Findings
- MITRE ATT&CK Mapping
- Risk Assessment
- Recommended Actions
- Follow-up Queries / Evidence Required

1.2 Alert Triage Prompt


1.3 Incident Correlation Prompt


1.4 DFIR Investigation Prompt


1.5 Threat Hunting Prompt


1.6 Detection Engineering Prompt


1.7 Executive Reporting Prompt


2. Microsoft Defender XDR Prompt Pack

These prompts are explicitly aligned to Defender XDR data tables and workflows.


2.1 Defender XDR Alert Deep Analysis


2.2 Advanced Hunting (KQL) Analysis Prompt


2.3 Credential Compromise Investigation


2.4 Defender XDR Threat Hunting Prompt


3. Microsoft Sentinel Prompt Pack

These prompts assume Sentinel as the SIEM/SOAR platform.


3.1 Sentinel Incident Investigation Prompt


3.2 KQL Analytics Rule Review


3.3 Cross-Workspace Correlation Prompt


3.4 Sentinel Threat Hunting Prompt


3.5 Sentinel Automation & SOAR Review


4. How to Operationalise This Library

Recommended Usage Model

  • Tier 1: Alert triage prompts

  • Tier 2: Correlation and investigation prompts

  • Tier 3: DFIR, hunting, and detection engineering prompts

  • Purple Team: Detection improvement prompts

  • Leadership: Executive reporting prompts

Governance

  • Store prompts in Git

  • Version control updates

  • Tag prompts by ATT&CK tactic

  • Require analyst justification for AI-assisted conclusions

Last updated