Junior Analyst AI Playbooks
Below is a complete, reusable SOC AI framework consisting of three tightly integrated components:
Reusable SOC Prompt Library (Core)
Microsoft Defender XDR & Sentinel–Specific Prompt Packs
Junior Analyst AI Playbooks (Operationalised for Tier-1 → Tier-2)
Written to be enterprise-ready, repeatable, and defensible in regulated SOC environments.
1. Reusable SOC Prompt Library (Core)
This library is platform-agnostic and should be treated as your SOC AI baseline. Each prompt is designed to be copied verbatim and populated with evidence.
1.1 Alert Triage Prompt (Universal)
You are a Tier-2 SOC analyst.
Context:
- Alert source:
- Alert severity:
- Detection logic:
- First seen (UTC):
- Last seen (UTC):
Evidence Provided:
- Alert details:
- Entities involved:
- Relevant logs or hunting output:
Tasks:
1. Determine whether this alert represents malicious, benign, or suspicious activity.
2. Identify the affected user(s), host(s), process(es), and IP(s).
3. Map observed activity to MITRE ATT&CK techniques.
4. Assess potential blast radius.
5. Provide a confidence level and justification.
6. Recommend next investigative or response steps.
Constraints:
- Evidence-based conclusions only
- Explicitly state assumptions1.2 Investigation Expansion Prompt
1.3 Threat Hunting Prompt (Hypothesis-Driven)
1.4 Incident Response Decision Support Prompt
2. Defender XDR Prompt Pack
These prompts are optimised for Defender XDR telemetry and workflows.
2.1 Defender XDR Alert Analysis
2.2 Advanced Hunting (KQL) Support
2.3 Identity-Based Attack Analysis (Entra ID / MDI)
2.4 Endpoint Compromise Investigation
3. Microsoft Sentinel Prompt Pack
Optimised for SIEM correlation, analytics rules, and incidents.
3.1 Sentinel Incident Correlation
3.2 Analytics Rule Validation
3.3 Post-Incident Detection Engineering
4. Junior Analyst AI Playbooks
These are step-by-step AI-assisted workflows designed for Tier-1 analysts, with escalation paths.
4.1 Tier-1 Alert Handling Playbook
Trigger: New SOC alert
AI Prompt Used:
Universal Alert Triage Prompt
Expected Output:
Verdict (TP / FP / Suspicious)
Affected entities
Escalation decision
Escalate If:
Credential access suspected
Persistence identified
Multiple hosts/users involved
4.2 Endpoint Investigation Playbook
Trigger: Suspicious endpoint alert
Steps:
Run Defender XDR Alert Analysis prompt
Ask AI to summarise command-line activity
Identify persistence indicators
Decide: isolate, monitor, or escalate
Escalate If:
SYSTEM-level execution
Credential dumping indicators
Unknown persistence mechanism
4.3 Identity Compromise Playbook
Trigger: Risky sign-in or MDI alert
Steps:
Use Identity-Based Attack Analysis prompt
Validate logon source and device
Identify token misuse or MFA bypass
Decide: password reset, sign-out, disable account
4.4 Threat Hunt Escalation Playbook (Tier-2)
Trigger: Confirmed malicious behaviour
Steps:
Convert incident into a hunt hypothesis
Use Threat Hunting Prompt
Validate scope expansion
Feed findings into detection engineering
5. Governance & Safe Use Controls
Mandatory Rules for Analysts
AI outputs must be validated against logs
AI is advisory, not authoritative
All conclusions must cite evidence
Assumptions must be explicitly stated
Recommended Integration
Embed prompts into SOC runbooks
Store approved prompts in a central repository
Version-control prompt changes
Restrict use for legal or HR decisions
Last updated