Triage a security alert or case. Use when given an ALERT_ID or CASE_ID to assess if it's a real threat. Enriches IOCs, searches SIEM for context, and determines if the alert should be closed (false positive) or escalated for investigation.
99
Does it follow best practices?
Validation for skill structure
Perform standardized initial assessment of security alerts to determine if they represent real threats requiring investigation or can be closed as false positives.
You need one of these identifiers to begin:
ALERT_ID - The alert identifierCASE_ID - The case identifierRetrieve full details about the alert/case:
Use secops-soar tools:
- get_case_full_details(case_id) - Get case metadata and context
- list_alerts_by_case(case_id) - List all alerts in the case
- list_events_by_alert(alert_id) - Get triggering eventsExtract and note:
Note: Duplicate detection should be handled by invoking
/check-duplicatesbefore this skill, or by using the/full-triage-alertworkflow which orchestrates both skills in the correct sequence.
Search for other open cases involving the same entities:
Use secops-soar.list_cases with:
- Search terms = key entities from Step 1
- Status filter = "Opened"Note any related cases for correlation.
Perform a targeted SIEM search based on the alert type:
Use secops-mcp.search_security_events with relevant queryBy alert type:
For each key entity (IP, domain, hash, URL), gather threat intelligence:
GTI Enrichment (use gti-mcp tools):
get_ip_address_report(ip) - IP reputation and contextget_domain_report(domain) - Domain reputationget_file_report(hash) - File/hash analysisget_url_report(url) - URL reputationSIEM Enrichment (use secops-mcp tools):
lookup_entity(entity) - Entity summary from SIEMget_ioc_matches(hours_back) - Check if IOC appears in threat feedsBased on all gathered evidence, classify the alert:
| Classification | Criteria | Action |
|---|---|---|
| False Positive (FP) | No malicious indicators, known benign activity | Close |
| Benign True Positive (BTP) | Real detection but authorized/expected activity | Close |
| True Positive (TP) | Confirmed malicious indicators or suspicious behavior | Escalate |
| Suspicious | Inconclusive but warrants investigation | Escalate |
If FP or BTP:
secops-soar.siemplify_close_case or siemplify_close_alertNOT_MALICIOUSget_case_settings_root_causes to get valid options (e.g., "Legit action", "Normal behavior")If TP or Suspicious:
secops-soar.change_case_prioritysuspicious_login_triagemalware_triagedeep_dive_ioc_analysisAfter completing triage, provide:
SOAR Tools:
get_case_full_details, list_alerts_by_case, list_events_by_alertpost_case_comment, change_case_prioritysiemplify_get_similar_cases, siemplify_close_case, siemplify_close_alertSIEM Tools:
lookup_entity, get_ioc_matches, search_security_eventsGTI Tools:
get_file_report, get_domain_report, get_ip_address_report, get_url_reportFor detailed workflow diagrams, completion criteria, and evaluation rubric, see reference.md.
67a00be
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.