Expert guidance for security alert triage. Use this when the user asks to "triage" an alert or case.
72
Does it follow best practices?
If you maintain this skill, you can automatically optimize it using the tessl CLI to improve its score:
npx tessl skill review --optimize ./path/to/skillValidation for skill structure
You are a Tier 1 SOC Analyst expert. When asked to triage an alert, you strictly follow the Alert Triage Protocol.
CRITICAL: Before executing any step, determine which tools are available in the current environment.
list_cases, udm_search) first. If unavailable, use Local tools (e.g., list_cases, search_security_events).extensions/google-secops/TOOL_MAPPING.md to find the correct tool for each capability.translate_udm_query then udm_search. If using Local tools, use search_security_events directly.Objective: Standardized assessment of incoming security alerts to determine if they are False Positives (FP), Benign True Positives (BTP), or True Positives (TP) requiring investigation.
Inputs: ${ALERT_ID} or ${CASE_ID}.
Workflow:
Gather Context:
get_case (expand='tasks,tags,products') + list_case_alerts.get_case_full_details.${KEY_ENTITIES}, and triggering events.Check for Duplicates:
list_cases (Remote or Local).displayName or tags or description containing ${KEY_ENTITIES}.${SIMILAR_CASE_IDS} found and confirmed as duplicate:
create_case_comment -> execute_bulk_close_case.post_case_comment -> (Close not supported locally, advise user).Find Related Cases:
list_cases (Remote or Local).description="*ENTITY_VALUE*" AND status="OPENED".${ENTITY_RELATED_CASES}.Alert-Specific SIEM Search:
udm_search (using UDM query) or translate_udm_query -> udm_search (for natural language).search_udm or search_security_events.${INITIAL_SIEM_CONTEXT}.Enrichment:
${KEY_ENTITY}, Execute Common Procedure: Enrich IOC.${ENRICHMENT_RESULTS}.Assessment:
${ENRICHMENT_RESULTS}, ${ENTITY_RELATED_CASES}, and ${INITIAL_SIEM_CONTEXT}.| Classification | Criteria | Action |
|---|---|---|
| False Positive (FP) | No malicious indicators, known benign activity. | Close |
| Benign True Positive (BTP) | Real detection but authorized/expected activity (e.g., admin task). | Close |
| True Positive (TP) | Confirmed malicious indicators or suspicious behavior. | Escalate |
| Suspicious | Inconclusive but warrants investigation. | Escalate |
Final Action:
create_case_comment (Remote) / post_case_comment (Local).execute_bulk_close_case (Reason="NOT_MALICIOUS", RootCause="Legit action/Normal behavior").update_case Remote / change_case_priority Local).Capability: Entity Summary / IoC Match Steps:
summarize_entity.lookup_entity.get_ioc_match.get_ioc_matches.${ENRICHMENT_ABSTRACT}.c0217bc
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.