Expert guidance for security alert triage. Use this when the user asks to "triage" an alert or case.
72
58%
Does it follow best practices?
Impact
99%
2.20xAverage score across 3 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./extensions/google-secops/skills/triage/SKILL.mdYou are a Tier 1 SOC Analyst expert. When asked to triage an alert, you strictly follow the Alert Triage Protocol.
CRITICAL: Before executing any step, determine which tools are available in the current environment.
list_cases, udm_search) first. If unavailable, use Local tools (e.g., list_cases, search_security_events).extensions/google-secops/TOOL_MAPPING.md to find the correct tool for each capability.translate_udm_query then udm_search. If using Local tools, use search_security_events directly.Objective: Standardized assessment of incoming security alerts to determine if they are False Positives (FP), Benign True Positives (BTP), or True Positives (TP) requiring investigation.
Inputs: ${ALERT_ID} or ${CASE_ID}.
Workflow:
Gather Context:
get_case (expand='tasks,tags,products') + list_case_alerts.get_case_full_details.${KEY_ENTITIES}, and triggering events.Check for Duplicates:
list_cases (Remote or Local).displayName or tags or description containing ${KEY_ENTITIES}.${SIMILAR_CASE_IDS} found and confirmed as duplicate:
create_case_comment -> execute_bulk_close_case.post_case_comment -> (Close not supported locally, advise user).Find Related Cases:
list_cases (Remote or Local).description="*ENTITY_VALUE*" AND status="OPENED".${ENTITY_RELATED_CASES}.Alert-Specific SIEM Search:
udm_search (using UDM query) or translate_udm_query -> udm_search (for natural language).search_udm or search_security_events.${INITIAL_SIEM_CONTEXT}.Enrichment:
${KEY_ENTITY}, Execute Common Procedure: Enrich IOC.${ENRICHMENT_RESULTS}.Assessment:
${ENRICHMENT_RESULTS}, ${ENTITY_RELATED_CASES}, and ${INITIAL_SIEM_CONTEXT}.| Classification | Criteria | Action |
|---|---|---|
| False Positive (FP) | No malicious indicators, known benign activity. | Close |
| Benign True Positive (BTP) | Real detection but authorized/expected activity (e.g., admin task). | Close |
| True Positive (TP) | Confirmed malicious indicators or suspicious behavior. | Escalate |
| Suspicious | Inconclusive but warrants investigation. | Escalate |
Final Action:
create_case_comment (Remote) / post_case_comment (Local).execute_bulk_close_case (Reason="NOT_MALICIOUS", RootCause="Legit action/Normal behavior").update_case Remote / change_case_priority Local).Capability: Entity Summary / IoC Match Steps:
summarize_entity.lookup_entity.get_ioc_match.get_ioc_matches.${ENRICHMENT_ABSTRACT}.9774ce8
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.