CtrlK
BlogDocsLog inGet started
Tessl Logo

building-cloud-siem-with-sentinel

This skill covers deploying Microsoft Sentinel as a cloud-native SIEM and SOAR platform for centralized security operations. It details configuring data connectors for multi-cloud log ingestion, writing KQL detection queries, building automated response playbooks with Logic Apps, and leveraging the Sentinel data lake for petabyte-scale threat hunting across AWS, Azure, and GCP security telemetry.

55

Quality

62%

Does it follow best practices?

Impact

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./skills/building-cloud-siem-with-sentinel/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

82%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong, technically detailed description that clearly articulates specific capabilities around Microsoft Sentinel deployment and operations. The main weakness is the absence of an explicit 'Use when...' clause, which would help Claude know precisely when to select this skill. The rich set of domain-specific trigger terms and concrete actions make it otherwise excellent for skill selection.

Suggestions

Add an explicit 'Use when...' clause, e.g., 'Use when the user asks about Microsoft Sentinel, SIEM/SOAR setup, KQL queries, security playbooks, or multi-cloud threat hunting.'

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: deploying Sentinel, configuring data connectors for multi-cloud log ingestion, writing KQL detection queries, building automated response playbooks with Logic Apps, and leveraging the data lake for petabyte-scale threat hunting across AWS/Azure/GCP.

3 / 3

Completeness

The 'what' is thoroughly covered with specific capabilities, but there is no explicit 'Use when...' clause or equivalent trigger guidance telling Claude when to select this skill. Per rubric guidelines, a missing 'Use when' clause caps completeness at 2.

2 / 3

Trigger Term Quality

Includes strong natural keywords users would say: 'Microsoft Sentinel', 'SIEM', 'SOAR', 'data connectors', 'KQL', 'detection queries', 'playbooks', 'Logic Apps', 'threat hunting', 'AWS', 'Azure', 'GCP', 'security telemetry', 'multi-cloud'. These cover a wide range of terms a security engineer would naturally use.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive with a clear niche: Microsoft Sentinel specifically, KQL queries, Logic Apps playbooks, and multi-cloud SIEM/SOAR operations. This is unlikely to conflict with other security or cloud skills due to the very specific technology stack mentioned.

3 / 3

Total

11

/

12

Passed

Implementation

42%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

The skill excels in actionability with concrete, executable code examples across PowerShell, KQL, and Logic Apps JSON, covering a comprehensive multi-cloud SIEM deployment workflow. However, it is significantly undermined by verbosity (glossary of known terms, verbose scenario narratives, mock output reports), lack of validation checkpoints in a complex multi-step deployment process, and a monolithic structure that would benefit greatly from splitting into referenced sub-files.

Suggestions

Remove the 'Key Concepts' glossary table and 'Tools & Systems' section entirely — Claude already knows what KQL, SOAR playbooks, and Azure Logic Apps are.

Add explicit validation checkpoints after each step, e.g., after Step 1 verify data ingestion with a KQL query like `Usage | where TimeGenerated > ago(1h) | summarize by DataType`, and after Step 2 verify analytics rules are triggering with test data.

Split the detailed KQL queries, Logic Apps JSON, and scenario walkthroughs into separate referenced files (e.g., `DETECTION_RULES.md`, `PLAYBOOKS.md`, `SCENARIOS.md`) to reduce the main skill to an overview with clear navigation.

Remove or drastically shorten the 'Output Format' mock report — it's a sample dashboard output that doesn't teach Claude how to do anything actionable.

DimensionReasoningScore

Conciseness

The skill is extremely verbose at ~250+ lines. The 'Key Concepts' glossary table defines terms Claude already knows (KQL, SOAR, Data Connector). The 'Tools & Systems' section describes well-known products. The 'Common Scenarios' section narrates a scenario at length rather than providing actionable steps. The 'Output Format' section is a mock report that adds little instructional value. Much of this content could be cut by 50%+ without losing actionable guidance.

1 / 3

Actionability

The skill provides fully executable PowerShell/CLI commands for provisioning, complete KQL detection queries that are copy-paste ready, and a detailed Logic Apps JSON definition for SOAR playbooks. Each step contains concrete, specific code with realistic parameters and configurations.

3 / 3

Workflow Clarity

The five steps are clearly sequenced and logically ordered from provisioning through detection, response, hunting, and threat intelligence integration. However, there are no validation checkpoints — no steps to verify data connectors are actually ingesting data, no validation that analytics rules are firing correctly, and no feedback loops for error recovery in any of the multi-step processes.

2 / 3

Progressive Disclosure

The content is a monolithic wall of text with no references to external files. All content — glossary, scenarios, output format, detailed code examples — is inline. The KQL queries, Logic Apps JSON, and scenario walkthroughs could easily be split into referenced files. There are no bundle files to support progressive disclosure.

1 / 3

Total

7

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

10

/

11

Passed

Repository
mukul975/Anthropic-Cybersecurity-Skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.