CtrlK
BlogDocsLog inGet started
Tessl Logo

building-cloud-siem-with-sentinel

This skill covers deploying Microsoft Sentinel as a cloud-native SIEM and SOAR platform for centralized security operations. It details configuring data connectors for multi-cloud log ingestion, writing KQL detection queries, building automated response playbooks with Logic Apps, and leveraging the Sentinel data lake for petabyte-scale threat hunting across AWS, Azure, and GCP security telemetry.

69

Quality

62%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./skills/building-cloud-siem-with-sentinel/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

82%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong description with excellent specificity and rich trigger terms covering the Microsoft Sentinel ecosystem comprehensively. Its main weakness is the absence of an explicit 'Use when...' clause, which would help Claude know precisely when to select this skill over others. Adding trigger guidance would elevate this from a good to an excellent description.

Suggestions

Add an explicit 'Use when...' clause, e.g., 'Use when the user asks about Microsoft Sentinel, SIEM/SOAR setup, KQL queries, security playbooks, or multi-cloud threat hunting.'

Consider adding common user phrasings like 'security monitoring', 'incident response automation', or 'log analytics' to broaden trigger coverage for users who may not use exact product names.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: deploying Sentinel, configuring data connectors for multi-cloud log ingestion, writing KQL detection queries, building automated response playbooks with Logic Apps, and leveraging the data lake for petabyte-scale threat hunting across AWS/Azure/GCP.

3 / 3

Completeness

The 'what' is thoroughly covered with specific capabilities, but there is no explicit 'Use when...' clause or equivalent trigger guidance telling Claude when to select this skill. Per rubric guidelines, this caps completeness at 2.

2 / 3

Trigger Term Quality

Includes strong natural keywords users would say: 'Microsoft Sentinel', 'SIEM', 'SOAR', 'data connectors', 'KQL', 'detection queries', 'playbooks', 'Logic Apps', 'threat hunting', 'AWS', 'Azure', 'GCP', 'security telemetry', 'multi-cloud'. These cover a wide range of terms a security engineer would naturally use.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive with a clear niche: Microsoft Sentinel specifically, KQL queries, Logic Apps playbooks, and multi-cloud SIEM/SOAR. Unlikely to conflict with other security or cloud skills due to the specificity of the platform and tooling mentioned.

3 / 3

Total

11

/

12

Passed

Implementation

42%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

The skill excels in actionability with concrete, executable code examples across PowerShell, KQL, and JSON, covering realistic multi-cloud security scenarios. However, it is severely bloated with unnecessary definitions, explanatory sections, and a mock output report that waste tokens. The lack of validation checkpoints in the workflow and the monolithic structure with no progressive disclosure significantly reduce its effectiveness as a skill file.

Suggestions

Remove the Key Concepts table, Tools & Systems section, and Output Format section — these define terms and tools Claude already knows and add no actionable guidance.

Add validation checkpoints after each step, e.g., 'Verify connector status: az sentinel data-connector list ... | grep Enabled' and 'Test analytics rule by running the KQL query manually before scheduling.'

Split detailed KQL queries, Logic Apps playbook JSON, and hunting queries into separate reference files (e.g., DETECTION_RULES.md, PLAYBOOKS.md, HUNTING_QUERIES.md) and link to them from the main skill.

Remove the Common Scenarios section or condense it to 2-3 lines — it largely restates the workflow steps already covered above.

DimensionReasoningScore

Conciseness

The skill is extremely verbose at ~250+ lines. The Key Concepts table defines terms Claude already knows (KQL, SOAR, Data Connector). The Tools & Systems section explains what Logic Apps and MITRE ATT&CK are. The Output Format section is a mock report that adds no actionable value. The Common Scenarios section narrates a detection approach at a high level that largely repeats earlier content.

1 / 3

Actionability

The skill provides fully executable CLI commands, complete KQL detection queries, and a detailed Logic Apps JSON definition. The code examples are specific, copy-paste ready, and cover real-world scenarios like impossible travel detection, S3 mass deletion, and cross-account lateral movement hunting.

3 / 3

Workflow Clarity

The five steps are clearly sequenced and logically ordered from provisioning through detection to response. However, there are no validation checkpoints — no steps to verify data connectors are actually ingesting data, no validation that analytics rules are firing correctly, and no feedback loops for troubleshooting failed playbook executions. For a multi-step process involving automated account disabling (destructive), this caps the score at 2.

2 / 3

Progressive Disclosure

The entire skill is a monolithic wall of content with no references to external files for detailed topics. The KQL examples, Logic Apps JSON, threat hunting queries, and threat intelligence configuration could all be split into separate reference files. Everything is inline, making the skill extremely long and difficult to navigate.

1 / 3

Total

7

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

10

/

11

Passed

Repository
mukul975/Anthropic-Cybersecurity-Skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.