Skip to content

Exercise B - Universal Security Triage Agent

Exercise Metadata

FieldValue
Duration~35 minutes
TypeWorkflow Agent with Integrations
FocusAgentic tool calling across security stack

Scenario

SOC analysts often pivot across SIEM, EDR, identity, firewall, and threat-intel tools manually. That process can take 30-60 minutes per alert and delays incident response during alert volume spikes.

Objective

Build a single-step Kindo Workflow Agent that performs end-to-end triage across the security stack and synthesizes a justified disposition.

The agent should autonomously:

  • Extract entities from an alert (users, hosts, IPs, domains, hashes, processes)
  • Query SIEM for correlated events and timelines
  • Query EDR for endpoint context and process activity
  • Query IdP for sign-in and privilege anomalies
  • Query firewall/NDR for network anomalies and beaconing
  • Enrich IOCs with threat intelligence
  • Produce a final disposition and ranked action plan

What Makes This Exercise Different

Exercise AExercise B
Multi-step prompts for fixed workflow stagesSingle-step runbook prompt
Agent follows explicit sequenceAgent decides which tool to call and when
Demonstrates structured procedural automationDemonstrates agentic reasoning
Primary tool: Knowledge StorePrimary tools: live integrations

Integrations Used (Demo Mode)

IntegrationRoleWhat the Agent Queries
SplunkSIEMAlerts, correlated events, timeline
CrowdStrikeEDREndpoint detections, device context, process trees
OktaIdPSign-in events, MFA status, privilege changes
Palo AltoFirewall/NDRNetwork traffic, beaconing, lateral movement
VirusTotalThreat IntelIOC reputation, file analysis, domain/IP enrichment

Prerequisites

  • Kindo training account
  • Five integrations pre-enabled by session facilitator
  • Demo Mode enabled in training environment

Step 1 - Create Agent and Enable Integrations (5 min)

  1. Go to Agents -> Create an Agent -> Workflow Agent.
  2. Configure:
    • Name: Universal Security Triage Agent
    • Description: Performs end-to-end triage across SIEM, EDR, IdP, firewall, and threat intel using agentic tool calling.
  3. Open Integrations and enable:
    • Splunk
    • CrowdStrike
    • Okta
    • Palo Alto
    • VirusTotal

Step 2 - Add the Triage Runbook Prompt (10 min)

Add one LLM step named Triage Runbook and use this prompt:

Run an end-to-end triage on the triggering alert/ticket if present. If no trigger exists, triage the highest-severity SIEM alerts from the last 4 hours.
1) Extract entities from the triggering object (users, hosts, IPs, domains, hashes, processes, email IDs, cloud resources).
2) SIEM: pull the rule details, raw events, correlations, first/last seen timestamps, and related alerts.
3) EDR/XDR: check device posture, detections, process tree, network connections, persistence mechanisms, and lateral movement signs.
4) IdP/IAM: review sign-in timeline, MFA outcomes, risk events, session/token anomalies, and privilege changes.
5) Firewall/NDR: check DNS + outbound anomalies, beaconing patterns, and east-west traffic spikes.
6) Threat Intel: enrich all IOCs (hashes, IPs, domains) and link to known campaigns or threat groups.
Conclude with:
- Disposition: TRUE POSITIVE / FALSE POSITIVE / NEEDS MORE DATA
- Severity: CRITICAL / HIGH / MEDIUM / LOW
- Confidence: HIGH / MEDIUM / LOW (with explanation)
- Scope: contained to single host | multiple hosts | org-wide | unknown
- Evidence summary: one line per data source showing what it found and whether it supports TP or FP
- Attack narrative (if TP): initial access -> current stage -> blast radius
- Ranked next steps: containment -> evidence preservation -> further investigation -> notification -> remediation

Step 3 - Run, Observe, and Review (15 min)

  1. Click Run.
  2. Observe live tool calls in the execution trace.
  3. Review final disposition against the checklist below.

Typical execution path you may observe:

  • Splunk queried for alert baseline and entities
  • CrowdStrike queried for host/process context
  • Okta queried for user authentication timeline
  • Palo Alto queried for network behavior linked to entities
  • VirusTotal queried for IOC enrichment
  • Final synthesis into disposition and actions

Review Checklist

  • Disposition quality: verdict is evidence-backed and coherent
  • Tool sequence quality: calls are relevant and follow-up queries are logical
  • Cross-correlation quality: findings are connected across identity, endpoint, and network data
  • Action quality: next steps are prioritized and operationally useful

Step 4 (Optional) - Add One Real Integration (5 min)

If credentials are available, connect one real integration and rerun. This demonstrates production connection flow while preserving demo data for the remaining tools.

Discussion Points

  • Agentic versus procedural design: when should each be used?
  • Did the agent make unnecessary calls or miss useful ones?
  • How did multi-source correlation improve triage quality?
  • If this saves 30-60 minutes per alert, where should that analyst time be reinvested?

Production Extensions

  • Trigger triage automatically for high-severity SIEM alerts
  • Auto-create Jira or ServiceNow tickets for true positives
  • Notify Slack on CRITICAL findings
  • Re-triage open incidents on a recurring schedule as new evidence arrives

Troubleshooting

IssueLikely CauseHow To Fix
Agent does not call all integrationsIntegration toggles are disabled or unavailableRe-check integration enablement in agent settings
Output contains unsupported claimsPrompt missing evidence accountabilityKeep required evidence summary lines per data source
Agent loops or over-queries one sourceRunbook lacks prioritization guardrailsAdd guidance: stop querying once confidence threshold is met
Disposition stays NEEDS MORE DATAEntities not extracted or source data sparseAdd explicit entity extraction checks and broaden time window
Contradictory evidence not reconciledPrompt lacks conflict-handling instructionAdd requirement to explain contradictions before verdict

Continue