Common SOC Workflows
This page provides plain-language, step-by-step playbooks for the most common AuroraSOC tasks.
When to Use This Page
Use this page when your question starts with:
- "How do I triage this alert quickly?"
- "How do I turn an alert into a managed case?"
- "How do I execute response safely with approval controls?"
Workflow 1: Triage a New Critical Alert
Goal
Decide whether an alert is false positive, monitoring-only, or requires immediate response.
Steps
- Go to Alerts Management.
- Filter to
severity=criticalandstatus=new. - Open the alert detail and read context, source, and IOCs.
- Trigger AI investigation and wait for results.
- Update alert status:
triagedif no immediate action is neededinvestigatingif deeper analysis is requiredcontainedif response action has started
Common mistakes
- Closing alerts before reviewing timeline evidence
- Ignoring correlated CPS/IoT events on mixed IT/OT incidents
Workflow 2: Convert Alert to Incident Case
Goal
Track ownership, timeline, and resolution in one place.
Steps
- From the alert detail, create or link to a case.
- Set severity, assign owner, and add summary context.
- Add investigation findings as timeline entries.
- Track every response step until closure.
- Generate report and close case with resolution notes.
Related: Case Management, SOAR Playbooks
Workflow 3: Run Response with Approval Guardrails
- Dry Run First
- Approved Execution
- Open a relevant playbook in SOAR Playbooks.
- Execute in dry run mode.
- Review expected side effects and impacted assets.
- Proceed to approved execution if outcomes are acceptable.
- Submit approval request for high-risk actions.
- Wait for decision in approvals stream.
- Execute once approved.
- Record results in case timeline.
Workflow 4: Investigate Endpoint or Device Risk
Endpoint path
- Open EDR Endpoints.
- Filter for unhealthy or high-risk endpoints.
- Trigger scan and review process/network indicators.
CPS/IoT path
- Open CPS/IoT Devices.
- Review attestation status and firmware trust state.
- Escalate compromised or untrusted devices into case workflow.
Workflow Validation Checklist
Use this quick checklist after executing any workflow:
- Alert/case status transitions are recorded correctly.
- Timeline includes all key analyst and agent actions.
- Required approvals are linked to executed actions.
- Final resolution note includes rationale and next steps.
Suggested SLA Targets
| Workflow Stage | Suggested Target |
|---|---|
| Initial critical alert triage | 5-15 minutes |
| Convert alert to case | < 10 minutes after triage |
| Approval decision for high-risk actions | < 30 minutes |
| Case closure note completion | Within 1 hour of final action |
Troubleshooting Quick Hits
Investigation button is disabled
Likely cause: role lacks investigation:trigger permission.
AI results are delayed
Likely cause: worker backlog or agent endpoint timeout.
Playbook cannot execute
Likely cause: approval pending, disabled playbook, or permission mismatch.