Overview
SCU Cost Estimate
This agent typically consumes 0,2-3 SCUs per incident analysis, depending on incident complexity, number of entities involved, and depth of threat intelligence enrichment.
Introduction
Forensic Agent Core is your automated incident analyst. If you've ever looked at a Defender XDR incident and thought "I need the full story, not just scattered alerts", this agent is for you. It takes an incident ID, pulls together everything related, enriches it with threat intelligence, builds a minute-by-minute timeline, and delivers a comprehensive forensic report that would normally take hours of manual investigation.




What It Does
Reconstructs incident timelines minute by minute from scattered alerts and events
Extracts and maps entities (devices, users, IPs, domains, files, hashes) and their relationships
Enriches with threat intelligence using multiple sources (Shodan, SSL certs, WHOIS, CIRCL, reputation services)
Analyzes device security posture showing vulnerabilities, software, and configuration
Tracks identity activity with risk events and authentication patterns
Correlates analyst comments to provide investigation context
Classifies incidents as True Positive, False Positive, or needs escalation with malicious intent scoring
Recommends remediation with prioritized, actionable steps
Generates standardized reports ready for handoffs, audits, or escalation
Use Cases
1. Incident Triage and Initial Assessment
You have a new high-severity incident and need to quickly understand what happened. Forensic Agent Core analyzes the incident, builds a timeline, identifies key entities, and provides a classification (True/False Positive) with confidence scoring. Instead of spending 30-60 minutes gathering context, you get a complete picture in minutes.
2. Preparing Incident Reports for Management
Leadership wants a clear explanation of a security incident. The agent generates a comprehensive forensic report with an executive summary, timeline, entity map, threat intel findings, and remediation recommendations. Everything is standardized and ready to present, no manual report writing needed.
3. Threat Intelligence Enrichment
An incident involves external IPs and domains, but you don't know if they're malicious. Forensic Agent Core enriches all indicators with open-source and commercial threat intelligence (Shodan port scans, SSL certificate analysis, WHOIS data, malware associations, reputation scores). You get curated intel that highlights what actually matters.
4. Deep-Dive Forensic Analysis
A critical incident requires detailed investigation before response. The agent performs advanced hunting queries, extracts all related entities, analyzes device and identity posture, correlates events into a precise timeline, and provides forensic-level detail about what happened, when, and how. Save hours of manual correlation work.
5. SOC Team Handoffs and Escalations
You need to escalate an incident to Tier 2 or external forensics team. The agent's standardized report provides complete context, timeline, entity relationships, threat intel, and initial analysis. The receiving team can pick up immediately without asking for clarification or redoing research.
Why Forensic Agent Core?
Fragmented alerts everywhere: Incident has dozens of alerts, unclear how they relate
Complete timeline: Minute-by-minute reconstruction showing how events connect
Missing context: Alerts show what happened but not why or what it means
Entity mapping: Full picture of devices, users, IPs, domains, and their relationships
Manual threat intel lookups: Copying indicators into multiple tools takes forever
Automated enrichment: All indicators enriched with curated intel from multiple sources
Device and identity data disconnected: Can't see how user activity relates to device events
Integrated analysis: Device posture and identity activity correlated in one view
Time pressure for reports: Management wants detailed analysis but you have 30 minutes
Ready-made reports: Comprehensive forensic report generated automatically
Noisy intel feeds: Too much information, unclear what's actually important
Curated findings: Agent highlights what matters, filters out noise
How It Works
What goes in:
Incident ID from Microsoft Defender XDR
Associated alerts, entities, and evidence
Analyst comments and investigation notes
Device and user activity data
Threat intelligence feeds (Shodan, CIRCL, reputation services)
What it does:
Retrieves complete incident data including all alerts and entities
Performs advanced hunting queries to find related activity
Extracts all entities (devices, users, IPs, domains, files, hashes)
Builds entity relationship map
Reconstructs minute-by-minute timeline from events
Enriches external indicators with threat intelligence
Analyzes device security posture (vulnerabilities, software, config)
Tracks identity activity and risk events
Correlates analyst comments with timeline
Classifies incident with malicious intent scoring
Generates prioritized remediation recommendations
What you get:
Executive summary with key findings and classification
Minute-by-minute timeline of incident progression
Entity inventory with relationships (who, what, where, when)
Device security posture summary (vulnerabilities, software, security controls)
Identity activity summary (authentication, risk events, behavior)
Threat intelligence findings:
Open ports/services/vulnerabilities (Shodan)
SSL certificate metadata and validation
WHOIS registration data
Malware associations and file reputation (CIRCL)
IP/domain reputation scores
Incident classification (True Positive, False Positive, Escalate)
Malicious intent confidence score
Prioritized remediation recommendations with specific actions
Last updated
Was this helpful?