Best Practices - Security Investigation Workflows
The following workflows represent best practices for common security tasks. These step-by-step patterns guide you through effective multi-tool investigations.
Workflow 1: Incident Investigation
Purpose: Conduct an end-to-end security incident investigation
Steps:
Identify the scope: Search for related events using
search_violations,search_exfiltration_events, orsearch_posture_eventswith your search criteriaGather details: For each relevant result, use
get_violation,get_exfiltration_event, orget_posture_eventto get full context including affected assets, actors, and risk levelsReview findings: For violations, use
get_violation_findingsto see exactly what sensitive data was detectedCheck activity timeline: Use the appropriate activity tools to understand what remediation has already been attempted
Assess user behavior: If an actor is identified, use
get_actor_activityto check their recent activity across all event typesSummarize and recommend: Provide a structured incident summary with scope, affected assets, actors involved, risk assessment, and specific remediation actions
Example Conversation:
"Investigate the incident involving repository finance-api"
"Show me the findings for violation abc-123"
"What has user [email protected] been doing recently?"
"Summarize the risk and recommend next steps"
Workflow 2: Violation Triage
Purpose: Prioritize and triage active DLP violations for remediation
Steps:
Fetch active violations: Use
search_violationswith querystate:ACTIVEsorted byRISK_DESCto get highest-risk violations firstCategorize by severity: Group violations by
risk_label(CRITICAL, HIGH, MEDIUM, LOW) and integrationGet details for high-priority items: For each CRITICAL and HIGH risk violation, use
get_violationto understand context and available remediation actionsReview sensitive findings: For top violations, use
get_violation_findingsto understand what data was exposedGenerate triage report: Create a prioritized list with specific next steps using
take_action_on_violations
Example Conversation:
"Triage all active violations, prioritize by risk"
"Show me details for the top 5 high-risk violations"
"What are the findings for these violations?"
"Create a remediation plan for the critical violations"
Workflow 3: Compliance Reporting
Purpose: Generate security compliance summary across time periods
Steps:
Gather violation statistics: Use
list_violationswithcreatedAftertimestamp for your reporting periodGather exfiltration statistics: Use
list_exfiltration_eventswith the same time rangeGather posture statistics: Use
list_posture_eventswith the same time rangeGet details for key incidents: Use the appropriate
get_*tools for the most significant eventsGenerate report: Produce a structured report with executive summary, breakdowns by integration/severity, top incidents, trends, and recommendations
Example Conversation:
"Generate a compliance report for the last 90 days"
"Break down violations by integration and severity"
"Show me the top 10 incidents with details"
"What trends are emerging in our security posture?"
Workflow 4: User Risk Assessment
Purpose: Assess security risk profile for a specific user
Steps:
Find violations: Use
search_violationswith queryuser_email:[email]to find all DLP violationsFind exfiltration events: Use
search_exfiltration_eventswith queryactor_email:[email]Find posture events: Use
search_posture_eventswith queryactor_email:[email]Get details on significant events: For high-risk items, use the appropriate
get_*toolsGenerate risk assessment: Produce a user profile with statistics, risk score, timeline, behavioral patterns, and recommendations
Example Conversation:
"Assess the risk profile for user [email protected]"
"Show me all violations and events involving this user"
"What patterns emerge from their behavior?"
"Recommend appropriate actions based on their risk level"
Workflow 5: Guided Remediation
Purpose: Execute remediation actions on specific violations
Steps:
Review violation details: Use
get_violationto understand context and available actionsCheck findings: Use
get_violation_findingsto see what data is at riskVerify appropriate action: Confirm the remediation action matches the violation severity and context
Execute remediation: Use
take_action_on_violationswith appropriate action (RESOLVE, BLOCK, DELETE, etc.)Verify completion: Check
get_violation_activityto confirm the action was recorded
Example Conversation:
"Show me details for violation xyz-789"
"What are the available remediation actions?"
"Resolve this violation and document the action"
"Confirm the remediation was successful"
Multi-Step Tool Chaining
"Search for GitHub violations, get details on the top 3, and show me the sensitive findings"
"Find all violations by [email protected], check her recent activity, and assess her risk profile"
"List exfiltration events from last week, get details on any involving bulk downloads, and summarize the risk"
"Search for high-risk Slack violations, review their findings, and recommend remediation actions"
Multi-Tool Investigation Patterns
The most effective investigations use multiple tools in sequence. Follow these patterns:
Basic Investigation Pattern:
Search → Get Details → Analyze → Recommend
Deep Investigation Pattern:
Search → Get Details → Get Findings → Check Activity → Assess Actor → Recommend
Remediation Pattern:
Search → Get Details → Verify Context → Take Action → Confirm
When asking complex questions, the AI will automatically chain tools in the optimal order. You can also explicitly request multi-step workflows: "Search for high-risk violations, review the top 5, and create a remediation plan."
Effective Communication with AI
Be specific about time ranges: "last 7 days" is clearer than "recently"
Use exact usernames or email addresses when investigating specific actors
Ask follow-up questions to drill deeper: "Show me the findings" after reviewing a violation
Request summaries for complex data: "Summarize these violations by severity"
Clarify formatting preferences: "Show as a table" or "Give me a bullet list"
Chain multiple steps in one request: "Search for violations, get details on the top 3, and show findings" is more efficient than three separate questions
Use date ranges to limit result sets when investigating recent incidents
Ask for pagination when dealing with large result sets to avoid overwhelming responses
Combine filters naturally: "high-risk GitHub violations from last week" is more efficient than multiple separate queries
Security
Store API keys in secure credential managers, never in code or configuration files committed to version control
Rotate API keys quarterly or immediately if compromise is suspected
Use dedicated API keys for each integration rather than sharing across systems
Review API key permissions regularly and follow least-privilege principles
Enable audit logging in your AI client to track MCP queries for compliance
Effective Communication with AI
Be specific about time ranges: "last 7 days" is clearer than "recently"
Use exact usernames or email addresses when investigating specific actors
Ask follow-up questions to drill deeper: "Show me the findings" after reviewing a violation
Request summaries for complex data: "Summarize these violations by severity"
Clarify formatting preferences: "Show as a table" or "Give me a bullet list"
Workflow Integration
Set up dedicated Slack/Teams channels for security alerts and use MCP to investigate directly from your collaboration tool
Create saved prompts for common investigations to maintain consistency across your security team
Document investigation procedures that leverage MCP for faster onboarding of new analysts
Use MCP in conjunction with the Nightfall console for comprehensive security operations
Last updated
Was this helpful?