본문으로 건너뛰기

Analyst Workbench

이 콘텐츠는 아직 한국어로 제공되지 않습니다.

The Analyst Workbench is a unified investigation workspace that combines alert/incident details, response actions, and investigation tools in a single view. It is the primary workspace for SOC analysts performing triage and response.


Core Features

Alert & Incident Investigation

  • View detailed alert or incident information in context
  • Switch between alerts and incidents from the same workspace
  • Access evidence, timeline, raw data, and MITRE ATT&CK mappings

Ownership & Lifecycle

ActionDescription
Take OwnershipAssign the alert/incident to yourself for investigation
EscalateEscalate to a higher-tier analyst or create an incident from an alert
Close CaseMark as resolved with a resolution summary

Response Actions

Response actions allow analysts to take direct containment and remediation steps:

ActionLicenseDescription
Isolate HostNDRNetwork-isolate a compromised endpoint
Block IPNDRBlock a malicious IP at the perimeter
Disable AccountDisable a compromised user account
Kill ProcessEDRTerminate a malicious process on an endpoint
Scan EndpointEDRTrigger an on-demand endpoint scan
Collect ForensicsEDRCollect forensic artifacts from an endpoint

Actions marked with EDR or NDR require the corresponding license to be active. Without the license, these buttons display a lock icon and link to the upgrade page.

  • Timeline: Activity log showing all actions taken on the alert/incident (assignments, status changes, comments)
  • Related Alerts: Similar alerts correlated by rule, source, or MITRE technique

Access Requirements

The Analyst Workbench requires the Respond (MDR) tier or above.