See for yourself how Prophet AI can supercharge your security operations, accelerating alert investigation and response
Key benefits:
Lowers MTTR with AI-driven automated alert triage & investigation
Lowers risk by prioritizing critical alerts for analyst review
Eliminates manual effort, freeing analysts to focus on high-impact security tasks
As cyber threats become more sophisticated, the demand for effective and efficient remediation strategies grows. Automated remediation offers a way to quickly address security incidents, minimizing damage and reducing the workload on security teams. In this post, we’ll explore low effort, high value scenarios where automated remediation can be implemented today, steps to set up these automations, and potential risks to be aware of.
Automated remediation can be particularly beneficial in scenarios where rapid response is crucial and human intervention is minimal. Here are some key situations where automation can make a significant impact:
Requires: Endpoint Detection and Response (EDR)
EDR tools like CrowdStrike, SentinelOne, and Microsoft Defender for Endpoint can automatically detect malicious activity on endpoints. When an endpoint shows signs of compromise, such as unusual file modifications or unexpected processes, the EDR tool can kill the process, ban the hash, and contain the host for immediate response.
Why it’s valuable: This immediate action reduces the risk of lateral movement within the network and allows security teams to analyze and remediate the threat without rushing.
What’s the risk: Simply put, computers do weird things. Most alerts generated from EDR tools are false positives, so you run the risk of banning legitimate processes used for business functions or disabling network connectivity on critical hosts.
Suggested Playbook Ideas:
Response for Servers and Critical Assets
Response for workstations or non-essential servers
Requires: Azure AD Identity Protection
Scenario: Detecting and responding to risky sign-ins indicative of Business Email Compromise (BEC).
Office 365 can detect risky sign-ins based on various factors like unfamiliar locations, IP addresses, and sign-in patterns. When a risky sign-in is detected, automated actions such as revoking user sessions and resetting their password can mitigate the risk.
Why it’s valuable: Rapidly addressing potentially compromised accounts prevents attackers from leveraging stolen credentials for further malicious activities.
What’s the risk: Revoking sessions and resetting passwords can be disruptive to user workflows. In most cases, these actions are not business impacting but can cause inconvenience in false positive scenarios.
Suggested Playbook Ideas:
On high severity or greater risky sign-ins with Azure AD Identity Protection, use the Graph API to revoke the user session. Session token theft is among the most common methods for threat actors to gain access to an environment, and revoking the sessions creates some inconvenience from having to reauthenticate but less business disruption than a full password reset.
Revoke user sessions (Graph API):
POST https://graph.microsoft.com/v1.0/me/revokeSignInSessions
Authorization: Bearer {token}
In the event another risky sign-in occurs from the same user within a 24 hour period, automate a password reset.
Reset user password (Graph API):
PATCH https://graph.microsoft.com/v1.0/users/{userId}
Authorization: Bearer {token}
Content-Type: application/json
{
"passwordProfile": {
"forceChangePasswordNextSignIn": true,
"password": "NewSecurePassword123!"
}
}
Requires: Proofpoint or other email solutions
Tools like Proofpoint can automatically detect phishing emails based on predefined rules and machine learning algorithms. When a phishing email is identified, the tool can quarantine the email, preventing it from reaching the user's inbox.
Why it’s valuable: This reduces the likelihood of a user falling for a phishing attack, saving time and potential security breaches.
What’s the risk: False positive identification of legitimate emails does happen and may slow business conversations.
Steps to set up automated phishing email remediation with Proofpoint:
While automated remediation offers significant benefits, it also comes with certain risks:
Automated systems may occasionally misidentify benign activities as malicious, leading to unnecessary disruptions. For example, isolating a non-compromised endpoint or resetting an un-compromised user's password can impact business operations. Regularly reviewing and refining detection rules can help minimize false positives.
Relying too heavily on automation can lead to complacency. Security teams should remain vigilant and continue to perform manual reviews and interventions when necessary. Automation should complement, not replace, human expertise.
Integrating various security tools and ensuring they work seamlessly together can be complex. Proper planning and testing are essential to avoid conflicts and ensure effective automation.
Automated remediation is a powerful strategy to enhance cybersecurity defenses with minimal effort. By focusing on high value scenarios such as EDR threat identification, risky Office 365 sign-ins, and phishing response, security professionals can significantly reduce the time to respond to incidents and mitigate risks. However, it’s crucial to balance automation with human oversight to ensure effective and reliable security operations.
Embrace automation, but do so wisely, and your security posture will be all the stronger for it.
At Prophet Security, we're building an AI SOC Analyst that applies human-level reasoning and analysis to triage and investigate every alert, without the need for playbooks or complex integrations. Request a demo of Prophet AI to learn how you can triage and investigate security alerts 10 times faster.
What is MFA fatigue attack?
Investigating geo-impossible travel alert
SOC metrics that matter
Automated incident response: streamlining your SecOps
Key SOC tools every security operations needs
Demystifying SOC automation
Alert triage and investigation in cybersecurity: best practices
SOC analyst challenges vs SOC manager challenges
Alert tuning best practices: keys to reducing false positives
How to investigate Okta alerts