Automated, Context-Rich Alert Triage with AI Insights

Intezer

TL;DR Intezer users can now view comprehensive triage assessments for alerts that Intezer ingests directly in the console, combining insights from multiple sources under one roof.

At Intezer, we constantly strive to automate more so SOC teams can focus on the serious threats that really matter. That’s why we are thrilled to announce the launch of our latest feature: the all-new Alert Report.

Merging Alert Source Data for Better Visibility

Our new Alert Report brings you undifferentiated triage like never before. Seamlessly merging ingested alert data from your integrated alerting tools with Intezer’s automated evidence collection and comprehensive analysis, we provide a consolidated view that equips you with the context and visibility you need to conduct effective investigations.

alert triage page for Microsoft Defender integration
Alert Report for an unmitigated Microsoft Defender endpoint alert, analyzed by Intezer and classified as a known Formbook threat.

Once an alert is automatically triaged, Intezer generates an extensive alert report that arms you with the following critical information:

  • Alert Triage Verdict: Indicates the triaged verdict based on code reuse and analysis of other artifacts.
  • Classification (Malware Family): Specifies the threat classification based on code reuse findings. 
  • Alert Triage Risk: We assign a risk level to each ingested alert, enabling you to prioritize your actions and allocate resources accordingly. 
  • Recommended Actions:  Specifies the recommended actions for your team to remediate.

In addition, the Alert Report aggregates all the evidence that was collected and analyzed as part of triaging a certain ingested alert and presents it under one roof. For example, a CrowdStrike alert can result in Intezer collecting a suspicious file, a URL that was seen in the command line in that alert, and even a live memory scan of the machine. All those artifacts and their associated analysis would be easily accessible on the Alert Report of that CrowdStrike alert.

automated security operations alert triage workflow using artificial intelligence
Automated workflow designed using Intezer’s AI Framework.

The Alert Report effortlessly combines this information with the data retrieved from your alerting tools, such as endpoint security, email security, and more. Critical details like mitigation status, OS version, process command line, and others are seamlessly integrated, offering you a complete and accurate detection and triage experience. You’ll also see AI Insight, giving you important information about scripts and macros, or phishing emails.

This capability is particularly advantageous when it comes to detecting memory-based threats, PowerShell, and LoTL (Living-off-the-Land) threats. Threats that lack files can be elusive, hiding within scripts or command lines. However, with our new Alert Report and Ingested Alerts page, you can accurately identify and handle these evasive threats with ease.

Integrate Smart Alert Triage Assessments with Your Security Tools

Excitingly, the complete alert triage assessment that you find in the new Alert Report is also available through our API, allowing security teams to seamlessly connect Intezer’s automated decision making and analysis with your preferred tools (like for reported phishing, endpoint security, SOAR, or SIEM). Previously the Intezer API only provided ways to leverage Intezer for individual analysis of files and other artifacts, now, you can enjoy the same comprehensive insights for an entire incident or alert. You can also get these insights sent directly to your tool of choice, such as ServiceNow for case management, integrating smart decision making seamlessly with your day-to-day workflows.

For example, you can use the Intezer API to get the verdict (false/true positive) and recommended actions for a specific SentinelOne alert ID, to build a playbook that runs custom actions based on the response. 

Refer to our API documentation for detailed information about how to interact with this capability.

Get Started with AI-Powered Alert Triage

By delivering accurate and in-depth triage, Intezer fulfills its promise of equipping SOC teams with the tools they need to save precious time and prioritize what matters most. 

Want to learn more about our latest product releases and how Intezer could help your team automate your security operation processes? Book a demo with us.

Intezer

Count on Intezer Forensic AI SOC to triage, investigate and respond to every alert at unmatched speed and accuracy.

In this article

Share this article
Recommended Blogs
blog cover for AI SOC: When to buy and when to DIY
5MIN READ

AI SOC: When to buy and when to DIY

The question worth asking isn't "build or buy?" It's a more precise one. Which parts of this problem are worth your engineers' time, and which parts aren't?
Illustration of multiple risk gauge meters representing varying security threat levels
5MIN READ

AI SOC for teams outgrowing MDR

For teams that have outgrown their MDR, the answer isn’t a better MDR. It’s a different operating model.
Illustration of a cube with connected nodes representing security integrations
3MIN READ

Intezer’s 2025 momentum reflects rapid adoption of AI SOC in global enterprise 

Enterprises are adopting AI SOC as the new model for running security operations. This shift is reflected clearly in Intezer’s momentum over the past year.