How Intezer Autonomous SOC Works

Written by Intezer

    Share article
    FacebookTwitterLinkedInRedditCopy Link

    Top Blogs

    A complete walkthrough of how Intezer’s Autonomous SOC platform works, automating your incident response process to make your team more efficient and effective.

    In the rapidly evolving world of cybersecurity, the industry faces significant challenges: a growing shortage of skilled professionals. More threats, not enough time to respond. As the complexity and volume of threats increase, the demand for expertise in managing security operations far outstrips the available supply. This is where Intezer steps in. Our Autonomous SOC platform automates the incident response process, effectively augmenting your security team’s capabilities.

    This article provides a technical overview of how our platform works, from monitoring to reporting, automating functions traditionally managed by a Security Operations Center (SOC) team. We will delve into each stage of Intezer’s incident response process, explaining how we collect and analyze data, how we determine the risk level of each alert, and how we respond to confirmed threats — providing you with a comprehensive understanding of how Intezer works to keep your organization secure and team members happy.

    The Future of Autonomous SOC for Security Teams

    Let’s be clear about one thing — Autonomous SOC isn’t about replacing your team, it’s about extending your team. It’s about maximizing incident response automation within your organization, using technology that can operate without constant intervention and interaction (aka “autonomously”), so your team can do more with the resources you have and focus on the serious, escalated threats.

    Many companies already rely on outsourced SOC providers these days, but maximizing incident response automation with Intezer reduces the need for such services or replaces them. SOC automation is also more affordable than such providers, while ensuring an organization’s internal security operations are efficient and effective at handling evolving and advanced threats.

    How Intezer Autonomous SOC Mimicks Expert Security Analysts

    Our Autonomous SOC platform is designed to mimic the actions of an expert human analyst, collecting as much evidence as possible, conducting thorough investigations, and making informed decisions based on the data. By automating these processes, we allow your security team to focus on their core responsibilities, improving efficiency and effectiveness. All without requiring you to build custom workflows or complicated playbooks.

    To provide a clear understanding of how Intezer works, here’s a high-level overview of our process:

    1. Monitor – Intezer continuously monitors and collects alerts 24/7 from your integrated security tools, ensuring that no potential threat goes unnoticed.
    2. Collect Evidence – Upon receiving an incoming alert, Intezer collects all relevant data associated with the alert, including files, processes, command lines, evidence from process arguments, URLs, IPs, parent and child processes, memory images, and more.
    3. Investigate – Intezer analyzes each piece of collected evidence using a variety of sophisticated techniques, including sandboxing, genetic analysis, static analysis, open-source intelligence (OSINT), memory analysis, and reverse engineering. The results of these individual analyses are then summarized into a cohesive incident-wide assessment using AI models.
    4. Triage – Intezer categorizes the risk associated with each alert and decides whether to escalate it based on the investigation results. In addition, Intezer reduces noise by auto remediating false positives within your detection systems, since these require no other action.
    5. Respond – For confirmed threats, Intezer provides assessments and recommendations, including detection content and ready-to-use hunting rules, to guide the response process. Intezer can also conduct automated deeper forensics if needed.
    6. Report – Intezer generates weekly reports to keep your team informed and provide tuning suggestions, allowing for continuous improvement in your security operations.

    By automating these processes, Intezer enhances the efficiency and effectiveness of your security team, allowing you to focus on their core responsibilities.

    how intezer automates incident response process for cybersecurity teams

    1. Alert Monitoring by Intezer 24/7

    Our Autonomous SOC platform connects directly to your alert sources via API Key, and within the same hour, it starts ingesting alerts automatically 24/7. This ensures a seamless and immediate integration of our system with your existing security infrastructure.

    The main alert source Intezer supports are endpoint security tools (CrowdStrike, SentinelOne, and Microsoft Defender). These tools are widely used in the industry and generally provide the most important alerts for our platform to analyze, as they provide the deepest visibility to assets in the organization. Importantly, Intezer pulls the alerts directly from these endpoint security tools using their APIs, ensuring real-time, accurate data for analysis.  Intezer monitors ALL types of alerts, including fileless threats and alerts that are based on suspicious activity.

    In addition to endpoint security tools, we also connect with Security Orchestration, Automation, and Response (SOAR) tools through a dedicated app in each of those vendors’ marketplace. Since Intezer and SOAR tools use different kinds of automation, they can be effectively used together. This can allow security teams to simplify playbooks (some may even be entirely replace) or automate even more processes, by combining an existing SOAR tool with powerful automation from Intezer. Currently, we support Splunk Phantom, XSOAR, and Chronicle (previously Siemplify). Connecting via SOAR allows our users to leverage Intezer’s decision-making and analysis capabilities for a wide range of custom alert sources and playbooks, including the investigation of suspicious emails and employee-reported phishing

    Through the smart combination of Intezer with your existing security tools, your team should be able to automate much more of your incident response process. We are also committed to expanding Intezer’s integration capabilities to meet your evolving security stack.

    2. How Intezer Automatically Collects and Extracts Evidence

    Once an alert is detected, the next step is to collect evidence. This involves gathering all relevant data associated with the alert, a process that mirrors what an expert human analyst would do. The goal is to collect as much evidence as possible to provide a comprehensive view of the potential threat.

    The types of evidence Intezer collects are wide-ranging and thorough. They include files, processes, command lines, evidence from process arguments, URLs, parent and child processes, memory images, and more. As a SOC analyst would, Intezer extracts evidence related to the incident whether it is a fileless PowerShell-based ransomware attack, or a obfuscated malicious file. This extensive collection of evidence allows Intezer to gain a deep understanding of the alert and the potential threat it represents.

    We collect this evidence using the API of the security tool that fired the alert and the API of the endpoint security tool. This approach allows us to gather both textual information from the raw alert data, such as IPs/URLs, and actual artifacts from the endpoint, such as files and processes. 

    It’s important to note that the automatic collection of many artifacts from endpoints is a complex task. It requires sophisticated engineering to handle edge-cases, reduce duplicates, and more. However, at Intezer, we have invested heavily in developing the capabilities to carry out this task effectively and efficiently. This ensures that our platform can provide the most comprehensive and accurate analysis of each alert, allowing your security team to respond effectively to each potential threat.

    3. Investigating Incidents with Deep Analysis

    The investigation stage is where Intezer truly shines. Analyzing evidence is a critical part of our incident response process, where the goal is to assign a verdict (true/false positive), risk level, and recommended next steps for each alert. This is achieved by conducting a thorough investigation of each piece of evidence separately, assigning a verdict (malicious, trusted, and others), and classification (malware family, threat actor, or software vendor in case it is trusted) for each individual piece of evidence. 

    Each individual artifact is analyzed using a variety of sophisticated techniques. All Intezer plans include sandboxing, as well as proprietary genetic analysis, static analysis, open-source intelligence (OSINT), memory analysis, and reverse engineering. These techniques allow us to gain a deep understanding of the behavior of the threat, its origin, and its potential impact.

    Once all individual pieces of evidence have been analyzed, we then provide an assessment for the entire alert, taking into account the investigation results of multiple pieces of evidence. This summary of all individual analyses into a coherent incident-wide verdict, risk level, and recommended next steps is done via smart machine learning models and AI algorithms. 

    The alert investigation summary can be seen either in Intezer’s alert report, inside your connected security tool that fired the alert, or alternatively via our API.

    This approach makes it easy for the user to understand the overall assessment while still enabling the user to dig into each individual artifact and explore why exactly we came to a certain conclusion. By providing both a high-level overview and detailed analysis, we ensure that your security team has all the information they need to respond effectively to each potential threat.

    how Intezer investigates like a soc analyst

    4. Automating Triage Decisions for Incident Response

    This triage stage is where we determine the appropriate response, based on the risk level determined in the investigation stage. Here Intezer decides whether an alert should be escalated or automatically remediated as a false positive.

    Escalated alerts are those that our platform identifies as requiring further attention. They are unmitigated, confirmed threats which now require human intervention. Threat escalations can be sent as notifications via email or any other webhook-supported system, as described in our documentation. The notification method is configurable by the user, allowing for seamless integration with your existing SOAR playbooks or ServiceNow security operations workflow.

    escalated cyber threat confirmed by Intezer Autonomous SOC

    The decision to escalate an alert is not made lightly. It combines both Intezer’s sophisticated algorithm and the user’s configuration to suit the security team’s policies and workflows. Our algorithm takes into account both the investigation results done by Intezer as well as information from the security tool that originally fired the alert, to ensure maximum efficacy. For more information on how we handle incident escalations, please refer to our dedicated article about Threat Escalations.

    Intezer’s unique technology for analyzing code reuse can provide critical information that allows it to accurately determine false positive alerts. As these require no further action, Intezer

    On the other hand, alerts that are determined to be false positives can be automatically resolved within the tool that originally fired the alert. This feature is designed to reduce noise and ensure that your security team can focus on the alerts that truly matter. By automating this process, we save your team from time wasted on false positives and too many escalated alerts.

    automated incident response process for false positives and escalated threats

    5. Responding to Confirmed Threats

    The response stage is all about taking action. Based on the recommended next steps determined in the investigation stage, Intezer acts to mitigate the potential threat.

    The possible responses can vary depending on the nature of the threat and the recommended next steps. They can include conducting deeper forensics on the endpoint, applying Indicators of Compromise (IOCs) and other hunting rules, or other recommended next steps that are based on industry best practices.

    In this stage, Intezer leverages your integrated security tools to carry out these actions. For example, using your endpoint security tool, Intezer can remotely execute its memory scanner to conduct deeper forensics on a suspicious endpoint, if needed. This is a valuable feature for detecting fileless attacks and traces of in-memory threats. Intezer’s memory scanner allows us to automatically gather more information about the threat for you and develop a more effective response.

    Looking ahead, we are working on expanding our response capabilities to automatically apply IOCs and hunting rules directly to your security tools. This will further streamline the response process, allowing your security team to respond to threats more quickly and effectively.

    6. Reporting on Automated Incident Response

    The final stage in our process is reporting. Intezer generates weekly Autonomous SOC Reports to keep your team focused on what matters most and provide tuning suggestions. These reports provide a clear and concise summary of all the threats detected and actions taken during the week, allowing your team to easily track progress and adjust strategies as necessary.

    autonomous soc report about automated incident response processes

    How is Intezer different from Incident Response “Playbooks?”

    While some tasks in Intezer’s six-step incident response process can be automated with SOAR playbooks or other security automation products, there are several key differences that set Intezer’s Autonomous SOC solution apart.

    First, most tasks in traditional incident response playbooks still require significant human involvement due to the decision-making needed. This includes deciding if an alert is a false positive or not, when to escalate, and more. Intezer’s platform on the other hand uses sophisticated algorithms to make decisions like an experience SOC analyst, reducing the need for human intervention.

    Second, truly automating tier-1 triage requires heavy custom engineering to create production-ready playbooks. For example, collecting a variety of evidence from actual endpoints, while addressing many edge-cases, is a challenging task to develop. Intezer has invested heavily in this area, developing capabilities that can handle these complex tasks effectively and efficiently.

    Third, even if you manage to do the required complex engineering, you often end up with large playbooks that are hard to maintain and keep up-to-date. This includes the need to maintain licenses and up-to-date logic of numerous third-party products to help automate the alert triage process for incident response, including a sandbox, URL scanner, reverse engineering platform, reputation databases, and more. Intezer’s platform, however, is designed to function as an all-in-one analysis platform for incident response, reducing the burden on your security team.

    endpoint and email phishing security incident response playbooks
    Intezer’s native incident response automation doesn’t require any engineering to set up, and it can integrate with SOAR tools to make existing incident response playbooks more effective and efficient.

    Want to know more about the difference between Intezer and SOAR platforms? Check out our blog here to learn about how Intezer and SOAR tools can work together in a complimentary way.

    Learn more about Intezer Autonomous SOC

    Discover how Intezer can help you automate alert triage and decision-making processes for security alerts — schedule your demo now. Our expert team can answer your questions about how Intezer can make your security operations even more effective and efficient.


    Count on Intezer’s Autonomous SOC solution to handle the security operations grunt work.

    Generic filters
    Exact matches only
    Search in title
    Search in content
    Search in excerpt