ms-incident-response
Microsoft Incident Response
Use when
- The user reports a suspicious Microsoft alert, compromised account, mailbox abuse, endpoint compromise, or mixed identity plus endpoint activity.
- The task is to classify a potential true positive, scope impact, contain active compromise, or write an incident summary.
Required inputs
- Preferred inputs:
UPN, device/host name, alert or incident ID, and a UTC time window. - If the user principal name or host is missing, ask for it before querying Microsoft data.
Workflow
- Classify the alert.
- Start with references/tp_indicators.md.
- Decide whether the event is identity-led, mailbox-led, endpoint-led, or mixed.
- Build the timeline.
- Use scripts/extract_entities.py to pull users, hosts, IPs, hashes, and domains from alert exports.
- Normalize all timestamps to UTC and keep first-seen and last-seen ordering.
- Investigate identity.
- Follow references/identity_analysis.md.
- Review sign-ins, risk events, MFA context, app consent, and post-authentication activity.
- Investigate mailbox and collaboration activity.
- Check inbox rules, forwarding, sent items, and Office audit events that show mailbox access or exfiltration.
- Investigate endpoint activity.
- Follow references/endpoint_triage.md.
- Review process trees, persistence, network destinations, downloads, and host isolation needs.
- Contain and eradicate.
- Revoke sessions, reset passwords, remove malicious rules or forwarding, remove suspicious OAuth consent, and isolate hosts when active malware or C2 is present.
- Report.
- Draft the final incident summary with assets/summary_report.md.
Microsoft Graph and az rest
- Prefer
az restfor Microsoft Graph and Entra queries. - Scope every query by
UPN, host, incident ID, or a narrow UTC window. - Use
v1.0when it exposes the required data; usebetaonly when the needed field is unavailable elsewhere. - Preserve raw evidence before making destructive changes such as session revocation or account blocking.
Operating rules
- Do not assume MFA means the account is safe.
- Do not alert the user before initial scoping if that could tip off an attacker.
- Treat missing telemetry as a limitation, not as proof of innocence.
- State clearly when a conclusion is an inference from partial logs.
Practical outputs
- A concise scope summary.
- A timeline of suspicious events.
- Containment actions already taken.
- Remaining gaps and recommended next checks.
More from crtvrffnrt/skills
pentest-xss
Security assessment skill for Cross-Site Scripting (XSS) vulnerabilities. Use when investigating input sanitization, reflected, stored, DOM, or blind XSS. Focuses on discovery, exploitation, and payload optimization. Do not use for generic network recon or non-web injection types.
37pentest-exploit-execution-payload-control
Security assessment skill for deterministic exploit execution from validated primitives. Use when prompts include exploit implementation, payload hardening, chaining confirmed weaknesses, post-exploitation proof, or controlled impact demonstration. Do not use for early-stage reconnaissance, speculative hypothesis generation, or report-only requests.
31pentest-recon-surface-analysis
Security assessment skill for reconnaissance, endpoint/service enumeration, and attack-surface mapping. Use when prompts include recon, enumerate, map endpoints, discover assets, inventory interfaces, fingerprint technologies, or identify control-plane surfaces. Do not use when the request is exploit development, payload execution, or final report writing only.
30pentest-business-logic-abuse
Security assessment skill for business workflow abuse, state-machine manipulation, and control-plane logic flaws. Use when prompts include workflow bypass, race condition, replay, quota abuse, order-of-operations flaws, delegated execution abuse, or unauthorized state transitions. Do not use for pure input injection fuzzing, broad recon, or standalone report formatting tasks.
27pentest-gemini-az
Use when users need an Azure, Microsoft 365, or Entra ID companion that reads, lists, changes, and manages resources using the current Azure CLI session, with `az rest` as the default execution path.
26pentest-outbound-interaction-oob-detection
Security assessment skill for outbound interaction and out-of-band (OOB) validation. Use when prompts include SSRF callback confirmation, blind XSS beacons, webhook abuse, XXE/OOB behavior, DNS/HTTP callback correlation, or asynchronous server-side interaction proof. Do not use when vulnerabilities are fully in-band and require no external callback correlation.
25