Claude for Security Operations
Workflow 1: Alert triage acceleration
You receive an alert. The first five minutes determine whether it escalates or closes. Claude accelerates the initial assessment — not by making the triage decision, but by structuring the analysis faster than manual review.
The triage prompt pattern follows the three-component structure from F3. Paste the alert details into a <alert> tag, define the assessment task, and specify the output format. Claude produces a field-by-field assessment that identifies which elements are normal and which are suspicious for your environment.
Worked artifact — alert triage prompt template:
<alert> Alert: Suspicious sign-in from non-corporate IP User: j.morrison@northgateeng.com IP: 203.0.113.91 Time: 2026-03-20 14:32 UTC App: Microsoft Office 365 AuthRequirement: singleFactorAuthentication Location: Lagos, Nigeria Device: Unknown ResultType: 0 (success) </alert> <task> Assess this alert for a UK-based engineering company. For each field, state whether it is normal or suspicious and why. Then provide an overall risk assessment (High/Medium/Low) and recommended next steps. </task> <output_format> Field-by-field assessment, then overall risk rating with recommended investigation steps. Be direct — no caveats. </output_format>Claude will flag the singleFactorAuthentication value (indicates token replay — MFA was not re-challenged), the Nigerian IP for a UK company, the unknown device, and the successful result. The overall assessment will be High risk with a recommendation to investigate as a potential AiTM compromise. Adapt the company context for your organization.
The key to effective triage prompts is including your organizational context. “A UK-based engineering company” tells Claude what is normal (UK IPs, corporate devices) and what is not (Nigerian IPs, unknown devices). Without this context, Claude cannot distinguish a true positive from a legitimate travel scenario.
For recurring alert types, create a Skill (F3) that defines your standard triage format. When you paste an alert and ask Claude to assess it, the Skill applies automatically — producing consistently formatted triage notes that match your SOC’s documentation standard.
Workflow 2: KQL query generation
Claude generates KQL queries from natural language descriptions. The quality depends entirely on the constraints you provide — the tables to use, the watchlists to reference, the time range, the fields to include, and the output format.
Worked artifact — KQL generation prompt template:
<task> Write a KQL query for Microsoft Sentinel that identifies inbox rules created with financial keyword targeting from non-corporate IP addresses. </task> <constraints> - Use the OfficeActivity table - Filter for Operation == "New-InboxRule" - Search rule parameters for keywords: invoice, payment, wire, bank, transfer, remittance - Exclude IPs in the CorporateExternalIPs watchlist - Include: TimeGenerated, UserId, ClientIP, Parameters - Time range: last 30 days - Add inline comments explaining each operator - Include MITRE ATT&CK mapping in the header comment </constraints> <output_format> KQL code block only. No prose explanation. </output_format>This prompt produces a deployable detection query on the first attempt because every constraint is explicit. Verify the table name and column names against your Sentinel schema before deploying.
The verification step is non-negotiable. Claude may generate a syntactically perfect query that references a column name that does not exist in your OfficeActivity table, or uses a KQL function with incorrect parameter ordering. Run every Claude-generated query in your lab workspace before deploying to production. The speed advantage comes from Claude writing the first draft in 30 seconds — not from skipping the 2-minute verification step.
If you have a Security Operations project (F2) with your Sentinel table schema uploaded as a reference document, Claude’s query accuracy improves significantly because it can reference your actual table and column names rather than guessing from training data.
Workflow 3: Log analysis
Upload a sanitized CSV export of sign-in logs, email events, or device activity. Ask Claude to identify patterns, anomalies, or specific indicators. Claude reads the column headers, understands the data structure, and produces categorized findings.
The analysis prompt should specify what you are looking for. “Analyze this data” produces a vague summary. “Identify sign-in events from non-corporate IPs that succeeded without MFA challenge, group them by user and IP, and flag any that occurred outside business hours (08:00-18:00 UTC)” produces specific, actionable findings.
For large datasets, pre-filter in Sentinel before uploading (F4). Upload the 200-500 most relevant rows, not the entire 50,000-row export. Claude analyzes focused datasets more effectively than large, unfocused ones.
After Claude identifies anomalies, verify each finding against the original data. Claude may misinterpret timestamp formats, miscalculate time differences, or misidentify a field value. The analysis is the starting point for your investigation — not the conclusion.
Workflow 4: Connector-powered investigation
With MCP Connectors enabled (F2), Claude can access external tools during the investigation without you switching applications.
Gmail Connector allows Claude to search your email for phishing reports, user complaints, or security notifications relevant to an active investigation. Ask Claude to “search my email for messages from j.morrison@northgateeng.com in the last 7 days” and it retrieves the results within the conversation.
Google Drive Connector allows Claude to pull documents — IR report templates, detection rule libraries, investigation checklists — from your shared drive without you downloading and uploading them separately.
Google Calendar Connector allows Claude to check schedules — incident bridge times, on-call rotations, or meeting conflicts — relevant to investigation coordination.
Slack Connector allows Claude to search channel messages for context — previous discussions about the affected user, related alerts mentioned by other analysts, or SOC channel updates about the incident.
The Connectors do not replace your investigation tools. They reduce the context-switching overhead — the time spent tabbing between email, drive, calendar, Slack, and the investigation workspace. When every tool is accessible within the conversation, the investigation flow is uninterrupted.
Permission controls matter. Configure each Connector with the minimum necessary permissions. Allow search and read access. Block send, delete, and modify actions. You want Claude to retrieve information — not take actions in your external systems during an investigation.
Try it: Run the complete triage workflow
Open your Security Operations project. Copy the alert triage prompt template from the worked artifact above. Replace the alert details with a real (sanitized) alert from your environment — a recent sign-in alert, an email alert, or a device alert. Run the prompt and evaluate Claude's assessment. Is the field-by-field analysis accurate? Does the risk rating match your own assessment? Are the recommended next steps actionable? This exercise calibrates your sense of where Claude's triage analysis adds value and where your judgment must override it.
Try it: Generate and verify a KQL query
Using the KQL generation prompt template, ask Claude to write a query for a detection scenario relevant to your environment — failed MFA attempts from unusual locations, inbox rule creation from external IPs, or sign-ins using legacy authentication protocols. Copy the generated query into your Sentinel lab workspace and run it. Does it execute without errors? Do the table and column names match your schema? Does the output contain the expected fields? If the query fails, identify what Claude got wrong (table name, column name, function syntax) and correct it. This exercise builds the verification habit that makes Claude-generated queries trustworthy.
Knowledge checks
Check your understanding
1. You paste an alert into Claude and it produces a triage assessment rating the alert as Low risk. The alert shows a successful sign-in from an IP in a country where your organization has no operations, with AuthenticationRequirement showing singleFactorAuthentication. What should you do?
2. Claude generates a KQL query that references "AADUserRiskEvents" — a table you have never seen in your Sentinel workspace. What is the most likely explanation?
3. You want Claude to search your Gmail for phishing report emails during an investigation, without leaving the Claude conversation. What feature enables this?
Key takeaways
Alert triage is accelerated, not automated. Claude produces a structured field-by-field assessment in seconds. The triage decision (escalate, investigate, close) remains with the analyst.
KQL generation requires verification. Claude writes the first draft in 30 seconds. You verify table names, column names, and logic in 2 minutes. The combination is faster than writing from scratch.
Log analysis needs focused data. Pre-filter to the relevant subset. Specify what you are looking for. Verify findings against the original data.
Connectors reduce context-switching. Gmail, Drive, Calendar, Slack — accessible within the investigation conversation. Configure with minimum necessary permissions.
Claude Essentials complete
You have finished Claude Essentials for Security Professionals. Ready to go deeper?
Explore Claude for Security Professionals →