Key Features
Natural Language Investigations
Ask questions in plain English. SoCMate translates them into optimized KQL queries, executes them against Sentinel, and returns structured investigation reports with risk scores, IOCs, and MITRE ATT&CK mappings.
Knowledge Graph
Every investigation enriches a persistent Neo4j knowledge graph of security entities — IPs, users, hosts, domains — and their relationships. Query the graph to discover connections across investigations.
Scheduled Investigations
Set up recurring investigations that run on a schedule. Monitor for brute force patterns, suspicious sign-ins, or anomalous network activity automatically, with notifications on findings.
Persona-Aware Reports
Get reports tailored to your role. SOC analysts receive technical IOCs, KQL queries, and MITRE mappings. CISOs receive executive summaries, business impact assessments, and compliance implications.
Real-Time Streaming
Watch investigations unfold in real time via Server-Sent Events. See each stage of the investigation pipeline — entity extraction, KQL generation, query execution, and summarization — as it happens.
Incident Sync
Automatically sync incidents from Microsoft Sentinel every 5 minutes. Enrich them with local notes, tags, and assignments. Launch investigations directly from incidents.
Architecture Overview
SoCMate is composed of four services that work together:| Service | Technology | Purpose |
|---|---|---|
| Frontend | Next.js 15, React 19 | Web UI with chat interface, dashboards, and knowledge graph visualization |
| Backend | FastAPI (Python 3.13) | API gateway handling auth, RBAC, search, and knowledge graph queries |
| Agent | FastAPI (Python 3.13) | SOC investigation engine with a 9-state KQL state machine |
| Worker | arq (Python 3.13) | Background tasks for incident sync and scheduled investigations |
How It Works
Infrastructure
SoCMate integrates with Azure-native services in production:| Component | Service |
|---|---|
| Authentication | Azure Entra ID (OAuth2 + RBAC) |
| Document Store | Azure DocumentDB (vCore) via MongoDB API |
| Cache & Queue | Azure Managed Redis |
| Knowledge Graph | Neo4j AuraDB |
| Search | Azure AI Search (hybrid keyword + vector) |
| SIEM | Microsoft Sentinel (KQL via Azure Monitor) |
| LLM Gateway | LiteLLM Proxy to Azure OpenAI and other providers |
Who Is SoCMate For?
- SOC Analysts who need to investigate security incidents faster, with natural language instead of manually writing KQL queries
- Security Engineers who want to automate recurring investigation patterns and build institutional knowledge
- CISOs and Security Leaders who need executive-level visibility into security posture and investigation outcomes
- Security teams looking to integrate AI-powered investigation into their existing SOAR workflows via API
Next Steps
Quickstart
Log in, run your first investigation, and explore the platform.
API Reference
Integrate SoCMate into your workflows with the REST API.
