Starting an Investigation
From the UI
Click New Investigation from the dashboard or sidebar. Select a persona and type your query in the chat interface.From the API
How Investigations Work
Every query is processed by SoCMate’s investigation engine. Each stage is visible in the UI as a real-time progress indicator.Entity Extraction
SoCMate extracts security entities from your query — IP addresses, usernames, hostnames, domains, file hashes, email addresses, and more. Each entity is tagged with a type and confidence score.
Intent Determination
The system classifies your investigation type: triage (quick assessment), investigation (deep dive), hunting (proactive threat search), or compliance (audit-focused).
Query Planning
Based on the entities and intent, SoCMate selects relevant Sentinel tables (e.g.,
SigninLogs, CommonSecurityLog, DeviceNetworkEvents) and defines a query strategy with time ranges.Query Generation
SoCMate generates optimized KQL queries using table metadata and schema information. Queries include proper filtering, projection, and sorting.
Execution
Each query runs against Microsoft Sentinel via the Azure Monitor API. Results are collected and cross-referenced.
Evidence Assessment
SoCMate evaluates whether the collected evidence adequately answers the original question. It checks question coverage, entity coverage, temporal coverage, and evidence quality. If gaps are found, additional queries are generated automatically.
Report Generation
A persona-aware report is generated. SOC Analyst reports include technical IOCs, KQL queries, and MITRE ATT&CK mappings. CISO reports include executive summaries and business impact assessments.
Personas
Personas control the tone, detail level, and structure of investigation reports.- SOC Analyst
- CISO
Technical reports tailored for hands-on analysts:
- Full technical details and raw data
- IOCs with copy-paste values
- KQL queries for manual verification
- MITRE ATT&CK technique IDs and descriptions
- Step-by-step remediation recommendations
- Timeline of observed events
Follow-Up Questions
You can ask follow-up questions in the same session. SoCMate retains full context from all prior queries, results, and entities.- All previously extracted entities are known
- Prior query results are available for cross-referencing
- The knowledge graph grows with each follow-up
Real-Time Streaming
Subscribe to investigation events via Server-Sent Events (SSE) or WebSocket:- SSE
- WebSocket
Event Types
| Event | Description |
|---|---|
run.started | Investigation has begun |
agent.event | Progress update (entity extraction, planning, etc.) |
agent.delta | Streaming report tokens (partial content) |
agent.message | Complete report response |
tool.call | Query execution with parameters and results |
entity.diagram | Entity relationship diagram generated |
clarification.needed | Investigation needs user input to continue |
error | Error during investigation |
run.completed | Investigation finished with final results |
Session Management
List Sessions
Pin a Session
Fork a Session
Create a copy of a session to explore a different line of investigation:Delete a Session
Investigation Results
The final investigation result includes:Search Past Investigations
Search across all completed investigations:hybrid(default) — Combined keyword and semantic vector searchkeyword— Traditional keyword matchingvector— Semantic similarity search
