Prerequisites
Before you begin, make sure you have:- An Azure Entra ID account with access to your organization’s SoCMate instance
- A connected Microsoft Sentinel workspace (configured by your admin)
Sign In
Navigate to SoCMate
Open your browser and go to your organization’s SoCMate URL (e.g.,
https://socmate.yourcompany.com).Authenticate with Azure Entra ID
Click Sign In and authenticate with your Azure Entra ID credentials. Complete MFA if prompted. You will be redirected to the SoCMate dashboard after successful authentication.
Run Your First Investigation
Start a new investigation
Click New Investigation from the dashboard or sidebar. This opens the investigation chat interface.
Select a persona
Choose the persona that matches how you want the report formatted:
- SOC Analyst — Technical details, IOCs, KQL queries, MITRE ATT&CK mappings
- CISO — Executive summary, business impact, compliance implications
Enter your query
Type a natural language question about a security concern. For example:SoCMate accepts any security-related question. You do not need to know KQL.
Watch the investigation unfold
SoCMate’s investigation engine processes your query in real time:
- Entity Extraction — Identifies security entities (IPs, users, hosts) in your query
- Intent Determination — Classifies the investigation type (triage, hunting, compliance)
- Query Planning — Selects relevant Sentinel tables and query strategy
- Query Generation — Produces optimized queries for Microsoft Sentinel
- Execution — Runs queries against Microsoft Sentinel
- Evidence Assessment — Evaluates whether the evidence answers your question
- Report Generation — Generates a structured report
Ask Follow-Up Questions
After receiving a report, you can ask follow-up questions in the same session. SoCMate retains full context from prior queries and results.Key Concepts
Investigation Session
A conversation thread between you and SoCMate. Each session can have multiple queries and follow-ups, all sharing context. Sessions are persisted and searchable.
Persona
Controls the tone, detail level, and structure of investigation reports. SOC Analyst personas produce technical reports; CISO personas produce executive summaries.
Knowledge Graph
A persistent graph of security entities (IPs, users, hosts, domains) and their relationships, built from investigation results. Entities discovered in one investigation are linked to entities from others.
Scheduled Investigation
A recurring investigation that runs automatically on a schedule (daily, weekly, monthly). Useful for monitoring patterns like failed sign-ins or anomalous network activity.
Navigating the Platform
| Section | What You’ll Find |
|---|---|
| Dashboard | Recent investigations, pinned sessions, incident summary |
| Investigations | Start new investigations, browse history, search past sessions |
| Incidents | Sentinel incidents synced automatically, with enrichment and investigation launch |
| Schedules | Create and manage recurring investigations |
| Knowledge Graph | Visual explorer for entities and relationships across investigations |
| Admin | SIEM providers, LLM models, users, API keys (admin role only) |
Next Steps
Investigations
Learn about advanced investigation features, capabilities, and the chat interface.
API Reference
Integrate SoCMate with your existing tools and workflows via the REST API.
