ms-incident-response

Installation
SKILL.md

Microsoft Incident Response

Use when

  • The user reports a suspicious Microsoft alert, compromised account, mailbox abuse, endpoint compromise, or mixed identity plus endpoint activity.
  • The task is to classify a potential true positive, scope impact, contain active compromise, or write an incident summary.

Required inputs

  • Preferred inputs: UPN, device/host name, alert or incident ID, and a UTC time window.
  • If the user principal name or host is missing, ask for it before querying Microsoft data.

Workflow

  1. Classify the alert.
  2. Build the timeline.
    • Use scripts/extract_entities.py to pull users, hosts, IPs, hashes, and domains from alert exports.
    • Normalize all timestamps to UTC and keep first-seen and last-seen ordering.
  3. Investigate identity.
Related skills

More from crtvrffnrt/skills

Installs
5
GitHub Stars
1
First Seen
Mar 30, 2026