Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines
News

How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines

Team-CWDBy Team-CWDSeptember 28, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Run by the team at workflow orchestration and AI platform Tines, the Tines library features over 1,000 pre-built workflows shared by security practitioners from across the community – all free to import and deploy through the platform’s Community Edition.

The workflow we are highlighting streamlines security alert handling by automatically identifying and executing the appropriate Standard Operating Procedures (SOPs) from Confluence. When an alert triggers, AI agents analyze it, locate relevant SOPs, and perform required remediation steps – all while keeping the on-call team informed via Slack.

It was created by Michael Tolan, Security Researcher L2 at Tines, and Peter Wrenn, Senior Solutions Engineer at Tines.

In this guide, we’ll share an overview of the workflow, plus step-by-step instructions for getting it up and running.

The problem – manual alert triage and SOP execution

For security teams, responding to alerts efficiently requires quickly identifying the threat type, locating the appropriate SOP, and executing the required remediation steps.

From a workflow perspective, teams often have to:

  • Manually analyze incoming security alerts
  • Search through Confluence for relevant SOPs
  • Document findings and actions in case management systems
  • Execute multiple remediation steps across different security tools
  • Update the case management system again after the fact
  • Notify stakeholders about incidents and actions taken

This manual process is time-consuming, prone to human error, and can lead to inconsistent handling of similar alerts.

The solution – AI-powered alert triage with automated SOP execution

This prebuilt workflow automates the entire alert triage process by leveraging AI agents and Confluence SOPs. The workflow helps security teams respond faster and more consistently by:

  • Using AI to analyze and classify incoming alerts
  • Automatically locating relevant SOPs in Confluence
  • Creating structured case records for tracking
  • Deploying a second AI agent (subagent) to execute remediation steps
  • Documenting all actions and notifying the on-call team via Slack

The result is a streamlined response to security alerts that ensures consistent handling according to established procedures.

Key benefits of this workflow

  • Reduced mean time to remediation (MTTR)
  • Consistent application of security procedures
  • Comprehensive documentation of all actions taken
  • Reduced analyst fatigue from repetitive tasks
  • Improved visibility through automated notifications

Workflow overview

Tools used:

  • Tines – workflow orchestration and AI platform (free Community Edition available)
  • Confluence – knowledge management platform for SOPs

This specific workflow also uses the following pieces of software. However, you can use whatever enrichment/remediation tools currently existing within your technology stack alongside Tines and Confluence.

  • CrowdStrike – threat intelligence and EDR platform
  • AbuseIPDB – IP reputation database
  • EmailRep – email reputation service
  • Okta – identity and access management
  • Slack – team collaboration platform
  • Tavily – AI research tool
  • URLScan.io – URL analysis service
  • VirusTotal – file and URL scanning service

How it works

Part 1: Alert Ingestion and Analysis

  • Receive security alert from integrated security tools
  • AI agent analyzes the alert to determine type and severity
  • System searches Confluence for relevant SOPs based on alert classification
  • Create a case record with alert details and identified SOP

Part 2: Remediation and Documentation

  • Second AI agent reviews the case and SOP instructions
  • AI agent orchestrates remediation actions across appropriate security tools
  • All actions are documented in the case history
  • Slack notification is sent to the on-call team with alert details and actions taken

Configuring the workflow – step-by-step guide

1. Log into Tines or create a new account.

2. Navigate to the pre-built workflow in the library. Select import.

3. Set up your credentials

You’ll need credentials for all the tools used in this workflow. You can add or remove whatever tools you wish to suit your environment.

  • Confluence
  • CrowdStrike
  • AbuseIPDB
  • EmailRep
  • Okta
  • Slack
  • Tavily
  • URLScan.io
  • VirusTotal

From the credentials page, select New credential, scroll down to the relevant credential and complete the required fields. Follow the credential guides at explained.tines.com if you need help.

4. Configure your actions.

Set your environment variables. In this particular workflow, that specifically requires setting the Slack channel for notifications (hardcoded to #alerts by default, but can be adjusted in the Slack action).

5. Customize the AI prompts

The workflow includes two key AI agents:

  • Alert Analysis Agent: Customize the prompt to help identify alert types
  • Remediation Agent: Customize the prompt to guide remediation actions

6. Test the workflow.

Create a test alert to verify:

  • Alert is properly classified
  • Correct SOP is retrieved from Confluence
  • Case is created with appropriate details
  • Remediation steps are executed
  • Slack notification is sent

7. Publish and operationalize

Once tested, publish the workflow and integrate with your security tools to begin receiving live alerts.

If you’d like to test this workflow, you can sign up for a free Tines account.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.





Source

computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates data breach hacker news hacking news how to hack information security network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNCA Arrest Man as HardBit Ransomware Blamed for Airport Outages
Next Article European Police Bust €100m Crypto-Fraud Ring
Team-CWD
  • Website

Related Posts

News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What are brushing scams and how do I stay safe?

December 24, 2025

Children and chatbots: What parents should know

January 23, 2026

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.