Audiences

Defender

A starting point for defenders, analysts, and responders handling suspicious activity, phishing, and account-risk investigations.

This page defines the defender lane for analysts and responders who triage suspicious activity, contain active risk, preserve evidence, and escalate when incident criteria are met.

1. Problem this page solves

Defender work fails when triage, containment, and escalation happen without explicit decision ownership and evidence thresholds.

This page gives the first-pass path so defender decisions stay fast, auditable, and proportional under uncertainty.

2. What you should understand after reading

After this page, you should understand:

  • the defender role boundary: validate signals, contain risk, preserve evidence, escalate at decision gates
  • what to read first before acting on alerts or reports
  • which incident decisions you own and which you hand off
  • how to separate observed facts from inferred conclusions
  • what to defer until the active case loop is complete

3. Mechanism-first role path

Read first (in order)

  1. Evidence
  2. Operations
  3. Do I Need to Escalate?
  4. What Evidence Is Required?
  5. Authorization Model
  6. Investigating a Phishing Report

Decisions you own in this role

DecisionWhat you ownPrimary pages
Triage classificationDecide whether signals are informational, suspicious, or confirmed malicious based on available artifactsEvidence, Operations
Containment selectionApply the least disruptive containment that reduces live risk while preserving future investigation valueOperations, Runbooks
Escalation triggerEscalate when compromise indicators, privileged exposure, spread potential, or boundary uncertainty exceeds defender authorityDo I Need to Escalate?, Authorization Model
Evidence sufficiencyEnsure case artifacts support later approval, incident review, and post-incident decisionsWhat Evidence Is Required?, Evidence

Defer initially

Defer these until the current case is triaged and either contained or escalated:

  • integration authoring and connector implementation detail in Integration Author
  • field-level receipt internals in Receipt Spec
  • scenario catalog pages that do not match the active incident type

4. Observed vs inferred

LayerWhat is observedWhat is inferred
Alert and artifact reviewmessage/header artifacts, sender infrastructure data, auth results, linked indicators, timeline eventsattacker intent, campaign attribution, full blast radius
Containment and responseaccount disable/reset actions, mail-flow blocks, endpoint/network controls, timestamps, case notescertainty that all persistence paths are removed
Escalation readinessexplicit evidence gaps, policy boundary breaches, privileged impact signalsbusiness impact severity beyond currently observed evidence

Treat inferred conclusions as hypotheses until additional evidence confirms them.

5. Role-specific trust assumptions

Operate with these assumptions explicit:

  • Incoming signals are imperfect: user reports, alerts, and artifacts may be incomplete, delayed, or intentionally deceptive.
  • Evidence timing lags risk: containment may begin before evidence is complete; record what was known at each decision point.
  • Escalation timing is a control: delaying escalation can increase impact, while premature escalation can disrupt operations without added safety.
  • Scope and approval boundaries are configuration-backed: defender actions still depend on accurate policy and workflow configuration.
  • Runtime integrity is assumed: host or key compromise invalidates workflow and evidence guarantees.
  • Receipts attest execution, not correctness: they prove what ran and what was captured, not whether your analytic conclusion is true.

See Threat Model for the full trust boundary map.

6. Next-page handoff

Next, read Manager / Approver to align defender outputs with approval and risk-acceptance decisions.