Use Triage and Investigation Agent (TIN) to investigate alerts
The Triage and Investigation Agent (TIN) is an AI-powered investigation assistant embedded in Google Security Operations. It determines if the alerts are true or false positives, then provides a summarized explanation for its assessment.
TIN analyzes alerts in Google SecOps using Mandiant principles and industry best practices. It evaluates incoming alerts, executes an investigation plan, and provides a structured analysis that includes both its findings and reasoning.
For a list of IAM permissions required for using the agent, see Triage and Investigation Agent (TIN).
Investigation tools
The agent uses the following built-in tools to complete its analysis:
Dynamic search queries: Runs and refines searches in SecOps to collect additional context for the alert.
GTI enrichment: Enriches IoCs with Google Threat Intelligence (GTI) data, including domains, URLs, and hashes.
Command-line analysis: Analyzes command lines to explain actions in natural language.
Process tree reconstruction: Analyzes the processes in the alert to show the full sequence of related system activity.
Trigger TIN
You can trigger TIN automatically or manually. Each tenant can run up to 10 investigations per hour (5 manual and 5 automatic). Each investigation typically completes in an average of 60 seconds and runs for a maximum of 20 minutes. There's no investigation queue. The agent doesn't automatically analyze alerts generated beyond the limit.
Automatic investigations
The agent automatically investigates alerts that contain events with the relevant
metadata.log_type values.
The following table lists the supported metadata.log_type values and their sources:
| Source | metadata.log_type values |
|---|---|
| Amazon |
|
| Cisco |
|
| CrowdStrike |
|
| Fortinet |
|
|
|
| Microsoft |
|
| Okta |
|
| Other |
|
Manual investigations
To manually run an investigation:
In Google SecOps, go to the Alerts & IoCs page.
Select an alert and click Run Investigation.
You can also navigate to an alert in a case and run an investigation for it. The banner updates to View Investigation once the process completes. You can click this banner to view the details of an investigation.
Navigate to investigations
You can access past or in-progress investigations from anywhere in Google SecOps.
Click
in the Google SecOps interface.
Click
in the navigation panel.
Click keyboard_arrow_down next to the investigation list to expand the panel.
In the list, select an item to open the investigation results.
Each investigation entry includes the alert name, the completion time, and the Gemini investigation summary. If the same alert is investigated multiple times, each investigation appears as a separate entry on the investigation list.
Review an investigation
Each investigation opens in a detailed view that summarizes Gemini's analysis, its reasoning, and the supporting data it used.
This view has the following components:
- Summary
- Investigation timeline
- View an alert or re-run an investigation
- Suggested next steps
- Feedback
Summary
At the top of the panel, the Summary by Gemini section provides a brief description of the alert and the investigation's findings.
The summary provides the following information:
- Disposition: Indicates if Gemini determined the alert to be a true or false positive.
- Confidence level: Describes Gemini's confidence in its assessment. This assessment is based on the alert and available investigation data.
- Summary explanation: Describes the alert and how Gemini reached its conclusion.
Investigation timeline
TIN investigation follows a structured, multi-stage timeline designed to transform raw alerts into actionable intelligence. While these intermediate steps are primarily used by the agent to build context and refine its analysis, they are also visible within the Investigation timeline in the web interface, providing security analysts with clear visibility into the agent's investigation progress.
Initial assessment and risk prioritization
The investigation begins with an immediate evaluation of the alert to establish baseline context. During this stage, the agent automatically analyzes alert details and metadata to identify high-confidence benign activity. If an alert is classified as low risk, the agent concludes the investigation.
Contextual enrichment and evidence gathering
The agent executes several parallel analysis steps to build a comprehensive picture of the suspicious activity by leveraging internal and external intelligence:
Google Threat Intelligence (GTI) enrichment: Identifies and evaluates indicators of compromise (IoCs), such as file hashes, IP addresses, and domains against Google Threat Intelligence and VirusTotal to identify known malicious entities.
Entity Context Graph (ECG) analysis: Retrieves prevalence data, such as when an entity was first or last seen, to provide deeper environmental context and analyze relationships between entities.
Network context gathering: Extracts additional context related to network traffic by performing targeted searches to identify suspicious patterns.
Case metadata integration: Retrieves broader context from the case the alert belongs to, incorporating metadata such as tags and priority into the investigation.
Process tree construction: Constructs the execution hierarchy of system processes to help analysts understand exactly how a suspicious action was initiated and what subsequent actions it took.
Adaptive Investigation
Based on the findings from the earlier investigation steps, the agent dynamically determines the next course of action:
Evaluates findings: Assesses information gathered in previous steps to identify potential gaps or new avenues for inquiry.
Performs deep-dive research: Iteratively generates new plans and executes specialized tools, such as GTI enrichment, ECG analysis, advanced command-line analysis, or targeted searches to uncover hidden threats.
View an alert or re-run an investigation
The investigation panel lets you take the following actions:
- View alert: Opens the alert details in the Google SecOps SIEM view.
- Re-run investigation: Reruns the analysis for the same alert.
Suggested next steps
For all investigations, Gemini provides further investigation steps. These steps recommend additional actions or data sources for analysts to explore.
As the agent is updated, these suggestions can expand to include remediation guidance.
Feedback
Each investigation includes thumb_up Thumb Up and thumb_down Thumb Down icons to collect feedback. Focus your feedback on the severity verdict because this helps refine Gemini's threat classification.
Cloud audit logging
To enable audit logging for TIN:
- In the Google Google Cloud console, navigate to IAM > Audit Logging.
- Search for Chronicle API.
- In the Permission Types tab of the Chronicle API panel, select the Admin Read checkbox.
View audit logs
To view audit logs:
In the Google Google Cloud console, go to Monitoring > Logs Explorer.
Search for the logs you want to view.
To view all Google SecOps audit logs, search for
protoPayload.serviceName: "chronicle.googleapis.com".To see only TIN logs, search for the related methods.
For example,
protoPayload.method: "google.cloud.chronicle.v1alpha.InvestigationService.TriggerInvestigation"andprotoPayload.method: "google.cloud.chronicle.v1alpha.InvestigationService.GetInvestigation".
Need more help? Get answers from Community members and Google SecOps professionals.