Skip to main content
Ctrl+K
Rules Bank  documentation - Home
  • ADK Runbooks

ADK Multi-Agent System

  • Multi-Agent Systems in ADK
  • Multi-Agent Configuration System
  • Configuration-Based Delegation System
  • Configuration System Quick Reference
  • Agent Workflow References

Core Documents:

  • Indicator Handling Protocols
  • Detection Strategy Overview
  • Project Plan: Enhance LLM Agent Context
  • MCP Tool Best Practices & Usage Guide
  • Analytical Query Patterns for AI Agents
  • Automated Response Playbook Criteria
  • Coding Conventions
  • Data Normalization Map
  • Detection Improvement Process for AI Agents
  • Log Source Overview
  • SOP & Automation Effectiveness Review Process

AI Documents:

  • AI Documentation
    • AI Decision Review Guidelines
    • AI Explainability Standards
    • AI Performance Framework: PICERL Index
    • AI Performance Logging Requirements

Atomic Runbooks:

  • Atomic Runbooks
    • Domain-Specific Atomic Runbooks
      • Atomic Runbook: Get Domain Reputation from GTI
      • Atomic Runbook: Get Domain Threat Intel via SecOps MCP
      • Atomic Runbook: Lookup Domain Entity Activity in Chronicle
      • Atomic Runbook: Search Domain DNS Queries in Chronicle
      • Atomic Runbook: Search Domain-Related Network Traffic in Chronicle
    • File Hash-Specific Atomic Runbooks
      • Atomic Runbook: Get File Hash Reputation from GTI
      • Atomic Runbook: Get File Hash Threat Intel via SecOps MCP
      • Atomic Runbook: Lookup File Hash Entity Activity in Chronicle
      • Atomic Runbook: Search File Hash Process Events in Chronicle
    • IP Address-Specific Atomic Runbooks
      • Atomic Runbook: Get IP Address Reputation from GTI
      • Atomic Runbook: Get IP Address Threat Intel via SecOps MCP
      • Atomic Runbook: Lookup IP Entity Activity in Chronicle
      • Atomic Runbook: Search IP Network Traffic in Chronicle
    • URL-Specific Atomic Runbooks
      • Atomic Runbook: Get URL Reputation from GTI
      • Atomic Runbook: Get URL Threat Intel via SecOps MCP
      • Atomic Runbook: Search URL Activity in Chronicle
    • User-Specific Atomic Runbooks
      • Atomic Runbook: Lookup User Entity Activity in Chronicle
      • Atomic Runbook: Search User Login Activity in Chronicle
      • Atomic Runbook: Search User Process Activity in Chronicle

General Security Runbooks:

  • General Security Runbooks
    • Advanced Threat Hunting (Hypothesis-Driven) Runbook
    • Alert Investigation Summary Report Runbook
    • Runbook: APT Threat Hunt
    • Basic Endpoint Triage & Isolation Runbook
    • Basic IOC Enrichment Runbook
    • Case Event Timeline & Process Analysis Workflow
    • Runbook: Generate Case Investigation Report
    • Close duplicate/similar Cases Workflow
    • Cloud Vulnerability Triage & Contextualization
    • Common Investigation Steps
      • Common Step: Check for Duplicate/Similar SOAR Cases
      • Common Step: Close SOAR Case or Alert
      • Common Step: Confirm Action with User
      • Common Step: Correlate IOC with SIEM Alerts & SOAR Cases
      • Common Step: Document Findings/Actions in SOAR Case
      • Common Step: Enrich IOC (GTI + SIEM)
      • Common Step: Find Relevant SOAR Case
      • Common Step: Generate Report File
      • Common Step: Pivot on IOC using GTI Relationships
    • Compare GTI Collection to IoCs, Events in SecOps
    • Runbook: Create Investigation Report
    • Runbook: Data Lake Queries
    • Deep Dive IOC Analysis Runbook
    • SOC Analyst Tier 2 Demo Runbook (SOAR Focus)
    • Runbook: Detection-as-Code Workflow (Placeholder)
    • Runbook: Generate Detection Report
    • Detection Rule Validation & Tuning Runbook
    • Group Cases Workflow
    • Runbook: Group Cases v2
    • Guided TTP Hunt Runbook (Example: Credential Access)
    • Guidelines and Workflows
      • Runbook: Report Writing Guidelines & Template
      • Runbook Guidelines
      • Runbook: SOC Analyst Standard Workflow Guide
      • Runbook: Threat Intelligence Workflows
    • Investigate a Case + external tools
    • Investigate Google Threat Intelligence Collection ID (Enhanced)
    • IOC Containment Runbook
    • Runbook: IOC Threat Hunt
    • Incident Response Plans (IRPs)
      • Compromised User Account Incident Response Plan (IRP) / Runbook
      • Malware Incident Response Plan (IRP) Runbook
      • Phishing Incident Response Plan (IRP) / Runbook
      • Ransomware Incident Response Plan (IRP) / Runbook
    • Lateral Movement Detection Hunt (Example: PsExec/WMI)
    • Malware Triage Runbook
    • Runbook: Meta-Analysis (Placeholder)
    • Post-Incident Review (PIR) Runbook
    • Prioritize and Investigate a Case
    • Proactive Threat Hunting based on GTI Campaign/Actor
    • Suspicious Login Alert Triage Runbook
    • Runbook: Alert Triage
    • Runbook: UEBA Report Analysis
  • Detection-as-Code Rule Tuning Workflow

Templates & Use Cases:

  • Detection Use-Case Package: [USE_CASE_NAME_Placeholder]
  • Atomic Runbook: [Clear, Verb-Oriented Title - e.g., Get_IP_Reputation_From_GTI]
  • Reporting Templates & Guidelines

Security Personas:

  • Security Personas
    • Security Personas
    • Persona: Chief Information Security Officer (CISO)
    • Persona: Compliance Manager
    • Persona: Cyber Threat Intelligence (CTI) Researcher
    • Persona: Detection Engineer
    • Persona: Incident Responder (IR)
    • Persona: Red Team Member
    • Persona: Security Engineer
    • Persona: Tier 1 SOC Analyst
    • Persona: Tier 2 SOC Analyst
    • Persona: Tier 3 SOC Analyst
    • Persona: SOC Manager
    • Persona: Threat Hunter

Agent Workflow References:

  • Agent Workflow References

MCP Tools Integration:

  • Suggested New MCP Tools
  • SOAR MCP Tools Reference
  • SecOps MCP Tools Reference
  • SCC MCP Tools Reference

Development & Planning:

  • Project Plan: Enhance LLM Agent Context
  • Repository
  • Suggest edit
  • Open issue
  • .md

Atomic Runbook: Search Domain-Related Network Traffic in Chronicle

Contents

  • Inputs Required
  • Execution Steps
  • Outputs Expected
  • Decision Logic / Next Steps (If Applicable)
  • AI Agent Execution Notes
  • Metrics Collection Points
  • References

Atomic Runbook: Search Domain-Related Network Traffic in Chronicle#

ID: RB-ATOM-DOMAIN-005 Version: 1.0 Last_Updated: 2025-05-30 Purpose: To perform a detailed search for network traffic events potentially related to a specific domain/FQDN. This often involves searching for connections to/from IP addresses previously resolved from the domain. Parent_Runbook(s)/Protocol(s): rules-bank/indicator_handling_protocols.md#2-atomic-indicator-domain-name--fqdn, rb_domain_search_dns_chronicle.md Trigger: When network connection details related to a domain are needed, typically after identifying IPs resolved from the domain or if direct domain logging is sparse.


Inputs Required#

  • domain_name: string - The domain name or FQDN under investigation.

    • Source Example: Alert field, output from other enrichment runbooks.

  • resolved_ips (optional): list - A list of IP addresses known to be associated with the domain_name (e.g., from rb_domain_get_gti_report.md or rb_domain_search_dns_chronicle.md).

    • Source Example: Output from rb_domain_search_dns_chronicle.md.

  • hours_back (optional): integer - How many hours of historical data to search. Defaults to 24.

  • max_events (optional): integer - Maximum event records to return. Defaults to 100.

  • additional_query_terms (optional): string - Additional UDM filter conditions.


Execution Steps#

  1. Tool Selection:

    • Primary_Tool_MCP_Server: secops-mcp

    • Primary_Tool_Name: search_security_events

  2. Query Construction (for text parameter of the tool):

    • Strategy 1 (Direct Domain in URL/Hostname):

      • Query: “Network traffic where target.hostname CONTAINS ‘{domain_name}’ OR target.url CONTAINS ‘{domain_name}’”

    • Strategy 2 (Using Resolved IPs - if resolved_ips list is provided and not empty):

      • Construct an IP list string: "{ip1}", "{ip2}", ...

      • Query: “Network traffic where target.ip IN ({ip_list_string}) OR principal.ip IN ({ip_list_string})”

    • AI Agent Note: Prioritize Strategy 2 if resolved_ips are available, as it’s often more direct for network traffic. If not, use Strategy 1. Combine if necessary.

    • Append time window: “… in the last {hours_back} hours”

    • Append additional terms: “ {additional_query_terms}” (if provided).

    • Example text (Strategy 2): “Network traffic where target.ip IN (‘1.2.3.4’, ‘5.6.7.8’) OR principal.ip IN (‘1.2.3.4’, ‘5.6.7.8’) in the last 24 hours”

  3. Parameter Mapping:

    • Map constructed query to text.

    • Map hours_back to hours_back.

    • Map max_events to max_events.

  4. Execute Tool: Call search_security_events.

    • AI Agent Note: Refer to rules-bank/mcp_tool_best_practices.md.

  5. Data Transformation/Extraction:

    • Focus on events.events. Extract connection details: principal.ip, target.ip, target.port, network.application_protocol, network.direction.


Outputs Expected#

  • network_traffic_events: list - List of UDM network event records.

  • translated_udm_query: string.

  • total_events_matched: integer.

  • contacted_ips_ports: list - Unique list of (target.ip, target.port) tuples from events.

  • source_ips_contacting: list - Unique list of principal.ip from events.

  • output_status: string - [“Success”, “NoEventsFound”, “Failure”, “PartialSuccess_NoResolvedIPs”]

    • “PartialSuccess_NoResolvedIPs” if resolved_ips was empty and only Strategy 1 could be attempted.

  • output_message: string (if Failure).


Decision Logic / Next Steps (If Applicable)#

  • IF output_status is “Success”:

    • Log key findings.

    • Analyze events for suspicious patterns (e.g., specific ports, protocols, data volumes to/from IPs associated with the domain).

    • If new suspicious IPs are identified in contacted_ips_ports or source_ips_contacting that were not in the initial resolved_ips list, consider initiating IP-specific atomic runbooks for them.

    • Escalate if high-risk activity confirmed.

  • IF output_status is “NoEventsFound” or “PartialSuccess_NoResolvedIPs”:

    • Log result. This might indicate the domain is not actively being connected to/from, or only Strategy 1 was possible and yielded no results.

  • ELSE (output_status is “Failure”):

    • Log error: output_message.

    • Escalate: “Failed to search network traffic for domain {domain_name} in Chronicle.”


AI Agent Execution Notes#

  • If the resolved_ips list is very long, the AI might need to batch queries or summarize, as UDM query length can be a constraint.

  • Correlate findings with network_map.md and asset_inventory_guidelines.md.


Metrics Collection Points#

  • Log execution time.

  • Log output_status, number of network_traffic_events returned.

  • (Reference rules-bank/ai_performance_logging_requirements.md)


References#

  • rules-bank/mcp_tool_best_practices.md

  • rules-bank/indicator_handling_protocols.md

  • rules-bank/analytical_query_patterns.md

  • rules-bank/ai_performance_logging_requirements.md

previous

Atomic Runbook: Search Domain DNS Queries in Chronicle

next

File Hash-Specific Atomic Runbooks

Contents
  • Inputs Required
  • Execution Steps
  • Outputs Expected
  • Decision Logic / Next Steps (If Applicable)
  • AI Agent Execution Notes
  • Metrics Collection Points
  • References

By Your Name/Organization

© Copyright 2025, Your Name/Organization.