Workbench Alerts
Investigate and analyze security alerts from Trend Micro Vision One Workbench. This skill provides read-only access to alert data for SOC analysts and incident responders.
Instructions
- •
When the user asks about security alerts, incidents, or wants to investigate suspicious activity, use this skill to query the Workbench.
- •
Start with alert listing: Use
list_workbench_alertsto get an overview of alerts matching the user's criteria (severity, time range, status). - •
Get alert details: When investigating a specific alert, use
get_workbench_alertwith the alert ID to retrieve full context including affected entities, indicators, and timeline. - •
Search for patterns: Use
get_workbench_alerts_listwhen you need to search across multiple alerts or correlate activity. - •
Prioritize by severity: When presenting alerts, organize by severity (critical > high > medium > low) and highlight actionable items.
- •
Correlate entities: Look for common entities (IPs, domains, users, endpoints) across alerts to identify attack patterns.
- •
Provide context: For each alert, explain the detection rule, potential impact, and recommended response actions.
Tools
This skill uses the following Vision One MCP tools (all read-only):
| Tool | Purpose |
|---|---|
list_workbench_alerts | List alerts with filtering by severity, status, time range |
get_workbench_alert | Get detailed information for a specific alert by ID |
get_workbench_alerts_list | Search and retrieve multiple alerts with advanced filters |
Common Workflows
Daily Alert Review
- •List alerts from the last 24 hours filtered by critical/high severity
- •For each alert, get details and summarize the threat
- •Group alerts by attack pattern or affected system
Incident Investigation
- •Get the specific alert details
- •Search for related alerts involving the same entities
- •Build a timeline of the attack progression
Alert Triage
- •List unresolved alerts by severity
- •Categorize by alert type (malware, phishing, lateral movement, etc.)
- •Prioritize based on affected asset criticality
Output Format
When presenting alerts, use this format:
## Alert Summary **Alert ID**: [ID] **Severity**: [Critical/High/Medium/Low] **Status**: [New/In Progress/Resolved] **Detected**: [Timestamp] ### Description [Brief description of the alert] ### Affected Entities - Endpoints: [list] - Users: [list] - IPs: [list] ### Indicators of Compromise - [IOC type]: [value] ### Recommended Actions 1. [Action item] 2. [Action item]
Security Considerations
- •This skill provides read-only access to alert data
- •Alert data may contain sensitive information about your environment
- •Use alert IDs when referencing specific alerts in reports
- •Do not share raw alert data outside authorized channels