Skip to main content
Investigation Playbooks

SOC Investigation Playbooks

Step-by-step investigation guides for the most common alert types in a production SOC. Each playbook includes decision trees, copy-pasteable SIEM queries, common analyst mistakes, and hands-on practice scenarios in SOCSimulator Operations.

15Playbooks
75+Investigation Steps
156+SIEM Queries
Core Concept

What is an Investigation Playbook?

An investigation playbook is a structured, step-by-step guide that tells a SOC analyst exactly what to do when a specific alert fires. Rather than relying on memory or tribal knowledge, playbooks codify the best investigation process for each alert type, covering what data to collect, which queries to run, how to interpret results, and when to escalate. Well-written playbooks reduce mean time to respond (MTTR), ensure consistent analysis quality across analysts with different experience levels, and create a documented audit trail for compliance.

These playbooks are written for working SOC analysts who face real pressure to triage alerts quickly and accurately. Each one follows an answer-first format: the summary at the top gives you the key actions, and the detailed steps walk you through the full investigation. You can practice the scenarios described here inside SOCSimulator Operations rooms or stress-test your speed in Shift Mode. Start free forever, no credit card required.

Investigation Playbook
A documented, repeatable procedure that guides SOC analysts through the investigation of a specific alert type, from initial triage to containment or closure. Playbooks standardize the investigation process, reduce analyst error, and ensure consistent response quality across shifts and experience levels.

Organizations with formal incident response playbooks identify breaches 54 days faster and save an average of $2.66 million per incident compared to those without documented procedures.

54 days
Faster breach identification
SANS Institute (2024)
$2.66M
Average cost savings per incident
IBM Cost of a Data Breach (2024)
Categories

Browse by Category

All Playbooks

Phishing & Social Engineering(2)

Phishing

Identity & Access(3)

Identity
Identity & Accesseasy

Brute Force Attack Investigation

When authentication logs show repeated failed login attempts against one or more accounts, investigate by identifying the source IP, determining if any attempts succeeded, checking for credential stuffing patterns, and assessing whether the account is now compromised. Block the source IP at the firewall and enforce account lockout policies. Escalate if any login succeeded after the brute force attempt.

15-20 minutes
SIEMFirewall
Identity & Accesseasy

Impossible Travel Login Investigation

When authentication logs show a user logging in from two geographically distant locations within a timeframe that makes physical travel impossible, investigate by verifying the user identity, checking for VPN or proxy use, reviewing the device fingerprint, and determining if credentials were compromised. This technique was central to the Scattered Spider campaigns (2023-2024) where attackers used stolen credentials from distant locations to bypass geographic anomaly detection.

10-20 minutes
SIEMXDR
Identity & Accessmedium

MFA Fatigue / Push Bombing Investigation

When authentication logs show repeated MFA push notifications sent to a user in rapid succession, especially outside business hours, investigate for MFA fatigue attacks where an attacker with valid credentials repeatedly triggers push notifications hoping the user will approve one out of frustration or confusion. This technique was used in the Uber breach (September 2022) by the Lapsus$ group, where a contractor approved a push notification after receiving over 100 requests.

20-30 minutes
SIEMXDR

Lateral Movement & Discovery(2)

Lateral Movement

Exfiltration & Impact(2)

Exfiltration

Malware & Execution(4)

Malware
Malware & Executionmedium

Suspicious Process Execution Investigation

When XDR or EDR alerts on suspicious process execution, unusual parent-child relationships, encoded command lines, or processes spawning from unexpected locations, investigate by analyzing the full process tree, checking the binary hash against threat intelligence, examining command-line arguments for malicious intent, and determining if the execution is part of a larger attack chain. Look at what happened before and after the process executed.

20-30 minutes
SIEMXDR
Malware & Executionhard

Cobalt Strike Beacon Detection & Investigation

When network or endpoint detection tools alert on periodic HTTP/HTTPS beaconing, named pipe creation, or process injection consistent with Cobalt Strike, investigate immediately. Cobalt Strike is the most commonly used post-exploitation framework by both penetration testers and threat actors. It was used in the SolarWinds SUNBURST attack (2020), the Colonial Pipeline ransomware (2021), and by APT29 (Cozy Bear) campaigns. Confirm the beacon, identify the C2 server, map all infected hosts, and contain before lateral movement begins.

30-45 minutes
SIEMXDRFirewall
Malware & Executionmedium

Macro-Enabled Document Malware Investigation

When XDR detects a Microsoft Office process spawning scripting interpreters, Word launching PowerShell, Excel spawning cmd.exe, or similar, investigate for macro-based malware delivery. This remains one of the most prolific initial access methods despite Microsoft disabling macros by default in 2022. Emotet, the most successful malware distribution network (disrupted 2021, resurrected 2022-2023), relied almost exclusively on macro-enabled documents to infect over 1.6 million systems globally.

20-35 minutes
SIEMXDRFirewall
Malware & Executionhard

Supply Chain Compromise Investigation

When trusted software updates or third-party tools exhibit unexpected behavior, making unusual network connections, spawning unexpected processes, or accessing sensitive data, investigate for supply chain compromise. The SolarWinds SUNBURST attack (2020) and the 3CX supply chain attack (March 2023) demonstrated that even signed, legitimate software can be weaponized. These attacks are exceptionally dangerous because the malicious code arrives through trusted update channels, bypassing most security controls.

45-60 minutes
SIEMXDRFirewall

Network & Infrastructure(2)

Network
Common Questions

Frequently Asked Questions

What is an investigation playbook?
An investigation playbook is a structured, step-by-step guide that tells a SOC analyst exactly what to do when a specific alert type fires. It covers what data to collect, which SIEM queries to run, how to interpret results, decision trees for escalation, and documentation requirements. Playbooks reduce mean time to respond (MTTR) and ensure consistent analysis quality across analysts of all experience levels.
How do SOC analysts use playbooks?
SOC analysts open the relevant playbook when an alert fires, then follow the investigation steps in order. Each step tells them which tool to use (SIEM, XDR, or Firewall), provides copy-pasteable queries, and includes decision points that branch the investigation based on findings. Analysts document their results at each step and use the escalation criteria to determine if the alert needs Tier 2 or incident response involvement.
What makes a good incident response playbook?
A good incident response playbook is specific enough to be actionable but flexible enough to handle variations. It should include an answer-first summary for quick reference, concrete SIEM queries (not just descriptions), clear decision trees at each stage, common mistakes to avoid, and explicit escalation criteria. The best playbooks are tested against real incidents and updated regularly based on lessons learned.
Are these playbooks free to use?
Yes, all investigation playbooks on SOCSimulator are free to read and reference. The playbooks include real SIEM queries in SPL (Splunk), KQL (Microsoft Sentinel), and Lucene (Elastic) formats. You can also practice the scenarios described in each playbook inside SOCSimulator Operations rooms, which are free forever with no credit card required.
How often are the playbooks updated?
Playbooks are reviewed and updated quarterly to reflect evolving threat landscapes, new attack techniques, and changes in SIEM query syntax. Each playbook is mapped to MITRE ATT&CK techniques and updated when new sub-techniques are published. Community feedback from analysts practicing in SOCSimulator also drives improvements to investigation steps and decision trees.

Practice These Playbooks in a Real SOC Environment

Reading a playbook is one thing. Executing it under pressure is another. SOC Simulator puts you in the analyst seat with realistic alerts, real SIEM interfaces, and zero consequences. Build the muscle memory to respond fast and accurately. Start free forever.

Free forever tier
Ready in 2 minutes
No credit card
15 playbooks
MJ
SK
DL
JM
AR
+12K
Rated 4.9/5 by security professionals
Trusted by analysts atFortune 500GovernmentMSPsStartups

We use cookies to improve your experience and measure usage. Learn more