• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
how to automate alert triage with ai agents and confluence

How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines

You are here: Home / General Cyber Security News / How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines
September 19, 2025

Run by the team at workflow orchestration and AI platform Tines, the Tines library features over 1,000 pre-built workflows shared by security practitioners from across the community – all free to import and deploy through the platform’s Community Edition.

The workflow we are highlighting streamlines security alert handling by automatically identifying and executing the appropriate Standard Operating Procedures (SOPs) from Confluence. When an alert triggers, AI agents analyze it, locate relevant SOPs, and perform required remediation steps – all while keeping the on-call team informed via Slack.

It was created by Michael Tolan, Security Researcher L2 at Tines, and Peter Wrenn, Senior Solutions Engineer at Tines.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


In this guide, we’ll share an overview of the workflow, plus step-by-step instructions for getting it up and running.

The problem – manual alert triage and SOP execution

For security teams, responding to alerts efficiently requires quickly identifying the threat type, locating the appropriate SOP, and executing the required remediation steps.

From a workflow perspective, teams often have to:

  • Manually analyze incoming security alerts
  • Search through Confluence for relevant SOPs
  • Document findings and actions in case management systems
  • Execute multiple remediation steps across different security tools
  • Update the case management system again after the fact
  • Notify stakeholders about incidents and actions taken

This manual process is time-consuming, prone to human error, and can lead to inconsistent handling of similar alerts.

The solution – AI-powered alert triage with automated SOP execution

This prebuilt workflow automates the entire alert triage process by leveraging AI agents and Confluence SOPs. The workflow helps security teams respond faster and more consistently by:

  • Using AI to analyze and classify incoming alerts
  • Automatically locating relevant SOPs in Confluence
  • Creating structured case records for tracking
  • Deploying a second AI agent (subagent) to execute remediation steps
  • Documenting all actions and notifying the on-call team via Slack

The result is a streamlined response to security alerts that ensures consistent handling according to established procedures.

Key benefits of this workflow

  • Reduced mean time to remediation (MTTR)
  • Consistent application of security procedures
  • Comprehensive documentation of all actions taken
  • Reduced analyst fatigue from repetitive tasks
  • Improved visibility through automated notifications

Workflow overview

Tools used:

  • Tines – workflow orchestration and AI platform (free Community Edition available)
  • Confluence – knowledge management platform for SOPs

This specific workflow also uses the following pieces of software. However, you can use whatever enrichment/remediation tools currently existing within your technology stack alongside Tines and Confluence.

  • CrowdStrike – threat intelligence and EDR platform
  • AbuseIPDB – IP reputation database
  • EmailRep – email reputation service
  • Okta – identity and access management
  • Slack – team collaboration platform
  • Tavily – AI research tool
  • URLScan.io – URL analysis service
  • VirusTotal – file and URL scanning service

How it works

Part 1: Alert Ingestion and Analysis

  • Receive security alert from integrated security tools
  • AI agent analyzes the alert to determine type and severity
  • System searches Confluence for relevant SOPs based on alert classification
  • Create a case record with alert details and identified SOP

Part 2: Remediation and Documentation

  • Second AI agent reviews the case and SOP instructions
  • AI agent orchestrates remediation actions across appropriate security tools
  • All actions are documented in the case history
  • Slack notification is sent to the on-call team with alert details and actions taken

Configuring the workflow – step-by-step guide

1. Log into Tines or create a new account.

2. Navigate to the pre-built workflow in the library. Select import.


3. Set up your credentials

You’ll need credentials for all the tools used in this workflow. You can add or remove whatever tools you wish to suit your environment.

  • Confluence
  • CrowdStrike
  • AbuseIPDB
  • EmailRep
  • Okta
  • Slack
  • Tavily
  • URLScan.io
  • VirusTotal

From the credentials page, select New credential, scroll down to the relevant credential and complete the required fields. Follow the credential guides at explained.tines.com if you need help.

4. Configure your actions.

Set your environment variables. In this particular workflow, that specifically requires setting the Slack channel for notifications (hardcoded to #alerts by default, but can be adjusted in the Slack action).

5. Customize the AI prompts

The workflow includes two key AI agents:

  • Alert Analysis Agent: Customize the prompt to help identify alert types
  • Remediation Agent: Customize the prompt to guide remediation actions

6. Test the workflow.

Create a test alert to verify:

  • Alert is properly classified
  • Correct SOP is retrieved from Confluence
  • Case is created with appropriate details
  • Remediation steps are executed
  • Slack notification is sent

7. Publish and operationalize

Once tested, publish the workflow and integrate with your security tools to begin receiving live alerts.

If you’d like to test this workflow, you can sign up for a free Tines account.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «russian hackers gamaredon and turla collaborate to deploy kazuar backdoor Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine
Next Post: 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge 17,500 phishing domains target 316 brands across 74 countries in»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.