Documentation Index
Fetch the complete documentation index at: https://docs.contraforce.com/llms.txt
Use this file to discover all available pages before exploring further.
Sentinel, DefenderXDR, QRadar, Splunk, CrowdStrike, SentinelOne Request DTO for the agent's submit-investigation tool — the closeout call the agent makes after it has finished investigating an incident.
Final investigation summary. Posted on the incident as the agent's comment as-is — no server-side wrapping or section headers are applied. Write as a detailed security analyst would: cover initial hypothesis, indicators matched, tools called and why, evidence found, classification rationale, response actions, and recommended next steps. This is what a human analyst will read to learn from the agent's analysis.
Short rationale (1–2 sentences) shown on the incident's closure record when the status transition closes the incident. Surfaces in the closure dialog and audit log alongside the classification reason.
Agent's maliciousness confidence on a 0–100 scale. 0 = clearly benign, 100 = clearly malicious. Values outside this range cause the call to fail with success:false.
Final incident classification. Allowed values: TruePositive (confirmed malicious), FalsePositive (alert was wrong), BenignPositive (real activity but not malicious), Undetermined (insufficient evidence), Suspicious (SentinelOne incidents only — suspicious but not confirmable). Status transition follows from this via the per-severity agent settings.
BenignPositive, FalsePositive, TruePositive, Undetermined, InformationalExpectedActivity, Unknown, NonIssue, PolicyViolation, QradarFalsePositive, Undefined, Suspicious, null Reason corresponding to the classification. TruePositive → Malware | Phishing | Other. FalsePositive → InaccurateData | IncorrectAlertLogic | Other. BenignPositive/Undetermined → Other. Not set for Suspicious. Wrong pairings are normalised server-side and may result in an unexpected applied reason.
InaccurateData, IncorrectAlertLogic, SuspiciousActivity, SuspiciousButExpected, Unknown, Apt, Malware, SecurityPersonnel, SecurityTesting, UnwantedSoftware, Other, MultistagedAttack, CompromisedUser, Phishing, MaliciousUserActivity, NotMalicious, NoEnoughDataToValidate, ConfirmedUserActivity, LineOfBusinessApplication, null The single classification SOP whose decision tree drove the classification. Null when no SOP applied to this incident type.
SOPs whose response steps the agent executed during the investigation. Empty when the agent decided no response action was warranted.
IDs of gamebooks the agent queued earlier via submit-gamebook during this investigation. Use the gamebook_id returned by each submit-gamebook call. Receive-only here — submit-investigation does NOT queue additional gamebooks.
Per-tool-call timeline the agent recorded during the investigation. Used to render the activity header on the comment so an analyst can see exactly which tools the agent invoked, on what target, in what order, and how long each took.