Skip to main content
View a complete audit trail of Security Delivery Agent executions to monitor agent performance, troubleshoot failures, and demonstrate compliance with response policies. The Execution History tab on the Agent Details page provides a sortable table of every time an agent has processed an incident. Each row captures when the execution occurred, who triggered it, which incident was processed, the data source, severity, token consumption, and the outcome — giving you full visibility into automated response activity.

What Can You Do Here?

Audit Agent Activity

Review every execution an agent has performed, with timestamps and outcomes.

Troubleshoot Failures

Identify failed executions and investigate causes using status and token data.

Monitor Token Usage

Track AI token consumption per execution to understand cost and complexity.

Prerequisites

RequirementDescription
Agent Center DeployedAzure AI Foundry infrastructure must be provisioned. See Deploying Agent Center.
Security Delivery Agent ConfiguredAt least one agent must be created and configured. See Configuring Security Delivery Agents.
ContraForce RolesOrganizational Admin or Agent Admin role required.

Accessing Execution History

1

Navigate to Agent Center

From the left navigation menu, select Agent Center.
2

Select Your Agent

Click the name of the agent you want to review. This opens the Agent Details page.
3

Open the Execution History Tab

On the Agent Details page, click the Execution History tab (next to the Configuration tab).
Agent Execution History
You will see a table displaying all past executions for that agent, sorted by date with the most recent entries at the top.

Understanding the Execution History Table

The Execution History table contains the following columns:
ColumnDescription
DateTimestamp of when the agent execution occurred (e.g., Feb 19, 2026 03:10 PM).
Triggered ByThe user or process that initiated the execution. Displays the name of the user for manual triggers (e.g., via the Actions menu) or auto-trigger events.
IncidentThe incident number the agent processed. Displayed as a clickable link (e.g., #149631) that navigates directly to the incident detail page.
SourceThe data source the incident originated from (e.g., Microsoft Sentinel, Microsoft Defender XDR).
SeverityThe severity level of the incident: High, Medium, Low, or Informational.
TokensThe number of AI tokens consumed during the execution. Displays if the execution did not complete successfully.
StatusThe current state of the execution, displayed as a color-coded badge.

Execution Statuses

StatusColorDescription
Completed🟢 GreenThe agent successfully finished processing the incident.
Running🔵 BlueThe agent is currently processing the incident.
Failed🔴 RedThe execution encountered an error and did not complete. Token count will show .

Using Execution History

Investigate a Processed Incident

Click any Incident link (e.g., #149631) in the table to navigate directly to that incident’s detail page. From there, you can review the full incident timeline, entity context graph, and any Gamebook actions that were executed.

Identify Failed Executions

Filter or scan for rows with a Failed status. Failed executions typically show in the Tokens column, indicating the agent did not complete its analysis. Common causes include:
Possible CauseWhat to Check
Agent Center infrastructure issueVerify the Logic App is enabled in the Azure Portal
Connectivity to data sourceConfirm the workspace module consent is active
Token or rate limit exceededReview token consumption trends in recent executions
Incident no longer availableCheck if the incident was deleted or merged in the source system
If failures persist, contact support@contraforce.com with the agent name, affected incident numbers, and the timestamps of the failed executions.

Monitor Token Consumption

The Tokens column shows how many AI tokens were consumed per execution. This helps you understand the complexity of agent processing and monitor usage. Executions that involve larger incidents with more entities and evidence will typically consume more tokens.
Compare token counts across similar incidents to establish a baseline. Unusually high token usage on a routine incident may indicate the agent is processing excessive data or encountering retry loops.

Best Practices

Check the Execution History tab periodically to confirm agents are processing incidents as expected. Look for patterns in failures, unexpected token spikes, or gaps in execution activity.
If the same incident appears multiple times with a Failed status, the issue is likely environmental (permissions, connectivity) rather than incident-specific. Check the troubleshooting table above.
The Execution History table serves as an audit trail for automated response activity. Use it to demonstrate that incidents were triaged and processed within your SLA requirements.
Cross-reference Execution History entries with the Gamebook Activity widget on the Command Dashboard to verify that agent-initiated Gamebooks completed successfully.

Troubleshooting

IssuePossible CauseSolution
No entries in Execution HistoryAgent has not processed any incidents yetVerify the agent Mode is set to On Queue, or manually trigger an investigation from an incident’s Actions menu
All executions show FailedAgent Center infrastructure issueCheck that the Logic App is enabled in the Azure Portal and that Azure AI Foundry resources are healthy
Incident link returns an errorIncident was deleted or mergedVerify the incident exists in the source system (Sentinel or Defender XDR)
Token column shows Execution failed before completionReview the Status column — failed executions do not record token usage
Execution History tab not visibleFeature not available in your environmentConfirm Agent Center is deployed and you have the required roles


Questions about Agent Execution History? Contact us at support@contraforce.com.