Skip to main content
Security Delivery Agents (SDAs) automate incident investigation and response within ContraForce. This guide walks you through configuring agents using a phased approach, allowing you to gradually increase automation as you become comfortable with agent capabilities.
Security Delivery Agents follow a three-phase adoption model: manual execution, automatic execution based on severity, and automatic gamebook execution. This progressive approach helps you build confidence in agent behavior before enabling full automation.

What Can You Do Here?

Run Manual Investigations

Trigger agent analysis on individual incidents

Automate by Severity

Configure agents to run automatically based on incident status

Enable Gamebook Execution

Allow agents to execute response playbooks automatically

Set Confidence Thresholds

Control when automated actions are permitted

Prerequisites

Before configuring Security Delivery Agents, ensure you meet the following requirements.
RequirementDescription
Agent Center DeployedMicrosoft Foundry infrastructure must be provisioned
ContraForce RolesOrganizational Admin and Workspace Owner roles required
Prerequisites to Configure Security Delivery Agents:
  • Agent Center must be fully deployed in your environment
  • ContraForce Role: Organizational Admin
  • ContraForce Workspace Role: Owner

Phase 1: Manual Agent Execution

In this initial phase, you manually select individual incidents and trigger the agent to run investigations. This allows you to evaluate agent performance before enabling automation.

Running Agent Investigation

1

Open an Incident

Navigate to the incident you want to investigate
2

Access Actions Menu

Select Actions from the incident toolbar
3

Choose Investigation Type

Select one of the following options:
  • Run Agent Investigation — Agent analyzes the incident and provides findings without taking remediation actions
  • Run Agent Investigation and Response — Agent analyzes the incident and executes recommended response actions
4

Review Results

Examine the agent’s findings and recommendations

Investigation Options

OptionDescriptionWhen to Use
Run Agent InvestigationAnalysis only, no response actionsWhen you want to review findings before taking action
Run Agent Investigation and ResponseAnalysis plus automated responseWhen you trust the agent to execute appropriate responses
Start with investigation-only runs to understand how the agent analyzes your specific incident types before enabling response actions.

Phase 2: Automatic Execution Based on Severity

Once you’re comfortable with agent behavior, configure automatic execution based on incident severity and status.

Configuring Automatic Execution

1

Navigate to Agent Center

Open ContraForce Agent Center from the main navigation
2

Set Mode to On Queue

Change the Mode setting to On Queue to enable automatic processing
3

Configure Status Filters

Select which incident statuses trigger automatic agent execution:
  • New — Agent runs on newly created incidents
  • Active — Agent runs on incidents currently being worked
  • Closed — Agent runs on closed incidents for retrospective analysis
4

Save Configuration

Apply your settings to activate automatic execution

Status Filter Options

Process new incidents automatically:
  • Agent triggers immediately when incidents are created
  • Provides rapid initial triage and analysis
  • Recommended for high-volume environments

Phase 3: Automatic Gamebook Execution

In this advanced phase, you enable the agent to automatically execute gamebooks based on confidence thresholds.

Enabling Automatic Gamebook Execution

1

Navigate to Agent Center

Open ContraForce Agent Center from the main navigation
2

Enable Gamebook Execution

Toggle Allow Agent to run gamebooks to enabled
3

Set Confidence Level

Configure the confidence threshold that determines when the agent automatically executes gamebook actions
4

Save Configuration

Apply your settings to activate automatic gamebook execution

Understanding Confidence Levels

Confidence LevelBehaviorRecommended For
HighAgent requires strong evidence before taking actionProduction environments, sensitive systems
MediumBalanced approach between automation and cautionMost standard deployments
LowAgent takes action with less certaintyTest environments, high-volume low-risk scenarios
Lower confidence thresholds result in more aggressive automation. Start with higher thresholds and adjust based on observed accuracy and your risk tolerance.

Configuration Summary

Manual Execution:
  • User selects individual incidents
  • User triggers agent via Actions menu
  • User reviews results before any response
  • Best for: Initial evaluation and building trust

Best Practices

Start with Phase 1 to understand agent behavior before enabling automation. Each phase builds on the previous one.
Use Phase 1 to validate that agent analysis aligns with your expectations and incident handling procedures.
Begin with higher confidence thresholds and lower them gradually based on observed accuracy.
Even with full automation enabled, periodically review agent actions to ensure expected behavior.
Keep records of which phases are enabled and your confidence threshold settings for troubleshooting and auditing.

Troubleshooting

Common Issues

IssuePossible CauseSolution
Agent not processing incidentsMode not set to On QueueVerify Mode is set to On Queue in Agent Center
Gamebooks not executingFeature not enabledConfirm “Allow Agent to run gamebooks” is toggled on
Too many automated actionsConfidence threshold too lowIncrease confidence level setting
Agent missing incidentsStatus filters misconfiguredReview and adjust status filter selections
Investigation not startingMissing permissionsVerify Organizational Admin and Workspace Owner roles
If you encounter persistent issues with Security Delivery Agent configuration, contact [email protected] with your configuration details and observed behavior.


Questions about Security Delivery Agent configuration? Contact us at [email protected].