ASA: Autonomous Security Analyst

Overview

The Autonomous Security Analyst (ASA) is an AI-powered automation solution that analyzes and triages user-reported messages. ASA operates like a virtual security analyst, investigating reports to the abuse mailbox and providing detailed analysis to help security teams overcome any volume of user-reported messages.

ASA addresses key pain points for security teams:

  • Security analysts overwhelmed by high volumes of user-reported messages can reduce the number of manual reviews required with ASA’s automated analysis.
  • Security managers struggling with allocating resources to noise and slow response times can automate the analysis, triage, remediation, and response using ASA’s auto-remediation and auto-review along with user report auto-replies.

When enabled, ASA is invoked automatically after an end-user reports a message as an Automation with the trigger “user report received”. After being invoked, ASA completes analysis and comes up with a verdict for the message along with a full report.

ASA uses the same Sublime tools as an analyst, such as

  • Analyzing detonated files and determining malicious content
  • Perform visual analysis on logos
  • Accessing sender profiles to determine prevalence and previous labels
  • Identifying potential misclassification of messages and why

Getting started with ASA

To enable ASA in your environment, you just have to activate the “Send user reports to ASA” Automation.

To leverage user report Automations, you must be an Enterprise customer with an abuse mailbox set.

Availability

ASA operates in our cloud environment (SaaS deployment) or your AWS cloud (self-hosted) at the moment. Data remains within the Sublime environment and is not shared with third parties including model providers.

The following AWS regions are currently supported:

  • USA - Virginia
  • USA - Oregon
  • EU - Dublin

To get on the waitlist for additional region support, reach out to [email protected]!

Configurations

ASA defaults to inactive mode and can then be set to active or passive:

  • Active: “Autonomous Mode”
    • In its active state, the ASA Automation will analyze, triage, and remediate user reported messages.
    • You can adjust the auto-remediations, auto-review status, and custom alerts for individual ASA verdicts to give ASA as much or as little autonomy as you’d like!
  • Passive: “Analyst Mode”
    • In its passive state, the ASA Automation will simply analyze and alert on user reported messages.
    • You can set auto-remediations and auto-review status, but the Automation cannot actually apply a remediation or auto-review.
    • Any custom alert Actions that are set are still applied so that you can receive alerts upon completion of the analysis.

Verdict-based auto-remediation, auto-review, and custom alert Actions

ASA classifies messages into the following verdict categories:

  • Malicious
  • Spam
  • Graymail
  • Benign
  • Unknown

Outside of unknown, all of ASA’s verdicts align 1:1 with a Sublime message classification option for easy message triage and review. Unknown verdicts are rare and indicate that a message needs human review.

You’re able to select an auto-remediation approach for each of the verdicts, with an exception for benign verdicts. Options for auto-remediation include:

  • Quarantine
  • Trash
  • Move to spam
  • Add a warning banner

Auto-review is available for the malicious, spam, graymail, and benign verdicts because there’s a corresponding review classification. Auto-review is unavailable for unknown verdicts that require human review.

Custom alert Actions - webhooks, Slack alerts, and email alerts — can be applied on all ASA verdicts for easy integration with SIEM and SOAR workflows.

ASA Report

ASA provides comprehensive analysis reports for each user-reported message, presenting information in a clear, accessible format.

One-liner

A concise summary of the message’s key attributes that’s available on the message details.

On the message details page, the one-liner also includes some message statistics:

  • The ASA verdict (unreviewed messages)
  • The message classification (reviewed messages)
  • Actions that have been applied
  • Messages count
  • User report count
  • First user report timing

Executive Summary

A short, detailed summary of message intent, content, links, and attachments with critical information to help analysts quickly make decisions on appropriate response to a given user report.

Full report and reasoning

The full ASA analysis report and agent reasoning is available for in-depth investigations.

The report is a full, detailed breakdown including:

  • Full attack chain analysis (for malicious verdicts)
  • Sender and content analysis
  • Details from detonated files and links
  • Contextual findings from sender profiles
  • Explanation of signals and Detection Rules that fired (or didn't fire)
  • An overall verdict explanation

Use Cases

Expedited analyst decisions with ASA analysis

In passive ”Analyst Mode”, ASA provides enhanced context to security analysts without taking automatic remediation actions.

  • ASA kicks off analysis when a message is reported
  • ASA’s analysis report is available when any analyst opens a user report (and coming soon, via API too!)
  • Analysts review ASA's one-liner and executive summary to make fast, informed decisions
  • Analysts check out ASA’s full report as-needed for in-depth investigations
  • User report mean time to respond (MTTR) is accelerated with ASA’s contextual analysis
  • Security teams maintain control over final remediation decisions and message classifications while reaping the benefits of ASA’s analysis.

Autonomous reviews with an analyst escalation path

In active ”Autonomous Mode”, ASA functions as a fully autonomous security agent with the ability to automatically remediate and review user reports.

  • ASA kicks off analysis when a message is reported and automatically remediates and classified messages based on verdict-level settings:
    • Dismisses benign and graymail false positive user reports
    • Quarantines malicious messages
    • Trashes/junks spam and graymail messages
    • Automatically classifies messages using the ASA verdict
    • Escalates unknown classifications to human analysts
  • Security teams only intervene when ASA determines human expertise is needed.
  • The Automation works 24/7 to process the queue of user reports, even when analysts are offline.

This mode significantly reduces the workload on security teams while maintaining effective threat protection.