What data staging observed?
What MITRE ATT&CK techniques?
What zero-day indicators?
What vulnerabilities exploited?
What credentials compromised?
What command and control activity?
What persistence mechanisms?
What lateral movement detected?
What privilege escalations?
What anomalous behavior observed?
What insider threats detected?
What unauthorized access occurred?
What data was exfiltrated?
What triggered this alert?
Is this impossible travel?
What similar incidents past 30 days?
What forensic evidence exists?
What threat intelligence available?
What Proofpoint campaigns active?
What ReversingLabs analysis?
What Have I Been Pwned results?
What SpyCloud breach data?
What Recorded Future intelligence?
What malicious content accessed?
What VirusTotal verdicts?
What job search activity?
What anonymizer access attempts?
What cloud storage access?
What ZIA policy violations?
What ZPA applications accessed?
What Zscaler sessions exist?
What remote logons recorded?
What file downloads recorded?
What policy violations by DLP?
What emails sent from this host?
What FortiDLP events exist?
What email clustering analysis?
What threat emails exist?
What emails contained URLs?
What risk scores for machines?
What alerts for this machine?
What emails with attachments?
What domain prevalence data?
What file reputation known?
What Microsoft Defender alerts exist?
What admin panel access attempts?
What privileged actions occurred?
What user accounts created?
What ThreatInsight detections?
What behavior detections triggered?
What Okta policies created?
What suspicious activity reported?
What password changes occurred?
What account lockout events?
What MFA factors deactivated?
What MFA factors activated?
What Okta login events exist?
What unverified commits made?
What Okta applications deleted?
What Okta applications created?
What outside collaborators invited?
What collaborators were added?
What Actions workflows ran?
What Actions secrets created?
What protected branch policies overridden?
What pull requests were created?
What webhooks were created?
What repositories were deleted?
What repositories were cloned?
What GitHub users authenticated?
What permission boundary modifications?
What roles had trust relationships modified?
What policy attachments occurred?
What users created service-linked roles?
What EC2 instances stopped?
What access keys created?
What GuardDuty findings exist?
What high-risk actions performed?
What S3 buckets publicly accessible?
What AWS EC2 instances created?
What EC2 security groups modified?
What registry activity initiated?
What process injection activity?
What image load activity?
What RDP activity targeted?
What RDP activity originated?
What network story activity?
What parent process created this?
What child processes were created?