Threat Triage Agent is a Dynatrace agentic workflow that automatically extracts indicators of compromise (IOCs) from threat alerts and analyzes the resulting exposure across your environment. By turning raw threat intelligence into actionable insights, it helps you quickly understand where you’re at risk and move efficiently toward remediation using the data already available in Dynatrace.
Slack connector to receive notifications.
Workflows and configure it as needed.In
Workflows, select Workflow.
In the left-hand menu, select the Dynatrace Intelligence (Preview) app.
Search for and select the Threat Triage Agent template.
Follow the on-screen guidance to configure the workflow.
After deployment, adjust the workflow as needed (for example, in the notify_in_slack task, choose the Slack channel).
After you set up the workflows, the integration workflow begins querying alerts from your selected threat‑intelligence source (for example, AlienVault) for the latest emerging threats (such as React2Shell). When an alert report is received, it automatically triggers the Threat Triage Agent workflow.
The Threat Triage Agent workflow then:
Sample report:
