Defender
A starting point for defenders, analysts, and responders handling suspicious activity, phishing, and account-risk investigations.
This page is for security engineers, defenders, incident responders, and analysts who use the docs to investigate suspicious activity, validate reports, and support safe triage.
What this role uses the docs for
Use these docs to:
- investigate reported phishing and suspicious activity
- validate alerts without overreacting
- collect evidence for escalation
- understand when a security event becomes an incident
- coordinate with operators and approvers
Start here
Read these in order:
What defenders should optimize for
- fast triage
- low false confidence
- clear escalation triggers
- good evidence hygiene
- user safety and business continuity
Trust boundaries you should know
Before investigating, understand these limits:
- Scope enforcement depends on
in-scope.txt— a configuration file, not an access control list. If the file is wrong, enforcement is wrong. - Self-approval is only possible when the workflow and external policy explicitly allow it. Separation of duties still depends on configuration.
- Host compromise defeats all governance controls. WitnessOps assumes a trustworthy host.
- Receipts prove execution occurred. They do not prove findings are correct or that the investigation was complete.
See Threat Model for the full trust boundary map.
Typical defender workflow
1. Triage the report
Determine what was reported, by whom, and when.
2. Establish the facts
Check the sender, links, attachments, authentication signals, affected accounts, and related activity.
3. Assess impact
Decide whether the event is informational, suspicious, or confirmed malicious.
4. Contain where needed
Take the minimum action needed to protect users and systems.
5. Preserve evidence
Keep the message, logs, indicators, and decision trail.
6. Escalate when necessary
Escalate if there is evidence of compromise, user interaction, spread, or privileged exposure.
Common investigations
- phishing reports
- suspicious login alerts
- malicious attachment claims
- credential reuse concerns
- mailbox rule abuse
- account takeover indicators
Common mistakes
- deleting the artifact before preserving it
- trusting appearance over headers and actual links
- escalating too late after confirmed user interaction
- failing to document what was verified
- treating "no immediate signs" as "no risk"
What success looks like
You can show:
- what was reported
- what you validated
- what evidence supported the conclusion
- what containment occurred
- whether more response work is required