Verdict Types

Understanding the classification outcomes from AI triage.

Classifications

ClassificationDescriptionTypical Response
MaliciousConfirmed threatImmediate containment
SuspiciousLikely threat, needs investigationQueue for analyst review
BenignNot a threatClose or archive
InconclusiveInsufficient dataRequest more information

Malicious

The incident is a confirmed security threat.

Criteria:

  • Multiple strong threat indicators
  • High-confidence threat intelligence matches
  • Clear malicious intent (credential theft, malware, etc.)

Example:

{
  "classification": "malicious",
  "confidence": 0.95,
  "category": "phishing",
  "reasoning": "Email contains credential phishing page targeting Microsoft 365. Sender domain registered yesterday, fails all email authentication. URL redirects to fake login mimicking Microsoft branding."
}

Response:

  • Execute recommended containment actions
  • Create incident ticket
  • Notify affected users

Suspicious

The incident shows concerning indicators but lacks definitive proof.

Criteria:

  • Some threat indicators present
  • Mixed or conflicting signals
  • Unusual but not clearly malicious behavior

Example:

{
  "classification": "suspicious",
  "confidence": 0.65,
  "category": "potential_phishing",
  "reasoning": "Email sender is unknown but domain is 6 months old with valid authentication. URL leads to legitimate document sharing service but file name uses urgency tactics. Recipient has not received email from this sender before."
}

Response:

  • Queue for analyst review
  • Gather additional context
  • Consider temporary quarantine pending review

Benign

The incident is not a security threat.

Criteria:

  • No threat indicators found
  • Known good sender/source
  • Normal expected behavior

Example:

{
  "classification": "benign",
  "confidence": 0.92,
  "category": "legitimate_email",
  "reasoning": "Email from known vendor with established sending history. All authentication passes. Attachment is a standard invoice PDF matching expected format. No suspicious URLs or indicators."
}

Response:

  • Close incident
  • Release from quarantine if held
  • Update detection rules if false positive

Inconclusive

Insufficient data to make a determination.

Criteria:

  • Missing critical information
  • Tool failures preventing analysis
  • Conflicting strong indicators

Example:

{
  "classification": "inconclusive",
  "confidence": 0.3,
  "category": "unknown",
  "reasoning": "Unable to analyze attachment - file corrupted. Sender reputation service unavailable. Email authentication results are mixed (SPF pass, DKIM fail). Need manual review of attachment content.",
  "missing_data": [
    "attachment_analysis",
    "sender_reputation"
  ]
}

Response:

  • Escalate to analyst
  • Retry failed tool calls
  • Request additional information

Confidence Scores

Confidence ranges and their meaning:

RangeInterpretation
0.9 - 1.0Very high confidence, clear evidence
0.7 - 0.9High confidence, strong indicators
0.5 - 0.7Moderate confidence, mixed signals
0.3 - 0.5Low confidence, limited evidence
0.0 - 0.3Very low confidence, insufficient data

Category Types

Email Threats

CategoryDescription
phishingCredential theft attempt
spear_phishingTargeted phishing
becBusiness email compromise
malware_deliveryMalicious attachment/link
spamUnsolicited bulk email

Endpoint Threats

CategoryDescription
malwareMalicious software detected
ransomwareRansomware activity
cryptominerCryptocurrency mining
ratRemote access trojan
pupPotentially unwanted program

Access Threats

CategoryDescription
brute_forcePassword guessing attempt
credential_stuffingLeaked credential use
impossible_travelGeographically impossible login
account_takeoverCompromised account

Using Verdicts

Automation Rules

# Auto-respond to high-confidence malicious
- trigger:
    classification: malicious
    confidence: ">= 0.9"
  actions:
    - quarantine_email
    - block_sender
    - create_ticket

# Queue suspicious for review
- trigger:
    classification: suspicious
  actions:
    - escalate:
        level: analyst
        reason: "Suspicious activity requires review"

Metrics

Track verdict distribution:

# Verdict counts by classification
sum by (classification) (triage_verdict_total)

# Average confidence by category
avg by (category) (triage_confidence)