How to use scenarios: pick the case closest to your situation, follow the linked path, collect evidence, and only then send a handoff or patch request.
Scenario Library
Learn the portal through real defender situations.
Use these scenarios when you know what happened but not which page to open. Each scenario gives the safest route through the portal and the decision you should avoid rushing.
Scenarios
8practical routes through the portalBest for
Learninguse when the menu feels too broadPattern
Signal to actiondecide, validate, communicate, trackGuardrail
No shortcutsevidence before urgencyCommon Scenarios
What to open when a real-world question lands on your desk
Patch emergency
A KEV item affects an internet-facing product
Path: Defenders Today -> Detail -> Decision Matrix -> Evidence Checklist -> Patch Window -> Handoff Center.
No patch
The vendor has no safe fix yet
Path: No Patch -> Mitigation Operations -> Exception Register -> Evidence Checklist -> Action Tracker.
SOC handoff
A public PoC appears and detection is needed
Path: Detection Starter Pack -> IOC Extractor -> Hunt Query Helper -> Sigma Helper -> Handoff Center.
Exposure uncertainty
A scary CVE may not affect your environment
Path: Exposure Operations -> Attack Surface -> Exposure Checker -> Evidence Checklist -> Action Tracker.
Ransomware concern
A vulnerability resembles initial access or disruption
Path: Ransomware Watch -> Exploit Chain Watch -> Decision Matrix -> Brief Builder -> Executive Report.
Identity risk
The issue touches auth, SSO, tokens, or sessions
Path: Identity Attack Surface -> JWT Decoder -> Email Header Analyzer -> Evidence Checklist -> Handoff Center.
Trust issue
A record is disputed, rejected, stale, or low-confidence
Path: Trust Review -> Methodology -> Source Analytics -> Status -> Saved.
Weekly reporting
You need a calm summary for stakeholders
Path: Action Tracker -> Brief Builder -> Executive Report -> Quality Center.
Recommended next move: if none of the scenarios fit, start with Role Paths and then use Decision Matrix.