Auto-Triage Management

The automatic triage of user-reported phishing is available as part of the Early Access Program (EAP) and is only supported on Stellar Cyber in SaaS deployments. If this feature doesn’t appear in your version of the platform, contact your account manager to inquire about taking part in the Early Access Program and enabling this functionality.

The System | HYPERAUTOMATION | Auto-Triage Management page is where you define and manage how the Stellar Cyber phishing email triage agent automatically handles user-reported phishing emails. This capability reduces the burden of manual analysis, accelerates alert generation, and enhances phishing response workflows across your organization.

Once configured, this feature integrates with a tenant-specific system-managed inbox where user-reported phishing emails are forwarded. The Stellar Cyber phishing triage agent then parses, enriches, and analyzes the email content using both built-in threat intelligence sources and an optional third-party integration with VirusTotal. Each triaged email results in an alert and optionally a correlated case for streamlined investigation.

The following are some of the benefits of this feature:

  • Automated Analysis: Reduces SOC analyst workload by automatically parsing and enriching phishing indicators such as URLs and attachments.

  • Centralized Management: Administrators can view, edit, and manage multiple triage configurations from a unified interface.

  • High-Confidence Verdicts: Combines internal AI and external intelligence for reliable threat determination.

  • Structured Outputs: Links triaged emails, observables, verdicts, and screenshots into an alert that supports deep investigation.

Overview

The triage process begins when your users report suspicious emails—typically by clicking a Report Phishing button. These reported emails are delivered to a centralized mailbox that you manage within your own email infrastructure such as Microsoft 365, Google Workspace, or an on-premises Exchange server. You are responsible for configuring this mailbox to serve as the collection point for all reported phishing emails.

Diagram of the auto triage workflow for user-reported phishing email

You set up the collection mailbox to automatically forward emails to a Stellar Cyber-provisioned inbox that’s unique for your tenant. After receiving the emails, the Stellar Cyber Platform retrieves them from the inbox and initiates the automated triage process.

Adding an Auto Triage Configuration

To implement the automated phishing triage feature, you must configure three main components:

  1. Email System (Your Infrastructure)

    User-Report Mechanism: Enable users to report suspected phishing emails by clicking a button in their email client.

    Centralized Mailbox: Set up a dedicated mailbox (for example, phishing@yourdomain.com) for collection.

    Email Forwarding Policy: Configure a policy rule on your central mailbox to automatically forward user-reported phishing emails to the Stellar Cyber inbox.

  2. Stellar Cyber Platform

    Auto Triage Feature Enablement: Ensure the auto triage phishing feature is enabled.

    Stellar Cyber-provisioned Inbox: Note the inbox address that Stellar Cyber creates when you define an auto triage configuration. You will add it as the destination in the policy rule that forwards suspected phishing email from the centralized mailbox to Stellar Cyber.

  3. Additional Threat Intelligence (optional)

    The Stellar Cyber phishing email triage agent includes threat intelligence enrichment through the Threat Intelligence Platform that’s built into Stellar Cyber and through direct built-in integrations with the third-party threat intelligence services URLScan.io and Sophos.

    VirusTotal Premium API Access: Enter a valid VirusTotal Premium API key into the auto triage configuration for VirusTotal to provide additional enrichment.

To ensure successful implementation, configuration is required on both your email infrastructure and within the Stellar Cyber Platform.

  • Stellar Cyber Platform (Auto Triage Configuration)

  • Email System (Your Infrastructure)

  • Stellar Cyber Platform (Auto Triage Enablement)

Follow the instructions in each section to establish a fully operational phishing triage pipeline—from user report to analyst alert—within your security operations workflow.

Using the Auto Triage Configurations Table

The table on the Auto Triage Management page displays all current configurations. Each row corresponds to a single configuration and contains the following columns:

  • Name: The label assigned to the configuration.

  • Type: The operational category of the configuration. For phishing triage, this is the fixed value Phishing Email | Inbox.

  • Tenant: The tenant to which the configuration is assigned. This field is not editable after creation.

  • Status: Indicates the current state of the configuration. Values include the following:

    • Running: The triage process is active and functioning.

    • In Progress: The configuration is being provisioned. This appears shortly after creation or reconfiguration.

    • Disabled: The configuration has been deactivated and triaging is currently paused.

    • Error: An issue is preventing normal operation. Review the Message field for more detail.

  • Message: Provides system status messages. A successful message reads “DP Trigger execution completed successfully”, which indicates that the triage operation was initiated and successfully completed. Other messages provide diagnostic or operational feedback based on the execution context.

  • Inbox Address: The Stellar Cyber-generated email address where reported phishing emails must be forwarded. This inbox is unique to each tenant and configuration.

  • Credential: Shows the VirusTotal credential (if assigned). When configured, this enables the use of VirusTotal as a threat intelligence source for enhanced URL and file enrichment.

  • Created Time: Timestamp when the configuration was initially saved in the Stellar Cyber Platform.

  • Updated Time: Timestamp of the most recent change to any field in the configuration. This can include both manual changes made through the UI and system-initiated updates.

This table enables you to review configuration health and validate triage inbox integration.

Editing an Auto Triage Configuration

You can edit the name and VirusTotal credential of an existing configuration by selecting the corresponding row and selecting Edit. Note that the Type and Tenant fields are fixed and cannot be changed after creation. This is by design, as each Stellar Cyber-provisioned inbox is dedicated to phishing email triage and is bound to the chosen tenant (or to "All Tenants") at the time an Auto Triage Configuration is created.

Deleting an Auto Triage Configuration

The deletion of an Auto Triage Configuration is not supported in the UI. This behavior is intentional, as each configuration is tied to a provisioned inbox that remains associated with its tenant. If you no longer want to use a configuration, you can disable it to stop triage operations. In rare cases where complete removal is required—such as a provisioning error or the need to assign the configuration to a different tenant—contact Stellar Cyber Support for assistance.