Back to Blog
Exaforce
Product
October 8, 2025

Aggregation redefined: Reducing noise, enhancing context

From duplicates to attack chains, Exaforce redefines aggregation so analysts see fewer alerts, each with more context and clarity.

The life of an analyst often starts with a flood of alerts. Buried in the noise may be the early signs of an attack, but finding those signs and connecting all of the necessary dots can be time-consuming and frustrating.

This isn’t a failure of detection. Most SIEMs and security tools do a good job surfacing suspicious activity, but they often present it in isolation. Without context, analysts are left wondering: is this a one-off event, or part of a bigger picture?

Exaforce takes a different approach. By intelligently aggregating findings, from collapsing duplicates to building attack chains, Exabots ensure analysts see fewer alerts, but with far more meaning. The result is less fatigue, more clarity, and faster response.

Exaforce findings represent one or more suspicious events or behavioral patterns that trigger an alert. These may be straightforward, such as compromising activity from a root account or deletion of a repository, or more statistical in nature, like an unusual sequence of actions tied to a credential, or login activity from an unexpected location. Identifying and connecting those related alerts can be deceptively difficult in complex attacks. Even more importantly, the type of relationship matters:

  • Are there duplicate alerts?
  • Are other analysts investigating something like this?
  • Are the alerts similar but distinct, requiring correlation to build a bigger picture?
  • Are they part of a broader attack chain, where seemingly unrelated events unfold as coordinated phases of an intrusion?

Exaforce addresses all of these scenarios by intelligently grouping alerts to reduce noise and maximize investigative context. Exabots achieve this by leveraging our proprietary Knowledge Model to perform this aggregation in an expedited, thorough, and consistent manner. This represents a significant departure from the traditional SOC tools, which may allow administrators and detection engineers to configure aggregation rules that aim to achieve a similar effect; however, these rules are cumbersome to build, maintain, and layer with existing detections. 

Eliminating alert duplication

Many alerting tools use simple triggering mechanisms that can overwhelm analysts. A single event may be configured to raise an alert. This means that if a user performs an action that triggers an alert repeatedly, the system might generate dozens of alerts for what is, in reality, a routine activity.

Exaforce classifies these as Duplicates: alerts that are identical except for their ID and timestamp. Instead of cluttering the analyst’s queue with dozens of near-identical entries, Exaforce automatically groups these and presents them as one threat finding, without the need for configuration work by the detection engineer. The original alerts are preserved for audit or deeper review, but the analyst experiences a cleaner queue and a more concise view.

Take this Google Security Command Center (SCC) alert, for example. This google.cloud.resourcemanager.v3.Organizations.GetOrganization API call was made 79 times by a user who often performs this action. In SCC, this action is configured to automatically trigger an alert. As such, the tool simply generated 79 alerts. For the analyst, investigating these duplicated alerts is rather cumbersome. The Exaforce approach instead provides one alert and calls out the 79 duplicates. The deduplication is explained in the AI generated summary, and the individual duplicates are present in the details if needed.

A threat finding that is made up of 79 duplicates
Exabot conclusion that mentions the duplicate alerts and behavior
List of the duplicate alerts available for audit or individual investigation

Building Attack Chains

The more complex challenge is linking together alerts that may appear unrelated but are, in fact, steps in an attack sequence. Attack Chains in Exaforce are constructed using our proprietary Knowledge Model, which correlates findings across sources, entities, and timeframes.

Unlike traditional SIEM correlation rules, where analysts must predefine complex multi-level conditions, Exaforce dynamically analyzes relationships across events. This includes scenarios such as:

  • Similar event patterns occurring across multiple users
  • Chained role assumptions across accounts or services
  • Activity by the same user spanning multiple tools or data sources

By automatically recognizing these varied relationships, Exaforce surfaces higher-order attack narratives rather than isolated alerts. 

Let’s take a look at an example in which an admin user’s accounts were compromised and access to multiple applications (AWS, Google Workspace) was compromised. Exaforce identified individual attempts, which were assessed separately with their own severities and priorities, and then grouped them into this Attack Chain to tell a complete story and provide a holistic severity and priority. 

Three chained alerts that tell a single attack narrative

In some cases, the relationship is not as straightforward. In the example below, three distinct users were found exhibiting similar suspicious behavior across two different apps (GitHub and AWS). Assessed individually, each of these was deemed a low severity false positive, but when taken in context, the chain certainly merits investigation. 

Attack chain spanning identities and systems

Related & historical findings

Not every alert can, or should, be collapsed into a duplicate or chained into a larger attack narrative; some findings are distinct but contextually relevant to another alert. Exaforce identifies and surfaces these as Related Findings, giving analysts the surrounding context they need. These relationships are also shared with Exabots to guide automated triage and enrichment.

A subset of related findings may have already been analyzed and evaluated. Exaforce incorporates prior assessments into the investigation process by analyzing historical findings and their resolutions. The closed findings’ closure notes, recommendations, verdicts, and even the investigative path taken are all captured in our Knowledge Model. When a similar alert arises, this history is automatically leveraged by Exabots to guide analysis and provide additional context. Analysts also benefit from this codification of institutional knowledge, avoiding repeated effort and improving the consistency of responses over time.

Below is an example of Exabot’s Historical Analysis in action. This alert, which looks real, was reclassified as a false positive because similar alerts were historically false positives. The pattern is observed and explained with similar findings listed for evidence. Exabots learn, adapt, and improve with each case.

Historical analysis that factors in the outcomes of related alerts

Why aggregation matters

The Exabot system of aggregations addresses several core SOC challenges. By intelligently identifying, classifying, grouping, and assessing each set of alerts, Exabots provide high fidelity analysis themselves and pass along that context to human analysts.

  • Reduced alert fatigue through deduplication
  • Greater investigative clarity via context-rich grouping
  • Faster response by surfacing full attack sequences rather than piecemeal signals
  • Reduced detection complexity by offloading aggregation logic to Exaforce

With Exaforce, analysts spend less time triaging noise and more time responding to what truly matters. Sign up for a demo to see it in action.

Table of contents

Share

Recent posts

Industry

October 9, 2025

GPT needs to be rewired for security

Product

October 8, 2025

Aggregation redefined: Reducing noise, enhancing context

News

Product

October 7, 2025

Exaforce selected to join the 2025 AWS Generative AI Accelerator

Research

October 2, 2025

Do you feel in control? Analysis of AWS CloudControl API as an attack tool

News

September 25, 2025

Exaforce Named a Leader and Outperformer in the 2025 GigaOm Radar for SecOps Automation

Industry

September 24, 2025

How agentic AI simplifies GuardDuty incident response playbook execution

Research

September 10, 2025

There’s a snake in my package! How attackers are going from code to coin

Research

September 9, 2025

Ghost in the Script: Impersonating Google App Script projects for stealthy persistence

Customer Story

September 3, 2025

How Exaforce detected an account takeover attack in a customer’s environment, leveraging our multi-model AI

Industry

August 27, 2025

s1ngularity supply chain attack: What happened & how Exaforce protected customers

Product

News

August 26, 2025

Introducing Exaforce MDR: A Managed SOC That Runs on AI

News

Product

August 26, 2025

Meet Exaforce: The full-lifecycle AI SOC platform

Product

August 21, 2025

Building trust at Exaforce: Our journey through security and compliance

Industry

August 7, 2025

Fixing the broken alert triage process with more signal and less noise

Product

July 16, 2025

Evaluate your AI SOC initiative

Industry

July 10, 2025

One LLM does not an AI SOC make

Industry

June 24, 2025

Detections done right: Threat detections require more than just rules and anomaly detection

Industry

June 10, 2025

The KiranaPro breach: A wake-up call for cloud threat monitoring

Industry

May 29, 2025

3 points missing from agentic AI conversations at RSAC

Product

May 27, 2025

5 reasons why security investigations are broken - and how Exaforce fixes them

Product

May 7, 2025

Bridging the Cloud Security Gap: Real-World Use Cases for Threat Monitoring

News

Product

April 17, 2025

Reimagining the SOC: Humans + AI bots = Better, faster, cheaper security & operations

Industry

March 16, 2025

Safeguarding against Github Actions(tj-actions/changed-files) compromise

Industry

November 6, 2024

Npm provenance: bridging the missing security layer in JavaScript libraries

Industry

November 1, 2024

Exaforce’s response to the LottieFiles npm package compromise

Explore how Exaforce can help transform your security operations

See what Exabots + humans can do for you