Agents bring reasoning capabilities that allow automation to handle ambiguity and change, while deterministic workflows provide reliability for structured, repeatable, and rule-based tasks. Today’s automation can combine both: agent steps excel at interpretation, decision-making, and unstructured data, whereas deterministic steps ensure consistency and speed. However, agents still face some constraints, including hallucinations, higher cost, execution limits, and maintenance challenges. To mitigate this, micro agents focus on narrow, well-defined tasks and integrate with Blink’s deterministic workflows. This hybrid approach delivers reliable execution, controls cost by using agents selectively, preserves performance through fast deterministic steps, and simplifies maintenance with safer debugging and updates. The following sections provide guidance on when to use agents so you can design workflows that are both effective and efficient.Documentation Index
Fetch the complete documentation index at: https://docs.blinkops.com/llms.txt
Use this file to discover all available pages before exploring further.
When to use Micro-Agents in Workflows
1. Reasoning & Summarization
Ideal to use when the task requires interpretation or synthesis of complex information.Use Case Example: Summarizing Incident Timelines and Suggesting Remediation
Use Case Example: Summarizing Incident Timelines and Suggesting Remediation
- Trigger: An incident is raised and the investigation workflow begins.
-
Micro-Agent Task:
- The agent reviews the incident timeline, log entries, and enrichment data.
- It identifies key events, interprets patterns, and summarizes findings in natural language.
- The agent suggests potential remediation steps (e.g., isolate endpoint, block IP, reset credentials).
-
Follow-up Workflow Action:
- The workflow takes the agent’s summary and automatically adds it to the Case Management ticket as the analyst’s notes.
- This ensures structured documentation of the incident while keeping human analysts in the loop.
-
Outcome:
- The workflow blends automation with reasoning: repetitive tasks remain automated, while the Micro-Agent provides human-like interpretation and actionable recommendations.
2. Unstructured / Ambiguous Inputs
Ideal to use for handling messy or unfamiliar input structures (such as incoming logs or alert payloads), especially when specific data must be extracted from new or unexpected formats. When the structure is already known, a deterministic workflow is recommended to ensure accuracy and consistency.Use Case Example: Extracting Relevant Data from Messy or Inconsistent Payloads
Use Case Example: Extracting Relevant Data from Messy or Inconsistent Payloads
- Trigger: A new alert or log payload is ingested into the workflow.
- Format Check:
- The workflow evaluates the type and format of the payload.
- If the format matches an existing schema, the workflow proceeds with a deterministic path designed for that specific fixed input.
- If the format is unknown, inconsistent, or ambiguous, the payload is routed to a Micro-Agent.
- Micro-Agent Task (for unknown/unstructured inputs):
- The agent scans the payload, even if it is messy, inconsistent, or deeply nested.
- It extracts the relevant field (e.g., an IP address), whether it appears as
src_ip,ip_address, or buried in nested JSON. - The agent outputs the extracted IP(s) in a clean, standardized format.
- Follow-up Workflow Action:
- The workflow consumes the standardized IP address from either the deterministic workflow or the Micro-Agent.
- Example: block the identified IP across the firewall or EDR platform.
- Outcome:
- Known formats are processed quickly and accurately through deterministic workflows.
- Unknown or inconsistent formats are still usable thanks to the adaptive capabilities of Micro-Agents.
3. Exploratory / Open-Ended Work
Ideal to use when steps are not predefined or the workflow may branch in different directions.Use Case Example: Investigating Suspicious Logins Across Multiple Data Sources
Use Case Example: Investigating Suspicious Logins Across Multiple Data Sources
- Trigger: A suspicious login event is detected (e.g., unusual location, time, or behavior).
- Micro-Agent Task:
- The agent collects and reviews logs across identity providers (Okta, Azure AD, Google Workspace) and endpoints.
- It correlates the login activity with endpoint events (e.g., device posture, EDR signals).
- The agent determines whether the login pattern suggests a possible account compromise.
- Follow-up Workflow Action:
- The workflow appends the agent’s investigation summary to the Case Management record.
- If compromise is likely, trigger automated containment actions (e.g., force MFA reset, block session).
- Outcome:
- The agent provides human-like investigation capabilities, surfacing insights from multiple noisy data sources.
- The workflow ensures those insights are immediately actionable and documented.
4. Contextual Decision-Making
Ideal to use when a process requires evaluating tradeoffs or choosing the best next step from several options.Use Case: Evaluating Signals to Decide if a Login is Suspicious
Use Case: Evaluating Signals to Decide if a Login is Suspicious
- Trigger: A login event is detected.
- Micro-Agent Task:
-
The agent evaluates multiple contextual signals including:
- User behavior patterns
- Device posture
- Login time and location
- Text from related logs
-
Instead of a binary threshold (e.g.,
x > 0.9), the agent reasons about the combination of factors and determines whether the login is suspicious.
-
Follow-up Workflow Action:
- If suspicious, flag the login and create a Case Management entry or force MFA challenge.
- If benign, allow the workflow to continue without escalation.
-
Outcome:
- The workflow benefits from context-aware decision-making, reducing false positives while still catching true anomalies.
When to use Fully Deterministic Workflows
1. Well-Defined, Structured Processes
Ideal to use when the task can be fully described as a fixed sequence of steps with clear inputs and outputs.Use Case Example: Automated Jira Ticket Creation for High-Severity Alerts
Use Case Example: Automated Jira Ticket Creation for High-Severity Alerts
- Trigger: High-severity alert occurs in the system.
- Data Extraction: Capture alert details (name, source system, timestamp, description).
- Ticket Creation: Automatically populate Jira fields:
- Project: Security Incidents
- Issue Type: Bug/Incident
- Priority: Highest/Blocker
- Summary:
High-Severity Alert: [Alert Name] - Description: Alert details and context
- Notification (Optional): Notify security team via Slack or email.
- Logging: Record alert ID and ticket ID for traceability.
2. Clear, Rule-Based Decisions
Ideal to use when the logic can be expressed through strict conditions or thresholds.Use Case Example: Automatic Remediation for High-Confidence Alerts
Use Case Example: Automatic Remediation for High-Confidence Alerts
- Trigger: Alert is detected.
- Evaluate Condition: Check if
Detection Confidence > 0.9. - Remediation Actions: Automatically execute predefined actions such as:
- Isolating affected systems
- Blocking malicious IPs or users
- Quarantining suspicious files
- Logging: Record all remediation actions for auditing.
3. High-Volume, Cost-Sensitive Workflows
Ideal for tasks that run frequently and must remain efficient and low-cost.Use Case Example: Automatic Alert Enrichment with Threat Intel and Geo-IP Data
Use Case Example: Automatic Alert Enrichment with Threat Intel and Geo-IP Data
- Trigger: Runs automatically for every incoming alert.
- Data Extraction: Capture fields such as source IP, domain, or alert type.
- Enrichment Actions: Query threat intel sources and perform geo-IP lookups.
- Attach Enrichment Data: Add structured enrichment fields (e.g., Threat Level, Malware Family, Country of Origin).
- Logging: Track enrichment actions for traceability and prevent duplication.
4. Predictable & Consistent Outcomes
Ideal to use when outcomes should always follow the same fixed sequence.Use Case Example: Deterministic User Offboarding Workflow
Use Case Example: Deterministic User Offboarding Workflow
- Trigger: User offboarding event is initiated (e.g., HR system update).
- Disable Okta Account: Revoke authentication immediately.
- Revoke Cloud Credentials: Remove access to AWS, Azure, GCP, etc.
- Remove Slack Access: Remove from workspace and channels.
- Logging: Ensure all actions are recorded and the sequence is strictly enforced.
5. Structured Data and Clear Schemas
Ideal to use when inputs and outputs follow a stable, well-defined structure that the workflow can rely on deterministically.Use Case Example: Onboarding a New User in Okta
Use Case Example: Onboarding a New User in Okta
- Trigger: Okta “New user created” event occurs. Fields include: Email, Name, Role.
- Data Extraction: Capture and validate user details from Okta.
- Salesforce Provisioning: Create the user with correct email, name, and role.
- Slack Provisioning: Create the user in Slack with correct workspace access and channels.
- Logging: Record provisioning actions and flag any failures for review.