analyze_anomalous_calls_by_process
Group anomalous network-call detections by process to distinguish legitimate VPN daemons (tailscaled, twingate, etc.) from other processes needing per-destination review. Returns per-process count, distinct endpoints, sample detections, and a suggested suppression rule for VPN processes.
Instructions
Group tenant-wide anomalous network-call detections by the calling process. Goal: spot VPN / mesh-networking daemons (tailscaled, twingate, zerotier-one, netbird, cloudflared, warp-svc, openvpn, wireguard) that are legitimately fanning out to many peer IPs and coordination endpoints as normal operation. For those, a single process-scoped rule suppresses both domain AND direct-IP benign anomalies with one rule. Returns per-process: count, distinct endpoints, distinct direct IPs, sample detections (with dashboard links), and a suggested single suppression rule. When a VPN process appears (is_vpn_process_candidate=true), propose a process-wide rule (just {process: , owner: '*', ...}). Do NOT auto-propose process-wide rules for other processes (dockerd, containerd, snapd, curl, etc.) — those can make security-relevant calls and deserve per-destination review.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| customer | No | StepSecurity customer/tenant identifier. Optional — falls back to STEP_SECURITY_CUSTOMER env var. | |
| minCount | No | Hide processes with fewer than this many anomalies (default: 2). |