Planning mode controls whether and how agents create execution plans before taking action. This is a powerful feature that can significantly improve performance on complex tasks.
Task: "Tell me about the IP 8.8.8.8"Step 1: Agent thinks "I should check IP_lookup" → calls ip_lookupStep 3: Agent has enough info → responds
Pros: Low latency, good for extremely simple tasks or when you know the task is simple and well-defined
Cons: May take inefficient paths, might miss important steps
Task: "Investigate suspicious login from [email protected]"Planning Phase:Agent creates plan:1. Get user details from Okta (roles, groups, last login)2. Get authentication events from past 24h3. Extract all source IPs from those events4. Check IPs against threat intel5. Determine if activity is anomalous6. Summarize findingsExecution Phase:Agent follows plan systematically, adjusting if needed
Pros: Thorough, systematic, less likely to miss steps
Cons: Slightly slower, less exploratory
Agent configuration:- Planning Mode: Never- Task: Always the same patternWorkflow:- Get Okta user details- Post to SlackResult: Fast, simple, no need for planning
Agent configuration:- Planning Mode: Always- Task: 15+ steps across multiple systemsPlan created:1. Verify user in Okta2. List all groups and roles3. Remove from Okta groups4. Disable AWS IAM access5. Remove from Google Workspace6. List Jira issues assigned to user7. Reassign critical issues8. Disable Slack account9. Post summary to #security channel...Result: Systematic, thorough, nothing missed
Speed vs Thoroughness: Planning adds 10-20% overhead but significantly improves reliability for complex tasks. For most agents, “Auto” provides the best balance.
When an agent creates a plan, you can see it in the execution logs:
Copy
Ask AI
📋 Plan Created:Step 1: Get SentinelOne alert details - Tool: get_sentinelone_alert - Purpose: Fetch full alert contextStep 2: Search Splunk for related activity - Tool: search_splunk - Purpose: Find user activity in past 24hStep 3: Check file hash in VirusTotal - Tool: virustotal_check_hash - Purpose: Determine if file is known malwareStep 4: Assess severity based on findings - No tool needed - Purpose: Analyze data and make determinationStep 5: Update Jira ticket with findings - Tool: update_jira_ticket - Purpose: Post results for analyst
This visibility helps you understand the agent’s approach and debug issues.
When planning your approach:- For Critical alerts, always create a detailed plan- For Low severity alerts, act quickly without extensive planning- If more than 3 tools are needed, plan your approach first
Your plan should include:1. All data gathering steps (list them)2. Analysis phase (what you'll evaluate)3. Decision criteria4. Action stepsEnsure your plan covers all requirements before executing.
Follow this sequence:1. First, always call [specific tool]2. Then, based on result, call [next tool]3. Finally, [action](Being explicit compensates for lack of planning)