Workflow
1. Phishing Email Analysis
Automate the extraction of indicators of compromise (IOCs) from phishing emails and check them against threat intelligence.
2. Malware Analysis
Automatically submit suspicious files to a malware analysis sandbox and retrieve the results.
3. Automated Enrichment
Automatically enrich IOCs with threat intelligence to provide context during analysis.
4. Blocking Malicious IPs
Automatically block malicious IP addresses at the firewall or other security devices.
5. User Verification
Automatically verify the status of a user when suspicious activity is detected.
6. Password Reset
Implement an automated workflow for user password resets following a potential compromise.
7. Disabling User Accounts
Automatically disable user accounts that are suspected to be compromised.
8. Quarantine Endpoint
Isolate endpoints that are suspected to be compromised to prevent lateral movement.
9. Data Exfiltration Detection
Implement workflows to detect and respond to potential data exfiltration.
10. Ransomware Response
11. Patch Management
12. Incident Ticket Creation
13. User Notification
14. Incident Documentation
15. Threat Indicator Sharing
16. SSL Certificate Renewal
17. Backup Verification
18. Cloud Security Monitoring
19. VPN Monitoring
20. DDoS Mitigation
Last updated