- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
One of the challenges when performing a security investigation is the endless stream of alerts with little to no context. Analysts are often overwhelmed, with too little time to separate the noise from the high-severity alerts. Automatic Incident enrichment with XSOAR speeds up the triage process and assists the analysts to make an informed decision by providing the bigger picture in a single pane of glass.
Using what we’ve learned in the previous article, let's take a look at how indicators are automatically created, and enriched using the VirusTotal integration.
Using what we’ve learned in the previous blog, Integrating Cortex XSOAR and VirusTotal for Maximum Incident Response and Investigation, let's take a look at how indicators are automatically created, and enriched using the VirusTotal integration.
Now that we have created the incident manually, you will see the indicators are automatically extracted and the reputation has been calculated using the Virus Total Integration.
Clicking on an indicator you can see the verdict, as well as the enrichment source. If you have configured any other sources besides Virus Total, they would appear here as well.
Lastly, you can monitor your API usage with the built-in API metrics dashboards on the homepage.
In Summary:
Automatic incident enrichment leverages Indicator extraction in order to take different text sources in the system (such as War Room entries, email content, etc), extracts them (usually based on regex) and creates indicators in Cortex XSOAR. After extraction, the indicator can be enriched. Indicator enrichment takes the extracted indicator and provides detailed information about the indicator (from open ports to whois information, etc). It provides a story about the indicator, based on an enrichment feed such as VirusTotal, IPinfo, etc.
Note: There are several methods for performing indicator extraction. Some of which are less resource intensive than others and utilize less disk space (since you are only extracting what you specifically choose, Ex. the body of an email). I would suggest reading about the different modes using the incident type method as a starting point. Additionally, the Customer Success team has put together an excellent engineer training series that we highly recommend.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Subject | Likes |
---|---|
2 Likes | |
1 Like | |
1 Like | |
1 Like | |
1 Like |
User | Likes Count |
---|---|
3 | |
2 | |
1 | |
1 | |
1 |