Thread Info | |||||
---|---|---|---|---|---|
I have a top level playbook that calls two playbooks, on that does some analysis and the second one that promotes the...
by
dphegarty
New Member
in
Splunk SOAR (f.k.a. Phantom)
02-07-2020
|
0
|
1
| |||
We have a python script that basically does "ip address -> ... python-generated splunk calls + viz api calls -> url o...
by
leomeyerovich
Explorer
in
Splunk SOAR (f.k.a. Phantom)
01-31-2020
|
0
|
0
| |||
When looking at the result of a Phantom automation, say on IP1 & IP2 + User1 & User2, we'd like to also have a table ...
by
leomeyerovich
Explorer
in
Splunk SOAR (f.k.a. Phantom)
01-31-2020
|
0
|
0
| |||
Question: Are there any locking or concurrency guarantees when playbooks are operating on a container?
Issue I am ...
by
buzz_gt
New Member
in
Splunk SOAR (f.k.a. Phantom)
01-31-2020
|
0
|
0
| |||
Hello,
I'm using the QRadar integration on Phantom, and we can define the mapping between Phantom and QRadar.I got...
by
flogo
New Member
in
Splunk SOAR (f.k.a. Phantom)
09-04-2019
|
0
|
1
| |||
Does anyone have examples of how to use Splunk Phantom to investigate and remediate phishing emails?
by
sloshburch
Splunk Employee
in
Splunk SOAR (f.k.a. Phantom)
01-30-2020
|
0
|
1
| |||
Does anyone have examples of how to use Splunk Phantom to hunt for threats?
by
sloshburch
Splunk Employee
in
Splunk SOAR (f.k.a. Phantom)
01-30-2020
|
0
|
1
| |||
Does anyone have examples of how to use Splunk Phantom to protect an EC2 group from malicious traffic?
by
sloshburch
Splunk Employee
in
Splunk SOAR (f.k.a. Phantom)
01-30-2020
|
0
|
1
| |||
Does anyone have examples of how to use Splunk Phantom to determine if an IP address is malicious?
by
sloshburch
Splunk Employee
in
Splunk SOAR (f.k.a. Phantom)
01-30-2020
|
0
|
1
| |||
Does anyone have examples of how to use Splunk Phantom to automatically contain malicious insiders?
by
sloshburch
Splunk Employee
in
Splunk SOAR (f.k.a. Phantom)
01-30-2020
|
0
|
1
| |||
Does anyone have examples of how to use Splunk Phantom to investigate and remediate malware infections?
by
sloshburch
Splunk Employee
in
Splunk SOAR (f.k.a. Phantom)
01-30-2020
|
0
|
1
| |||
Does anyone have examples of how to use Splunk Phantom to prompt an analyst to block an endpoint?
by
sloshburch
Splunk Employee
in
Splunk SOAR (f.k.a. Phantom)
01-30-2020
|
0
|
1
| |||
Does anyone have examples of how to use Splunk Phantom to investigate and contain ransomware?
by
sloshburch
Splunk Employee
in
Splunk SOAR (f.k.a. Phantom)
01-30-2020
|
0
|
1
| |||
Hi all,
I was testing out phanom to contain malicious IPs with my perimeter FWs.The problem is that it only block ...
by
stevenaung
New Member
in
Splunk SOAR (f.k.a. Phantom)
01-29-2020
|
0
|
0
| |||
Event coming from QRadar is missing artifact. What should I check?
If you need mapping,How do I map between phanto...
by
kyung123a
New Member
in
Splunk SOAR (f.k.a. Phantom)
01-28-2020
|
0
|
0
|