Splunk SOAR

SOAR Automation with Darktrace APP

Nraj87
Explorer

Security alerts generated by Darktrace are currently converted into incidents within Splunk for investigation. Once the analysis team completes the review and formally closes an incident, propose an automated process that will immediately confirm this action back to Darktrace as well. the automation SOAR is designed to automatically acknowledge and update the status of the corresponding Darktrace alert.

please advise how Splunk Notable data from notable index can be sent TO SOAR or pull by SOAR from Splunk ES

Labels (1)
Tags (1)
0 Karma

phanTom
SplunkTrust
SplunkTrust

@Nraj87 you can send to SOAR from ES using the Adaptive Response:

https://help.splunk.com/en/splunk-soar/splunk-app-for-soar-export/4.3.25/send-data-between-the-splun... 

Or you can use the Splunk app on SOAR to poll the notable index and it will create SOAR cases for each one ingested. 

 

-- Hope this helps! If so please mark with Karma, or mark as a Solution if this resolved your issue. Happy SOARing! --

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...