Splunk SOAR

SOAR Automation with Darktrace APP

Nraj87
Explorer

Security alerts generated by Darktrace are currently converted into incidents within Splunk for investigation. Once the analysis team completes the review and formally closes an incident, propose an automated process that will immediately confirm this action back to Darktrace as well. the automation SOAR is designed to automatically acknowledge and update the status of the corresponding Darktrace alert.

please advise how Splunk Notable data from notable index can be sent TO SOAR or pull by SOAR from Splunk ES

Labels (1)
Tags (1)
0 Karma

phanTom
SplunkTrust
SplunkTrust

@Nraj87 you can send to SOAR from ES using the Adaptive Response:

https://help.splunk.com/en/splunk-soar/splunk-app-for-soar-export/4.3.25/send-data-between-the-splun... 

Or you can use the Splunk app on SOAR to poll the notable index and it will create SOAR cases for each one ingested. 

 

-- Hope this helps! If so please mark with Karma, or mark as a Solution if this resolved your issue. Happy SOARing! --

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...