- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Can one use Splunk phantom for auto-remediation?
What real-life use cases are applicable to the use of Phantom?
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


Phantom is mainly used to automate repetitive tasks.
for example: if you have correlation search in Splunk that alerts when phishing email is found.
in general scenarios, analyst will follow incident playbook to perform actions in response to phishing alert.
The list of actions purely based on how incident can be properly handled, below are the just examples:
- identifying list of recipients who received phishing email
- identifying list of users who clicked on phishing link using proxy logs
- notifying users that they received phishing email with subject "what ever it is"
- changing password of users
- sharing of new passwords to the users.
and also, find more use case here
https://www.splunk.com/en_us/blog/security/playbooks-going-beyond-incident-response-use-cases.html
If this helps, give a like below.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


Phantom is mainly used to automate repetitive tasks.
for example: if you have correlation search in Splunk that alerts when phishing email is found.
in general scenarios, analyst will follow incident playbook to perform actions in response to phishing alert.
The list of actions purely based on how incident can be properly handled, below are the just examples:
- identifying list of recipients who received phishing email
- identifying list of users who clicked on phishing link using proxy logs
- notifying users that they received phishing email with subject "what ever it is"
- changing password of users
- sharing of new passwords to the users.
and also, find more use case here
https://www.splunk.com/en_us/blog/security/playbooks-going-beyond-incident-response-use-cases.html
If this helps, give a like below.
