Splunk SOAR

Splunk Phantom

rhugo
Observer

Can one use Splunk phantom for auto-remediation?

What real-life use cases are applicable to the use of Phantom?

 

Labels (1)
0 Karma
1 Solution

thambisetty
SplunkTrust
SplunkTrust

Phantom is mainly used to automate repetitive tasks.

for example: if you have correlation search in Splunk that alerts when phishing email is found.

in general scenarios, analyst will follow incident playbook to perform actions in response to phishing alert.

The list of actions purely based on how incident can be properly handled, below are the just examples:

  • identifying list of recipients who received phishing email
  • identifying list of users who clicked on phishing link using proxy logs
  • notifying users that they received phishing email with subject "what ever it is"
  • changing password of users 
  • sharing of new passwords to the users.

and also, find more use case here 

https://www.splunk.com/en_us/blog/security/playbooks-going-beyond-incident-response-use-cases.html

  •  
————————————
If this helps, give a like below.

View solution in original post

thambisetty
SplunkTrust
SplunkTrust

Phantom is mainly used to automate repetitive tasks.

for example: if you have correlation search in Splunk that alerts when phishing email is found.

in general scenarios, analyst will follow incident playbook to perform actions in response to phishing alert.

The list of actions purely based on how incident can be properly handled, below are the just examples:

  • identifying list of recipients who received phishing email
  • identifying list of users who clicked on phishing link using proxy logs
  • notifying users that they received phishing email with subject "what ever it is"
  • changing password of users 
  • sharing of new passwords to the users.

and also, find more use case here 

https://www.splunk.com/en_us/blog/security/playbooks-going-beyond-incident-response-use-cases.html

  •  
————————————
If this helps, give a like below.
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...