The QRadar SOAR Add-on integrates the IBM Security QRadar SOAR Platform with Splunk to simplify and streamline the process of escalating and managing cases. Escalating a Splunk alert or Splunk ES notable event to IBM QRadar SOAR allows the platform to generate a detailed, case-specific response plan that enables security team members to quickly respond.
Additionally, security team members can add artifacts and other incident details to case records, and can leverage built-in threat intelligence to gather valuable context needed to inform an intelligent and decisive response.
Complete documentation is available on GitHub: https://github.com/ibmresilient/resilient-reference/tree/master/developer_guides/qradar-soar-splunk-addon
For support, please visit https://ibm.com/mysupport . Do not use the 'Contact Developer' link, as that email address is not monitored.