Splunk SOAR 6.2 Introduces New Automation Features, Workload Migration, and Firewall Integrations

Security Coty Sugg
The Splunk team is proud to announce the release of Splunk SOAR 6.2 (Security Orchestration Automation and Response). We’ve been hard at work developing the latest and greatest features for this update, several of which have come from requests and suggestions from our users over on Splunk Ideas. SOAR 6.2 allows users to configure logic loops directly in the Visual Playbook Editor with an intuitive user interface, eliminating the need for custom code, as well as integrating the Splunk SOAR cloud environment with CyberARK's privileged access management solution. In addition to these features, the release also includes a new set of firewall management apps for two highly requested products and a new user interface that will allow customers to convert playbooks developed in the classic Visual Playbook Editor to modern playbooks.

Let’s take a closer look at some of the new features and updates for Splunk SOAR 6.2

Over the coming weeks, we’ll provide an in depth look at each of these new features in dedicated blogs and videos. Be sure to check back each week in the month of December for more information.

What’s on the Horizon

The Splunk SOAR team is already hard at work on the next version release and we’ll have more to share about the newest features, playbooks, and much more in 2024. One upcoming change that we want to make sure our users know about involves the classic version of the Visual Playbook Editor.

When version 6.3 of Splunk SOAR arrives next year, we will be removing the classic version of the Visual Playbook Editor. The modern version of the Visual Playbook Editor isn’t going anywhere. Back in version 5.0.1, we introduced the modern version of the Visual Playbook Editor, which made it easier than ever for users to create and modify playbooks, regardless of their level of coding experience. This version added improved readability, vertical orientation, and a slew of new options for creating playbook blocks.

We want to make it as easy as possible for users currently using any playbooks made with the classic editor to be able to convert their playbooks to the modern editor. In our previous release, (6.1.1) we added a command line interface (CLI) tool for on-premises users to migrate their classic playbooks to modern playbooks. With the release of Splunk SOAR 6.2, the same migration capability is available from the Splunk SOAR user interface (UI) and is available for both cloud and on-premises users.

Upgrade to SOAR 6.2 Today

Splunk SOAR 6.2 updates are available today in both cloud and on-prem environments. We are excited to see how users will apply these new features and updates to enhance their approach to automation. Be sure to let us know what you think of Splunk SOAR 6.2 over in the Splunk SOAR Community and if you have an idea or request for a new feature, please let us know by submitting them to Splunk Ideas.

If you didn’t have the chance to join our recent Tech Talk that went over this release, be sure to give the On-Demand recording of the session a watch here.

For more information about Splunk SOAR 6.2, be sure to check out the release notes. Over the coming weeks, we’ll also have individual blogs that take a deeper look at the new features found in this release which you won’t want to miss.

Get out there and get automating!

Related Articles

Going Beyond Today’s Asset and Risk Intelligence: What’s New in Splunk ARI 1.2
Security
3 Minute Read

Going Beyond Today’s Asset and Risk Intelligence: What’s New in Splunk ARI 1.2

With the improvements within Splunk’s ARI 1.2, organizations can further improve aligning their vulnerabilities, misconfigurations, and threat activity with the business value of each asset.
Staff Picks for Splunk Security Reading January 2024
Security
3 Minute Read

Staff Picks for Splunk Security Reading January 2024

Welcome to the January Splunk staff picks blog – a curated list of presentations, whitepapers, and customer case studies that Splunk security experts feel are worth a read.
Q&A Follow-Up: How Datev uses MITRE ATT&CK & Splunk in its SOC
Security
2 Minute Read

Q&A Follow-Up: How Datev uses MITRE ATT&CK & Splunk in its SOC

Following our webinar with Datev on how they use MITRE ATT&CK & Splunk in its SOC, we compiled all of the questions left unanswered in this blog post. Read all of it here,