A simple script and Playbook can automatically post an IOC (e.g. IP address, file hash, etc.) to Phantom to kick off a Playbook. Perhaps you want a Playbook to run an investigation when a specific file hash is detected. Mark that Playbook active and let it do the investigation every time a new hash needs to be investigated.
Here are the steps to set up and use it:
Here is the email from this Playbook:
If you didn’t already know it, Playbooks are Python scripts that Phantom interprets in order to execute your mission when you see something that you want to take action on. Playbooks hook into the Phantom platform and all of its capabilities in order to execute actions, ensuring a repeatable and auditable process around your security operations. Sample community Playbooks can be customized at will and are synchronized via Git and published on our public Community GitHub repository. You can read more about Phantom and Playbooks here.
Interested in seeing how Phantom Playbooks can help your organization? Get the free Phantom Community Edition.
The world’s leading organizations rely on Splunk, a Cisco company, to continuously strengthen digital resilience with our unified security and observability platform, powered by industry-leading AI.
Our customers trust Splunk’s award-winning security and observability solutions to secure and improve the reliability of their complex digital environments, at any scale.