Try in Splunk SOAR

Description

Published in response to CVE-2021-44228, this playbook accepts a list of hosts and filenames to remediate on the endpoint. If filenames are provided, the endpoints will be searched and then the user can approve deletion. Then the user is prompted to quarantine the endpoint.

  • Type: Response
  • Product: Splunk SOAR
  • Apps: SSH
  • Last Updated: 2021-12-14
  • Author: Kelby Shelton, Splunk
  • ID: 6ea2007c-8ef8-4647-a4a4-7825cfee3866
  • Use-cases:

Associated Detections

How To Implement

The ssh asset may require ssh access to delete some files depending on their permissions.

Explore Playbook

explore

Required field

Reference

source | version: 1