Try in Splunk SOAR


"This playbook prepares a risk notable for investigation by performing the following tasks: 1. Ensures that a risk notable links back to the original notable event with a card pinned to the HUD. 2. Posts a link to this container in the comment field of Splunk ES. 3. Updates the container name, description, and severity to reflect the data in the notable artifact."

  • Type: Investigation
  • Product: Splunk SOAR
  • Apps: Splunk
  • Last Updated: 2021-10-22
  • Author: Kelby Shelton, Splunk
  • ID: 060edc96-ff2b-48b0-9f6f-13da3783fd63
  • Use-cases:

Associated Detections

How To Implement

For detailed implementation see

Explore Playbook


Required field

  • event_id
  • info_min_time
  • info_max_time


source | version: 1