Try in Splunk SOAR


Published in response to CVE-2021-44228, this playbook accepts a list of hosts and filenames to remediate on the endpoint. If filenames are provided, the endpoints will be searched and then the user can approve deletion. Then the user is prompted to quarantine the endpoint.

  • Type: Response
  • Product: Splunk SOAR
  • Apps: SSH
  • Last Updated: 2021-12-14
  • Author: Kelby Shelton, Splunk
  • ID: 6ea2007c-8ef8-4647-a4a4-7825cfee3866
  • Use-cases:

Associated Detections

How To Implement

The ssh asset may require ssh access to delete some files depending on their permissions.

Explore Playbook


Required field


source | version: 1