Skip to content

Commit e2b479c

Browse files
committed
Updated links in playbook yamls
1 parent d7b6081 commit e2b479c

10 files changed

+82
-82
lines changed
Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,25 @@
11
name: Risk Notable Block Indicators
22
id: 000edc96-ff2b-48b0-9f6f-83da3783fd63
33
version: 1
4-
date: "2021-10-22"
4+
date: '2021-10-22'
55
author: Kelby Shelton, Splunk
66
type: Response
77
description: This playbook handles locating indicators marked for blocking and determining if any blocking playbooks exist. If there is a match to the appropriate tags in the playbook, a filter block routes the name of the playbook to launch to a code block.
88
playbook: risk_notable_block_indicators
9-
how_to_implement: For detailed implementation see https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
9+
how_to_implement: For detailed implementation see https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1010
references:
11-
- https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack#Call_child_playbooks_with_the_dynamic_playbook_system
12-
- https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack#Indicator_tagging_system
11+
- https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/build-playbooks-compatible-with-the-dispatch_input_playbooks-utility
12+
- https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/use-the-tagging-system-with-the-playbook-pack-for-splunk-soar
1313
app_list: []
1414
tags:
1515
labels:
16-
- risk_notable
16+
- risk_notable
1717
playbook_outputs:
18-
- note_title
19-
- note_content
18+
- note_title
19+
- note_content
2020
playbook_type: Automation
2121
vpe_type: Modern
2222
platform_tags:
23-
- Risk Notable
23+
- Risk Notable
2424
product:
25-
- Splunk SOAR
25+
- Splunk SOAR

playbooks/risk_notable_enrich.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
name: Risk Notable Enrich
22
id: 010edc96-ff2b-48b0-9f6f-43da3783fd63
33
version: 1
4-
date: "2021-10-22"
4+
date: '2021-10-22'
55
author: Kelby Shelton, Splunk
66
type: Investigation
77
description: This playbook collects the available Indicator data types within the event as well as available investigative playbooks. It will launch any playbooks that meet the filtered criteria.
88
playbook: risk_notable_enrich
9-
how_to_implement: For detailed implementation see https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
9+
how_to_implement: For detailed implementation see https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1010
references:
11-
- https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack#Call_child_playbooks_with_the_dynamic_playbook_system
11+
- https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/build-playbooks-compatible-with-the-dispatch_input_playbooks-utility
1212
app_list: []
1313
tags:
1414
labels:
15-
- risk_notable
15+
- risk_notable
1616
playbook_outputs:
17-
- note_title
18-
- note_content
17+
- note_title
18+
- note_content
1919
playbook_type: Automation
2020
vpe_type: Modern
2121
platform_tags:
22-
- Risk Notable
22+
- Risk Notable
2323
product:
24-
- Splunk SOAR
24+
- Splunk SOAR
Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,32 +1,32 @@
11
name: Risk Notable Import Data
22
id: 020edc96-ff2b-48b0-9f6f-23da3783fd63
33
version: 1
4-
date: "2021-10-22"
4+
date: '2021-10-22'
55
author: Kelby Shelton, Splunk
66
type: Investigation
77
description: This playbook gathers all of the events associated with the risk notable and imports them as artifacts. It also generates a custom markdown formatted note.
88
playbook: risk_notable_import_data
9-
how_to_implement: For detailed implementation see https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
9+
how_to_implement: For detailed implementation see https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1010
references:
11-
- https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
12-
- http://docs.splunk.com/Documentation/ES/6.6.2/Admin/Configurecorrelationsearches#Use_security_framework_annotations_in_correlation_searches
11+
- https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
12+
- http://docs.splunk.com/Documentation/ES/6.6.2/Admin/Configurecorrelationsearches#Use_security_framework_annotations_in_correlation_searches
1313
app_list:
14-
- Splunk
14+
- Splunk
1515
tags:
1616
labels:
17-
- risk_notable
17+
- risk_notable
1818
playbook_outputs:
19-
- note_title
20-
- note_content
19+
- note_title
20+
- note_content
2121
platform_tags:
22-
- Risk Notable
22+
- Risk Notable
2323
playbook_type: Automation
2424
vpe_type: Modern
2525
playbook_fields:
26-
- event_id
27-
- info_min_time
28-
- info_max_time
29-
- risk_object
30-
- risk_object_type
26+
- event_id
27+
- info_min_time
28+
- info_max_time
29+
- risk_object
30+
- risk_object_type
3131
product:
32-
- Splunk SOAR
32+
- Splunk SOAR
Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
11
name: Risk Notable Investigate
22
id: 030edc96-ff2b-48b0-9f6f-03da3783fd63
33
version: 1
4-
date: "2021-10-22"
4+
date: '2021-10-22'
55
author: Kelby Shelton, Splunk
66
type: Investigation
77
description: This playbook checks for the presence of the Risk Investigation workbook and updates tasks or leaves generic notes.
88
playbook: risk_notable_investigate
9-
how_to_implement: For detailed implementation see https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
9+
how_to_implement: For detailed implementation see https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1010
references:
11-
- https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
11+
- https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1212
app_list: []
1313
tags:
1414
labels:
15-
- risk_notable
15+
- risk_notable
1616
playbook_type: Automation
1717
vpe_type: Modern
1818
platform_tags:
19-
- Risk Notable
19+
- Risk Notable
2020
product:
21-
- Splunk SOAR
21+
- Splunk SOAR
Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
name: Risk Notable Merge Events
22
id: 040edc96-ff2b-48b0-9f6f-53da3783fd63
33
version: 1
4-
date: "2021-10-22"
4+
date: '2021-10-22'
55
author: Kelby Shelton, Splunk
66
type: Investigation
77
description: This playbook finds related events based on key fields in a risk notable and allows the user to process the results and decide which events to merge into the current investigation.
88
playbook: risk_notable_merge_events
9-
how_to_implement: For detailed implementation see https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
9+
how_to_implement: For detailed implementation see https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1010
references:
11-
- https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
11+
- https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1212
app_list: []
1313
tags:
1414
labels:
15-
- risk_notable
15+
- risk_notable
1616
playbook_outputs:
17-
- note_title
18-
- note_content
17+
- note_title
18+
- note_content
1919
playbook_type: Automation
2020
vpe_type: Modern
2121
platform_tags:
22-
- Risk Notable
22+
- Risk Notable
2323
product:
24-
- Splunk SOAR
24+
- Splunk SOAR

playbooks/risk_notable_mitigate.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
11
name: Risk Notable Mitigate
22
id: 050edc96-ff2b-48b0-9f6f-63da3783fd63
33
version: 1
4-
date: "2021-10-22"
4+
date: '2021-10-22'
55
author: Kelby Shelton, Splunk
66
type: Response
77
description: This playbook checks for the presence of the Risk Response workbook and updates tasks or leaves generic notes. The risk_notable_verdict playbooks recommends this playbook as a second phase of the investigation. Additionally, this playbook can be used in ad-hoc investigations or incorporated into custom workbooks.
88
playbook: risk_notable_mitigate
9-
how_to_implement: For detailed implementation see https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
9+
how_to_implement: For detailed implementation see https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1010
references:
11-
- https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
11+
- https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1212
app_list: []
1313
tags:
1414
labels:
15-
- risk_notable
15+
- risk_notable
1616
playbook_type: Automation
1717
vpe_type: Modern
1818
platform_tags:
19-
- Risk Notable
19+
- Risk Notable
2020
product:
21-
- Splunk SOAR
21+
- Splunk SOAR

playbooks/risk_notable_preprocess.yml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Risk Notable Preprocess
22
id: 060edc96-ff2b-48b0-9f6f-13da3783fd63
33
version: 1
4-
date: "2021-10-22"
4+
date: '2021-10-22'
55
author: Kelby Shelton, Splunk
66
type: Investigation
77
description: >-
@@ -10,21 +10,21 @@ description: >-
1010
2. Posts a link to this container in the comment field of Splunk ES.
1111
3. Updates the container name, description, and severity to reflect the data in the notable artifact."
1212
playbook: risk_notable_preprocess
13-
how_to_implement: For detailed implementation see https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
13+
how_to_implement: For detailed implementation see https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1414
references:
15-
- https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
15+
- https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1616
app_list:
17-
- "Splunk"
17+
- 'Splunk'
1818
tags:
1919
labels:
20-
- risk_notable
20+
- risk_notable
2121
platform_tags:
22-
- Risk Notable
22+
- Risk Notable
2323
playbook_type: Automation
2424
vpe_type: Modern
2525
playbook_fields:
26-
- event_id
27-
- info_min_time
28-
- info_max_time
26+
- event_id
27+
- info_min_time
28+
- info_max_time
2929
product:
30-
- Splunk SOAR
30+
- Splunk SOAR
Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
name: Risk Notable Protect Assets and Users
22
id: 070edc96-ff2b-48b0-9f6f-93da3783fd63
33
version: 1
4-
date: "2021-10-22"
4+
date: '2021-10-22'
55
author: Kelby Shelton, Splunk
66
type: Response
77
description: This playbook attempts to find assets and users from the notable event and match those with assets and identities from Splunk ES. If a match was found and the user has playbooks available to contain entities, the analyst decides which entities to disable or quarantine.
88
playbook: risk_notable_protect_assets_and_users
9-
how_to_implement: For detailed implementation see https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
9+
how_to_implement: For detailed implementation see https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1010
references:
11-
- https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack#Call_child_playbooks_with_the_dynamic_playbook_system
11+
- https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/build-playbooks-compatible-with-the-dispatch_input_playbooks-utility
1212
app_list: []
1313
tags:
1414
labels:
15-
- risk_notable
15+
- risk_notable
1616
playbook_outputs:
17-
- note_title
18-
- note_content
17+
- note_title
18+
- note_content
1919
playbook_type: Automation
2020
vpe_type: Modern
2121
platform_tags:
22-
- Risk Notable
22+
- Risk Notable
2323
product:
24-
- Splunk SOAR
24+
- Splunk SOAR
Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
11
name: Risk Notable Review Indicators
22
id: 080edc96-ff2b-48b0-9f6f-73da3783fd63
33
version: 1
4-
date: "2021-10-22"
4+
date: '2021-10-22'
55
author: Kelby Shelton, Splunk
66
type: Response
77
description: This playbook was designed to be called by a user to process indicators that are marked as suspicious within the SOAR platform. Analysts will review indicators in a prompt and mark them as blocked or safe.
88
playbook: risk_notable_review_indicators
9-
how_to_implement: For detailed implementation see https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
9+
how_to_implement: For detailed implementation see https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1010
references:
11-
- https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack#Indicator_tagging_system
11+
- https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/use-the-tagging-system-with-the-playbook-pack-for-splunk-soar
1212
app_list: []
1313
tags:
1414
labels:
15-
- risk_notable
15+
- risk_notable
1616
platform_tags:
17-
- Risk Notable
17+
- Risk Notable
1818
playbook_type: Automation
1919
vpe_type: Modern
2020
product:
21-
- Splunk SOAR
21+
- Splunk SOAR

playbooks/risk_notable_verdict.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
11
name: Risk Notable Verdict
22
id: 090edc96-ff2b-48b0-9f6f-33da3783fd63
33
version: 1
4-
date: "2021-10-22"
4+
date: '2021-10-22'
55
author: Kelby Shelton, Splunk
66
type: Response
77
description: This playbook locates available playbooks with the response tag and presents them to the analyst. Based on the analyst selection, it will launch its chosen playbook.
88
playbook: risk_notable_verdict
9-
how_to_implement: For detailed implementation see https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack
9+
how_to_implement: For detailed implementation see https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/get-started-with-the-risk-notable-playbook-pack-for-splunk-soar
1010
references:
11-
- https://docs.splunk.com/Documentation/ESSOC/latest/user/Useplaybookpack#Call_child_playbooks_with_the_dynamic_playbook_system
11+
- https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/how-to-use-splunk-security-content/5.8/use-splunk-soar-playbooks-and-workbooks-from-the-risk-notable-playbook-pack/build-playbooks-compatible-with-the-dispatch_input_playbooks-utility
1212
app_list: []
1313
tags:
1414
labels:
15-
- risk_notable
15+
- risk_notable
1616
platform_tags:
17-
- Risk Notable
17+
- Risk Notable
1818
playbook_type: Automation
1919
vpe_type: Modern
2020
product:
21-
- Splunk SOAR
21+
- Splunk SOAR

0 commit comments

Comments
 (0)