- 15 Jul 2024
- 1 Minute to read
- PDF
Use Automation to Combat Threats
- Updated on 15 Jul 2024
- 1 Minute to read
- PDF
Automation is the key to quickly remediating threats and minimizing your time to remediation. You can configure automation playbooks to be triggered by several events in the life cycle of a confirmed threat:
When a threat is published
When a threat is marked as remediated
When a threat is marked as not remediated
When a threat is acknowledged
Respond to a threat
You can configure an automation playbook to execute during a threat's life cycle.
From the navigation menu, click Automation.
Click Configure new trigger and select When a Threat is published.
Customize the trigger to meet your needs.
Associate one or more playbooks to the trigger.
What automation actions affect the state of threats?
A number of automation actions can affect the state of a threat in Red Canary. These include,
Marking a threat as acknowledged
Marking a threat as not remediated (with a specific reason)
Marking a threat as remediated
You can find the complete list of actions in Red Canary.
Notifying your incident response team when a threat is confirmed
Notify your team whenever a threat with a specific severity is published, by triggering playbooks that:
Create a ticket in your incident management system with the Webhook or API action.
Email an incident response mailing list with the Send Email action.
Post a message in a Slack/Teams channel with the Send Slack Message or Send Microsoft Teams Message action.
Trigger a PagerDuty incident for your security response team using the Create PagerDuty Incident action.
Call a phone tree using the Call Phone Numbers action.
Isolate and remediate workstations affected by malicious software
Activate network isolation / containment for workstation (non-server) endpoints that are affected by malicious software detections, by triggering playbooks that:
Enqueue endpoint isolation using the Isolate the Endpoint action.
Disable network communications with a device management system triggered with the Webhook or API action.
Record a number of forensics artifacts using the Collect forensics action.
Remediate infections using the Kill Processes (IOC), Delete/Capture Files (IOC), etc., actions.