ChronicleAsset Investigation - Chronicle
Chronicle Pack.#
This Playbook is part of theThis playbook receives indicators from its parent playbook, performs enrichment and investigation for each one of them, provides an opportunity to isolate and block the hostname or IP address associated with the current indicator, and gives out a list of isolated and blocked entities. This playbook also lists the events fetched for the asset identifier information associated with the indicator.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksList Device Events - Chronicle Hostname And IP Address Investigation And Remediation - Chronicle
#
IntegrationsThis playbook does not use any integrations.
#
Scripts- SixgillSearchIndicators
- DeleteContext
#
CommandssetIndicator
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
chronicleasset_value | The value of the ChronicleAsset indicator. | Required | |
chronicleasset_support_contact | The support email address for the chronicle asset. | incident.chronicleassetsupportcontact | Optional |
auto_block_entities | Autoblock the detected suspicious IP Address(es). You can manually set this as 'Yes' or 'No' here or you can set it into a 'Chronicle Auto Block Entities' custom incident field. | incident.chronicleautoblockentities | Optional |
skip_entity_isolation | Skip the isolation of entities. You can manually set this as 'Yes' or 'No' here or you can set it into a 'Chronicle Skip Entity Isolation' custom incident field. | incident.chronicleskipentityisolation | Optional |
#
Playbook OutputsPath | Description | Type |
---|---|---|
IsolatedEntities | List of the isolated entities. | unknown |
PotentiallyBlockedIPs | List of potentially blocked IP addresses. | unknown |