DEPRECATED. Use the Search Endpoints By Hash playbook instead. Assumes that malicious IOCs are in the right place in the context and starts hunting using available tools.
This playbook uses the following sub-playbooks, integrations, and scripts.
This playbook does not use any sub-playbooks.
This playbook does not use any integrations.
This playbook does not use any scripts.
This playbook does not use any commands.
There are no inputs for this playbook.
There are no outputs for this playbook.