IOC Alert
#
This Playbook is part of the Core - Investigation and Response Pack.Supported versions
Supported Cortex XSOAR versions: 6.6.0 and later.
IOCs provide the ability to alert on known malicious objects on endpoints across the organization.
Analysis Actions: The playbook will use several enrichment sources to determine the IOC verdict. Additionally, will use the Analytics module to run a prevalence check for the IOC.
Response Actions The playbook's first response action is a containment plan which is based on the playbook input. In that phase, the playbook will execute endpoint isolation.
Investigative Actions: When the playbook executes, it checks for additional abnormal activity using the Endpoint Investigation Plan playbook that can indicate the endpoint might be compromised.
Remediation Actions: In case results are found within the investigation phase, the playbook will execute remediation actions that include containment and eradication.
This phase will execute the following containment actions:
- File quarantine
- Endpoint isolation
And the following eradication actions:
- Manual process termination
- Manual file deletion
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooks- Eradication Plan
- Enrichment for Verdict
- Handle False Positive Alerts
- Endpoint Investigation Plan
- Recovery Plan
- Containment Plan
#
IntegrationsThis playbook does not use any integrations.
#
ScriptsThis playbook does not use any scripts.
#
Commands- extractIndicators
- closeInvestigation
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
BlockIndicatorsAutomatically | Whether to block suspicious/malicious indicators automatically. Specify True/False. | False | Optional |
ShouldCloseAutomatically | Whether to close the alert automatically if it's established verdict is False Positive? | True | Optional |
PreHostContainment | Whether to isolate the host before the investigation phase in case an IOC is found to be suspicious. | False | Optional |
ShouldHandleFPautomatically | Whether to automatically handle false positive alerts? Specify true/false. | Optional | |
AutoRestoreEndpoint | Whether to execute the Recovery playbook. | Optional | |
AutoContainment | Setting this input will impact both Containment Plan sub-playbooks. Without setting this input, the default values are True for the first occurrence and False for the second. Whether to execute automatically or manually the containment plan tasks: * Isolate endpoint * Block indicators * Quarantine file * Disable user | Optional | |
FileRemediation | Should be either 'Quarantine' or 'Delete'. | Quarantine | Optional |
AutoEradication | Whether to execute automatically or manually the eradication plan tasks: * Terminate process * Delete file * Reset the user's password | False | Optional |
#
Playbook OutputsThere are no outputs for this playbook.