SecurityIncident

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Tables Index


Attribute Value
Category Internal
Supports Transformations ✓ Yes (source)
Ingestion API Supported ✗ No

Contents

Solutions (34)

This table is used by the following solutions:

Connectors (2)

This table is ingested by the following connectors:

Connector Selection Criteria
Derdack SIGNL4
Microsoft Defender XDR

Content Items Using This Table (70)

Analytic Rules (3)

In solution MicrosoftPurviewInsiderRiskManagement:

Analytic Rule Selection Criteria
Insider Risk_High User Security Alert Correlations
Insider Risk_High User Security Incidents Correlation

In solution SOCRadar:

Analytic Rule Selection Criteria
SOCRadar Unsynced Closed Incident

Hunting Queries (1)

In solution SOCRadar:

Hunting Query Selection Criteria
SOCRadar Incident Correlation

Workbooks (58)

In solution Apache Log4j Vulnerability Detection:

Workbook Selection Criteria
Log4jImpactAssessment

In solution Azure Key Vault:

Workbook Selection Criteria
AzureKeyVaultWorkbook

In solution Azure SQL Database solution for sentinel:

Workbook Selection Criteria
Workbook-AzureSQLSecurity

In solution AzureSecurityBenchmark:

Workbook Selection Criteria
AzureSecurityBenchmark

In solution Censys:

Workbook Selection Criteria
Censys

In solution ContinuousDiagnostics&Mitigation:

Workbook Selection Criteria
ContinuousDiagnostics&Mitigation

In solution CybersecurityMaturityModelCertification(CMMC)2.0:

Workbook Selection Criteria
CybersecurityMaturityModelCertification_CMMCV2

In solution DORA Compliance:

Workbook Selection Criteria
DORACompliance

In solution DPDP Compliance:

Workbook Selection Criteria
DPDPCompliance

In solution GDPR Compliance & Data Security:

Workbook Selection Criteria
GDPRComplianceAndDataSecurity

In solution GreyNoiseThreatIntelligence:

Workbook Selection Criteria
GreyNoiseOverview

In solution HIPAA Compliance:

Workbook Selection Criteria
HIPAACompliance

In solution Infoblox:

Workbook Selection Criteria
Infoblox_Lookup_Workbook
Infoblox_Workbook

In solution Infoblox SOC Insights:

Workbook Selection Criteria
InfobloxSOCInsightsWorkbook

In solution IoTOTThreatMonitoringwithDefenderforIoT:

Workbook Selection Criteria
IoTOTThreatMonitoringwithDefenderforIoT

In solution Lumen Defender Threat Feed:

Workbook Selection Criteria
Lumen-Threat-Feed-Overview

In solution MaturityModelForEventLogManagementM2131:

Workbook Selection Criteria
MaturityModelForEventLogManagement_M2131

In solution Microsoft Defender Threat Intelligence:

Workbook Selection Criteria
MicrosoftThreatIntelligence

In solution Microsoft Defender XDR:

Workbook Selection Criteria
MicrosoftDefenderForOffice365detectionsandinsights

In solution MicrosoftPurviewInsiderRiskManagement:

Workbook Selection Criteria
InsiderRiskManagement

In solution NISTSP80053:

Workbook Selection Criteria
NISTSP80053

In solution ReversingLabs:

Workbook Selection Criteria
ReversingLabs-CapabilitiesOverview

In solution SOC Handbook:

Workbook Selection Criteria
AnalyticsEfficiency
AnomaliesVisualization
AnomalyData
IncidentOverview
InvestigationInsights
SecurityOperationsEfficiency
SentinelCentral

In solution SOC-Process-Framework:

Workbook Selection Criteria
SOCProcessFramework

In solution SentinelSOARessentials:

Workbook Selection Criteria
IncidentTasksWorkbook
SecurityOperationsEfficiency

In solution Threat Intelligence:

Workbook Selection Criteria
ThreatIntelligence

In solution Threat Intelligence (NEW):

Workbook Selection Criteria
ThreatIntelligenceNew

In solution ThreatAnalysis&Response:

Workbook Selection Criteria
DynamicThreatModeling&Response

In solution ThreatConnect:

Workbook Selection Criteria
ThreatConnectOverview

In solution ZeroTrust(TIC3.0):

Workbook Selection Criteria
ZeroTrustTIC3

GitHub Only:

Workbook Selection Criteria
AMAmigrationTracker
AdvancedWorkbookConcepts
AnalyticsEfficiency
AnalyticsHealthAudit
AnomaliesVisualization
AnomalyData
AzureKeyVaultWorkbook
DoDZeroTrustWorkbook
IncidentTasksWorkbook
InvestigationInsights
MicrosoftSentinelDeploymentandMigrationTracker
OptimizationWorkbook
SecurityOperationsEfficiency
SentinelWorkspaceReconTools
Sentinel_Central
ThreatIntelligence
UserEntityBehaviorAnalytics
User_Analytics_Workbook
WorkspaceUsage
ZeroTrustStrategyWorkbook

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Tables Index