Joshua Cyberisk Vision

Solution: Joshua-Cyberiskvision

Joshua-Cyberiskvision Logo

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Solutions Index


Attribute Value
Publisher Joshua Cyberiskvision
Support Tier Partner
Support Link https://www.cyberiskvision.com/
Categories domains
Version 2.0.0
Author Microsoft - support@microsoft.com
First Published 2022-01-10
Last Updated 2022-01-10
Solution Folder Joshua-Cyberiskvision
Marketplace Azure Marketplace · Popularity: ⚪ Very Low (0%)

Joshua Cyberiskvision enables organizations to define, monitor, analyze, and improve their level of Global Cybersecurity following a predictive and context-aware approach that uses a broad spectrum cyber intelligence-driven logic. The Joshua Solution automates the ingest of Joshua Cyberiskvision threat indicators into the ThreatIntelligenceIndicator table of Microsoft Sentinel workspace.

Data Connectors

This solution does not include data connectors.

This solution may contain other components such as analytics rules, workbooks, hunting queries, or playbooks.

Content Items

This solution includes 9 content item(s):

Content Type Count
Playbooks 9

Playbooks

Name Description Tables Used
Joshua Import To Sentinel Joshua Cyberiskvision provides two main use cases: Get Indicators and Alert Enrichment. -
Joshua Indicators Processor DOMAIN Joshua Cyberiskvision provides two main use cases: Get Indicators and Alert Enrichment. -
Joshua Indicators Processor EMAIL Joshua Cyberiskvision provides two main use cases: Get Indicators and Alert Enrichment. -
Joshua Indicators Processor FILE Joshua Cyberiskvision provides two main use cases: Get Indicators and Alert Enrichment. -
Joshua Indicators Processor IP Joshua Cyberiskvision provides two main use cases: Get Indicators and Alert Enrichment. -
Joshua Indicators Processor URL Joshua Cyberiskvision provides two main use cases: Get Indicators and Alert Enrichment. -
Joshua Intel Enrichment File These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents ... -
Joshua Intel Enrichment IP These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents ... -
Joshua Intel Enrichment URL These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents ... -

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Solutions Index