Collect evidence to support threat investigation and incident response by creating evidence collection playbooks.
Evidence collection requires that you enable XDR endpoint sensors on target endpoints.
Evidence archives use the same folder structures as the SANS Institutes and CyLR tool.
You must specify a unique name for the playbook.
Actions pending manual approval for over 24 hours expire and cannot be performed.
Setting |
Description |
---|---|
Notification method |
|
Subject prefix |
The prefix that appears at the start of the notification subject line |
Recipients |
The email addresses of recipients The field only appears if you select Email for Notification method. |
Webhook |
The webhook channels to receive notifications The field only appears if you select Webhook for Notification method. Tip:
To add a webhook connection, click Create channel in the drop-down list. |
Setting |
Description |
---|---|
Name |
The node name |
Evidence types |
Types of evidence to collect Note:
Basic information is required. |
Upload evidence to Trend Vision One |
Uploads evidence to Trend Vision One Tip:
Find uploaded evidence on the Execution Results page in the Security Playbooks app. |
Archive location on endpoint |
Location of the archive on the local endpoint Important:
|
You can only select one path for notification of results.
Setting |
Description |
---|---|
Name |
The node name |
Notification method |
|
Subject prefix |
The prefix that appears at the start of the notification subject line |
Recipients |
The email addresses of recipients The field only appears if you select Email for Notification method. |
Webhook |
The webhook channels to receive notifications The field only appears if you select Webhook for Notification method. Tip:
If you need to add a webhook connection, click Create channel in the drop-down list. |
Setting |
Description |
---|---|
Name |
The node name |
Notification method |
The action node can only send "Ticket" notifications |
Ticket profile |
The ServiceNow ticket profile to use Tip:
If you need to add a ticket profile, click Create ticket profile in the drop-down list. |
Ticket profile settings |
The ticket profile settings for the playbook Selecting a ticket profile automatically loads the settings. Changing the settings overrides the ticket profile for the playbook.
|
The playbook appears on the Playbooks tab in the Security Playbooks app.