Automatically respond to important Workbench alerts, speeding up response and minimizing the impact scope, by creating Automated Response Playbooks.
Automated Response Playbooks (formerly Automated Response) allow you to automate your response to Workbench alerts by leveraging the Security Playbooks app.
When a detection model triggers an alert on "highly suspicious" or "suspicious" objects, the Automated Response Playbook can create response tasks and compile the results into a report sent to your security team.
The Automatic Investigation and Response system leverages Trend Micro Threat Intelligence powered by Trend Micro Smart Protection Network to reassess highlighted objects found in Workbench alerts, such as files, URLs, IP addresses, and domains. The analysis measures the likelihood of a false positive during the reassessment. If the likelihood of a false positive is low, the object is labeled "highly suspicious". If the likelihood of a false positive is higher, the object is labeled "suspicious". The response system executes the playbook and creates response tasks on a per-object basis. If there are multiple highlighted objects in a single Workbench alert, the response system and playbook might create individual response tasks for each object that might execute simultaneously.
You must have the XDR Threat Investigation entitlement enabled and the following required data sources configured to create Automated Response Playbooks: XDR Endpoint Sensor or XDR Email Sensor
Automatic or manual (executed from Workbench): Workbench alerts automatically trigger playbook execution. You can also manually trigger playbook execution from Workbench.
Manual (executed from Workbench): You need to manually trigger playbook execution from Workbench.
For more information about how to trigger playbook execution from Workbench, see Alert View and Alerts (Incident View) in the Workbench documentation.
Click Select Models.
Select the detection models by which to filter Workbench alerts.
The severity of your selected models must match the severity of the target settings, otherwise the playbook might fail to run.
You can use both predefined and custom detection models to filter Workbench alerts. Click Custom Models to select custom detection models.
Click Move to Selected Detection Models.
Click Save.
This step is available only when you select Filter by highlighted object risk in the Target node.
Setting |
Description |
---|---|
Parameter |
Highlighted object risk is the only parameter for this playbook. |
Operator |
|
Value |
|
For details, see Step 7.
For details, see Step 9.
For more information, see Response Actions.
Setting |
Description |
---|---|
General actions |
|
Emails |
|
Files |
|
URLs |
|
Endpoints |
|
Processes |
Important:
This is a “Pre-release” feature and is not considered an official release. Please review the Pre-release Disclaimer before using the feature.
|
Actions pending manual approval for over 24 hours expire and cannot be performed.
Setting |
Description |
---|---|
Notification method |
|
Subject prefix |
The prefix that appears at the start of the notification subject line |
Recipients |
The email addresses of recipients The field only appears if you select Email for Notification method. |
Webhook |
The webhook channels to receive notifications The field only appears if you select Webhook for Notification method. Tip:
To add a webhook connection, click Create channel in the drop-down list. |
Setting |
Description |
---|---|
Subject prefix |
The prefix that appears at the start of the notification subject line |
Recipients |
The email addresses of recipients The field only appears if you select Email for Notification method. |
Webhook |
The webhook channels to receive notifications The field only appears if you select Webhook for Notification method. Tip:
To add a webhook connection, click Create channel in the drop-down list. |
Setting |
Description |
---|---|
Ticket profile |
The ServiceNow ticket profile to use Tip:
If you need to add a ticket profile, click Create ticket profile in the drop-down list. |
Ticket profile settings |
The ticket profile settings for the playbook Selecting a ticket profile automatically loads the settings. Changing the settings overrides the ticket profile for the playbook.
|
This setting is available only to ticket notification action.
The nodes that can be added by using an add
node () vary depending on the
preceding node. For example, an Action
node can only be possibly followed by another
Action node; a
Condition node can be followed by an
Action node or have an
Else-If Condition or Else
Action attached to it.
When a condition is false, the playbook performs the Else Action or checks if its Else-If Condition is met. If the Else-If Condition is met, the playbook continues to perform the corresponding Else Action.
Multiple Action nodes configured in a serial mode are taken sequentially.
The playbook appears on the Playbooks tab in the Security Playbooks app.