Review and Customize Phishing Playbooks - Tutorials - 6.x - Cortex XSOAR - Cortex - Security Operations

Cortex XSOAR 6.x Tutorials

Product
Cortex XSOAR
Version
6.x
Creation date
2022-10-13
Last date published
2023-06-05
Category
Tutorials

For any phishing threat or attack, a SOC team needs to go through the following processes sequentially:

  • Detection

  • Identification

  • Analysis

  • Remediation

Each of the high-level processes might contain a number of sub-processes that require step-by-step actions to be performed. You can use playbooks to detect, identify, analyze and remediate an event.

The Phishing content pack comes out of the box with a number of playbooks, such as the Phishing - Generic v3, Process Email - Generic v2, Calculate Severity By Email Authenticity, etc. You can customize these out-of-the-box playbooks, or create your own playbook.