[Quick Tip] How to share information between playbooks
Sometimes, you might be in a situation, where you want to share information between multiple playbooks, even a...
•
Sometimes, you might be in a situation, where you want to share information between multiple playbooks, even a...
This week we released Custom Fields - a new Case Management feature that allows you to extend the cases and al...
We just released a new integration - Vertex AI! It's in public preview. If you are not familiar with Vertex AI...
Hello Google SecOps Users, On July 14, 2024, Python 3.11 with migration best practices was made available in G...
Hi everyone,We’ve noticed that for the past week, we haven’t seen any alerts or results related to Mandiant Th...
Has anyone figured out how to use Chronicle SOAR free edition? I have an account and it shows my profile and t...
Is there a Chronicle Trial for the SIEM part that allows you to test ingestions?
I have set a context value for a filed Threat_type = "URL" and used action get context value to verify if it w...
We are creating Widgets and the Tag Filter is taking forever to return results. Is this normal? We don't have ...
We are using the /external/v1/cases/AddEvidence/ endpoint to add evidence as an attachment to a case. Despite ...
Hi,I have got a list of IP's which was accesed by a process and was enriched with a block and now wanted to ch...
Unable to reach the SOAR Community Edition Access request page - https://chronicle.security/soar-free-edition/...
Heyy Everyone,I'm working on creating a custom integration for Copilot. However, I'm encountering an issue whe...
We have onboarded alerts from a 3rd party security product in SIEM. We have a single detection rule which moni...
I'm looking for the method for using an action from Integration-A within a custom-action in Integration-B in G...
Hello All,Just a question: Does Action = "GoogleChronicle-Add Values To Reference List" overwrites the values ...
Hey everyone,I have a use case in which I need to run multiple playbooks on the same ingested alert.My first p...
Looking for updating Context Values using API just like an Action - Set Context Value.
Team,My instance is multitenant , i have updated the Actions Monitor code , in the receipients i given my mail...
Hi,Exploring the TemplateEngine action named Render Template.Trying to convert Epoch time to date and time but...
Hi All,I have a question regarding creating a custom entity view.For example, I have multiple user entities, a...
Looking for a way to query LDAP using a custom action similar to Splunk SOAR's ldap query but do not see a cur...
Currently I am trying to test a playbook that takes in a hash as input, but I have multiple hashes coming in t...
I try to use EmailV2 integration to send emails. I created a simple playbook that when there is an alert it wi...
I have created a custom connector in Google Secops SOAR but whenever the connector runs it re-creates even tho...
When a custom connector runs automatically and ingests the same alerts, cases, or events (alertInfo/caseInfo o...
When working with custom connectors in Google SecOps, it's often necessary to persist certain values, like off...
i have these values from the events which is MME file typebut some events have 3 values ,4 values ,5 values -w...
HiI was wondering if there is an official list of activityKind?I see activitykind in wall data json for a give...
Hi, reading the official doc it says that is necessary to install RHEL 8.7 or centos 7.9, but manual installat...
I'm currently trying to run a query with the run UDM query action in the "Google Chronicle" integration. When ...
Hello team,Some of our alerts are grouped into one case because of a similar IP Address (0.0.0.0).When trying ...
Hi,I have a working playbook with multiple blocks. To make changes in one of the block i made a copy of the bl...
I am using the Create Entity action and trying to create entities for internal ips and domains in a playbook. ...