After adding the playbooks to Splunk Soar and updating the Response Plan you can launch an embeded playbook during the "Render Verdict" phase to automatically contain assets. By saying "no" to one of the actions still gives you the ability to follow-up with an "ad-hoc" action to contain an artifact.
- Add this repo as a Git source to Splunk SOAR.
- Add the "Protect Users and Assets" to the Encoded PowerShell Detection Response plan.
- In Splunk Soar, Navigate to Administration > Administration Settings > Source Control
- From the "Repositories" drop down, select "Configure a new repository."
- Repo URL:
https://github.com/ZachTheSplunker/mission-control-demo.git
- Branch Name:
main
- Check (Enable) "Read Only"
- Save Changes
- In Splunk Soar, navigate to Playbooks.
- Using the filter textbox, type "Protect Users."
- Set the "Protect Users and Assets" playbook to be "Active" using the Status dropdown.
- In Mission Control, Navigate to Content.
- Select the Response Plan "Encoded PowerShell Detection Response."
- For the "Render Verdict" phase, Select the task "Take Remediation Action or Close Incident."
- Add the Playbook
Protect Users and Assets
to the task.
The playbook will automatically execute for the encoded powershell incident. You will have to manually click the "bell" icon in the upper right of the screen to reveal the notifications. You can then select the prompt.