We've updated the ServiceNow Community Code of Conduct, adding guidelines around AI usage, professionalism, and content violations. Read more

SecOps articles
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Articles

[Tutorial] Notifications: all you need to know to make the best out of them. By Luke Kasper, Principal Security Consultant, ServiceNow

In this new episode of the "Lower your risk profile" series for new and recent users of the Security Incident Response application, Luke Kasper once again shares his expertise to make your life easy and your business successful. Notifications are a c...

find_real_file.png find_real_file.png
Eric Feron by Moderator
  • 2148 Views
  • 2 comments
  • 6 helpfuls

Nexpose and ServiceNow integration

Edit (5/25/2019): Almost all the installation steps mentioned in this article is no longer applicable as these steps are only applicable to the old version of the integration app developed by Rapid7. This version is discontinued in favour of a newer...

find_real_file.png find_real_file.png find_real_file.png find_real_file.png

Recorded Future TAXII collections - Domain List

You can collect the RF threat feeds for Domains, IPs, File Hashes and URLs. 1. Define RF Rest Message (Recorded Future Taxii) method with Basic Auth Username = rf and Password = *RF API Key* 2. Create a Post Method(Default Post) , endpoint - https://...

find_real_file.png find_real_file.png find_real_file.png

Using the Email Client for Security Incident Response

While not always something every team considers, the use of the platform-wide Email Client for Security Incident Response teams can be quite beneficial when configured properly.  In the attached Solution Brief, myself and my associate Andy Ojha detai...

Luke Kasper by ServiceNow Employee
  • 906 Views
  • 1 comments
  • 7 helpfuls

FAQs for Security Operations

What is Security Operations? Security Operations is ServiceNow offering that helps security organizations deliver efficient security response, streamline remediation and visualize their security posture. It extends the workflow and systems management...

Labels
Top Contributors