- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-29-2019 08:03 AM
Hello all,
I have recently had an instance of Security Operations installed in our environment that we are struggling to get value out of. The current situation has us getting an incident created, then once its created - the analyst has to take the artifacts (i.e. Observables) which are blatantly in the description or short description and then manually add them as an IOC or observable. This is NOT what we expected from any SOAR solution, because the others can take an incident, take any observables given them by the incident and enrich those against an external CTI solution. We were told Recorded Future worked with the solution, now we are doing a POC and after speaking with their leadership - it turns out this is not entirely true. There is an app, but it doesn't return risk scores or do any of what it can do from other platforms.
If one has the observable, such as a URL, IP, hash value - we should be able to immediately parse those from specific field mappings into the IOC observables. Additionally, we should be able to automate the workflow to perform the lookup. In my current instance, this does not occur but I speculate it should. Does anyone else have automatic observables from incident data being added and enriched automatically so analysts do not spend time manually entering data that is already in the incident (or defanging it from an email) for TI use?
Thank you!
Solved! Go to Solution.

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-30-2019 09:46 PM
Hey there,
As Alex mentioned, the SecOps Security Incident Response product is built to handle this scenario. Having an analyst manually sort through a body of text and creating observables is not the happy path.
For the ProofPoint integration, are these coming through an email message to ServiceNow?
If so, you should check out the sample "Email Parser" configurations that are included with the SIR product (but turned off). Navigate to (Security Operations -> Email Processing -> Email Parsing).
You will notice that each of the sample Email parsers contain one or more transforms to a table called [sn_ti_m2m_task_observable].
The Observables in ServiceNow can be associated to more than one SIR record -i.e. many-to-many (m2m).
When ProofPoint (or similar sources), are creating Security Incidents you can have Observables automatically created and associated to the SIR record:
- You can map the field transformations from the email message to fields such as
- Source IP
- Destination IP
- Malware URL
- Malware Hash
- Referrer URL - There is Business Rule called "Handle Deprecated Observable Fields", that takes these values and will establish Observable records to be associated to the SIR
- As the name of the Business Rule calls out -> these are "deprecated" fields that are not quite used for Threat Intelligence / Observable purposes anymore - as an Observable can be associated to many SIR records
- The better approach would be to leverage an Email Parser config, similar to the ones included in the baseline SIR Product and map fields like Source IP Address to the [sn_ti_m2m_task_observable] table such that they are associated to the SIR record
This way your analysts can easily view the Observables associated to the SIR record without having to do this manually.
Also, if you have the Threat Intelligence plugin / license -> the Observables will be enriched through external sources you configure (such as VirusTotal, PhishTank, HaveIbeenPwned, ThreatCrowd, etc). The analyst would be able to open the SIR record, see the associated Observables, see the count of similar SIR records also associated to the same Observable, and see the "Threat Lookup Results" for each Observable and Threat Intel source - simply just by opening the SIR record that was created without any additional manual work.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-29-2019 03:26 PM
Hey there,
The Security Incident and Threat Intel apps can indeed do everything you're mentioning here. A lot of this comes down to what info is placed where, and what rules are enabled / configured.
There a ton of ways this can be done, so specific solutions require a little more detail about the incoming information. Maybe we can take a look at one of your use cases?
For example you mentioned that there is data coming into a description field - can you share more info about the source of that data, and how the integration was setup?
Usually our integrations and implementations push/pull data directly into the observable fields to prevent the need for manual entry where possible, just as you're expecting.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-30-2019 07:55 AM
Hello Alex,
First to all, I want to thank all of you for replying to my messages. I can't say how surprised I am by how alive the community is! So with Proofpoint alerts, they come right into SNOW (forget the SIEM, it send its own alerts). They also go into the SIEM but are very high-fidelity and actionable. I have the user, their IP, their User Agent from the browser and the URL they clicked. The subject is generic like "URL Defense Alert" but the content is pretty good.
The moment, I have no workflows, no observables added for each of the SIR's that get generated.. and yes, someone paid for pro services and they won't be paying again. I personally didn't call it complete but it's what people these days refer to as "agile" project development...
I will be having a meeting with the new admin of the platform tomorrow but I need some action items for him to work on and I'll need to have an understanding of what needs to happen for success. This community is awesome, thank you!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-30-2019 08:59 AM
Hi R34rvi3w,
I'm glad to see the community can help!
In "ServiceNow speak" - you might want either a Business Rule or a Workflow/Flow to create custom triggers for enrichment, where the integration or implementation is not providing what you'd like.
For example: business rules can watch any type of record and any combination of fields on them, and create a trigger. That trigger can do basically anything (it can run a script of your design).
Let's say there is an IP in your Description or Short Description fields that you want to pull out and load into threat intel. It's more ideal to load threat intel data directly into fields like "source_ip", "destination_ip", "malware_hash" etc, but sometimes this isn't possible.
In this case you could make a business rule that:
- Fires when "Description" (or another field) is changed on a Security Incident
- Runs a script that:
- Parses that field for an IP with regex
- If it finds it, adds that IP to the source_ip or destination_ip field
- Saves the change
- Once that field is filled in - threat intel snags the value in there, adds it as observable, and triggers the Threat Lookup within I think 30 seconds or a minute.
Workflows / Flows are a lot more powerful and visual - you can trigger them off of many of the same things, but they provide a flow chart style interface to managing the logic.

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-29-2019 03:37 PM
Hi R34rvi3w,
Our Security Incident Response solution does work with Recorded Future, and many other threat intelligence solutions. Typically the observables are ingested through a SIEM alert at time of security incident creation. The integration maps the observables to the appropriate ServiceNow fields fields for observables, host/CI, etc. You can of course add observables later, and threat intelligence lookup will run automatically but the intent is that this has already happened by the time the analyst first sets eyes on the incident. The description field is not parsed for IOCs because that's not what the field is used for.
You didn't mention the SIEM you're using. There are pre-built integrations for Splunk QRadar, ArcSight, LogRhythm, etc, in store.servicenow.com. These are specific integrations for "Security Operations" not ITSM. There's also a pre-built integration for Recorded Future at https://store.servicenow.com/sn_appstore_store.do#!/store/application/497b16314f64b6009c4031124210c7.... Are you using any of these?
We recommend that customers use a qualified/experienced implementation partner or our professional services for implementation. We are not a point solution. There is more capability with our solutions, and it is therefore a little more involved to initially implement. Once implemented, it is easier to extend the solution with additional integrations.
I recommend reaching out to your ServiceNow account team.