Creating cases using Threat Analyst Workbench
- UpdatedAug 1, 2024
- 2 minutes to read
Cases are used to track information about a campaign or threat actor threatening your organization. After a case is created, you can add artifacts that allow you to review and analyze all related information from a single case or case task.
Before you begin
Role required: sn_sec_tisc.analyst, sn_sec_tisc.admin
Procedure
Related Content
- Workbench Overview
The Workbench Overview page consists of the Case Tasks and Cases that are under Threat Analysts and their team.
- Create case task using Threat Analyst Workbench
Create case tasks to associate with case(s).
- Working with Investigation Canvases
The Investigation Canvas is a key significant feature which provides more valuable information for the Threat Intelligence (TI) analysts. It provides a structured framework by mapping one to one or one to many relationships and visualizing information related to observables, indicators of compromise (IOCs), or entities.
- Add artifacts to case(s) or case task(s)
After you have created a case, you can view or add artifacts, such as security incidents, CIs, and indicators of compromise, to the case. These artifacts act as clues in solving the case.
- Run Enrichment Actions within a case
Use this section to understand how enrichments actions are performed on case(s).
- View Case Reports
Use the case reports feature to generate reports related to the cases. These reports include post investigation report or an executive summary report.
- Create a security incident from a TISC case
Create security incidents and associate observables to the security incidents from a TISC case.
- Upload Secure File Attachments
Use this section to understand on how to upload the secure file attachments to the case(s).
