Security Operations common functionality
- UpdatedAug 1, 2024
- 5 minutes to read
- Xanadu
- Security Operations
Security Operations common functionality
Whenever any of the plugins for the main Security Operations applications (Security Incident Response, Vulnerability Response, Threat Intelligence, or Configuration Compliance) are activated, the Security Support Common plugin is activated. This plugin loads various modules that provide functionality that is common across all Security Operations applications.
Security Operations Modules
| Feature | Description |
|---|---|
| Security Operations Integration Reference, Threat Intelligence integrations, Vulnerability Response integrations | Several integrations are included with the Security Operations applications (Security Incident Response, Threat Intelligence, and Vulnerability Response). This section provides instructions for activating the plugins and configuring both ServiceNow and third-party integrations. Also included are some basic guidelines for developing your own integrations, as well as details on specific integrations included in the base system. |
| Security Operations email processing | You can set up the integration of information from external detection systems, provide granularity in processing security operations records, handle unmatched emails, and prevent duplication of records using Email Processing. |
| Groups |
|
| Security Tags | Tags: Security tag rules provide filtering for security tag access. |
| Workflows |
|
| Utilities |
|
| CMDB | CI Identifier Rules: CI identifiers are rules used to lookup a configuration item (CI) in the CMDB that contains matching information from a third-party integration. These rules define the fields that contain matching data and the order of precedence by which they are evaluated. The lowest Order value is evaluated first. |