Components installed with Security Incident Response

  • Release version: Zurich
  • Updated July 31, 2025
  • 10 minutes to read
  • Several types of components are installed when you download and activate the Security Incident Response application, including user roles, tables, properties, and scheduled jobs.

    Note:
    The Application Files table lists the components that are installed with this application. For instructions on how to access this table, see Find components installed with an application.

    Demo data is available for this feature.

    Properties installed

    Users with the System Administrator [admin] role can view the properties. Users with the Security Administrator [sn_si.admin] role can modify them.

    Property Usage
    The default category nodes that are displayed in the Relationship Graph tab within the Workspace. The default values represent the table names corresponding to the related records.

    sn_si_aw.defaultCategories

    • Type: string
    • Default value: sn_ti_m2m_task_observables,sn_si_m2m_task_affected_user,sn_si_incident
    Default start time for all agents when no schedule is set, formatted as 08:00

    sn_si.default.start.time

    • Type: string
    • Default value: 08:00
    • Location: Security Incident > Administration > Properties
    Default end time for all agents when no schedule is set, formatted as 17:00

    sn_si.default.end.time

    • Type: string
    • Default value: 17:00
    • Location: Security Incident > Administration > Properties
    Include Destination type observables along with other context type observables in the security incident user and CI relationships

    sn_si.link_dest_ip

    Determines whether a security incident observable with a context type of Destination is displayed under the Configuration Items or Affected Users tabs. By default, observables with a Destination context type are excluded. To include the observables, choose Yes.
    Allow customization when creating a Problem or Change Request from a Security Incident

    sn_si.popup

    When a problem or change is created, this property opens a pop-up window to modify the request.

    If this properties are set to false, the problem or change request has the same priority, short description, and description as the security incident without the option to add or edit those fields.

    • Type: true | false
    • Default value: true
    • Location: Security Incident > Administration > Properties
    Associate Sightings Search results with CIs in the CMDB.

    sn_si.associate_ci_with_sighting_search

    When set to true, sightings search results include associated configuration items that are in your CMDB.
    • Type: true | false
    • Default value: true
    • Location: Security Incident > Administration > Properties
    Risk score in the range is highlighted green, formatted as 0-49

    sn_si.risk.score.green

    In the Security Incidents list, security incidents with a risk score between 0 and 49 are marked with a green dot.
    Risk score in the range is highlighted orange, formatted as 50-79

    sn_si.risk.score.orange

    In the Security Incidents list, security incidents with a risk score between 50 and 79 are marked with an orange dot.
    Risk score in the range is highlighted red, formatted as 80-100

    sn_si.risk.score.red

    In the Security Incidents list, security incidents with a risk score between 80 and 100 are marked with a red dot.
    This parameter enables or disables Sightings Search Configurations that have implemented this feature.

    sn_si.enable_sighting_search

    When set to true, sightings searches can be performed on activated integrations.
    • Type: true | false
    • Default value: true
    • Location: Security Incident > Administration > Properties
    The number of rows of raw data that are saved when a Sighting Search is performed. Range 0-100

    sn_si.sighting_search_raw_data_rows

    This property defaults to 50 rows of raw data. Half of the result rows are reported from the beginning of the search time frame and half from the end of the search time frame. So, if you select 50 rows, 25 come from the start of the search time frame and 25 from the end of the search time frame.
    Automatically advance the Incident State to Contain when a Response Task advances to Work In Progress

    sn_si.rollup_task_state

    While using flows or workflows, consider setting this property to false. This enables you to control the Incident State from within flows or workflows. It also helps avoid any potential conflicts while transitioning from one incident state to another.
    • Type: true | false
    • Default value: true
    • Location: Security Incident > Administration > Properties
    Assignment properties for Security Incident Response
    Location Weight

    sn_si.location.weight

    A rating used when calculating the criteria to use for auto-assigning a security analyst. If, for example, location is considered for a task, the location weight value is added to the security analyst rating.
    • Type: integer
    • Default value: 10
    • Location: Security Incident > Administration > Properties
    Skills Weight

    sn_si.skills.weight

    A rating used when calculating the criteria to use for auto-assigning a security analyst. If, for example, skills are considered for a task, the skills weight value is added to the security analyst rating.
    • Type: integer
    • Default value: 10
    • Location: Security Incident > Administration > Properties
    Set the maximum number of security analysts to be processed by auto-assignment at a time

    sn_si.max.agents.processed

    The system has an absolute limit of 300 security analysts. If you specify more than 300, it sets the value to that level. The system cannot auto-dispatch a task for a dispatch group that contains more security analysts than the value configured.
    • Type: integer
    • Default value: 100
    • Location: Security Incident > Administration > Properties
    Time Zone Weight

    sn_si.timezone.weight

    A rating used when calculating the criteria to use for auto-assigning a security analyst. If, for example, the security analyst time zone is considered for a task, the time zone weight value is added to the security analyst rating.
    • Type: integer
    • Default value: 10
    • Location: Security Incident > Administration > Properties
    Amount of time (in minutes) to add between the end of a task and the travel start of the next.

    sn_si.work.spacing

    An example of a valid time value is 10.
    • Type: integer
    • Default value: 0
    • Location: Security Incident > Administration > Properties
    Specified journal fields containing code tags that render content as HTML.

    sn_si.journal_field.html_enabled

    • Type: string
    • Default value: work_notes, comments
    • Location: Security Incident > Administration > Properties
    Calculate the Impacted services in background.

    sn_si.refresh_impacted.event

    Affected Services/Impacted CIs related list is generated through events. When enabled the refresh gets executed in the background and security tags are added to the incident.

    Set the value to true to perform the operation in background.

    • Type: true | false
    • Default value: false
    • Location: Security Incident > Administration > Properties
    Retrieve the critical service from a pre-calculated data.

    sn_si.critical_service.calculator.use_cache

    Enables the critical service calculator to use a pre-calculated data of configuration items.

    Set the value to true to lookup from a pre calculated data

    • Type: true | false
    • Default value: false
    • Location: Security Incident > Administration > Properties

    Roles installed

    Role title [name] Description Contains roles
    Security Incident Administrator

    [sn_si.admin]

    Full control over all Security Incident Response data. Also administers territories and skills, as needed.
    Note:
    In the base system, the administrator also has access to sn_si.admin. Security Incident Response can be restricted from the administrator as long as at least one other user is assigned the security administrator role.
    • assessment_admin
    • catalog_admin
    • decision_table_admin
    • decision_table_reader
    • filter_admin
    • flow_designer
    • pd_author
    • pd_content_author
    • pd_operator
    • skill_admin
    • skill_model_admin
    • sn_si.analyst
    • sn_si.ingestion_profile_admin
    • sn_si.knowledge_admin
    • sn_si.manager
    • sn_sec_cmn.admin
    • sn_si.restriction_access_manager
    • sn_si.special_access_read_manager
    • sn_si.special_access_write_manager
    • sn_ti.malicious_attachment_access
    • sn_ti.observable.admin
    • tags_admin
    • template_admin
    • territory_admin
    • treemap_admin
    • user_admin
    Profile Admin

    [sn_si.ingestion_profile_admin]

    Configure the plugins, create, edit, delete, and manage profiles for Splunk, Splunk ES, and Azure Sentinel Integration for Security Operations application.
    Note:
    Users with the sn_si.admin role can perform all operations available to a Profile Admin, as the sn_si.admin role inherits the required permissions by default.

    The sn_si.ingestion_profile_admin role is assignable to users by the sn_si.admin.

    N/A
    Security Incident Analyst

    [sn_si.analyst]

    Manage security incidents. Underlying role for basic Security access. Users with this role can create and update security incidents, requests, and tasks, as well as problems, changes, and outages related to their incidents.
    • pd_operator
    • snc_platform_rest_api_access
    • sn_msi.promoter
    • sn_msi.proposer
    • sn_si.basic
    • sn_ti.malicious_attachment_access
    Security Incident Basic

    [sn_si.basic]

    Underlying role for basic Security access. Users with this role can create and update security incidents, requests, and tasks, as well as problems, changes, and outages related to their incidents.
    • canvas_user
    • document_management_user
    • email_composer
    • flow_operator
    • inventory_user
    • pa_viewer
    • service_fullfiller
    • skill_user
    • sn_sec_cmn.write
    • sn_si.read
    • sn_ti.observable.read
    • sn_ti.observable.write
    • sn_ti.read
    • task_activity_writer
    • task_editor
    • treemap_user
    Chief Information Security Officer (CISO)

    [sn_si.ciso]

    View and manipulate the CISO dashboard. Also, if the Vulnerability Response plugin is activated, users with this role can add vulnerability significance definition treemaps to the dashboard. You can also do the same with Security Incident Response plugin.
    • pa_viewer
    • sn_si.basic
    • sn_si.read
    Security Incident External

    [sn_si.external]

    View any security incidents that belong to their particular group.
    Note:
    The following two rules are applicable throughout ServiceNow irrespective of scoped admin or scope app.
    • When you add any user to a group, you are also assigning roles to that group. Similarly, when you remove a user from a group, the inherited roles will also get removed.
    • Every role is assignable by some higher precedence role.
    service_fulfiller
    Security Incident Integration User

    [sn_si.integration_user]

    External tools can provide new security incident records and update security incident records. import_transformer
    Security Incident Knowledge Administrator

    [sn_si.knowledge_admin]

    Manage, update, and delete the information in the Security Incident knowledge base.
    • knowledge_admin
    • sn_si.read
    Security Incident Manager

    [sn_si.manager]

    Same access as security analysts.
    • pd_author
    • pd_operator
    • sn_si.basic
    Security Incident Read

    [sn_si.read]

    Read security incidents.
    • canvas_user
    • sn_sec_cmn.read
    • sn_templated_snip.template_snippet_reader
    • sn_ti.observable.read
    • workspace_user
    Security Restriction Access Manager [sn_si.restriction_access_manager] Allows users or groups to 'enforce restriction' on security incidents. This is applicable only for field change. N/A
    Security Incident Special Access

    sn_si.special_access

    Provides access to specific security incidents to users outside of the Security Operations organization. N/A
    Security Special Access Enabler [sn_si.special_access_enabler] Provides special access role to a user outside of the Security Operations organization to specific security incidents. N/A
    Security Incident Special Access Read Manager [sn_si.special_access_read_manager] Manage the Security Incident Special Access [sn_si.special_access] role. Use this role to modify the Read access field in the security incident form. This role is assignable by sn_si.admin. sn_si.special_access_enabler
    Security Incident Special Access Writer Manager [sn_si.special_access_write_manager] Manage the Security Incident Special Access [sn_si.special_access] role. Use this role to modify the Privileged access field in the security incident form. This role is assignable by sn_si.admin. sn_si.special_access_enabler

    Scheduled jobs installed

    Scheduled job Description
    Lookup Security Incident Observables Performs a lookup for observables on a user-defined schedule.

    Tables installed

    Table Description
    News Feed Configuration

    [sn_si_feed_configuration]

    Configuration records used to define the content displayed in the security incident news feed.
    Post Incident Review Assignment Rule

    [sn_si_pir_condition]

    Automates selection of participants of a post incident review survey when a security incident is closed.
    Security Incident

    [sn_si_incident]

    Stores a security incident, the responses to the incident, all linked tasks, changes, problems, and incidents related to this security incident.
    Security Incident Attack Vectors

    [sn_si_attack_vector]

    Attack vector options.
    Security Incident Audit Log

    [sn_si_audit_log]

    Stores security incident enrichment audit logs.
    Security Incident Calculator

    [sn_si_calculator]

    A calculator to set certain security incident fields when certain conditions are met.
    Security Incident Calculator Group

    [sn_si_calculator_group]

    A grouping of security incident calculators. The order of the calculator group determines which group is evaluated first, and in each group, one calculator at most is used.
    Security Incident Enrichment Firewall

    [sn_si_enrichment_firewall]

    Extends from the base table (sn_sec_cmn_enrichment_data_base) and includes all enrichment records specific to Palo Alto Networks Firewall.
    Security Incident Enrichment Malware Results

    [sn_si_enrichment_malware]

    Extends from the base table (sn_sec_cmn_enrichment_data_base) and includes all enrichment records specific to malware.
    Security Incident Enrichment Network Statistics

    [sn_si_enrichment_network_statistics]

    Extends from the base table (sn_sec_cmn_enrichment_data_base) and includes all enrichment records specific to network statistics.
    Security Incident Enrichment Running Processes

    [sn_si_enrichment_running _processes]

    Extends from the base table (sn_sec_cmn_enrichment_data_base) and includes all enrichment records specific to running processes.
    Security Incident Enrichment Running Services

    [sn_si_enrichment_running_service]

    Extends from the base table (sn_sec_cmn_enrichment_data_base) and includes all enrichment records specific to running services.
    Security Incident Email Search

    [sn_si_m2m_incident_email_search]

    Maps email search records to security incidents.
    Security Incident Import

    [sn_si_incident_import]

    Import table for security incidents. Used to create security incidents from external systems.
    Security Incident Process Definition

    [sn_si_process_definition]

    Stores configuration for Security Incident process flows.
    Security Incident Process Definition Selector

    [sn_si_process_definition_selector]

    Stores the Security Incident Process Definition to use for security incidents.
    Security Incident Related Customer Service Case

    [sn_si_m2m_incident_customerservice_case]

    Maps customer service cases and security incidents
    Security Incident Related Enrichment Data

    [sn_si_m2m_incident_enrichment]

    Maps security incidents and related enrichment data records.
    Security Incident Response Task

    [sn_si_task]

    Manages subtasks related to handling a security incident. These tasks can be assigned to security personnel, or to people in other departments, to manage interdepartmental communication and task tracking.
    Security Incident Response Task Template

    [sn_si_task_template]

    Used to create a Security Incident Response task. These templates are often used in catalog entries, to automatically create a set of appropriate subtasks for a particular type of security incident.
    Security Incident Runbook Document

    [sn_si_runbook_document]

    Associates security incident conditions or filters with a knowledge article. Used to specify runbook procedures for security incident remediation.
    Security Incident Template

    [sn_si_incident_template]

    Used to create a security incident. These templates are often used in catalog entries to create a prebuilt security incident.
    Security Request

    [sn_si_request]

    A security-related request to the security team.
    Security Scan Request

    [sn_si_scan_request]

    A request for a threat lookup.
    Severity Calculator

    sn_si_severity_calculator

    Defines the severity, impact, risk, and criticality values for a security incident.
    Task Affected User

    [sn_si_m2m_task_affected_user]

    A many-to-many table associating security incidents with affected users.
    Template Workflow Activity Outcome Evaluator

    [sn_si_wf_activity_outcome_evaluator]

    Maps a capability with an evaluation script. A new subflow can be added to a template workflow to set a response task outcome rather than having an analyst manually set it.