Playbook for Automated Phishing
The Automated Phishing playbook provides step-by-step guidance for your analysts on how they could resolve specific types of security threats in your Automated Phishing activities.
Overview
The Automated Phishing playbook template is designed to automate the phishing response tasks and contains a sequence of actions that includes trigger conditions. You can use the playbook templates in Workflow Studio to automate the steps in the phishing response playbook and resolve these incidents efficiently. This playbook template contains a sequence of reusable actions designed to respond to phishing attacks. Each flow has a trigger (condition), a sequence of actions, and subflows that you can annotate.
In this playbook, there won't be any user interaction when a security incident's category is set to phishing. This playbook can be used if a security incident is created or updated. You need to activate the Automated Phishing Playbook in Workflow Studio, and this playbook automatically performs all the tasks, such as analysis, contain, eradicate, and review.
- Analysis
- Contain
- Eradicate
- Review
Once you mark a task complete in a stage, you can move to the next task. You can save a task at any point in time and return to the playbook at a later date and time. After you complete all the tasks in a stage, you can move to the next stage. The status is reflected in the left-hand panel as you keep completing tasks and stages. An Activity log on the right-hand side of the playbook shows all the data that you have entered for each task.
After you complete all the tasks, you’re asked to review the details you entered in all the stages. You can choose to edit any field or click Finish to complete the process of creating the entitlement.