Splunk® SOAR (On-premises)

Administer Splunk SOAR (On-premises)

The visual editor for classic playbooks was removed from Splunk SOAR in release 6.4.0. Convert your classic playbooks to modern mode. Your classic playbooks will continue to run and you can view and edit them in the SOAR Python code editor.
For details, see:

Manage settings for investigations

Use the settings on this page to control how displays information for investigations.

Each of these settings can be managed from the Home menu, by selecting Administration, then, Product Settings, then Investigations.

Clickable URLs

When a Common Event Format (CEF) field on an artifact contains URL data, the user interface can display a clickable link for it.

  • Use this setting to toggle whether clickable links are shown.
  • Only CEF values generated by automation or included in an artifact are controlled by this setting.
  • Since many URLs in CEF values are likely to be malicious, the default is OFF.

Notes can contain URL data, and those URLs will be clickable unless they are escaped using the backtick or grave character ( ` ). URLs in notes are not controlled by this setting.

Example:

 `http://some.malicious.url.com`

Indicators

Use this setting to toggle whether creates indicators for new artifacts.

Severity Inheritance

When toggled on, a container will automatically increase its severity when an artifact with a higher severity level is added to it.

Example:
An analyst adds an artifact with a severity of 'high' to a container with a severity of 'medium.' The severity on the container is increased to 'high.'

Last modified on 13 November, 2024
Share data from   Manage dashboard widgets in

This documentation applies to the following versions of Splunk® SOAR (On-premises): 6.3.1, 6.4.0


Please expect delayed responses to documentation feedback while the team migrates content to a new system. We value your input and thank you for your patience as we work to provide you with an improved content experience!

Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters