General DocumentsUse CasesSecurity OperationsSecurity OperationsSee the popular categories and use cases.AuthenticationUse CasesAutomated Phishing Email Analysis and ResponseDetect, Analyze, and Action on Malicious Process Detected by EDROnboard Fraud Detection Alerts from Flashpoint to CFTRPerform Malware Analysis on Phishing Emails using Joe Security SandboxRun Phishing Simulations to Promote Awareness among Impacted EmployeesAnalytics and SIEMUse CasesAutomated Phishing Email Analysis and ResponseAssess Third-party Supplier Risk and Respond to Critical VulnerabilitiesOnboard AWS Guardduty Alerts to CFTROnboard Incidents from Microsoft Azure SentinelPerform Malware Analysis on Phishing Emails using Joe Security SandboxRansomware Detection and ResponseSplunk Retrospective Search Threat HuntingThreat Intel Hunt and ActionThreat Intelligence Enrichment Process AutomationDetect Domain Infringement Attempts and RespondAutomatically Triage Compromised Credentials and Protect your AccountDetect and Respond to Command and Control AttacksProactive Detection and Response to Data Exfiltration AttacksDefend against crypto-jacking attacks and protect your InfrastructureAutomatically Detect Account Takeover Attacks and Respond EffectivelyCase/Ticket ManagementUse CasesOnboard ServiceNow Incidents to CFTREnrich IOCs from Ivanti ITSM IncidentConfiguration Management Database (CMDB)Use CasesAutomated Phishing Email Analysis and ResponseAssess Third-party Supplier Risk and Respond to Critical VulnerabilitiesDetect, Analyze, and Action on Malicious Process Detected by EDROnboard Fraud Detection Alerts from Flashpoint to CFTRPerform Malware Analysis on Phishing Emails using Joe Security SandboxRun Phishing Simulations to Promote Awareness among Impacted EmployeesOnboard AWS Guardduty Alerts to CFTREvent Logging Interruption Alert Analysis and ActionExploit Attempt Alert and Action using AWS WAFAutomatically Triage Compromised Credentials and Protect your AccountProactive Detection and Response to Data Exfiltration AttacksCyware ProductUse CasesAsset Synchronization and Compliance MonitoringAutomated Phishing Email Analysis and ResponseBlock High Confidence Score IndicatorsBlock Malicious Hashes on CrowdstrikeBlock Malicious Threat Indicators on Blue CoatBrute Force Attack Detection and ResponseConduct Comprehensive Investigations on QRadar Offenses with CFTRCredential Compromise Attempt Detection and Automated ResponseDetect, Analyze, and Action on Malicious Process Detected by EDREnrich IOCs from Ivanti ITSM IncidentEvent Logging Interruption Alert Analysis and ActionExploit Attempt Alert and Action using AWS WAFGet notified when an unauthorized AWS Security Group is CreatedOnboard Alerts from Devo SIEM for InvestigationOnboard AWS Guardduty Alerts to CFTROnboard Incidents from Microsoft Azure SentinelOnboard Incidents from Microsoft Cloud Access Security Broker (CASB)Onboard Incidents from CrowdStrike Endpoint DetectionOnboard ServiceNow Incidents to CFTRRansomware Detection and ResponseRun Phishing Simulations to Promote Awareness among Impacted EmployeesSplunk Retrospective Search Threat HuntingThreat Intel Hunt and ActionThreat Intelligence Enrichment Process AutomationVulnerability Management Process - IBM X-ForceVulnerability Management Process - QualysVulnerability Management Process - TenableSCPerform Malware Analysis on Phishing Emails using Joe Security SandboxOnboard Fraud Detection Alerts from Flashpoint to CFTRSearch Affected Users and Block Malicious Emails on Mimecast Email GatewayAutomated Online Brand Protection and Domain Take-Down ActionDetect Unusual Behavior of Users, Entities, and RespondAssess Third-party Supplier Risk and Respond to Critical VulnerabilitiesEnrich and Onboard Proofpoint Email Attack Alerts to CFTRDetect Domain Infringement Attempts and RespondAutomatically Triage Compromised Credentials and Protect your AccountPublish XML Advisories from your Mailbox as CSAP AlertsProactively detect, prioritize, and respond to cloud security threatsAutomate Intel Enrichment, Correlation, Analysis, and Actioning using CTIX RulesDetect and Respond to Command and Control AttacksProactive Detection and Response to Data Exfiltration AttacksData Enrichment and Threat IntelligenceUse CasesAutomated Phishing Email Analysis and ResponseAutomatically Triage Compromised Credentials and Protect your AccountAssess Third-party Supplier Risk and Respond to Critical VulnerabilitiesBlock Malicious Hashes on CrowdstrikeConduct Comprehensive Investigations on QRadar Offenses with CFTRDetect, Analyze, and Action on Malicious Process Detected by EDRDetect Domain Infringement Attempts and RespondEnrich and Onboard Proofpoint Email Attack Alerts to CFTREnrich IOCs from Ivanti ITSM IncidentEvent Logging Interruption Alert Analysis and ActionGet notified when an unauthorized AWS Security Group is CreatedIdentify, Prioritize, and Remediate Known Exploitable VulnerabilitiesOnboard Alerts from Devo SIEM for InvestigationOnboard Incidents from Microsoft Azure SentinelOnboard Incidents from Microsoft Cloud Access Security Broker (CASB)Onboard Incidents from CrowdStrike Endpoint DetectionPerform Malware Analysis on Phishing Emails using Joe Security SandboxRansomware Detection and ResponseVulnerability Management Process - IBM X-ForceVulnerability Management Process - QualysVulnerability Management Process - TenableSCDetect and Respond to Command and Control AttacksProactive Detection and Response to Data Exfiltration AttacksEnhance Effectiveness and Efficiency of Threat Intel Analysts using Generative AIDefend against cryptojacking attacks and protect your InfrastructureAutomatically Detect Critical Threats using Real-time Threat HuntingDecode STIX package Intel to Snort Detection Rules using Generative AIAutomatically Detect Account Takeover Attacks and Respond Effectively