Task Automation
Task Automation
Lesson 8 of 13
Task Automation
What is Task Automation?
In ThreatStream, you can automate your investigation tasks.
When you need to run several checks on an observable, you
can use an automated task—a predefined sequence of
enrichments applied to a specific type of the observable
during the investigation.
• Domain
• Email
• IP
• Hash
• URL
Please note, this Investigation video was recorded before the release of the MITRE ATT&CK framewor
within Investigation models, therefore you'll notice that it's missing.
Lesson 10 of 13
Mastering the MITRE ATT&CK in Investigations
Threat hunters can leverage the MITRE ATT&CK framework to quickly highlight specific TTPs
that are more likely to be used by actors and adversaries known for being potential threats. By
focusing on adversary tactics and techniques rather than observables that are easily changed b
adversaries, analysts are able to move from a reactive to a proactive approach.
The framework proved itself very useful in gauging an Organization’s level of visibility against
targeted attacks with the existing tools deployed across an organization's security structure.
In the video below we demonstrate how this fantastic tool can be used in your
day-to-day work.
It will review the scenario introduced in the "Searching and Editing Existing
in
rk
y
by
r
Task Automation Page
The Task Automation page displays a list of every automated task
associated with your organization that is visible to you.
E
The framework proved itself very useful in gauging an Organization’s level of visibility against
targeted attacks with the existing tools deployed across an organization's security structure.
In the video below we demonstrate how this fantastic tool can be used in your
day-to-day work.
It will review the scenario introduced in the "Searching and Editing Existing
Intelligence in ThreatStream" module. We have received an alert from our
SIEM regarding suspicious network traffic for the IP address 39.105.168[.]13,
which has been added to an Investigation along with its associated Entities.
Lesson 11 of 13
Why Not Try It Yourself?
Do You Have Access to Your Organization's
Threatstream?
This section is completely optional, but if you have access to your
organization's ThreatStream platform, why not practice the skills that you
have learned in this lesson and work through the following Exercises:
(Investigations that you have created can also be deleted later on if needed to keep your live
environment tidy)
○ Populate the Investigation with entities available in ThreatStream or manually add new
ones.
○ Click Show Models and review how those entities are added to the Investigation Entities
model and the MITRE ATT&CK framework.
r
e
Creating Automated Tasks
You can create your own automated tasks. A task consists of the
following: