You can use Kaspersky Threat Intelligence Portal for Splunk Phantom actions in Splunk Phantom playbooks. This section contains an example of how to create a playbook that requests full information about an IP address.
To create a playbook that requests full information about an IP address:
The Playbooks section
The Phantom Playbook Editor opens.
A panel with elements that can be created appears to the left of the playbook scheme.
dst
field.ip reputation
action of Kaspersky Threat Intelligence Portal for Splunk Phantom.This action retrieves the reputation of the IP address contained in the dst
field of the event being checked.
Specify the following condition in the decision element: the value of the threat_score
field of the event being checked is equal to or greater than 75
.
get detailed info
action of Kaspersky Threat Intelligence Portal for Splunk Phantom.A playbook sample