Hi,
We are receiving data from both Google Workspace Activity and Google Workspace Alerts, specifically phishing alerts. The alerts from Google Workspace Activity arrive first, while the corresponding alerts from Google Workspace Alerts typically follow after two hours. We have created a rule for this and set the match condition to receiver over 2 hours. However, we would like to reduce the time between the activity and the alert—ideally to one hour. If this is possible, how can we achieve it?
Furthermore, when we receive the alerts in SOAR under Cases > Alerts > Event > Highlighted Fields, we do not see much information about the phishing email. Important fields such as URL, DMARC, message body, SPF, and DKIM are missing.
How and where can we adjust the configuration to ensure that all this information is included in the highlighted details of the event?