I am aware that we can include the artifacts like source IP's to the case but what I want to know is cant we attach the exact events we need to a case? For example, we do a threat hunt and we found some suspicious events. Is there a way to attach these suspicious events into a case?
Thanks
How to attach events to case in Google SecOps SOAR?
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.

