Skip to main content

Hello team,

We are looking to enhance our phishing response process using our SOAR platform. Currently, when users report potential phishing emails, the alerts are generated with the suspicious email included as a .eml attachment.

Our goal is to create a fully automated, end-to-end triage playbook.

Hi, 

You could use a lot of integrations to achieve this task!

For example, the PowerUps integration EmailUtilities (Email Utilities  |  Google Security Operations  |  Google Cloud) that contains “Parse Case Wall Email” action where parse the email contained in the case wall activities, or you could configure and integrate the Microsoft Graph Mail integration (Integrate Microsoft Graph Mail with Google SecOps  |  Google Security Operations  |  Google Cloud) or EmailV2 integration (Email V2  |  Google Security Operations  |  Google Cloud).

There are a lot of possible solutions, all of these depend on your goals and technologies.


Reply