I created a new rule in Chronicle SIEM and used Test Rule, where I can see past detections. Now, I need these detections to generate alerts in Chronicle SOAR so I can build playbooks.
How can I:
- Convert these detections into alerts in SOAR?
- Manually trigger alerts in SOAR from past detections?
- Use an API or another method to resend these detections to SOAR as alerts?
My SIEM-SOAR integration is working fine, and new alerts are coming into SOAR. I just need a way to turn these past detections into SOAR alerts.
Any guidance would be appreciated! Thanks.