SOAR renewal? Migrate to D3 for free

Endpoint IR

Protect Endpoints, Eliminate Disjointed Processes

Endpoint Protection, Step by Step

A potential unauthorized access event is ingested into D3 from an integrated endpoint protection tool and the analyst triggers the Endpoint Protection – Unauthorized Access playbook.

In the incident analysis stage, D3 retrieves processes from an integrated EDR tool, the user audit log, host information, and user details from Active Directory. D3 also orchestrates a search for related SIEM events.

D3 then extracts artifacts from the collected data and determines if critical assets are involved.

In the data aggregation stage, D3 assembles the investigation data for the analyst to review and then sets the incident severity.

In the remediation stage, D3 blocks users as necessary via Active Directory.

New to Smart SOAR?