This playbook is designed to automate the behavioural analysis of suspicious files using Fortinet FortiSandbox. During endpoint investigations, potentially malicious files can be automatically submitted for deep sandbox inspection. The outcome aids in identifying malware families, command and control (C2) behaviors, and other anomalies.
By combining automation with human decision points, this playbook empowers SOC teams to scale threat analysis while retaining critical oversight for triage and escalation decisions.
Suggested for you are based on app category, product compatibility, popularity, rating and newness. Some apps may not show based on entitlements. Learn more about entitlements.
This playbook is designed to automate the behavioural analysis of suspicious files using Fortinet FortiSandbox. During endpoint investigations, potentially malicious files can be automatically submitted for deep sandbox inspection. The outcome aids in identifying malware families, command and control (C2) behaviors, and other anomalies.
By combining automation with human decision points, this playbook empowers SOC teams to scale threat analysis while retaining critical oversight for triage and escalation decisions.
Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox