This playbook is triggered by a data exfiltration alert, particularly involving large file
transfers that may indicate suspicious or malicious behavior. It initiates case
management, performs threat intelligence enrichment, queries historical logs, and
isolates the endpoint if necessary using EnCase Endpoint Security. The process is fully
orchestrated through ArcSight SOAR.
This playbook is triggered by a data exfiltration alert, particularly involving large file
transfers that may indicate suspicious or malicious behavior. It initiates case
management, performs threat intelligence enrichment, queries historical logs, and
isolates the endpoint if necessary using EnCase Endpoint Security. The process is fully
orchestrated through ArcSight SOAR.
Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox