This playbook provides a structured response to file metadata changes that could indicate insider threats, data staging, or policy violations. These actions include renaming, moving, or changing file timestamps—often precursors to exfiltration or account misuse. It automates SOC notification, enriches with user information, and provides analysts with decision-making authority to disable a user or close the case as a false positive
This playbook provides a structured response to file metadata changes that could indicate insider threats, data staging, or policy violations. These actions include renaming, moving, or changing file timestamps—often precursors to exfiltration or account misuse. It automates SOC notification, enriches with user information, and provides analysts with decision-making authority to disable a user or close the case as a false positive
Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox