HI All,
We have received a requirement from one of our customers and are seeking a playbook solution to block malicious IPs through email approval. The proposed steps are as follows:
- An analyst will create a manual incident. Once the artifact is added, an email containing the IP artifacts will be triggered.
- This email will be sent to the Single Point of Contact (SPOC) and they don't have SOAR access.
- Upon approval of the email by the SPOC, the information will be sent to the SOAR platform, and the IPs will be blocked automatically.
We would greatly appreciate any suggestions or recommendations you may have to enhance this process.
Thanks,
Bhagyesh
------------------------------
Bhagyesh Limbad
------------------------------