- Incident Responder Release Notes
- Get Started with Incident Responder
- Configure Incident Responder Settings
- Core Settings
- Analytics Settings
- Configure Services
- Configure the Amazon Elastic Compute Cloud (EC2) Service
- Configure the Anomali ThreatStream API Service
- Configure the Atlassian Jira Service
- Configure the BMC Remedy Service
- Configure the Check Point Firewall Service
- Configure the Cisco AMP for Endpoints Service
- Configure the Cisco Services Engine (ISE) Service
- Configure the Cisco Threat Grid Service
- Configure the CrowdStrike Falcon Host API Service Service
- Configure the CrowdStrike Falcon Host API Service Service
- Configure the CyberArk Service
- Configure the Cylance Protect Service
- Configure the Exabeam Advanced Analytics Service
- Configure the Exabeam DL Service
- Configure the FireEye HX Service
- Configure the Fortinet Service
- Configure the Google Gmail Service
- Configure the IntSights Cyber Intelligence Ltd. Service
- Configure the IRNotificationSMTPService Service
- Configure the Joe Security Joe Sandbox Service Service
- Configure the Microsoft Active Directory (AD) (Latest) Service
- Configure the Microsoft Exchange Service
- Configure the Microsoft Outlook Office 365 Service
- Configure the Netskope Service
- Configure the Okta Service
- Configure the Palo Alto Networks Wildfire Service
- Configure the Rapid7 insightVM Service
- Configure the SentinelOne Service
- Configure the SentinelOneV2 Service
- Configure the Service Now Service
- Configure the Slack Service
- Configure the SlashNext Service
- Configure the Splunk Service
- Configure the ThreatConnect API Service
- Configure the Urlscan.io API Service
- Configure the VirusTotal Service
- Configure the Zscaler Service
- Test a Service
- Edit a Service
- Disable a Service
- Upload a Custom Service
- Delete a Custom Service
- Create an Email Template for the Notify by Email Action
- Respond to Security Incidents
Get Started with Incident Responder
Welcome to Incident Responder, the security orchestration, automation, and response (SOAR) solution that helps you work more productively, make less mistakes, and quickly resolve security incidents using playbooks and a visual editor.
To understand what Incident Responder is and how to use it, here are some key concepts that might help you.
Incident Responder automates your repetitive and manual tasks, like looking up the reputation of an IP address. Respond quickly and efficiently to incidents using actions and playbooks.
Integrate Incident Responder with a service to run actions and playbooks.
Call a third-party service and gather data points manually or automatically using actions.
Automate your tasks, immediately neutralize attacks, and mitigate damages with Incident Responder playbooks.
Get to Know the Playbook Editor
Learn about the components you use to create and edit playbooks.
Incident Responder
Incident Responder automates your repetitive and manual tasks, like looking up the reputation of an IP address. Respond quickly and efficiently to incidents using actions and playbooks.
Exabeam Incident Responder is a security orchestration, automation, and response (SOAR) solution that features playbooks and a visual editor. With Incident Responder, your SOC works more productively, makes less mistakes, and quickly resolves security incidents.
If you're an overburdened analyst, integrated services and automated workflows help you avoid repetitive tasks and switch between security tools.
If you're a SOC manager, Incident Responder helps you deal with a shortage of talent. You create and maintain playbooks using a simple drag-and-drop editor, no coding experience required. You can even use playbook templates to teach junior analysts about your organization's best practices for common scenarios, like phishing and malware.
Incident Responder requires a separate license. To learn more, contact your technical account manager or watch product videos on the Exabeam Community.
Incident Responder Services
Integrate Incident Responder with a service to run actions and playbooks.
A service is a third-party product or vendor you integrate with Incident Responder to run actions and playbooks. This service is usually one your organization already uses, like Cisco Threatgrid or Palo Alto Networks Wildfire. Instead of leaving Incident Responder to use these services, integrate them so you access them in one location.
You configure each service differently. Once you configure a service, you can edit or disable it.
If you don't want to purchase additional services from third parties, you can use Exabeam's in-house service, Exabeam Actions. It is free to use and available out of the box. You can also upload a custom service. This custom service can be one you developed from scratch or one that customizes an out-of-the-box third-party service.
If you use a third-party service we don't yet support, contact your Sales Representative to request it.
Exabeam Actions Service
Get started using basic actions with the Exabeam Actions service.
Exabeam Actions is an in-house service that is free to use and available out-of-the-box. With the Exabeam Actions service, you can start using actions or playbooks, like turnkey playbooks, without purchasing additional services from third parties.
The service supports basic actions, including:
Detonate File in Sandbox
Detonate URL in Sandbox
Get Domain Reputation
Get URL Reputation
Get Email Reputation
Get IP Reputation
Get File Reputation
To assess the reputation of an entity, Exabeam Actions searches across various sources, like threat feeds and IP reputation lists, for evidence that the entity may be risky. Then, it compares the evidence against a set of conditions. Depending on which conditions the evidence matches, Exabeam Actions assigns the entity a severity level between 0 and 99. If the entity has a severity level of 50 and above, Exabeam Actions considers the entity to have a malicious reputation.
Incident Responder Actions
Call a third-party service and gather data points manually or automatically using actions.
An action is an API call to a service that gathers specific data points about an indicator of compromise (IOC) in an incident; for example, it can find the reputation of an IP address artifact. It is a Python script that you can edit or create on your own. You execute them manually, or automatically using a playbook. There are out-of-the-box actions, or you integrate Incident Responder with a service to run others.
Playbooks
Automate your tasks, immediately neutralize attacks, and mitigate damages with Incident Responder playbooks.
A playbook is a standard, repeatable sequence of actions that responds to specific incident types, like phishing or malware, based on your best practices. It automates your workflow and completes complex, manual, and repetitive tasks so you quickly identify and address incidents.
You design a logic flow that triggers the playbook under certain conditions. Then, the playbook automatically runs the relevant responses. You make workflows semi-automated so it runs at the push of a button, or fully automated so it runs without any human intervention.
You manage a playbook and track its history in an incident's workbench.
You can create your own playbook from scratch, create a playbook from a pre-designed template, or run a fully configured turnkey playbook.
Playbook Terminology
Define all the terms you encounter when dealing with playbooks.
- Action
A scripted task to call a third-party API service and gather data, executed manually or automatically using playbooks; for example, retrieve the reputation information for a given URL or search emails by sender.
You use action nodes in playbooks. It has an inbound port on the left and an outbound port on the right.
- Decision
A node that indicates a boolean (if/else) decision. It has one inbound node on the left, an if/true node on the right, and else/false nodes on the top and bottom.
- Filter
A node that filters out a subset of the input source based on conditions you specify when you configure the node. The filter node outputs the remaining subset and passes it on to the next node. It has one inbound node on the left and an outbound port on the right.
- Input
Data passed from one node to another; data from a Case Manager incident, entity, or artifact.
- Node
The fundamental building blocks of playbooks. Each represent an action, decision, filter, start, or end.
- Operator
Compares operands and returns a logical value if the comparison is true. Operands may be numerical, string, logical, or object values. Strings are compared based on standard lexicographical ordering, using Unicode values.
- Port
Each action, decision, or filter node has at least one inbound port and one outbound port that connects it to another node. An inbound port receives data from another note. An outbound node sends data.
The only nodes that don't have one inbound and outbound port are the start and end nodes. The start node only has one outbound port. The end node has only one inbound port.
- Service
A third-party product or vendor you integrate with Incident Responder to run actions and playbooks; for example: Cisco Threat Grid and Palo Alto Networks Wildfire. You interact with multiple instances of a service from within Incident Responder. Information about a service, like how to connect to it and which actions are defined, is stored in the Incident Responder server.
Playbook Triggers
Automatically run playbooks using triggers.
Playbooks run automatically if you prescribe it to run under a certain circumstance and that circumstance happens. This circumstance is called a trigger. There are six circumstances that trigger a playbook:
Incident Created – When a playbook triggers and creates an incident.
Status Changed – When someone changes an incident's status.
Priority Changed – When someone changes an incident's priority.
Queue Changed – When someone is assigned to another queue.
Assignee Changed – When someone changes who's assigned to an incident.
Incident Type Changed – When an incident's type changes, manually or automatically.
If you already created an incident manually and the details match the conditions of a playbook trigger, the playbook won't trigger automatically.
Get to Know the Playbook Editor
Learn about the components you use to create and edit playbooks.
In the playbook editor, you create and edit playbooks.
This is a new example playbook. Let's explore this playbook:

1 Control how you view the interface. Zoom in, out, or reset the view to the default.
2 A playbook is made of nodes. You connect each node to one or more other nodes. Each node has two or more ports, inbound and outbound. To view a node's ports, hover over the node.
3 Add a playbook trigger.
4 Save your playbook and return to the PLAYBOOKS page. You can save your playbook even if it's incomplete, but if it contains any errors, it will not run.
Every playbook has a start node and end node that defines its logical boundaries, where the playbook starts and ends. You cannot change these two nodes. The start node has one outbound port; the end node has one inbound port.
To build the logic of your playbook, add nodes, and configure action, decision, and filter nodes.
If a node is outlined in red, it needs your attention. When you create a playbook using a template, all the nodes are initially outlined in red. You must click on the node and change how it's configured or the playbook will not run.