Playbook Overview
Navigating the Editor
Pre-built Playbooks
Phishing Playbook: Part 1
Phishing Playbook: Part 2
Vuln. Mgmt: Part 1
Vuln. Mgmt: Part 2
Start from Scratch
Manual Task Example
Error Handling
Conditional Logic
Looping
Sub-Playbooks
Dynamic Sections
Testing & Debugging
Intro to API Integration
API Authentication Methods
API Request Formats
XSOAR Integration Framework
SIEM Integration Overview
Configuring the Splunk Integration
Fetching SIEM Events
Automated Actions in SIEM
EDR Integration Overview
Configuring the CrowdStrike Integration
Firewall Integration Overview
PANW Firewall Integration
Automated EDR Actions
Troubleshooting Integrations
API Rate Limiting
Integration Best Practices
RBAC: The Basics
XSOAR's Role Structure
Permissions Deep Dive
Users & Role Assignment
Testing RBAC
Least Privilege Defined
Role Design for MSSPs
Granular Permissions
Reviewing Role Assignments
Automation for RBAC
Audit Logging: Why?
Configuring Audit Logs
Analyzing Audit Logs
Alerting on Audit Events
Compliance & Audit Logs
Reporting Overview
Report Generation Basics
Report Export Options
Customizing Report Layouts
Filtering Report Data
Advanced Report Types
Scheduling Reports
Emailing Reports
Report Storage Options
Troubleshooting Reports
Dashboard Overview
Creating Basic Dashboards
Dashboard Widget Types
Client-Specific Dashboards
Dashboard Permissions
Define Project Scope
Environment Assessment
Resource Allocation
Security Requirements
Risk Assessment
Installation & Configuration
Integration Configuration
Playbook Deployment
Data Migration
User Training
Documentation Standards
Performance Tuning
Scalability Planning
Security Hardening
Maintenance