Close Menu
geekfence.comgeekfence.com
    What's Hot

    Buying a phone in 2026? Follow this one rule

    February 10, 2026

    3 Questions: Using AI to help Olympic skaters land a quint | MIT News

    February 10, 2026

    Introducing the new Databricks Partner Program and Well-Architected Framework for ISVs and Data Providers

    February 10, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Improving SOC efficiency with automation
    Cyber Security

    Improving SOC efficiency with automation

    AdminBy AdminFebruary 9, 2026No Comments5 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Improving SOC efficiency with automation
    Share
    Facebook Twitter LinkedIn Pinterest Email


    7 p.m., end of the first day of security operations and first day of training course. My teammate and friend René Straube and I enjoy a well-deserved dinner at an Italian restaurant near the Excel conference center. This is his first time accompanying us to the Black Hat Network Operations Center (NOC), so naturally, we discuss his impressions.

    After sharing many positive things, René said to me: “You know, what’s frustrating as an XDR analyst is that very often, during an incident, we see network detections to a public IP address, but we have no idea why that connection was made because we don’t have EDR (and agent on the endpoints), and it would be really helpful to at least know which domain or URL the user was trying to communicate with.” He also told me that he thought we had all the information we needed in Splunk, because we collect DNS logs from Palo Alto Networks NGFW and connection logs from Corelight OpenNDR, which usually contain information about the domains linked to that IP address. The NOC leadership enabled Cisco and other partners to introduce additional pre-approved software and hardware solutions, enhancing our internal efficiency and expanding our visibility capabilities; however, Cisco is not the official provider for Extended Detection & Response, Security Event and Incident Management, Firewall, Network Detection & Response or Collaboration.

    “Okay, I understand, René!” If we have this information somewhere, we can probably automate the process and enrich your incident automatically or at the request of an analyst (playbook). Let’s go ahead and try to take it a step further with the opposite scenario. If you see a domain in an incident, maybe what you’re trying to find out as an analyst is which IP address was linked to that domain to verify whether the connection was authorized by the firewall.

    The next day, at 7 a.m., at the NOC/SOC, we begin working on it and set up two workflows:

    1. Find Domains related to IPs
      • Input: IP address(es) 
      • Query Splunk to obtain Palo Alto Network firewall DNS logs and extract the domain queried with this IP address as the response 
      • If no results are obtained (DNS bypass), query Splunk to obtain Corelight connection logs and extract the domains associated with this IP address 
      • Inject this DNS resolution event into the XDR data analytics platform, so that it is correlated with your incident and enriched 
    2. Find IPs related to Domain
      • Input: Domains(s) 
      • Query Splunk to obtain Palo Alto Network firewall DNS logs and extract the domain queried with this IP address as the response 
      • If no results are obtained (DNS bypass), query Splunk to obtain corelight connection logs and extract the domains associated with this IP address 
      • Inject this DNS resolution or Network Connection event into the XDR data analytics platform, so that it is correlated with your incident and enriched.

    Thirty minutes of coding later, two new actions were made available to the analyst in the incident response playbook, guiding them and saving them time and effort.

    1XDRIncidentResponse
    2XDRAutomateWorkflow

    Let’s see how this applies to an incident:

    It all starts with a Webex notification about a new incident related to domains associated with malicious activity by Cisco Secure Access (Umbrella DNS) originating from two internal IP addresses connected to the Black Hat Europe general Wi-Fi network.

    3Webexnotification

    When we opened the incident, a third internal IP address was already identified by Cisco XDR.

    4XDRIncidentInvestigation

    The XDR incident confirms that DNS queries were allowed and enrichment from threat intelligence integrated into Cisco XDR confirmed that the domains were indeed malicious. 

    5XDRIncidentObserved

    Our analyst must now determine whether the connections to the IP addresses associated with these domains were successful and what they are. He therefore triggers the new playbook action in the identification step: “Identify the IP addresses of the domains” and selects the two domains in the incident.

    6XDRAutomation

    In the time it took to drink a cup of coffee, the incident was enriched with all the IP addresses visible in Black Hat Palo Alto Networks’ DNS logs and Corelight connection logs related to these domains.

    7XDRInvestigation

    It was then easy for the analyst to investigate all IP addresses involved in the incident with a single click (using XDR ribbons) and obtain additional information.

    • An additional internal IP address communicating with some of the IP addresses
    8XDRObservables
    • A pattern in the URLs linked to these domains confirming a potentially successful phishing attack
    9XDRInvestigation

    Conclusion 

    Thanks to this innovation from Rene’s idea, it took the analyst only a few minutes to confirm the incident and gather enough useful information before forwarding it to our Level 3 analyst, Tony Iacobelli, Manager of the Splunk Cloud Incident Response team. 

    He also emphasizes the importance of listening to analysts’ feedback and using automation to solve their problems. 

    You can read the other blogs from our colleagues at Black Hat Europe.

    About Black Hat 

    Black Hat is the cybersecurity industry’s most established and in-depth security event series. Founded in 1997, these annual, multi-day events provide attendees with the latest in cybersecurity research, development, and trends. Driven by the needs of the community, Black Hat events showcase content directly from the community through Briefings presentations, Trainings courses, Summits, and more. As the event series where all career levels and academic disciplines convene to collaborate, network, and discuss the cybersecurity topics that matter most to them, attendees can find Black Hat events in the United States, Canada, Europe, Middle East and Africa, and Asia. For more information, please visit the Black Hat website.


    We’d love to hear what you think! Ask a question and stay connected with Cisco Security on social media.

    Cisco Security Social Media

    LinkedIn
    Facebook
    Instagram
    X





    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Here’s what you should know

    February 10, 2026

    Fake Dubai Crown Prince tracked to Nigerian mansion after $2.5M romance scam

    February 8, 2026

    Open Source, Rebuilt to Last

    February 7, 2026

    Man pleads guilty to hacking nearly 600 women’s Snapchat accounts

    February 6, 2026

    The Buyer’s Guide to AI Usage Control

    February 5, 2026

    Please Don’t Feed the Scattered Lapsus ShinyHunters – Krebs on Security

    February 4, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202617 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202512 Views

    Achieving superior intent extraction through decomposition

    January 25, 20268 Views
    Don't Miss

    Buying a phone in 2026? Follow this one rule

    February 10, 2026

    Summary created by Smart Answers AIIn summary:Tech Advisor advises following the ‘previous generation rule’ when…

    3 Questions: Using AI to help Olympic skaters land a quint | MIT News

    February 10, 2026

    Introducing the new Databricks Partner Program and Well-Architected Framework for ISVs and Data Providers

    February 10, 2026

    Threat Observability Updates in Secure Firewall 10.0

    February 10, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Buying a phone in 2026? Follow this one rule

    February 10, 2026

    3 Questions: Using AI to help Olympic skaters land a quint | MIT News

    February 10, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.