Close Menu
geekfence.comgeekfence.com
    What's Hot

    Can your job be unbundled? If so it is under threat from AI – Computerworld

    March 27, 2026

    Here’s why some people choose cryonics to store their bodies and brains after death

    March 27, 2026

    Maine bans online sweepstakes casino platforms statewide

    March 27, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Improving SOC efficiency with automation
    Cyber Security

    Improving SOC efficiency with automation

    AdminBy AdminFebruary 9, 2026No Comments5 Mins Read1 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Improving SOC efficiency with automation
    Share
    Facebook Twitter LinkedIn Pinterest Email


    7 p.m., end of the first day of security operations and first day of training course. My teammate and friend René Straube and I enjoy a well-deserved dinner at an Italian restaurant near the Excel conference center. This is his first time accompanying us to the Black Hat Network Operations Center (NOC), so naturally, we discuss his impressions.

    After sharing many positive things, René said to me: “You know, what’s frustrating as an XDR analyst is that very often, during an incident, we see network detections to a public IP address, but we have no idea why that connection was made because we don’t have EDR (and agent on the endpoints), and it would be really helpful to at least know which domain or URL the user was trying to communicate with.” He also told me that he thought we had all the information we needed in Splunk, because we collect DNS logs from Palo Alto Networks NGFW and connection logs from Corelight OpenNDR, which usually contain information about the domains linked to that IP address. The NOC leadership enabled Cisco and other partners to introduce additional pre-approved software and hardware solutions, enhancing our internal efficiency and expanding our visibility capabilities; however, Cisco is not the official provider for Extended Detection & Response, Security Event and Incident Management, Firewall, Network Detection & Response or Collaboration.

    “Okay, I understand, René!” If we have this information somewhere, we can probably automate the process and enrich your incident automatically or at the request of an analyst (playbook). Let’s go ahead and try to take it a step further with the opposite scenario. If you see a domain in an incident, maybe what you’re trying to find out as an analyst is which IP address was linked to that domain to verify whether the connection was authorized by the firewall.

    The next day, at 7 a.m., at the NOC/SOC, we begin working on it and set up two workflows:

    1. Find Domains related to IPs
      • Input: IP address(es) 
      • Query Splunk to obtain Palo Alto Network firewall DNS logs and extract the domain queried with this IP address as the response 
      • If no results are obtained (DNS bypass), query Splunk to obtain Corelight connection logs and extract the domains associated with this IP address 
      • Inject this DNS resolution event into the XDR data analytics platform, so that it is correlated with your incident and enriched 
    2. Find IPs related to Domain
      • Input: Domains(s) 
      • Query Splunk to obtain Palo Alto Network firewall DNS logs and extract the domain queried with this IP address as the response 
      • If no results are obtained (DNS bypass), query Splunk to obtain corelight connection logs and extract the domains associated with this IP address 
      • Inject this DNS resolution or Network Connection event into the XDR data analytics platform, so that it is correlated with your incident and enriched.

    Thirty minutes of coding later, two new actions were made available to the analyst in the incident response playbook, guiding them and saving them time and effort.

    1XDRIncidentResponse
    2XDRAutomateWorkflow

    Let’s see how this applies to an incident:

    It all starts with a Webex notification about a new incident related to domains associated with malicious activity by Cisco Secure Access (Umbrella DNS) originating from two internal IP addresses connected to the Black Hat Europe general Wi-Fi network.

    3Webexnotification

    When we opened the incident, a third internal IP address was already identified by Cisco XDR.

    4XDRIncidentInvestigation

    The XDR incident confirms that DNS queries were allowed and enrichment from threat intelligence integrated into Cisco XDR confirmed that the domains were indeed malicious. 

    5XDRIncidentObserved

    Our analyst must now determine whether the connections to the IP addresses associated with these domains were successful and what they are. He therefore triggers the new playbook action in the identification step: “Identify the IP addresses of the domains” and selects the two domains in the incident.

    6XDRAutomation

    In the time it took to drink a cup of coffee, the incident was enriched with all the IP addresses visible in Black Hat Palo Alto Networks’ DNS logs and Corelight connection logs related to these domains.

    7XDRInvestigation

    It was then easy for the analyst to investigate all IP addresses involved in the incident with a single click (using XDR ribbons) and obtain additional information.

    • An additional internal IP address communicating with some of the IP addresses
    8XDRObservables
    • A pattern in the URLs linked to these domains confirming a potentially successful phishing attack
    9XDRInvestigation

    Conclusion 

    Thanks to this innovation from Rene’s idea, it took the analyst only a few minutes to confirm the incident and gather enough useful information before forwarding it to our Level 3 analyst, Tony Iacobelli, Manager of the Splunk Cloud Incident Response team. 

    He also emphasizes the importance of listening to analysts’ feedback and using automation to solve their problems. 

    You can read the other blogs from our colleagues at Black Hat Europe.

    About Black Hat 

    Black Hat is the cybersecurity industry’s most established and in-depth security event series. Founded in 1997, these annual, multi-day events provide attendees with the latest in cybersecurity research, development, and trends. Driven by the needs of the community, Black Hat events showcase content directly from the community through Briefings presentations, Trainings courses, Summits, and more. As the event series where all career levels and academic disciplines convene to collaborate, network, and discuss the cybersecurity topics that matter most to them, attendees can find Black Hat events in the United States, Canada, Europe, Middle East and Africa, and Asia. For more information, please visit the Black Hat website.


    We’d love to hear what you think! Ask a question and stay connected with Cisco Security on social media.

    Cisco Security Social Media

    LinkedIn
    Facebook
    Instagram
    X





    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Implementing Post-Quantum Cryptography in Android

    March 27, 2026

    Coruna iOS exploit framework linked to Triangulation attacks

    March 26, 2026

    The Kill Chain Is Obsolete When Your AI Agent Is the Threat

    March 25, 2026

    ‘CanisterWorm’ Springs Wiper Attack Targeting Iran – Krebs on Security

    March 24, 2026

    A quick guide to recovering a hacked account

    March 23, 2026

    Fake ‘Trusted Sender’ Labels Misused in New Apple Mail Phishing Scheme

    March 22, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202527 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202624 Views

    The Complete Guide to Model Context Protocol

    October 29, 202516 Views
    Don't Miss

    Can your job be unbundled? If so it is under threat from AI – Computerworld

    March 27, 2026

    There have been plenty of warnings about job losses due to AI, particularly in the…

    Here’s why some people choose cryonics to store their bodies and brains after death

    March 27, 2026

    Maine bans online sweepstakes casino platforms statewide

    March 27, 2026

    Customize your AWS Management Console experience with visual settings including account color, region and service visibility

    March 27, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Can your job be unbundled? If so it is under threat from AI – Computerworld

    March 27, 2026

    Here’s why some people choose cryonics to store their bodies and brains after death

    March 27, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.