Skip to content

Commit 0763b0f

Browse files
jpipkin1kimsauce
andauthored
Update docs/cloud-soar/introduction.md
Co-authored-by: Kim (Sumo Logic) <[email protected]>
1 parent b54753e commit 0763b0f

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

docs/cloud-soar/introduction.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -602,12 +602,12 @@ Let’s create a playbook for use in Cloud SIEM.
602602
1. For the **IP** field, click the cog icon on the right, and select the **Get Insight Details** action. Then find the **output.entity.ip.address** field and select it.
603603
1. Click **Create** to save the new action.
604604
1. Add another action to the playbook by clicking the **+** icon on the **Get VirusTotal Info** node you just created and selecting **Action**. Use the parameters outlined below:
605-
1. **Name**: Add Entity Enrichment
606-
1. **Integration**: **Sumo Logic Cloud SIEM Internal**
607-
1. **Type**: **Notification**
608-
1. **Action**: **Add Entity Enrichment**
605+
1. **Name**: "Add Entity Enrichment".
606+
1. **Integration**: **Sumo Logic Cloud SIEM Internal**.
607+
1. **Type**: **Notification**.
608+
1. **Action**: **Add Entity Enrichment**.
609609
1. **Entity ID**: Click the cog icon on the right, and select the **Get Insight Details** action. Then find the **output.entity.id** field and select it.
610-
1. **Enrichment Name**: VirusTotal IP Reputation
610+
1. **Enrichment Name**: "VirusTotal IP Reputation".
611611
1. **Raw JSON**: Click the cog icon, select **Get VirusTotal Info**, then select **output.raw**.
612612
1. You can leave the other fields blank. Click **Create** to save the action.
613613
1. Playbooks also allow condition nodes that can switch execution branches depending on the true/false results of a given expression. Let’s add a condition node to our playbook that will differentiate the execution branch depending on the severity of the insight.

0 commit comments

Comments
 (0)