diff --git a/docs/platform-services/automation-service/automation-service-playbooks.md b/docs/platform-services/automation-service/automation-service-playbooks.md
index 4e70a426a8..c2cd4d53ac 100644
--- a/docs/platform-services/automation-service/automation-service-playbooks.md
+++ b/docs/platform-services/automation-service/automation-service-playbooks.md
@@ -38,7 +38,7 @@ The following procedure provides a brief introduction to how to create a playboo
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Automation > Playbooks**. You can also click the **Go To...** menu at the top of the screen and select **Playbooks**.
Previously-created playbooks display.
1. Click the **+** button to the left of **Playbook**.
1. A new configuration box will be displayed. Name your new playbook.
-1. Select the incident **Type**. (For example, for Cloud SIEM automations, select **CSE**. For playbooks run from inside another playbook, you can select another incident type to associate with it, for example, **Denial of Service**, **Malware**, **Phishing**, and so on.)
+1. Select the incident **Type**. (For example, for Cloud SIEM automations, select **Cloud SIEM**. For playbooks run from inside another playbook, you can select another incident type to associate with it, for example, **Denial of Service**, **Malware**, **Phishing**, and so on.)
1. Enter a **Description** of the playbook to help others understand how to use it.
1. Click **Create**. The new playbook appears in the list of available playbooks.
1. To configure the new playbook, select it from the list and click the **Edit** button at the bottom of the screen.
diff --git a/docs/platform-services/automation-service/index.md b/docs/platform-services/automation-service/index.md
index 3752cce70d..951d851621 100644
--- a/docs/platform-services/automation-service/index.md
+++ b/docs/platform-services/automation-service/index.md
@@ -18,6 +18,12 @@ In this section, we'll introduce the following concepts:
Get an overview of how the Automation Service allows you to automate actions.
+Get an introduction to the Automation Service.
+
+
+See [Cloud SIEM Automation](/docs/cse/automation/).
+
+### Automation with Cloud SOAR
+
+Strictly speaking, the Automation Service is a subset of functionality provided by Cloud SOAR that is available to use in other parts of Sumo Logic, like alerting and Cloud SIEM. However, the same functionality is natively built into Cloud SOAR for incident management. See [Cloud SOAR Automation](/docs/cloud-soar/automation/).
+
+## App Central integrations and playbooks
+
+[App Central](/docs/platform-services/automation-service/app-central/) is a central repository of out-of-the-box solutions that can help any organization get going with automations quickly without needing customization or development. The Automation Service comes with hundreds of pre-built [playbooks](/docs/platform-services/automation-service/playbooks-in-app-central/) and [integrations](/docs/platform-services/automation-service/app-central/integrations/) as part of App Central.
+
+
+
+As a Sumo Logic administrator, you can explore App Central and install any integrations your team requests. You can also create custom integrations using APIs from the [**Integrations**](/docs/platform-services/automation-service/automation-service-integrations/) page. These integrations will connect Automation Service features to other tools like CrowdStrike, ServiceNow, or Jira. Once all your tools are integrated, App Central can be a single, central location for orchestrating your security response.
+
+
+
+## Explore the Automation Service UI
+
+Let's check out the Automation Service UI and learn about installing and configuring integrations.
+
+1. Navigate to the [App Central](/docs/platform-services/automation-service/automation-service-app-central/) page.
+1. Choose a sample integration from the list and click on it. A popup window will appear showing the details of the integration, including version, description, and a list of "actions" that are supported in automations.
+1. Navigate to the [**Integrations**](/docs/platform-services/automation-service/automation-service-integrations/) page to show installed integrations.
+1. Move the mouse cursor over the existing resource called **Sumo Logic Log Analytics resource**, then click the **Edit** (pencil) icon. You will see a dialog showing the configuration fields for this resource.
+ :::note
+ When you create a resource or configure an existing one, you need to enter the appropriate connection information such as the API web URL (for either Sumo Logic or a third-party service) and associated API keys (see [Configure Authentication for Automation Integrations](/docs/platform-services/automation-service/configure-authentication-for-integrations/)). Many Sumo Logic integrations require you to create an access ID and access key through the Sumo Logic UI to use in configuring integrations. Some third-party integrations may require you to visit their website and sign up for an account in order to obtain the appropriate URL and/or credentials for their API.
+ :::
+1. Click the **Test** button after you have configured the resource to test the connection info. You will see a small popup that indicates whether the test was successful. It may take a few seconds to execute depending on the integration.
+
+## Playbooks
+
+Once you’ve identified a potential security incident, you can respond to it by executing a playbook. [Playbooks](/docs/platform-services/automation-service/automation-service-playbooks/) are automated, or partially automated, workflows that act based on information from an incident or alert. A playbook can enrich data, contain threats, notify teams, and other actions with custom APIs. These actions help automatically orchestrate many parts of the investigation, containment, eradication, and recovery processes.
+
+Custom playbooks allow you to automate any task that uses a custom API. You can also use them to automate tasks that aren’t part of the hundreds of default playbooks included in the Automation Service.
+
+Playbooks are built from nodes connected together in a flowchart. Whether you’re customizing a playbook or creating one from scratch, you can choose from several node types:
+* **Actions**. Enrich data, execute APIs, send notifications, or use other integrations.
+* **Conditions**. If-then statements that allow playbooks to branch in different directions.
+* **Tasks**. Assign a manual task to another user.
+* **Filter**. Use designated criteria to filter data outputs from previous nodes.
+* **Embedded playbooks**. Run another playbook.
+
+Each of these node types are color-coded in a playbook. The following image shows a sample playbook. Note the different actions and enrichments, along with the branches that execute different sequences of actions based on conditions.
+
+
+
+* A. **Condition**. Conditions, represented by a purple diamond, allow your playbook to branch in different directions based on an if-then statement.
+* B. **Enrichment**. Green nodes are enrichments. These might add additional information from a threat intel database or convert data from one type to another.
+* C. **Notification**. Blue nodes are notification actions, such as a Slack or email alert.
+
+Action nodes use integrations. These integrations broadly fall into several types:
+* **Enrichments**. Add information, metadata, or context, such as from a threat intelligence database.
+* **Containment**. Reduces further damage by isolating files or machines related to a threat.
+* **Notifications**. Alerts sent via email, Slack, PagerDuty, or most other services you can connect with an API.
+* **Custom**. Scripts and any other automations you can create using YAML, Perl, Python, PowerShell, or Bash.
+
+Custom actions can also include trigger actions, which run based on an event type until certain criteria are met. For example, if malware is detected, a trigger action could run an anti-malware cleanup software until no malware is detected. Similarly, you can create scheduled actions that run at certain intervals. For example, you could create a scheduled action that checks for malicious IP addresses every 5 minutes until no more malicious IP addresses are found.
+
+### Best practices
+
+Before you begin creating or customizing a playbook, decide what you’d like to automate. Think about what conditions you want met, and what actions or integrations you want to accomplish based on different flows. Once you have a design in mind for the flow of your playbook, you can create or customize a new one.
+
+The Sumo Logic Automation Service includes hundreds of [prebuilt playbooks](/docs/platform-services/automation-service/playbooks-in-app-central). Start by searching the catalog to see if an out-of-the-box solution meets your needs. You can also use these playbooks as templates, saving time by modifying an existing playbook instead of building one from scratch.
+
+### Create a playbook for Cloud SIEM insights
+
+The Automation Service allows us to create automations that will run whenever [Cloud SIEM insights](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/) are created or closed. These automations are powered through "playbooks" as discussed in the previous section, predefined actions run in an automated workflow to respond to an incident.
+
+To create the playbook as described below, you must first configure the following integrations that the playbook will use:
+* [Sumo Logic Cloud SIEM integration](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem)
+* [VirusTotal integration](/docs/platform-services/automation-service/app-central/integrations/virustotal)
+* [VirusTotal V3 integration](/docs/platform-services/automation-service/app-central/integrations/virustotal-v3)
+
+Now that those integrations are configured, let’s use the Automation Service to create a playbook for use in Cloud SIEM:
+1. Go to the [Playbooks](/docs/platform-services/automation-service/automation-service-playbooks/) page.
+ 1. Enter a name for the playbook, such as "Send Cloud SIEM Insight Email Notification". You can optionally enter a description. Select **Cloud SIEM** as the **Type** for the playbook.
+ 1. Click **Create** when finished.
+ 1. On the following screen you will see the starting template for your new empty playbook, with **Start** and **End** nodes. Switch to edit mode by clicking on the **Edit** (pencil) icon in the bottom toolbar.
+ 1. Before we start adding actions to our playbook, we’ll want to set up the initial configuration of the playbook so we get the proper inputs from the Cloud SIEM insight. Mouse over the **Start** node, and click the **Edit** (pencil) icon.
+ 1. In the **Edit Node** popup, go to the **Add one or more params as a playbook input** field and select **Insight**. Choosing **Insight** automatically populates the popup view with a number of input parameters that will be added to the playbook from the corresponding insight. (For more information about these parameters, see [Insight payload variables](/docs/platform-services/automation-service/automation-service-playbooks/#insight-payload-variables).)
+ 1. Click **Update** to save and close the input parameters.
+1. Now let's add an action node to the playbook.
+ 1. Click the **+** symbol on the **Start** node.
+ 1. Choose the **Action** node tpe.
+ 1. Use the following parameters to configure the node. If a field is not listed, keep the default value. Make sure you fill out the listed configuration fields in order, as some fields will only appear in the dialog box after you’ve selected fields above it.
+ * **Name**. Type "Get Insight Details".
+ * **Integration**. Sumo Logic Cloud SIEM.
+ * **Type**. **Enrichment**.
+ * **Action**. **Get Insight**.
+ * **Insight ID**. Click the gear icon and select **Playbook inputs** and then **input.readableId**.
+ 1. Click **Create** when finished.
+1. Add another action to the playbook by hovering your mouse over the **Get Insight Details** node you just created and clicking the **+** icon.
+ 1. Choose the **Action** node tpe.
+ 1. In the **Add Node** dialog box, use the parameters outlined below:
+ * **Name**. Type "Get VirusTotal Info".
+ * **Integration**. **VirusTotal V3**.
+ * **Type**. **Enrichment**.
+ * **Action**. **IP Reputation**.
+ * **IPs**. Click the gear icon and select **Playbook inputs** then **input.entity.value**.
+ 1. Click **Create** to save the new action.
+1. Add another action to the playbook by clicking the **+** icon on the **Get Virus Total Info** node you just created. Use the parameters outlined below:
+ * **Name**. Type "Add Entity Enrichment".
+ * **Integration**. **Sumo Logic Cloud SIEM**.
+ * **Type**. **Notification**.
+ * **Action**. **Add Entity Enrichment**.
+ * **Entity ID**. Click the gear icon and select **Get Insight Details** and **output.entity.id**.
+ * **Enrichment Title**. Type "VirusTotal IP Reputation".
+ * **Enrichment**. Click the gear icon and select **Get VirusTotal Info** and **output.raw**.
+ 1. Click **Create** to save the action.
+1. Playbooks also allow "condition" nodes that can switch execution branches depending on the true/false results of a given expression. Let’s add a condition node to our playbook that will differentiate the execution branch depending on the severity of the insight.
+ 1. Hover your mouse over your last action (the blue **Add Entity Enrichment** action) and click the **+** icon.
+ 1. Choose a **Condition** node.
+ 1. Click **Create**.
+ 1. Hover your mouse over the new condition node and click the pencil icon to edit it.
+ 1. For the top **Select a value**, select **Get Insight Details** and the **output.severity** option. Make sure **==** is selected in the middle row.
+ 1. For the bottom **Select a value** field, add a manual value: **HIGH**.
+ 1. . Click **Update** to save the condition node.
+1. Click the **+** icon under the condition node to create a new node.
+ 1. Select **Action** for this new node.
+ 1. For **Node name** type "Send Notification Email".
+ 1. . For the **Integration**, select **Basic Tools**. Set **Type** to **Notification** and **Action** to **Send Email**.
+ 1. For **Recipients**, enter an email address (real or fake). Make sure you press Enter after typing the email address to signal the **Recipients** field to parse and accept the email address.
+ 1. Type in in the **Subject** field "High severity insight detected".
+ 1. When composing content for an email notification, you have the option of using input parameters from earlier nodes in the playbook in addition to any desired custom text. Click on the **{ }** icon to add a parameter field to your **HTML Content (Body)** text.
+ 1. Click on the red parameter box that appears and select a source for the desired input parameter (for instance, **Get Insight Details.output.name**). The parameter box will turn green once you have selected a valid source parameter. You can add custom text before or after the source parameter. Add one or more source parameters and accompanying custom text to outline what you want the email to say. For instance, explain that a high severity insight has been detected with the following details: name, timestamp, etc.
+ 1. Click **Create** when finished with this action.
+1. When you’ve created your final nodes for your playbook, manually drag the mouse cursor from the gray connection circle on the right side of the **Send Notification Email** node to the left connection area of the **End** node. Drag and connect the "failure" end of the condition node to the End node as well.
+1. Verify that the **Start > End** node sequence for all branches have been completed. It will look more or less like the screenshot below. (Note that you can always drag playbook elements anywhere in the playbook canvas for clarity or organization).
+1. At the bottom of the screen, click the **Publish** (clipboard) icon next to the **Edit** (pencil) icon to publish your playbook. (You can add a description here if you want.)
+1. Toggle the playbook from **Enabled** to **Disabled**. (You don't want this playbook to automatically run. It's only for manual testing purposes.)
+1. Test your playbook:
+ 1. Search in Cloud SIEM for an insight with "HIGH" severity and copy the insight ID.
+ 1. In your playbook, go to the kebab icon in the upper right corner and select **Run Test**.
+ 1. For **Input** select **Insight** and in **ID** enter the insight ID.
+ 1. Click **Run**.
+ 1. The playbook runs. If errors occur, click the nodes with errors and [troubleshoot the playbook](/docs/platform-services/automation-service/automation-service-playbooks/#troubleshoot-playbooks).
+ 1. After the playbook runs, the email recipient should get an email that looks like this:
+
+#### Create a custom automation to run your Cloud SIEM insights playbook
+
+Now that you've created a playbook as described in the [previous section](#create-a-playbook-for-cloud-siem-insights), let’s use Cloud SIEM to create an automation to run it. A [Cloud SIEM automation](/docs/cse/automation/) allows you to automatically run a playbook based on a trigger, such as an insight being created or closed.
+
+Automations define the conditions in which a playbook will be executed. For instance, you might want to execute a specific playbook whenever Cloud SIEM creates a new insight. Or another playbook whenever an insight is closed to create and distribute appropriate notifications or reports. Automations can also be set to "manual execution", allowing operators to run the playbook manually when judged necessary.
+
+This way, potentially the entire incident response cycle can now be automated: a threat is identified, an insight or alert is triggered, then a playbook is automatically deployed to perform necessary actions and email a final report for an analyst to review.
+
+1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
+
+#### Test your Cloud SIEM automation
+
+To test the automation you created in the [previous section](#create-a-custom-automation-to-run-your-cloud-siem-insights-playbook), run it on a Cloud SIEM insight:
+
+1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main menu select **Cloud SIEM** and then click **Insights** at the top of the screen. [**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Insights**. You can also click **Go To...** at the top of the screen and select **Insights**.
+1. Since our test playbook only sends a notification for insights with high severity, you need to find an insight with high severity. In the **Filters** area at the top of the screen, search for insights with high severity.
+1. Select an insight from the list of filter results.
+1. Click **Actions** in the left sidebar of the insight and select your automation from the list. (If you do not see your automation, you may need to leave and return to Cloud SIEM to refresh the list.)
+1. You should see a green popup at the bottom indicating that your automation was successfully submitted for execution.
+1. Click the **Automations** tab on the top of the screen to see the results of executing your automation. **Status** will display the results of the playbook's run, such as **Success** or **Completed with errors**.
+1. Click the **View Playbook** to see more details about the playbook's execution, such as an explanation about any errors that occurred. (See [Troubleshoot playbooks](/docs/platform-services/automation-service/automation-service-playbooks/#troubleshoot-playbooks) for help if your playbook run has problems.)
+1. If the automation execution was successful, and you included your email in the playbook email notification when you created, your inbox should have an email from the Cloud SIEM system with the insight details as designed in the playbook.
+
+You now have a custom automation that can be manually run or attached to insight creation or closing.
+
+### Create a playbook for alerting
+
+Cloud SIEM isn’t the only application that can use playbooks from the Automation Service. You can also use [automated playbooks in monitors](/docs/alerts/monitors/use-playbooks-with-monitors/). In this section, we'll create a playbook that will be triggered when an alert is generated by a monitor within Sumo Logic's Log Analytics Platform.
+
+To create the playbook as described below, you must first configure the following integrations that the playbook will use:
+* [AWS EC2](/docs/platform-services/automation-service/app-central/integrations/aws-ec2/)
+* [Sumo Logic Log Analytics](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics/)
+
+For this playbook let’s presume we have some AWS EC2 instances that are being monitored through Sumo Logic. We’ll create a sample playbook that upon a monitor alert will get information about our instances and reboot them as needed.
+
+1. Go to the **Playbooks** page.
+ 1. In this case, we also want to add a custom parameter to facilitate later actions. Scroll down to the bottom of the **Edit node** dialog and click **Add New Param**.
+ 1. Type the following as the parameter name: `customPlaceholderMap[]."cloud.instance.id"`
+1. Click **Update** when finished.
+1. Add a node to your playbook go get EC2 instance IDs:
+ 1. Click the **+** symbol on the **Start** node.
+ 1. Choose the **Action** node tpe.
+ 1. Configure the node:
+ * **Node name**. "Describe AWS Instances"
+ * **Integration**. **AWS EC2**.
+ * **Type**. **Enrichment**.
+ * **Action**. **Describe Instances**.
+ * **Instance ID**. Click the gear icon and select **Playbook inputs** and then **customPlaceholderMap[]."cloud.instance.id"**. If you do not see this item in the list, check that you added the new parameter and saved it successfully in the previous step.
+ 1. Click **Create**.
+1. Add a node to reboot EC2 instances:
+ 1. Click **+** on the **Describe AWS Instances** node you just created.
+ 1. Choose the **Action** node tpe.
+ 1. Configure the node:
+ * **Node name**. "Reboot Instances"
+ * **Integration**. **AWS EC2**.
+ * **Type**. **Containment**.
+ * **Action** **Reboot Instances**.
+ * **Instance Id**. Click the gear icon and select **Describe AWS Instances** and then **output.Reservations.[].Instances.[].InstanceId**.
+ 1. Click **Create**.
+1. Add a node to resolve the alerts:
+ 1. Click **+** on the **Reboot Instances** node you just created.
+ 1. Choose the **Action** node tpe.
+ 1. Configure the node:
+ * **Name**: "Resolve Alert"
+ * **Integration**. **Sumo Logic Log Analytics**.
+ * **Type**. **Notification**.
+ * **Action** **Resolve Alert**.
+ * **Alert ID**: Click the gear icon and select **Playbook inputs** and then **input.Id**.
+ 1. Click **Create**.
+1. Connect the **Resolve Alert** node to the **End** node. Your completed playbook will look more or less like the following:
+1. At the bottom of the screen, click the **Publish** (clipboard) icon next to the **Edit** (pencil) icon to publish your playbook.
+
+#### Attach your playbook to a monitor
+
+Now that you have created a playbook for alerting, follow the directions in [Add an automated playbook to a monitor](/docs/alerts/monitors/use-playbooks-with-monitors/#add-an-automated-playbook-to-a-monitor) to add the playbook to a monitor for your AWS EC2 instances. When the alert triggers, it will run the playbook.
+
+1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Monitoring > Monitors**.
+1. Click **Save**.
+
+Saving the monitor with this configuration will run the playbook automatically whenever the alert is triggered.
+
+#### View the playbook in an alert
+
+When the monitor you configured in the previous section triggers an alert, the playbook attached to the monitor runs. To see the results of the playbook execution, open the alert that was triggered.
+
+1. To get to your alert list, from the [**New UI**](/docs/get-started/sumo-logic-ui), select **Alerts > Alert List**. From the [**Classic UI**](/docs/get-started/sumo-logic-ui-classic), click the bell icon in the top menu.
+1. Select the alert triggered by the monitor that has the playbook attached.
+1. On the alert details page, click **Playbooks** in the upper right corner. This opens a sidebar listing the playbook attached to the monitor.
+1. Click the playbook link in the sidebar. This opens the playbook results page in another browser tab, showing you the results of each playbook action. If the playbook ran with errors, see [Troubleshoot playbooks](/docs/platform-services/automation-service/automation-service-playbooks/#troubleshoot-playbooks) for help.
\ No newline at end of file
diff --git a/sidebars.ts b/sidebars.ts
index 85f9af31ae..54760c49ee 100644
--- a/sidebars.ts
+++ b/sidebars.ts
@@ -3194,6 +3194,7 @@ integrations: [
link: {type: 'doc', id: 'platform-services/automation-service/index'},
items: [
'platform-services/automation-service/about-automation-service',
+ 'platform-services/automation-service/intro-to-automation-service',
{
type: 'category',
label: 'App Central',
diff --git a/static/img/cse/automations-new-playbook-button.png b/static/img/cse/automations-new-playbook-button.png
index 82abce1dac..a00f32fd6b 100644
Binary files a/static/img/cse/automations-new-playbook-button.png and b/static/img/cse/automations-new-playbook-button.png differ
diff --git a/static/img/cse/automations-new-playbook-dialog.png b/static/img/cse/automations-new-playbook-dialog.png
index b5a3613bb7..c9a60857c3 100644
Binary files a/static/img/cse/automations-new-playbook-dialog.png and b/static/img/cse/automations-new-playbook-dialog.png differ
diff --git a/static/img/platform-services/automation-service/intro-add-automated-playbook.png b/static/img/platform-services/automation-service/intro-add-automated-playbook.png
new file mode 100644
index 0000000000..173d38a840
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-add-automated-playbook.png differ
diff --git a/static/img/platform-services/automation-service/intro-add-entity-enrichment-node.png b/static/img/platform-services/automation-service/intro-add-entity-enrichment-node.png
new file mode 100644
index 0000000000..c3da0b28ec
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-add-entity-enrichment-node.png differ
diff --git a/static/img/platform-services/automation-service/intro-add-new-node.png b/static/img/platform-services/automation-service/intro-add-new-node.png
new file mode 100644
index 0000000000..58f435c857
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-add-new-node.png differ
diff --git a/static/img/platform-services/automation-service/intro-add-node.png b/static/img/platform-services/automation-service/intro-add-node.png
new file mode 100644
index 0000000000..9294ba5a61
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-add-node.png differ
diff --git a/static/img/platform-services/automation-service/intro-alert-node.png b/static/img/platform-services/automation-service/intro-alert-node.png
new file mode 100644
index 0000000000..b657bdfc31
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-alert-node.png differ
diff --git a/static/img/platform-services/automation-service/intro-alerts-playbook.png b/static/img/platform-services/automation-service/intro-alerts-playbook.png
new file mode 100644
index 0000000000..03f25f01f6
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-alerts-playbook.png differ
diff --git a/static/img/platform-services/automation-service/intro-app-central.png b/static/img/platform-services/automation-service/intro-app-central.png
new file mode 100644
index 0000000000..9c32dfafd3
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-app-central.png differ
diff --git a/static/img/platform-services/automation-service/intro-completed-playbook.png b/static/img/platform-services/automation-service/intro-completed-playbook.png
new file mode 100644
index 0000000000..2c9edcbd2d
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-completed-playbook.png differ
diff --git a/static/img/platform-services/automation-service/intro-condition.png b/static/img/platform-services/automation-service/intro-condition.png
new file mode 100644
index 0000000000..1fb89b9ede
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-condition.png differ
diff --git a/static/img/platform-services/automation-service/intro-edit-button.png b/static/img/platform-services/automation-service/intro-edit-button.png
new file mode 100644
index 0000000000..74452d3aff
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-edit-button.png differ
diff --git a/static/img/platform-services/automation-service/intro-edit-node-alert.png b/static/img/platform-services/automation-service/intro-edit-node-alert.png
new file mode 100644
index 0000000000..437830d444
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-edit-node-alert.png differ
diff --git a/static/img/platform-services/automation-service/intro-explore-ui-installed-integrations.png b/static/img/platform-services/automation-service/intro-explore-ui-installed-integrations.png
new file mode 100644
index 0000000000..b5ff6e31cb
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-explore-ui-installed-integrations.png differ
diff --git a/static/img/platform-services/automation-service/intro-explore-ui-integrations.png b/static/img/platform-services/automation-service/intro-explore-ui-integrations.png
new file mode 100644
index 0000000000..f32a70c175
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-explore-ui-integrations.png differ
diff --git a/static/img/platform-services/automation-service/intro-find-high-severity-insights.png b/static/img/platform-services/automation-service/intro-find-high-severity-insights.png
new file mode 100644
index 0000000000..369228ba93
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-find-high-severity-insights.png differ
diff --git a/static/img/platform-services/automation-service/intro-get-virus-total-node.png b/static/img/platform-services/automation-service/intro-get-virus-total-node.png
new file mode 100644
index 0000000000..a717fd3f41
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-get-virus-total-node.png differ
diff --git a/static/img/platform-services/automation-service/intro-integrations.png b/static/img/platform-services/automation-service/intro-integrations.png
new file mode 100644
index 0000000000..cbf362c386
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-integrations.png differ
diff --git a/static/img/platform-services/automation-service/intro-new-automation.png b/static/img/platform-services/automation-service/intro-new-automation.png
new file mode 100644
index 0000000000..7b8fcc7907
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-new-automation.png differ
diff --git a/static/img/platform-services/automation-service/intro-notification-box.png b/static/img/platform-services/automation-service/intro-notification-box.png
new file mode 100644
index 0000000000..919d24e96d
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-notification-box.png differ
diff --git a/static/img/platform-services/automation-service/intro-notification-email.png b/static/img/platform-services/automation-service/intro-notification-email.png
new file mode 100644
index 0000000000..47ad099f34
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-notification-email.png differ
diff --git a/static/img/platform-services/automation-service/intro-params.png b/static/img/platform-services/automation-service/intro-params.png
new file mode 100644
index 0000000000..4d1ba9adcb
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-params.png differ
diff --git a/static/img/platform-services/automation-service/intro-playbook-results.png b/static/img/platform-services/automation-service/intro-playbook-results.png
new file mode 100644
index 0000000000..88dfb9cc14
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-playbook-results.png differ
diff --git a/static/img/platform-services/automation-service/intro-playbook-view-of-results.png b/static/img/platform-services/automation-service/intro-playbook-view-of-results.png
new file mode 100644
index 0000000000..5dcb7eac03
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-playbook-view-of-results.png differ
diff --git a/static/img/platform-services/automation-service/intro-reboot-instances-node.png b/static/img/platform-services/automation-service/intro-reboot-instances-node.png
new file mode 100644
index 0000000000..5d20749124
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-reboot-instances-node.png differ
diff --git a/static/img/platform-services/automation-service/intro-resolve-alert-node.png b/static/img/platform-services/automation-service/intro-resolve-alert-node.png
new file mode 100644
index 0000000000..a13ffdcfe9
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-resolve-alert-node.png differ
diff --git a/static/img/platform-services/automation-service/intro-results-of-automation.png b/static/img/platform-services/automation-service/intro-results-of-automation.png
new file mode 100644
index 0000000000..840a43b6ed
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-results-of-automation.png differ
diff --git a/static/img/platform-services/automation-service/intro-select-automation.png b/static/img/platform-services/automation-service/intro-select-automation.png
new file mode 100644
index 0000000000..d67835d7f5
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-select-automation.png differ
diff --git a/static/img/platform-services/automation-service/intro-start-node.png b/static/img/platform-services/automation-service/intro-start-node.png
new file mode 100644
index 0000000000..af3e531494
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-start-node.png differ
diff --git a/static/img/platform-services/automation-service/intro-test-playbook-email-2.png b/static/img/platform-services/automation-service/intro-test-playbook-email-2.png
new file mode 100644
index 0000000000..f7cd94c963
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-test-playbook-email-2.png differ
diff --git a/static/img/platform-services/automation-service/intro-test-playbook-email.png b/static/img/platform-services/automation-service/intro-test-playbook-email.png
new file mode 100644
index 0000000000..cdadb8d45c
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-test-playbook-email.png differ
diff --git a/static/img/platform-services/automation-service/intro-test-playbook-results.png b/static/img/platform-services/automation-service/intro-test-playbook-results.png
new file mode 100644
index 0000000000..4e4fdcb448
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-test-playbook-results.png differ
diff --git a/static/img/platform-services/automation-service/intro-test-playbook.png b/static/img/platform-services/automation-service/intro-test-playbook.png
new file mode 100644
index 0000000000..2a7c0006fa
Binary files /dev/null and b/static/img/platform-services/automation-service/intro-test-playbook.png differ