
Playbooks
Intelligence-Driven Orchestration

Playbooks
ThreatConnect’s Playbooks feature automates almost any cybersecurity task using an easy drag-and-drop interface - no coding needed. ThreatConnect uses Triggers (e.g., a new IP address Indicator, a phishing email sent to an inbox) to pass data to apps, which perform a variety of functions, including: data enrichment, malware analysis, and blocking actions. Once enabled, Playbooks run in real time and provide you with detailed information about each run. Playbooks are available in TC Manage™ and TC Complete™.
GET STARTED NOW
Playbooks are available in TC Manage™ and TC Complete™.
Begin with a Trigger, which is an event that initiates a Playbook to run.
Use Apps to take action in response to a Trigger.
Use Operators to link between Triggers and Apps (e.g. If/Else command).
Use the Playbook configuration Screen to create or edit a Playbook. Everything is drag and drop with no coding needed.
Execution and Steps show you if and when Playbooks ran and what steps were taken, making it easy to adjust processes in the future.
Easily configure Playbooks to align with almost any of your current cybersecurity processes or use cases.