

Use cases library
search
Search use case, service, tool…
Unlock Local User Accounts on Devices Managed by Jamf Pro
Device Monitoring
Endpoint Protection
_____


Create a Microsoft Sentinel Subscription for Every New Alert
Incident Management
Alerts and Notifications
_____


Automatically Monitor Employees' Received Emails to Detect Threats
Email Security
IP Analysis
_____

Automatically Perform Dataflows and Dataset Refreshes in PowerBI
Productivity
Data Analysis
_____

Slack Channel Messages Daily Summary Reports
Productivity
Alerts and Notifications
_____


Automated Google Meet Recording & Transcript Notifications
Productivity
_____
_____


Suspicious Login Detection and Remediation in Google Workspace
Cloud Security
IAM
_____





Automated Cloud Resources Change Monitoring & Security Alerts
Cloud Security
Incident Management
_____

AI··Agent: Security Workflow Routing and Request
_______
_____
_____


Automate Google User Impersonation with IAM & OAuth
IAM
_____
_____


Delete All Access Tokens and Signout a User with Google Admin Directory
Offboarding
Incident Management
IAM


Investigate Devices' Current DNS Resolver with Jamf Pro and Slack
Endpoint Protection
Device Monitoring
Network Security


Scheduled Subdomains Enumeration and SSL Certificate Scans
Vulenrability Management
Network Security
_____




Continuous Network Threat Hunting using Darktrace and Remediation in CrowdStrike
Network Security
Threat Detection
_____



Automated Network Mapping & Security Scans with Shodan
Network Security
Endpoint Protection
_____


Automatically Perform Shodan Queries to Identify Network Misconfigurations
Network Security
Incident analysis
_____



Automated Persistent Software Monitoring with Jamf Pro, Google Sheets & Slack
Device Monitoring
Endpoint Protection
_____



Automated Google Workspace 2FA Management via Slack
_______
Incident Management
_____


Automate employee onboarding on Google Workspace Admin with Okta and Slack
Onboarding
_____
_____






HaveIBeenPwned Scan and Trigger Password Change in Google Admin Directory
IAM
Endpoint Protection
_____



Automate inactive user management in AWS IAM and AWS CloudTrail
_______
_____
_____




Automate Contact Management in HubSpot with Mindflow
CRM
Marketing
_____

Automate email threat detection and analysis with Slack, VirusTotal, and EmailRep
Email Security
Endpoint Protection
Threat Analysis


Automate Daily Slack Message Recaps and Summary for Efficient Updates
Productivity
Notification
_____


Automate Device Locking and Phishing Alerts with AI Agents in CrowdStrike
Device Monitoring
Endpoint Protection
_____


Extract Key Insights from Meetings Notes and Organize Data in Notion
Data Analysis
_____
_____

Automate PII Anonymization and AI Responses in Slack with AWS Comprehend and OpenAI
Compliance
Data Security
_____



Ingest notifications from ESET Protect and trigger remediation
Remediation
Incident Management
_____


Automate LinkedIn Job Title Categorization to Build Ideal Customer Profiles
CRM
Marketing
Sales

Perform weekly scans on quarantined objects on ESET
Threat Detection
Threat Analysis
_____


Automated Threat Detection and Remediation with ESET Protect and Slack Notifications
Incident Management
Threat Detection
Remediation



Automated Google Workspace User and Group Management with Slack
Incident Management
Remediation
_____


Automated just in time access to sensitive cloud resources with AWS IAM and SSO
IAM
Cloud Management
_____


Automated Access Review with Google Workspace Admin, Jamf Pro and Drata
Compliance
Device Monitoring
IAM






GitHub Event Handling and Response with Slack Notifications and Repository Management
Triage
Triage
_____


Automated IOC Management and Response in Slack with Crowdstrike
Incident Management
Threat Detection
Threat Analysis


Onboard users on different tools and create tickets in Siit
_______
_____
_____






Cloud Credentials Rotation on Azure
Cloud Security
_____
_____


Automate CSPM Threat Response with Lacework, Jira, and AWS
Cloud Security
Endpoint Protection
_____





Automate Static Website Deployment with Gitlab and Jira
Cloud Management
_____
_____


Continuous Network Vulnerability Monitoring
Network Security
Threat Detection
_____




Automated Cloud Security and User Account Management with Microsoft Teams
_______
Data Security
_____

Proactive Monitoring and Automated Remediation of Suspicious File Downloads in Google Drive
Data Security
Cloud Security
_____


Automated Malicious Email Detection and Remediation with Threat Exchange
Threat Detection
Incident Management
_____




Monitor, Enrich, and Remediate Honeytoken Triggers on GitGuardian
Incident Management
Cloud Security
Alerts and Notifications



Domain MX Records and IP Reputation Analysis with Slack Reporting
Threat Analysis
Email Security
_____




Just in Time Admin Rights on Employees' Devices Using MDM
Compliance
IAM
_____


Automating Cloud Cost Optimization with AWS EC2 and Slack
Cloud Management
Cost Optimization
_____


Receive & remediate SNS notifications from AWS Config
Cloud Management
Alerts and Notifications
Remediation


Enrich & remediate suspicious logins reported in Okta
Enrichment
Remediation
_____



Dyanmic AWS EC2 Disk Space Management and Optimization
Cost Optimization
Cloud Management
_____


Streamline Incident Response with VMware Carbon Black, PagerDuty, VirusTotal, and Jira
Endpoint Protection
_____
_____



Streamlined temporary access management in AWS IAM and AWS SSO from Slack
IAM
_____
_____


Enhance Email Security: Automated Domain Scanning, Breach Detection & Password Resets
Email Security
Endpoint Protection
_____



Perform a scheduled review of ASPs with Google Admin and automate Slack notifications
Endpoint Protection
IAM
_____


Automate email security with UrlScan, VirusTotal & Slack for threat detection
Email Security
Endpoint Protection
_____


Streamline Noname Security issue and evidence processing in Splunk
Incident Management
Incident analysis
_____

Remediate unusual Google Admin login events through Panther alerts
IAM
Endpoint Protection
_____



Automate HubSpot contact creation from Slack
Productivity
_____
_____


Automated Phishing Email Analysis and Risk Assessment with Multi-Tool Security Integration
Phishing
Email Security
Threat Detection

Automating AWS S3 Bucket Privacy with CloudTrail Alerts and Slack Notifications
Data Analysis
Cloud Security
_____


Automating Threat Detection in AWS GuardDuty with URLScan and Jira
Threat Analysis
Threat Detection
Incident analysis


AWS Cloud Security Management with Investigation and Remediation of Lacework Alerts
Cloud Security
Remediation
Threat Detection





Remediate unusual login alerts from a SIEM system with Slack and Google Admin
Alerts and Notifications
Incident Management
_____




Revoke Okta session following a Panther Event
IAM
Incident Management
_____



Automate scheduled device compliance evidence reporting with Jamf Pro and Drata
Compliance
_____
_____




Terminate Active Malicious Processes in CrowdStrike with Slack Notifications
Threat Detection
Incident Management
_____


Send an unknown IOC to Recorded Future for Analysis
Incident analysis
Threat Detection
Endpoint Protection

Automated employee offboarding using Google Admin, Okta, Bitwarden, Slack, HubSpot, and GitHub
Offboarding
IAM
_____






Monitor and remediate file and media uploads on company cloud storage
Cloud Security
Cloud Management
_____



Deactivate stale AWS access keys discovered by Wiz
Cloud Security
IAM
_____



Detect & remediate public AWS S3 buckets with JupiterOne
Cloud Security
Threat Analysis
_____



Identify EC2 instances missing tags and configure them
Cloud Management
Cloud Management
_____

Automated Compliance Reporting with Drata and Slack
SOC
Compliance
_____


Search & update notable status in Splunk Enterprise Security
Incident Management
_____
_____

Automate vulnerability data transfer from CrowdStrike Falcon Spotlight to Drata
Incident Management
Compliance
Enrichment


Automate background check tracking and evidence upload for compliance in Drata
Compliance
_____
_____

Automatically analyze and remediate forwarded email attachments using GLIMPS
Threat Detection
Email Security
_____



Automated Web Extension Blocklist Management with JAMF Pro and Slack
Device Monitoring
Endpoint Protection
_____



Automated Device Containment and Incident Tracking with CrowdStrike Falcon Overwatch and Jira
Endpoint Protection
Incident Management
Remediation


Analyze and Remediate Files Uploaded on Google Drive with GLIMPS
Threat Detection
Remediation
_____




Comprehensive Email Threat Detection and Response
Email Security
Threat Detection
_____

Automated Real Time Threat Response with CrowdStrike Falcon
Threat Detection
Remediation
_____

Automated Computer Restart and Status Tracking with Check Point Harmony Endpoint
Device Monitoring
Endpoint Protection
_____

Automated Token Retrieval and API Session Initialization for Check Point Harmony Endpoint
IAM
Alerts and Notifications
_____

Automate User Access Management in Acronis with Slack Notifications for IT Teams
_______
_____
_____


Automate 2FA Compliance Checks, Enforcement, and Reporting for Users in Acronis
Compliance
Endpoint Protection
_____


Monitor, notify, and remediate secret incidents on GitGuardian
Remediation
Alerts and Notifications
_____



Check leaked password with Digital Shadows
Threat Detection
_____
_____



Automated Google Sheets Configuration for Users Using Google Admin Directory
Data
_____
_____


Automated Analysis of Phishing Emails, URLs, and Attachments Using VirusTotal, URLScan.io, and emailrep.io
Email Security
Phishing
_____

Automatically Collect and Organize Google Form Responses in Google Sheets for Efficient Data Management
Data
Enrichment
_____


Automated Scanning and Reporting of Open Ports Using Shodan and Slack
Threat Detection
Incident Management
_____


Automated URL Threat Analysis and Incident Ticket Creation Using VirusTotal and Freshservice
Threat Analysis
Ticketing
Incident Management

Secure and Authorized Project Deletion in Google Cloud Resource Manager with Slack Notifications
Data Security
_____
_____


Ensure Employee Compliance with Drata and Notify via Slack
Compliance
_____
_____


Correlate and Alert on Multiple Failed Okta Logins via Slack for Enhanced Security Monitoring
Threat Detection
_____
_____


Automated IP Address Verification and Remediation Using Google Sheets, VirusTotal, Jamf, and Slack
Threat Analysis
_____
_____





WordPress admin unknown IP address alert
Threat Analysis
_____
_____





Weekly Automatic Signout and Cookie Reset for All Google Workspace Users
_______
IAM
_____


Force Password Reset in Azure Active Directory Upon Detection of Compromised Credentials
IAM
Endpoint Protection
_____
Automated File Sharing Monitoring and Notification for Access Changes in Google Drive
IAM
Data Security
_____




Automated Domain Blocking in FireEye Endpoint Security for Enhanced Threat Response
Domain Analysis
Endpoint Protection
_____

Automated Daily Jamf Pro App Inventory Retrieval and Google Sheets Update with Slack Notifications
Device Monitoring
Endpoint Protection
_____



Comprehensive Multi-Platform Identity Enrichment and Risk Analysis
IAM
Enrichment
_____



Role creation or suspension in CrowdStrike
Onboarding
Offboarding
_____

Pull existing WordPress subscribers
IAM
Data
_____


Creating a forwarding address in Gmail
IAM
_____
_____

Delete inactive mobile devices from Google Workspace
IAM
Device Monitoring
_____


Handle False Positive Alerts in AWS IAM with an AI Agent
Triage
Alerts and Notifications
Incident Management

Detection and Management of CISA Vulnerabilities Using Tenable, Jira, and Microsoft Teams
_______
Threat Detection
Incident Management



Azure Incident Response and Remediation
Cloud Management
Incident Management
_____


Automated URLBlockList Updates by JAMF Pro
Incident Management
IP Analysis
_____


Retrieve overly permissive Google Cloud firewall rules with Wiz
Cloud Security
_____
_____



Manage GitHub Webhook
Triage
_____
_____


Synchronization of notes in a ServiceNow ticket
Ticketing
Alerts and Notifications
_____

Reset a user's password in Okta
IAM
_____
_____

Real-Time Email Anomaly Monitoring and Alerting with Google Pub/Sub and Slack Integration
Threat Detection
_____
_____




Monitor Google Drive Activities for Access Changes, Downloads, and Deletions
Email Security
Threat Detection
_____


Automated Spam Detection and Removal in Office 365 Mailboxes
Email Security
_____
_____

Discovery and Reporting of New Threats from MITRE TAXII Server to Slack
Alerts and Notifications
Threat Detection
_____


Monitor Sent Emails in Google Workspace Using Admin Directory and Gmail
Email Security
Threat Analysis
_____


Verify Hashicorp Vault cluster health
Threat Detection
_____
_____


Query Shodan for findings and alert on them using Slack and Jira
Threat Detection
Alerts and Notifications
_____



Automated Text Messaging with Twilio
Alerts and Notifications
_____
_____

Automated Employee Onboarding with BambooHR, Google Workspace, Okta, and Microsoft Teams
Onboarding
IAM
_____





Answer to approval and denial requests via Slack
IAM
Productivity
_____

Email attachment threat analysis and triage with Material Security and VirusTotal
Triage
Email Security
_____

Crowdstrike Detection Analysis with VirusTotal and Incident Reporting in Jira and Microsoft Teams
Threat Detection
Threat Analysis
Threat Detection



Analyze Email Headers for IP Reputation and Spoofing Detection
Email Security
_____
_____

Fetch Microsoft Defender alerts and create a ticket in Jira
Ticketing
Incident analysis
_____


Automated external email in-depth analysis with VirusTotal, Urlscan and AbuseIPDB
Email Security
Threat Detection
_____


Automate PaloAlto FireWall upgrade
Device Monitoring
Endpoint Protection
_____


Automate Scaleway Project and assets creation
Cloud Management
_____
_____

Detection and Remediation of Malware in Network Environments Using Wiz, SentinelOne, and Jira
Threat Detection
Remediation
_____




Monitoring and Management of Security Advisories Using Palo Alto ATP and Jira
Threat Detection
_____
_____

Detection and Management of Inactive Google Cloud Service Accounts Using Wiz and Jira
Threat Detection
Cloud Security
_____



Bulk Data Updates and Status Monitoring in Salesforce Using Slack Integration
Data
_____
_____


Triage of Email Attachments for Enhanced Security Using Material Security and VirusTotal
Email Security
_____
_____

Automate Retrieval and Notification of RFC Tickets Using ServiceNow and Microsoft Teams
Ticketing
_____
_____


Continuous Security Monitoring for BitWarden Using Mindflow AI Agent
_______
IAM
_____



Enrich CrowdStrike incidents with VirusTotal & send to TheHive
Enrichment
Endpoint Protection
_____


Automated Jira Ticket Creation and Alert Assignment with Notifications via Microsoft Teams
Ticketing
Alerts and Notifications
_____

Respond to a CrowdStrike detection in ServiceNow
Enrichment
Remediation
Incident analysis


Search Elastic data sets and display results
Data Analysis
Cloud Management
_____

Find & remediate publicly exposed S3 buckets with Wiz
Cloud Security
Cloud Security
_____


Monitor large downloads by employees in Netskope and create Jira issues
Data Security
Cloud Security
_____

Automate ticket creation in ServiceNow
Ticketing
Ticketing
_____
Email Header and Body Analysis for Phishing Attempt
Email Security
IP Analysis
_____
Close child tickets in ServiceNow
Ticketing
Ticketing
_____


Ticket enrichment from a Sekoia Alert
Endpoint Protection
Endpoint Protection
_____
