

Threat detection use cases library
search
Search use case, service, tool…
Perform weekly scans on quarantined objects on ESET
Threat Detection
Incident Management
_____


Automated OneDrive & SharePoint Anomaly Detection and Response
Incident Management
Threat Detection
Data Security

External Threat Intelligence Analysis of IOCs using VirusTotal and Google Sheets
Threat Detection
Threat Analysis
_____

Automate Deep Gmail Security Analysis: URL & Attachment Threat Detection
Email Security
Threat Detection
_____



Azure AD Event Analysis & Anomaly Detection with Microsoft Graph & Teams
Incident Management
Threat Detection
_____

Automate Azure Brute Force Alert Detection & Response with Splunk & Microsoft Graph
Threat Detection
Endpoint Protection
_____




Investigate User Actions Performed During a Azure Active Directory Session
IAM
Threat Detection
Endpoint Protection



Darktrace AI Analyst Incident Review, Notification, and Reporting
Incident analysis
Threat Detection
Alerts and Notifications


Continuous Network Vulnerability Monitoring
Network Security
Threat Detection
_____




Automated Phishing Email Analysis and Risk Assessment with Multi-Tool Security Integration
Phishing
Email Security
Threat Detection

Detection and Management of CISA Vulnerabilities Using Tenable, Jira, and Microsoft Teams
_______
Threat Detection
Incident Management



Automated Malicious Email Detection and Remediation with Threat Exchange
Threat Detection
Incident Management
_____




Continuous Network Threat Hunting using Darktrace and Remediation in CrowdStrike
Network Security
Threat Detection
_____



Perform weekly scans on quarantined objects on ESET
Threat Detection
Threat Analysis
_____


Automated Threat Detection and Remediation with ESET Protect and Slack Notifications
Incident Management
Threat Detection
Remediation



Automated IOC Management and Response in Slack with Crowdstrike
Incident Management
Threat Detection
Threat Analysis


Automating Threat Detection in AWS GuardDuty with URLScan and Jira
Threat Analysis
Threat Detection
Incident analysis


AWS Cloud Security Management with Investigation and Remediation of Lacework Alerts
Cloud Security
Remediation
Threat Detection





Terminate Active Malicious Processes in CrowdStrike with Slack Notifications
Threat Detection
Incident Management
_____


Send an unknown IOC to Recorded Future for Analysis
Incident analysis
Threat Detection
Endpoint Protection

Automatically analyze and remediate forwarded email attachments using GLIMPS
Threat Detection
Email Security
_____



Analyze and Remediate Files Uploaded on Google Drive with GLIMPS
Threat Detection
Remediation
_____




Comprehensive Email Threat Detection and Response
Email Security
Threat Detection
_____

Automated Real Time Threat Response with CrowdStrike Falcon
Threat Detection
Remediation
_____

Check leaked password with Digital Shadows
Threat Detection
_____
_____



Automated Scanning and Reporting of Open Ports Using Shodan and Slack
Threat Detection
Incident Management
_____


Correlate and Alert on Multiple Failed Okta Logins via Slack for Enhanced Security Monitoring
Threat Detection
_____
_____


Real-Time Email Anomaly Monitoring and Alerting with Google Pub/Sub and Slack Integration
Threat Detection
_____
_____




Monitor Google Drive Activities for Access Changes, Downloads, and Deletions
Email Security
Threat Detection
_____


Discovery and Reporting of New Threats from MITRE TAXII Server to Slack
Alerts and Notifications
Threat Detection
_____


Verify Hashicorp Vault cluster health
Threat Detection
_____
_____


Query Shodan for findings and alert on them using Slack and Jira
Threat Detection
Alerts and Notifications
_____



Crowdstrike Detection Analysis with VirusTotal and Incident Reporting in Jira and Microsoft Teams
Threat Detection
Threat Analysis
Threat Detection



Automated external email in-depth analysis with VirusTotal, Urlscan and AbuseIPDB
Email Security
Threat Detection
_____


Detection and Remediation of Malware in Network Environments Using Wiz, SentinelOne, and Jira
Threat Detection
Remediation
_____




Monitoring and Management of Security Advisories Using Palo Alto ATP and Jira
Threat Detection
_____
_____

Detection and Management of Inactive Google Cloud Service Accounts Using Wiz and Jira
Threat Detection
Cloud Security
_____



Automated Jamf Device Compliance Checks with CrowdStrike
Device Monitoring
Endpoint Protection
Threat Detection

Automating IP Threat Detection and Notification with VirusTotal
IP Analysis
Threat Analysis
Threat Detection
Automated IP Analysis and Reporting with GreyNoise and Jira
IP Analysis
Threat Detection
_____


Automated OCR Fraud Analysis and Zendesk Ticketing
Threat Detection
Incident analysis
_____


Automated domain breach detection with HaveIBeenPwned in Google Admin Directory
Incident Management
Threat Detection
Remediation



Analyze files in Hybrid Analysis
Endpoint Protection
Threat Detection
Threat Analysis
search
Search use case, service, tool…
Perform weekly scans on quarantined objects on ESET
Threat Detection
Incident Management
_____


Automated OneDrive & SharePoint Anomaly Detection and Response
Incident Management
Threat Detection
Data Security

External Threat Intelligence Analysis of IOCs using VirusTotal and Google Sheets
Threat Detection
Threat Analysis
_____

Automate Deep Gmail Security Analysis: URL & Attachment Threat Detection
Email Security
Threat Detection
_____



Azure AD Event Analysis & Anomaly Detection with Microsoft Graph & Teams
Incident Management
Threat Detection
_____

Automate Azure Brute Force Alert Detection & Response with Splunk & Microsoft Graph
Threat Detection
Endpoint Protection
_____




Investigate User Actions Performed During a Azure Active Directory Session
IAM
Threat Detection
Endpoint Protection



Darktrace AI Analyst Incident Review, Notification, and Reporting
Incident analysis
Threat Detection
Alerts and Notifications


Continuous Network Vulnerability Monitoring
Network Security
Threat Detection
_____




Automated Phishing Email Analysis and Risk Assessment with Multi-Tool Security Integration
Phishing
Email Security
Threat Detection

Detection and Management of CISA Vulnerabilities Using Tenable, Jira, and Microsoft Teams
_______
Threat Detection
Incident Management



Automated Malicious Email Detection and Remediation with Threat Exchange
Threat Detection
Incident Management
_____




Continuous Network Threat Hunting using Darktrace and Remediation in CrowdStrike
Network Security
Threat Detection
_____



Perform weekly scans on quarantined objects on ESET
Threat Detection
Threat Analysis
_____


Automated Threat Detection and Remediation with ESET Protect and Slack Notifications
Incident Management
Threat Detection
Remediation



Automated IOC Management and Response in Slack with Crowdstrike
Incident Management
Threat Detection
Threat Analysis


Automating Threat Detection in AWS GuardDuty with URLScan and Jira
Threat Analysis
Threat Detection
Incident analysis


AWS Cloud Security Management with Investigation and Remediation of Lacework Alerts
Cloud Security
Remediation
Threat Detection





Terminate Active Malicious Processes in CrowdStrike with Slack Notifications
Threat Detection
Incident Management
_____


Send an unknown IOC to Recorded Future for Analysis
Incident analysis
Threat Detection
Endpoint Protection

Automatically analyze and remediate forwarded email attachments using GLIMPS
Threat Detection
Email Security
_____



Analyze and Remediate Files Uploaded on Google Drive with GLIMPS
Threat Detection
Remediation
_____




Comprehensive Email Threat Detection and Response
Email Security
Threat Detection
_____

Automated Real Time Threat Response with CrowdStrike Falcon
Threat Detection
Remediation
_____

Check leaked password with Digital Shadows
Threat Detection
_____
_____



Automated Scanning and Reporting of Open Ports Using Shodan and Slack
Threat Detection
Incident Management
_____


Correlate and Alert on Multiple Failed Okta Logins via Slack for Enhanced Security Monitoring
Threat Detection
_____
_____


Real-Time Email Anomaly Monitoring and Alerting with Google Pub/Sub and Slack Integration
Threat Detection
_____
_____




Monitor Google Drive Activities for Access Changes, Downloads, and Deletions
Email Security
Threat Detection
_____


Discovery and Reporting of New Threats from MITRE TAXII Server to Slack
Alerts and Notifications
Threat Detection
_____


Verify Hashicorp Vault cluster health
Threat Detection
_____
_____


Query Shodan for findings and alert on them using Slack and Jira
Threat Detection
Alerts and Notifications
_____



Crowdstrike Detection Analysis with VirusTotal and Incident Reporting in Jira and Microsoft Teams
Threat Detection
Threat Analysis
Threat Detection



Automated external email in-depth analysis with VirusTotal, Urlscan and AbuseIPDB
Email Security
Threat Detection
_____


Detection and Remediation of Malware in Network Environments Using Wiz, SentinelOne, and Jira
Threat Detection
Remediation
_____




Monitoring and Management of Security Advisories Using Palo Alto ATP and Jira
Threat Detection
_____
_____

Detection and Management of Inactive Google Cloud Service Accounts Using Wiz and Jira
Threat Detection
Cloud Security
_____



Automated Jamf Device Compliance Checks with CrowdStrike
Device Monitoring
Endpoint Protection
Threat Detection

Automating IP Threat Detection and Notification with VirusTotal
IP Analysis
Threat Analysis
Threat Detection
Automated IP Analysis and Reporting with GreyNoise and Jira
IP Analysis
Threat Detection
_____


Automated OCR Fraud Analysis and Zendesk Ticketing
Threat Detection
Incident analysis
_____


Automated domain breach detection with HaveIBeenPwned in Google Admin Directory
Incident Management
Threat Detection
Remediation



Analyze files in Hybrid Analysis
Endpoint Protection
Threat Detection
Threat Analysis
Can't find a use case that meets your expectations?
Turn any prompt into ready-to-use flows with our Generative AI.
Try GenAI
Turn any prompt
into ready-to-go flows
Introducing our AI text-to-automation, capable of programmatically calling service APIs. Simply describe your use case and let our AI build the necessary steps for you, and even craft a complete tailored workspace with AI-generated flows.
Generate
edit
Waiting instructions from prompt...
Interested in exploring edge cases?
Investigate combinations with an expert
Turn any prompt
into ready-to-go flows
Introducing our AI text-to-automation, capable of programmatically calling service APIs. Simply describe your use case and let our AI build the necessary steps for you, and even craft a complete tailored workspace with AI-generated flows.
Generate
edit
Waiting instructions from prompt...
Interested in exploring edge cases?
Investigate combinations with an expert
Nothing you had in mind here?
Submit your
use case
Nothing you had in mind here?
Submit your
use case
Subscribe to innovation.
Subscribe to innovation.

Threat detection
Use cases
Can't find a use case that meets your expectations?
Turn any prompt into ready-to-use flows with our Generative AI.
search
Search use case, service, tool…
Perform weekly scans on quarantined objects on ESET
Threat Detection
Incident Management
_____


Automated OneDrive & SharePoint Anomaly Detection and Response
Incident Management
Threat Detection
Data Security

External Threat Intelligence Analysis of IOCs using VirusTotal and Google Sheets
Threat Detection
Threat Analysis
_____

Automate Deep Gmail Security Analysis: URL & Attachment Threat Detection
Email Security
Threat Detection
_____



Azure AD Event Analysis & Anomaly Detection with Microsoft Graph & Teams
Incident Management
Threat Detection
_____

Automate Azure Brute Force Alert Detection & Response with Splunk & Microsoft Graph
Threat Detection
Endpoint Protection
_____




Investigate User Actions Performed During a Azure Active Directory Session
IAM
Threat Detection
Endpoint Protection



Darktrace AI Analyst Incident Review, Notification, and Reporting
Incident analysis
Threat Detection
Alerts and Notifications


Continuous Network Vulnerability Monitoring
Network Security
Threat Detection
_____




Automated Phishing Email Analysis and Risk Assessment with Multi-Tool Security Integration
Phishing
Email Security
Threat Detection

Detection and Management of CISA Vulnerabilities Using Tenable, Jira, and Microsoft Teams
_______
Threat Detection
Incident Management



Automated Malicious Email Detection and Remediation with Threat Exchange
Threat Detection
Incident Management
_____




Continuous Network Threat Hunting using Darktrace and Remediation in CrowdStrike
Network Security
Threat Detection
_____



Perform weekly scans on quarantined objects on ESET
Threat Detection
Threat Analysis
_____


Automated Threat Detection and Remediation with ESET Protect and Slack Notifications
Incident Management
Threat Detection
Remediation



Automated IOC Management and Response in Slack with Crowdstrike
Incident Management
Threat Detection
Threat Analysis


Automating Threat Detection in AWS GuardDuty with URLScan and Jira
Threat Analysis
Threat Detection
Incident analysis


AWS Cloud Security Management with Investigation and Remediation of Lacework Alerts
Cloud Security
Remediation
Threat Detection





Terminate Active Malicious Processes in CrowdStrike with Slack Notifications
Threat Detection
Incident Management
_____


Send an unknown IOC to Recorded Future for Analysis
Incident analysis
Threat Detection
Endpoint Protection

Automatically analyze and remediate forwarded email attachments using GLIMPS
Threat Detection
Email Security
_____



Analyze and Remediate Files Uploaded on Google Drive with GLIMPS
Threat Detection
Remediation
_____




Comprehensive Email Threat Detection and Response
Email Security
Threat Detection
_____

Automated Real Time Threat Response with CrowdStrike Falcon
Threat Detection
Remediation
_____

Check leaked password with Digital Shadows
Threat Detection
_____
_____



Automated Scanning and Reporting of Open Ports Using Shodan and Slack
Threat Detection
Incident Management
_____


Correlate and Alert on Multiple Failed Okta Logins via Slack for Enhanced Security Monitoring
Threat Detection
_____
_____


Real-Time Email Anomaly Monitoring and Alerting with Google Pub/Sub and Slack Integration
Threat Detection
_____
_____




Monitor Google Drive Activities for Access Changes, Downloads, and Deletions
Email Security
Threat Detection
_____


Discovery and Reporting of New Threats from MITRE TAXII Server to Slack
Alerts and Notifications
Threat Detection
_____


Verify Hashicorp Vault cluster health
Threat Detection
_____
_____


Query Shodan for findings and alert on them using Slack and Jira
Threat Detection
Alerts and Notifications
_____



Crowdstrike Detection Analysis with VirusTotal and Incident Reporting in Jira and Microsoft Teams
Threat Detection
Threat Analysis
Threat Detection



Automated external email in-depth analysis with VirusTotal, Urlscan and AbuseIPDB
Email Security
Threat Detection
_____


Detection and Remediation of Malware in Network Environments Using Wiz, SentinelOne, and Jira
Threat Detection
Remediation
_____




Monitoring and Management of Security Advisories Using Palo Alto ATP and Jira
Threat Detection
_____
_____

Detection and Management of Inactive Google Cloud Service Accounts Using Wiz and Jira
Threat Detection
Cloud Security
_____



Automated Jamf Device Compliance Checks with CrowdStrike
Device Monitoring
Endpoint Protection
Threat Detection

Automating IP Threat Detection and Notification with VirusTotal
IP Analysis
Threat Analysis
Threat Detection
Automated IP Analysis and Reporting with GreyNoise and Jira
IP Analysis
Threat Detection
_____


Automated OCR Fraud Analysis and Zendesk Ticketing
Threat Detection
Incident analysis
_____


Automated domain breach detection with HaveIBeenPwned in Google Admin Directory
Incident Management
Threat Detection
Remediation



Analyze files in Hybrid Analysis
Endpoint Protection
Threat Detection
Threat Analysis

Turn any prompt
into ready-to-go flows
Generate
Introducing our AI text-to-automation, capable of programmatically calling service APIs. Simply describe your use case and let our AI build the necessary steps for you, and even craft a complete tailored workspace with AI-generated flows.
Interested in exploring edge cases?
Investigate combinations with an expert
auto_fix_high
text-to-automation
Build flows with NLP and AI Agents
edit
Waiting instructions from prompt...
auto_fix_high
text-to-automation
Build flows with NLP and AI Agents
edit
Waiting instructions from prompt...
open_in_full
auto_fix_high
text-to-automation
Build flows with NLP and AI Agents
edit
Waiting instructions from prompt...
open_in_full
Nothing you had in mind here?
Submit your
use case
Subscribe to innovation.