Security Operations orchestration Security Operations Orchestration activities allow users to interact with and retrieve data from Windows or UNIX-based systems and environments using workflows. Security Operations Orchestration saves time by eliminating manual processes and obtaining contextual information to remediate incidents. The Security Operations products have standard activity packs and workflows that are included and activated in each of the plugins. Purchase a full orchestration license to create and access additional orchestration activities that are not available as a standard offering with the Security Operations products. Security Incident Response Orchestration workflows: Retrieve network statistics with the Get Network Statistics workflow Retrieve running processes with the Get Running Processes workflow Create IoC Lookup Request for IoC Changes workflow Get Threat Email Details and Delete workflow Return Email Details from Exchange workflow Return Total Emails Found in Exchange workflow Search and Delete Threat Emails workflow Threat Intelligence Orchestration workflows: Threat Intelligence - Run IoC Lookup workflow Update security incident with lookup results workflow Vulnerability Response Orchestration workflows: Scan vulnerability workflow Scan vulnerable item workflow Security Operations orchestration workflowsSeveral workflows are included with Security Operations.Security Operations orchestration activitiesMany activities are included with Security Operations for use in workflows.