Security Operations field mapping

Security Operations tables can be mapped to and from other tables, linking a security incident to a customer service case, or a problem to other parts of the Security Operations application. For example, you can integrate a plugin to a Security Incident Response task.

Field mapping defines the mapping used when a record from the source table is used to create a new record in the destination table. It is typically used to create a security incident from another record. The maps define which fields in a security incident are inserted into a new problem or which fields from an existing customer incident populate a new security incident.