Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.

Security Operations field mapping

Log in to subscribe to topics and get notified when content changes.

Security Operations field mapping

Security Operations tables can be mapped to and from other tables, linking a security incident to a customer service case, or a problem to other parts of the Security Operations application.

Field mapping defines the mapping used when a record from the source table is used to create a new record in the destination table. It is typically used to create a security incident from another record. The maps define which fields in a security incident are inserted into a new problem or which fields from an existing customer incident populate a new security incident.