Shared data transformation

The Security Incident Response, Vulnerability Response, and Threat Intelligence plugins share common features used to import external and internal information into Security Operations.

Email Parsing, Duplication Rules, and Field Mapping take input data (an email, a JSON or XML file, or a record) and transform that data into the correct format to create a new record. Each of these features pulls data in their own way but it is transformed into the new record using many of the same processes.