Security Operations field mapping

Security Operations tables can be mapped to and from other tables, linking a security incident to a customer service case or a problem to other parts of the Security Operations system. For example, you can integrate a plugin to a Security Incident Response task.

Field Mapping defines the mapping used when a record from the source table is used to create a new record in the destination table. Typically used to create a security incident from another record, these maps define which fields in a security incident are inserted into a new problem or which fields from an existing customer incident populate a new security incident.