Security Operations Orchestration Users can interact with and retrieve data from Windows or UNIX-based systems and environments using activity packs and workflows in Security Operations Orchestration. Security Operations Orchestration saves time by eliminating manual processes and obtaining contextual information to remediate incidents. The Security Operations products have standard activity packs and workflows that are included and activated in each of the plugins. To create and access additional orchestration activities that are not available with the standard offering Security Operations products, purchase a full orchestration license. Security Incident Response Orchestration workflows: Security Incident Response - Get Network Statistics workflow Security Operations System Command Integration - Get Running Processes workflow Create Lookup Request for IoC Changes workflow Security Operations Integration - Email Search and Delete workflow Threat Intelligence Orchestration workflows: Threat Intelligence - Run IoC Lookup workflow Update security incident with lookup results workflow Vulnerability Response Orchestration workflows: Scan vulnerability workflow Scan vulnerability item workflow Security Operations orchestration workflowsSeveral workflows are included with Security Operations.Security Operations orchestration activitiesMany activities are included with Security Operations for use in workflows.