Product documentation Docs
    • English
    • Deutsch
    • 日本語
    • 한국어
    • Français
  • More Sites
    • Now Community
    • Developer Site
    • Knowledge Base
    • Product Information
    • ServiceNow.com
    • Training
    • Customer Success Center
    • ServiceNow Support Videos
  • Log in

Product documentation

  • Home
How search works:
  • Punctuation and capital letters are ignored
  • Special characters like underscores (_) are removed
  • Known synonyms are applied
  • The most relevant topics (based on weighting and matching to search terms) are listed first in search results
Topics are ranked in search results by how closely they match your search terms
  • A match on the entire phrase you typed
  • A match on part of the phrase you typed
  • A match on ALL of the terms in the phrase you typed
  • A match on ANY of the terms in the phrase you typed

Note: Matches in titles are always highly ranked.

  • Release version
    Table of Contents
    • Security Operations
Table of Contents
Choose your release version
    Home Orlando Security Incident Management Security Operations Security Incident Response Playbook Resources Action Library

    Action Library

    • Save as PDF Selected topic Topic & subtopics All topics in contents
    • Unsubscribe Log in to subscribe to topics and get notified when content changes.
    • Share this page

    Action Library

    Complex actions that are critical for building Security Incident Response playbooks are available as Action Libraries. The actions listed below enable security administrators to create playbooks without writing any complicated code.

    Table 1.
    Action Name Description Example scenario
    Add a security tag to the security incident Use this action to add a security tag automatically using flow designer logic. If the flow detects an IOC, the IOC Detected tag can be automatically added using this action.
    • Input: security incident, security tag
    • Output: not applicable
    Add observables to the security incident Use this action to add observables to a selected security incident.
    • By default, the list of observables are separated by the comma (,) delimiter but this can be modified. You can specify another single special character as a delimiter. While adding observables, the type (URL, IP address, hash) is automatically set.
    • When the observables are added to the security incident, the type (URL, IP address, hash) is automatically set.
    • When the observables are being added, the Filter Whitelisted Observables option identifies whitelisted observables and does not add them to the security incident's observables related list. An automated system activity (response) is added to indicate that these observables have been removed.
    • Input:
      • security incident
      • observables
      • delimiter
      • filter whitelisted observables and post activity note
    • Output: not applicable
    Get affected users (Related Lists) from multiple security incidents V1 Retrieves all the affected users listed in the Affected Users related list for the specified security incidents. You may have parent security incidents with multiple child security incidents. Use this action to roll-up affected users from all the child security incidents to the corresponding parent security incidents. Only unique affected users are rolled-up and all duplicates are eliminated.
    • Input: security incidents
    • Output:
      • affected user
      • count
    Get affected users from multiple security incidents Retrieves the primary affected user for the specified security incident. It does not include the affected users from the Affected User related list.
    • While investigating a phishing security incident, send an email to the primary affected users (who reported the phishing incident) to confirm if any of the users clicked on the malicious links in the phishing email.
    • Update the parent security incident severity or risk score based on the count of primary affected users.
    • Input: security incidents
    • Output:
      • affected users
      • count
    Get affected users (Related List) from a security incident Retrieves all the affected users listed in the Affected Users related list for a specified security incident.
    • Input: security incidents
    • Output:
      • affected users
      • count
    Add affected users to security incident Adds all affected users to a security incident. Suppose you have a parent security incident with multiple child security incidents. You can use this action to roll-up affected users from all the child security incidents to the corresponding parent security incident. Only unique affected users are rolled-up and all duplicates are eliminated.
    • Input:
      • security incident
      • user
    • Output: not applicable
    Get configuration items of the affected users Retrieves the configuration items (CIs) of all affected users. In phishing or malware scenarios, you can use this action to update the Affected Configuration Items (CI) related list and investigate the CIs. You can then update the severity or risk score of the security incident based on the number of identified CIs.
    • Input: users
    • Output:
      • configuration items
      • count
    Get all child security incidents for a security incident Retrieves all child security incidents related to a specific parent security incident.
    • Example scenario: Use this action to:
      • Update the status of the child security incidents when their corresponding parent security incidents status get updated.
      • Update the severity or risk score of the security incident automatically based on the number of child security incidents.
    • Input:
      • security incident
      • incident state
    • Output:
      • child security incident
      • count
    Get configuration items for the observables (type IP address) Retrieves all configuration items (CIs) for observables of type IP address. An IP address observable can be associated with a configuration item. For example, the IP address of a server. If you use this action, you can retrieve information for the server.
    • Input: observable ip address
    • Output:
      • configuration items
      • count
    Is observable malicious Confirms the presence of one or more malicious observables in a set of observables. After the threat lookup has been completed and you have identified the presence of malicious observables, you can increase the severity or risk score of a security incident.
    • Input: security incident
    • Output:
      • malicious (true/false)
    Filter out whitelisted observables Use this action to whitelist observables from a given set of observables. You can identify certain observables that can be ignored from a set of observables. These observables will not taken into account while resolving the security incident.
    • Input: security incident
    • Output:
      • whitelisted observables
      • count
    Get user group for affected user Retrieves the user group details of affected users. In an organization, if two or more users report phishing emails, you can find out the group they belong to and identify if more users have been affected
    • Input: user
    • Output:
      • user groups
      • count

    Tags:

    Feedback
    On this page

    Previous topic

    Next topic

    • Contact Us
    • Careers
    • Terms of Use
    • Privacy Statement
    • Sitemap
    • © ServiceNow. All rights reserved.

    Release version
    Choose your release version

      Action Library

      • Save as PDF Selected topic Topic & subtopics All topics in contents
      • Unsubscribe Log in to subscribe to topics and get notified when content changes.
      • Share this page

      Action Library

      Complex actions that are critical for building Security Incident Response playbooks are available as Action Libraries. The actions listed below enable security administrators to create playbooks without writing any complicated code.

      Table 1.
      Action Name Description Example scenario
      Add a security tag to the security incident Use this action to add a security tag automatically using flow designer logic. If the flow detects an IOC, the IOC Detected tag can be automatically added using this action.
      • Input: security incident, security tag
      • Output: not applicable
      Add observables to the security incident Use this action to add observables to a selected security incident.
      • By default, the list of observables are separated by the comma (,) delimiter but this can be modified. You can specify another single special character as a delimiter. While adding observables, the type (URL, IP address, hash) is automatically set.
      • When the observables are added to the security incident, the type (URL, IP address, hash) is automatically set.
      • When the observables are being added, the Filter Whitelisted Observables option identifies whitelisted observables and does not add them to the security incident's observables related list. An automated system activity (response) is added to indicate that these observables have been removed.
      • Input:
        • security incident
        • observables
        • delimiter
        • filter whitelisted observables and post activity note
      • Output: not applicable
      Get affected users (Related Lists) from multiple security incidents V1 Retrieves all the affected users listed in the Affected Users related list for the specified security incidents. You may have parent security incidents with multiple child security incidents. Use this action to roll-up affected users from all the child security incidents to the corresponding parent security incidents. Only unique affected users are rolled-up and all duplicates are eliminated.
      • Input: security incidents
      • Output:
        • affected user
        • count
      Get affected users from multiple security incidents Retrieves the primary affected user for the specified security incident. It does not include the affected users from the Affected User related list.
      • While investigating a phishing security incident, send an email to the primary affected users (who reported the phishing incident) to confirm if any of the users clicked on the malicious links in the phishing email.
      • Update the parent security incident severity or risk score based on the count of primary affected users.
      • Input: security incidents
      • Output:
        • affected users
        • count
      Get affected users (Related List) from a security incident Retrieves all the affected users listed in the Affected Users related list for a specified security incident.
      • Input: security incidents
      • Output:
        • affected users
        • count
      Add affected users to security incident Adds all affected users to a security incident. Suppose you have a parent security incident with multiple child security incidents. You can use this action to roll-up affected users from all the child security incidents to the corresponding parent security incident. Only unique affected users are rolled-up and all duplicates are eliminated.
      • Input:
        • security incident
        • user
      • Output: not applicable
      Get configuration items of the affected users Retrieves the configuration items (CIs) of all affected users. In phishing or malware scenarios, you can use this action to update the Affected Configuration Items (CI) related list and investigate the CIs. You can then update the severity or risk score of the security incident based on the number of identified CIs.
      • Input: users
      • Output:
        • configuration items
        • count
      Get all child security incidents for a security incident Retrieves all child security incidents related to a specific parent security incident.
      • Example scenario: Use this action to:
        • Update the status of the child security incidents when their corresponding parent security incidents status get updated.
        • Update the severity or risk score of the security incident automatically based on the number of child security incidents.
      • Input:
        • security incident
        • incident state
      • Output:
        • child security incident
        • count
      Get configuration items for the observables (type IP address) Retrieves all configuration items (CIs) for observables of type IP address. An IP address observable can be associated with a configuration item. For example, the IP address of a server. If you use this action, you can retrieve information for the server.
      • Input: observable ip address
      • Output:
        • configuration items
        • count
      Is observable malicious Confirms the presence of one or more malicious observables in a set of observables. After the threat lookup has been completed and you have identified the presence of malicious observables, you can increase the severity or risk score of a security incident.
      • Input: security incident
      • Output:
        • malicious (true/false)
      Filter out whitelisted observables Use this action to whitelist observables from a given set of observables. You can identify certain observables that can be ignored from a set of observables. These observables will not taken into account while resolving the security incident.
      • Input: security incident
      • Output:
        • whitelisted observables
        • count
      Get user group for affected user Retrieves the user group details of affected users. In an organization, if two or more users report phishing emails, you can find out the group they belong to and identify if more users have been affected
      • Input: user
      • Output:
        • user groups
        • count

      Tags:

      Feedback

          Share this page

          Got it! Feel free to add a comment
          To share your product suggestions, visit the Idea Portal.
          Please let us know how to improve this content

          Check any that apply

          To share your product suggestions, visit the Idea Portal.
          Confirm

          We were unable to find "Coaching" in Jakarta. Would you like to search instead?

          No Yes
          • Contact Us
          • Careers
          • Terms of Use
          • Privacy Statement
          • Sitemap
          • © ServiceNow. All rights reserved.

          Subscribe Subscribed Unsubscribe Last updated: Tags: January February March April May June July August September October November December No Results Found Versions Search preferences successfully updated My release version successfully updated My release version successfully deleted An error has occurred. Please try again later. You have been unsubscribed from all topics. You are now subscribed to and will receive notifications if any changes are made to this page. You have been unsubscribed from this content Thank you for your feedback. Form temporarily unavailable. Please try again or contact  docfeedback@servicenow.com  to submit your comments. The topic you requested does not exist in the release. You were redirected to a related topic instead. The available release versions for this topic are listed There is no specific version for this documentation. Explore products Click to go to the page. Release notes and upgrades Click to open the dropdown menu. Delete Remove No selected version Reset This field is required You are already subscribed to this topic Attach screenshot The file you uploaded exceeds the allowed file size of 20MB. Please try again with a smaller file. Please complete the reCAPTCHA step to attach a screenshot
          Log in to personalize your search results and subscribe to topics
          No, thanks Login