Security Operations field mapping
-
- UpdatedJan 30, 2025
- 1 minute read
- Yokohama
- Security Operations
Security Operations field mapping
Security Operations tables can be mapped to and from other tables, linking a security incident to a customer service case or a problem to other parts of the Security Operations system.
Field Mapping defines the mapping used when a record from the source table is used to create a new record in the destination table. Typically used to create a security incident from another record, these maps define which fields in a security incident are inserted into a new problem or which fields from an existing customer incident populate a new security incident.