Shared data transformation
-
- UpdatedAug 3, 2023
- 2 minutes to read
- Vancouver
- Security Operations
The Security Incident Response, Vulnerability Response, and Threat Intelligence plugins share common features, for relationship data and duplication rules, used to import external and internal information into Security Operations.
Email Parsing, Duplication Rules, and Field Mapping take input data (an email, JSON or XML file, or a record) and transform that data into the correct format to create a new record. Each of these features pulls data in their own way but, it is transformed into the new record using many of the same processes.
Related Content
- Create email parsers in Security Operations
Email Parsing creates Security Operations records from your email for security, vulnerability, and observables to expedite threat response and remediation.
- Map tables to tables with Security Operations field mapping
Security Operations provides you with finer field-mapping granularity so you can map a Security Operations table to any other table.