Security Incident Response release notes
-
- UpdatedJan 30, 2025
- 4 minutes to read
- Yokohama
- Release Notes and Upgrades
The ServiceNow® Security Incident Response (SIR) application helps your organization connect security and IT teams, respond faster and efficiently to threats, and view your organization's security posture. Security Incident Response was enhanced and updated in the Yokohama release.
Security Incident Response highlights for the Yokohama release
- Identify inefficiencies and optimize the resolution process of security incidents for faster closure by using Process MIning.
- Include the number of VITs indirectly associated with a CVE through TPEs.
- Help managers ensure there are no gaps in coverage and analysts are always available to address security incidents by configuring shifts for analysts.
- Define default child nodes to populate in the relationship graph, and add or remove child nodes at the parent node level.
- Import data to automatically create security incidents for email events that are not captured by Targeted Attack Protection (TAP) products.
See Security Incident Response for more information.
New in the Yokohama release
- Process Mining for security incidents
- Identify factors contributing to delays in processing Security Incident Response (SIR) incidents that take a long time to close or resolve by scanning historical SIR records through Process Mining. Time-consuming factors can include multiple reassignments, prolonged hold times, and periods of inactivity.
- Add indirectly linked VITs to CVEs
- Identify all the Third-Party Entities (TPEs) associated with a Common Vulnerabilities and Exposures (CVE) and then calculate and display the total number of vulnerable items (VITs) indirectly linked to those CVEs through the TPEs by setting the sn_ti.include_cve_vit_indirect_relation property.
- Configure on-call schedules
- As an admin:
- Create a shift and assign or remove members to/from the shift.
- Create/edit on-call schedules for groups.
- View any group’s on-call schedule, including those to which they belong.
As an analyst:
- Specify your availability and preferred contact methods.
- View your on-call schedule and see other members of your shift.
- Configure report templates in Security Incident Response
- As an admin, create report templates that can be used to generate an incident summary or an executive summary for analysis and sharing.
As an analyst, use the templates to generate analyst summary or executive summary reports for a SIR incident that can be shared over email.
- Security Incident Response conference call integration
- Initiate conference calls using communication channels such as Microsoft Teams, Cisco Webex, or Zoom with customers and peer agents to resolve security incidents over a call by using the SIR conference call feature.
- Enhancements to relationship graphs
-
As an admin:
- Define default child nodes to populate in the relationship graph.
- Configure relationship labels.
As an analyst:- Add or remove child nodes at the parent node level.
- Save the state of the relationship graph.
- Retrieve updated data.
- Proofpoint integration for Security Operations
- Proofpoint integration for Security Operations supports integration between SOAR (Security Orchestration, Automation, and Response) and Proofpoint Targeted Attack Protection (TAP) software. This integration provides the following benefits:
- Detect and block threats such as business email compromise and tags suspicious emails for tracking, analysis, and audit.
- Import data to automatically create security incidents for email events that are not captured by TAP products.
- Data Loss Prevention Incident Response Analyst Workspace
- Preview the evidence file of the incident from either the Data Loss Prevention analyst workspace or the DLP end user workspace.
UI changes
- Start a Sidebar chat in Security Incident Response
- The Discuss option has been renamed Start Chat and moved under the Collaborate option.
Changed in this release
- Security Operations
-
- Other additional Security Incident Response setup tasks
- View security incidents with read access and update security incidents with write access without any defined security role.
Activation information
Install Security Incident Response by requesting it from the ServiceNow Store. Visit the ServiceNow Store website to view all the available apps and for information about submitting requests to the store. For cumulative release notes information for all released apps, see the ServiceNow Store version history release notes.
- Security Operations common functionality
- The Security Support Common plugin is activated when any of the plugins for the main Security Operations applications (Security Incident Response, Vulnerability Response, Threat Intelligence, or Configuration Compliance) are activated.
Related ServiceNow applications and features
- Vulnerability Response
- Vulnerability Response is part of the Security Operations application suite. Together, these applications connect security to your IT department, increase the speed and efficiency of your response, and give you a definitive view of your security posture.
- Threat Intelligence
- The ServiceNow® Threat Intelligence application enables you to find indicators of compromise (IoC) and enrich security incidents with threat intelligence data.