0
14.0.1
Australia, Zurich, Yokohama, Xanadu
Standalone Application
With ServiceNow Security Incident Response, you can manage and automate the life cycle of your security incidents from initial prioritization to containment and resolution. Use the automated workflows to respond quickly and consistently and understand the trends and bottlenecks with analytics-driven dashboards and comprehensive reporting systems.
Integrations with third-party security solutions give you an enterprise-wide view of your security posture. Add orchestration for much faster incident response.
New:
- Ingest security incidents using email parsers, external monitoring, tracking systems, or the service catalog. Consolidate multiple events into a single incident for an efficient response.
- Use the tile-based Security Analyst workspace to quickly and efficiently perform day-to-day security analysis work.
- Employ security automation with third-party cybersecurity solutions to accelerate triage, investigation, containment, eradication, and remediation steps during incident response.
- Use the Security Analyst Playbooks to analyze specific threats step-by-step to orchestrate security automation. Playbooks lead you through a series of tasks and other activities for resolving the threat.
- The User-Reported Phishing feature allows you to create incidents from employees' forwarded phishing emails.
- Perform a post-incident review. Creating knowledge base articles can help with future similar incidents.
- Post-incident review reports provide the setup capability to create multiple report templates and configure those to align with the security incidents.
- Walk through the Security Incident Response setup process using the Setup Assistant in a simple, step-by-step procedure.
- Managed Security Service Providers offer domain-separated implementations of all existing and future integrations, such as Threat lookup, Observable enrichment, and Sighting search based on the user.
- New
- Added UI action 'Link as Children' to add similar Security incidents as child to parent security incident
- Added capability to support Unmatched Affected User for missing sys_user records
- Capability to allow external users(of SITs) to access security incident
- Changed
- Restricted removal of manually added security tags
- Added support for Groups in Post Incident Review – Assessment Setup User Assignment Rules
- Fixed:
- Unable to view PIR report with sn_si.analyst role
- "Submit to Sandbox - ESCM Activity" subflow cannot be opened or triggered
- Valid URL observable is being incorrectly classified as "Unknown"
- 'Create Knowledge Article' Checkbox not working correctly when closing security incident in security incident workspace
- When "Enforce Restriction" is enabled then the playbook section is not getting auto refreshed after completion of a step/activity
- Unable to see the definition field value from workspace on list unless we double click
The following Security Operations apps must be installed and activated:
- Security Integration Framework
- Security Support Common
- Security Support Orchestration
- Threat Core
Permissions and roles:
- Role required: System Admin (admin) or Security Admin (sn_si.admin)