Try in Splunk SOAR

Description

Accepts user, to be disabled using Microsoft AD LDAP connector. This playbook produces a normalized observables output for each user and device.

  • Type: Investigation
  • Product: Splunk SOAR
  • Apps: AD LDAP
  • Last Updated: 2023-05-08
  • Author: Teoderick Contreras, Splunk
  • ID: e6f96caf-610c-4ced-aa2c-ba9b19b89e1f
  • Use-cases:
    • Phishing
    • Endpoint

Associated Detections

How To Implement

This input playbook requires the Microsoft AD LDAP connector to be configured. It is designed to work in conjunction with the Dynamic Attribute Lookup playbook or other playbooks in the same style.

D3FEND

ID Technique Definition Category
D3-AL Account Locking The process of temporarily disabling user accounts on a system or domain. Credential Eviction

Explore Playbook

explore

Required field

Reference

source | version: 1