Remove tag playbooks
article thumbnail

Automated Deployment of CDP Private Cloud Clusters

Cloudera

This blog will walk through how to deploy a Private Cloud Base cluster, with security, with a minimum of human interaction. Running the playbook. The overriding principle is that you should never need to amend the playbooks or the collections – everything that you wish to customise should be customisable through the definition.

Cloud 81
article thumbnail

Block COVID-19 Phishing Emails at Machine Speed

Palo Alto Networks

This is where Cortex XSOAR automated playbooks can help. Automated phishing playbooks are among the most popular use cases for Cortex XSOAR. Employees submitting suspicious emails to infosec teams will trigger a COVID-specific playbook that will extract all the relevant indicators like URLs, domains and links.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Manage a Remote SOC: Playbooks for Monitoring Remote User Activity

Palo Alto Networks

Cortex XSOAR uses playbooks – also known as runbooks – to automate security workflows. In this installment of our Manage a Remote SOC series , we want to share some soon-to-be-released Cortex XSOAR playbooks leveraging our Prisma Access integration to help you monitor traffic and maintain connectivity uptime for all of your remote users.

article thumbnail

Seven Marketing Trends That Guarantee Business Success

Strategy Driven

The conventional marketing playbook is getting a revamp in 2023, but is your business ready to pivot and secure its spot in this dynamic market landscape? Blogging: The Evergreen Marketing Tool Even with new marketing techniques, blogging remains a formidable tool in digital marketing.

Trends 37
article thumbnail

Palo Alto Networks Secures Black Hat from Itself

Palo Alto Networks

XSOAR playbooks are used to automatically provide context and enrichment to any incidents that occur, then progress the incidents to investigation and closure. Based on this threat intel, the Black Hat staff is able to leverage a Cortex XSOAR slack integration to instantly block bad actors through address tagging on the firewall.

Network 52
article thumbnail

Learn by Doing with Hands-On DevOps Training Courses

Linux Academy

Ansible: Playbooks Deep Dive. Course Description: Learn what a play and playbook are in Ansible. Many key features of Ansible Playbooks are highlighted as you work through the course and a few new modules are introduced along the way. Tag images and push them to Docker Hub. Difficulty Level: Intermediate.

Course 60
article thumbnail

Deployment of Spring Boot App on Amazon EKS Using GitHub, Jenkins, Maven, Docker, and Ansible

Perficient

Hope this detailed blog is helpful to understand the CI/CD process. Now search for AdministratorAccess policy and click Skip on create tag. This is a common use case scenario that is used by several organizations. Go to AWS console, IAM, click on Roles. create a role Select AWS services, Click EC2, Click on Next permissions.

AWS 52