HomeCyber SecurityHow To Automate Ticket Creation, System Identification and Risk Triage With Tines

How To Automate Ticket Creation, System Identification and Risk Triage With Tines


Jul 09, 2025The Hacker InformationSafety Operations / Automation

How To Automate Ticket Creation, System Identification and Risk Triage With Tines

Run by the crew at workflow orchestration and AI platform Tines, the Tines library options over 1,000 pre-built workflows shared by safety practitioners from throughout the group – all free to import and deploy by means of the platform’s Neighborhood Version.

A current standout is a workflow that handles malware alerts with CrowdStrike, Oomnitza, GitHub, and PagerDuty. Developed by Lucas Cantor at Intercom, the creators of fin.ai, the workflow makes it simpler to find out the severity of a safety alert and escalate it seamlessly, relying on the machine proprietor’s response. “It is an effective way to cut back noise and add context to safety points which can be added on our endpoints as nicely,” Lucas explains.

On this information, we’ll share an outline of the workflow, plus step-by-step directions for getting it up and operating.

The issue – lack of integration between safety instruments

For safety groups, responding to malware threats, analyzing their severity, and figuring out the machine proprietor to allow them to be contacted to resolve the menace, can take up quite a lot of time.

From a workflow perspective, groups usually need to:

  • Manually reply to CrowdStrike occasions
  • Enrich the alert with extra metadata
  • Doc and alert the machine proprietor in Slack
  • Notify on name groups by way of PagerDuty

Going by means of this course of manually can lead to delays and improve the probabilities of human error.

The answer – automated ticket creation, machine identification, and menace triage

Lucas’s prebuilt workflow automates the method of taking the malware alert and creating the case – whereas crucially notifying the machine proprietor and the on-call crew. This workflow helps safety groups precisely establish the extent of menace quicker by:

  • Detecting new alerts from Crowdstrike
  • Figuring out and notifying the machine proprietor
  • Escalating important points

The result’s streamlined response to malware safety alerts that ensures they’re handled shortly, it doesn’t matter what the severity.

Key advantages of this workflow:

  • Diminished remediation time
  • System proprietor is stored knowledgeable
  • Clear remediation and escalation pathways
  • Centralized administration system

Workflow overview

Instruments used:

  • Tines – workflow orchestration and AI platform (free Neighborhood Version accessible)
  • Crowdstrike – menace intelligence and EDR platform
  • Oomnitza – IT asset administration platform
  • Github – developer platform
  • PagerDuty – incident administration platform
  • Slack – crew collaboration platform

The way it works

Half 1

  • Get a safety alert from CrowdStrike
  • Discover the machine that the alert was triggered and lookup its particulars
  • Create a ticket in GitHub for the alert and lift the difficulty in a Slack message
  • If the machine is owned by a consumer and it’s a low precedence,
    • Ship the proprietor a message requesting escalation
  • If the machine is owned by a consumer and it’s a excessive precedence,
    • Create a PagerDuty Occasion to inform the on-call analyst
    • Informing the proprietor of the continuing subject

Half 2

  • Get a consumer interplay with the Slack message
  • Enrich the GitHub subject with the customers response
  • If the proprietor escalates the difficulty
    • Create a PagerDuty Occasion to inform the on-call analyst

Configuring the workflow – step-by-step information

1. Log into Tines or create a brand new account.

2. Navigate to the pre-built workflow within the library. Choose import. This could take you straight to your new pre-built workflow.

3. Arrange your credentials

You may want 5 credentials added to your Tines tenant:

  • CrowdStrike
  • Oomnitza
  • Github
  • PagerDuty
  • Slack

Observe that related providers to those listed above will also be used, with some changes to the workflow.

From the credentials web page, choose New credential, scroll right down to the related credential and full the required fields. Observe the CrowdStrike, Oomnitza, Github, PagerDuty, and Slack credential guides at defined.tines.com should you need assistance.

4. Configure your actions.

  • Set your atmosphere variables. This contains your:
    • Slack IT channel alerting webhook (`slack_channel_webhook_urls_prod`)
    • CrowdStrike/GitHub severity precedence mapping (`crowdstrike_to_github_priority_map`)
  • Configure CrowdStrike to alert the New CrowdStrike Detection webhook when a detection is created
  • Configure your SlackBot interactivity URL to the Obtain Slack Button Push webhook

5. Check the workflow.

6. Publish and operationalize

As soon as examined, publish the workflow.

If you would like to check this workflow, you may join a free Tines account.

Discovered this text attention-grabbing? This text is a contributed piece from one in every of our valued companions. Observe us on Twitter and LinkedIn to learn extra unique content material we submit.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments