File size: 1,208 Bytes
a6ab323
1
{"title": "What are investigative actions?", "url": "https://support.expel.io/hc/en-us/articles/12925747081875-What-are-investigative-actions-", "date": "2023-01-10T21:54:27Z", "contents": "Investigative actions are steps an analyst and/or automation take to aid in\nthe investigation. Most commonly used investigative actions are steps that a\ngiven security technology supports. For example,\n\n  * acquiring a file can be accomplished by asking Workbench to retrieve it.\n\n  * Workbench navigates for the SOC analysts, indicating how to acquire the file from any number of EDRs.\n\nInvestigative actions can also describe manual steps. This is less common, but\nan investigative action can be created, for example, tasking you to upload a\nfile that Expel doesn’t have access to but needs to complete the\ninvestigation.\n\nInvestigative actions come in many forms, but can be grouped into 2\ncategories: _triage support_ and _communications_.\n\n  * Triage support consists of gathering additional data from customer devices, enriching data from external data sources, and fetching data sources from multiple locations.\n\n  * Communications involves sending out verify actions or notifications.\n\n"}