Generic SOAR use cases rarely hold up in practice; the right automation depends entirely on your environment, alert volumes, and how your SOC is structured. The use cases below are tailored to specific scenarios and include step-by-step workflow breakdowns.
The workflows below reflect the traditional SOAR model; agentic platforms run many of these same cases without predefined steps.
1. Phishing detection and response
Problem: Analysts face bottlenecks in manually handling phishing alerts, largely due to the high volume of false positives and the repetitive nature of triage actions. AI-generated phishing attacks increased 703% between 2024 and 2025, making automated triage a necessity rather than a productivity improvement for most SOCs.1
How SOAR helps:
- Triage phase: SOAR receives phishing alerts and automatically sorts them based on severity, source, and risk level.
- Indicator extraction and validation: Key indicators (URLs, IP addresses, file hashes) are extracted from the phishing file.
- Malicious or not: If malicious activity is detected, the playbook triggers a response: blocking the sender, isolating endpoints, or deleting the malicious file. If no clear indicators are found, the system validates the alert further to rule out false positives.
- False-positive analysis: The malicious file runs in a sandbox to analyze how the malware behaves. The sender’s domain is checked for similarity to trusted domains.
Video: Real-life demonstration: phishing playbook demo
Source: Palo Alto Networks2
Real-world example: Zensar’s Cybersecurity Team uses SOAR for phishing triage and incident response, using codeless playbooks, 200+ integrations, and email threat intelligence. CrowdStrike’s Charlotte Agentic SOAR now handles phishing investigation in real time without pre-written playbooks, claiming 98% decision accuracy on investigated alerts. 3
SOAR tools rely on accurate endpoint data and actionable device control. Learn how endpoint management software strengthens automated security response.
2. Endpoint detection and response (EDR)
Problem: Although EDR tools help detect suspicious endpoint activity, they often generate a high volume of alerts, many of which may be false positives.
How SOAR helps:
Ingestion of endpoint data: SOAR pulls data from EDR tools (antivirus, EDR agents) to monitor real-time activity.
SIEM check: Checks whether files were previously identified in SIEM. Notification to analysts: If a potential threat is detected, SOAR alerts analysts with context and severity.
Automated response and endpoint cleaning: If confirmed as a false positive, SOAR cleans the endpoint and automatically removes suspicious files.
3. Detecting suspicious user login from IP address locations
Problem: Suspicious logins are hard to catch at scale because user behavior is variable, organizations have multiple cloud environments to track, and manual monitoring is slow.
How SOAR helps:
- Ingest behavioral anomaly: SOAR collects login data from SIEMs or authentication systems to identify unusual activity.
- Enrich user information: SOAR retrieves past login history, role, and permissions to assess whether the behavior is legitimate.
- Enrich IP intelligence: SOAR cross-references IP addresses against threat intelligence databases to identify known malicious sources.
- Determine threat status: Based on user behavior and IP data, SOAR decides whether the login is likely malicious.
Video: IP address investigation with SOAR
Source: Palo Alto Networks4
Automated response:
— No threat: SOAR closes the incident automatically.
— Detected threat: SOAR blocks the malicious IP address and locks the account.
4. Zero-day threat response
Problem: Zero-day attacks exploit previously unknown security flaws before a fix is available. Antivirus tools don’t detect them, so they bypass traditional defenses. This is also where static playbooks hit a hard limit; no pre-written rule can anticipate an unknown exploit.
How SOAR helps:
Collect IOCs and files: Pull file hashes, malicious URLs, and IP addresses from the alert.
Extract and check for indicators:
- Search endpoint logs for malicious hashes: Analyze EDR logs for evidence of identified hashes being executed or downloaded.
- Query firewall logs for compromised hosts: Look for traffic to or from known malicious IPs or suspicious lateral movement.
- Link to previous incidents: Cross-reference existing records to identify similar TTPs from past events.
- Block infected endpoints: Deploy blocking rules across firewalls, web gateways, and email filters.
- Close playbook: Send updated rules or IOCs back to the EDR platform.
Agentic AI addresses the zero-day gap directly. Rather than matching indicators against pre-written rules, it reasons through novel behavior, making it better suited for threat types that have never appeared in the environment before.5
5. Vulnerability management
Problem: Manual vulnerability testing is time-consuming, produces false positives, and often lacks visibility into unmanaged assets.
- Difficult data collection related to vulnerabilities
- False positives on vulnerabilities.
- Lack of network visibility (e.g., unmanaged assets)
How SOAR helps vulnerability management:
- Collection of vulnerability data: SOAR pulls vulnerability data from external tools and CVE databases.
- Enrich: SOAR adds details on affected endpoints, asset criticality, and affected business units.
- Add vulnerability context: SOAR adds exploitation history and known active threat context to the incident data.
- Calculate risks: SOAR combines CVE severity with system context to calculate the overall risk for each vulnerability.
Remediation:
— Analyst review for high-risk items
— Automated remediation for known, low-risk findings
6. Automating the provisioning of new accounts
Problem: Manual user provisioning is error-prone. Mistakes in access assignments lead to over-provisioning (violating least privilege) or under-provisioning (blocking the new hire from working).
How SOAR helps:
- Get ticket details: Retrieves the provisioning request from the ITSM platform.
- Create a user in the directory service: Connects to Active Directory or equivalent.
- Add user to required tools by role: Assigns access to email, HR platforms, and other role-specific tools. Send onboarding email: Sends login credentials and setup instructions.
- Deploy required software to the endpoint: Initiates software deployment via endpoint management tools.
- Notify stakeholders: Alerts HR, IT, and managers when onboarding is complete.
7. Incident lifecycle case management
Problem: Continuity breaks down across the incident lifecycle because security products are siloed, processes aren’t standardized, and handoffs between teams slow mean time to response.
How SOAR helps:
- Retrieve alerts from data sources: SOAR continuously pulls alerts from SIEMs, firewalls, and other sources.
- Trigger playbook: Upon receiving an alert, SOAR triggers the appropriate playbook for that incident type.
- Assign incidents to analysts: SOAR routes enriched incidents with attached context.
- Extract and check IOCs with threat intelligence: File hashes, IP addresses, and domains are checked automatically.
- Check for malicious activity: SOAR determines if the activity is malicious and takes action blocking the IP or isolating the file.
LLM integration update: One MSSP documented a 60% increase in automated resolution of low-severity incidents after integrating large language models into their SOAR workflows. Analysts queried the platform in natural language for threat summaries and adjusted playbooks in real time without coding.6
8. Automating firewall policy change requests
Problem: Managing firewall change requests manually is slow, inconsistent, and hard to audit. Teams handle large volumes of requests each week, overlapping rules, and limited visibility into approvals.
How SOAR helps automate firewall policy change requests:
SOAR streamlines the firewall change process by automating approvals, validations, and policy deployments through integrated playbooks.
- A firewall policy change request: Initiated from an ITSM platform, e.g., ServiceNow
- Trigger SOAR playbook
- Do endpoints’ roles and addresses exist?
- YES: Add IP address to the existing endpoint group
- ELSE: Call “new policy” playbook: SOAR runs a separate playbook to create a custom rule.
- Apply the configuration using the firewall management system
- Close the ITSM ticket.
9. SSL certificate expiration tracking
Problem: Expired certificates trigger browser security warnings, reduce visitor trust, and can lead to traffic loss. Manual certificate tracking across large environments is unreliable.
How SOAR helps:
- Check certificate status: SOAR monitors SSL certificates across all domains and flags those nearing expiration.
- Alert and escalate: SOAR notifies the responsible team with enough lead time to act.
- Automate renewal where possible: For platforms with API access, SOAR can trigger the renewal workflow directly.
- Log and close: SOAR records the action taken and closes the ticket.
10. Threat Intelligence Management
Problem: Threat intelligence data arrives from multiple feeds in different formats. Manual ingestion, deduplication, and cross-referencing with active incidents is time-consuming and inconsistent.
How SOAR helps:
- Ingest threat intelligence feeds: SOAR automatically pulls indicators (IPs, domains, file hashes, CVEs) from multiple sources.
- Deduplicate and normalize: SOAR strips duplicates and converts data into a consistent format.
- Correlate with active incidents: SOAR checks incoming intelligence against open cases and live alerts.
- Enrich incidents: Relevant indicators are automatically added to open tickets and analyst queues.
- Distribute to blocking tools: High-confidence IOCs are pushed to firewalls, EDRs, and email filters.
FAQ
Security orchestration, automation, and response (SOAR) technology helps coordinate, execute, and automate tasks between various people and tools.
Orchestration:
Playbooks, workflows
Logically organized plan of action
Controlling and activating the security product stack from a central location.
Security automation:
Automated scripts
Extensible product integrations
Machine execution of playbook tasks.
Response:
Case management
Analysis and reporting collaboration
Breaking down silos: SOAR increases team collaboration and enables security analysts to automate actions across tools throughout their security stack.
Centralization: Providing security teams with a centralized console for managing and coordinating all company security areas.
Improved SOC decision-making: SOAR dashboards can help security operations teams make better decisions by providing visibility into threats.
Handling more notifications in less time: SOARs can help manage alerts by centralizing security data, enhancing events, and automating replies. As a result, SOCs can handle more alerts.
SIEM: SIEM tools gather and aggregate data from internal security tools, centralizing logs and flagging anomalies.
SOAR: SOAR systems emerged to enhance SIEMs by adding orchestration, automation, and incident response capabilities that standard SIEMs often lack. They focus on automating repetitive tasks, improving incident management, and coordinating security tools.
XDR (extended detection and response): a newer, more powerful solution for end-to-end security event management. It is mainly used for addressing issues at internal endpoints. When preparing for an automatic response, XDR uses data captured by SIEM.
Large organizations often use all three tools, but vendors increasingly combine their features.
Some SIEMs now include response capabilities.
XDRs are incorporating SIEM-like data logging.
Vendors such as Microsoft Sentinel and ManageEngine Log360 offer SIEM and SOAR capabilities.
Be the first to comment
Your email address will not be published. All fields are required.