Playbooks
The first step in designating steps to run in response to a threat is to add a playbook. A playbook ties a threat or "trigger type" to the steps to take in response to that threat. A threat response can be assigned to a playbook on the Threat Detection Page. After a playbook is created, add steps that specify the action for the threat response.
Execute playbooks in a test environment and review the results before executing them in the production environment.
When testing or first configuring playbooks in Threat Manager, trigger playbooks manually instead of automatically. After the playbooks have been manually tested and you have familiarity with Threat Manager threats and threat responses, enable automatic triggering of playbooks.
Add a Playbook
To add a playbook:

Step 1 – In the Threat Response box, click New Playbook. A new playbook called "My Playbook 1" is created. As additional Playbooks are added, sequential numbers are appended to My Playbook.
Change the name of the playbook immediately after creation for organizational purposes.
Step 2 – Select the newly-created playbook from the Playbooks tab and click the Edit button. Rename My Playbook and optionally enter a description for the playbook in the Description field.
Step 3 – Configure the Playbook using the configuration tabs.
Step 4 – Click the Save button.
The new playbook is named and ready for steps to be added. See the Actions Tab topic for additional information.
Configure a Playbook
Playbooks are configured using the tabs on the Threat Response page:

The Threat Response page contains the following configuration tabs:
- General Tab
- Actions Tab
- Follow-Up Tab
- Logs Tab
General Tab
The General Tab contains the Allowed Threats box for configuring which threats are applicable for the selected playbook.

The General tab has the following configuration options:
- Allowed for all threat response – Configures which threats are applicable for this playbook. (All threats are allowed by default). If a threat is excluded from Allowed Threats, it won't be available to run ad hoc on the Threat Details page nor available for automated threat response.
- Send Email on Execution of Playbook – An email notification is sent after the playbook runs.
- Search Threats – Select the threats that are allowed to be used as a threat response for this playbook from the dropdown.
Actions Tab
Once a playbook is created or imported, add steps to the playbook using the Actions tab. Steps are actions that are taken in response to a threat. See the Preconfigured Actions topic for additional information.
To add steps to a playbook:

Step 1 – Select the playbook from the Playbooks list in the Threat Response box or on the Playbooks overview.
Step 2 – Click the Actions tab and then click Add Step to open a box to add a step to the playbook.
Step 3 – Enter the following information in the box:
- Display Name – The name for the step
- Action Type – The type of action to take for the threat response. Select the action from the dropdown. Additional configuration information is required depending upon the type of action selected. See the Action Configuration for Playbook Steps topic for additional information.
- Continue on Error – Select this checkbox to execute the next step if the current step fails
Step 4 – Click Add to add the step to the playbook.
The step is added to the playbook.
Follow-Up Tab
Follow-Up Playbooks can be configured on the Follow-Up tab. Follow-Up playbooks let additional playbooks run after the playbook completes. This lets a Threat Manager administrator sequence a series of playbooks together as part of a threat response.

The Follow-Up tab has the following configuration options:
- Send Email on Follow-up – Send an email notification when a follow-up playbook runs
- On Fail – If the current playbook fails, run the selected playbook from the dropdown
- On Success – If the current playbook runs successfully, run the selected playbook from the dropdown
Click Save to save the configured settings.
Logs Tab
Click the Logs tab to access the Playbook Execution History table. The table lists all playbook executions and lets you search the table.

The table provides the following information:
- Threat – The threat type that triggered the playbook
- Click the threat link to open the Threat Details Page and view information about the threat.
- Threat Detected – The time that the threat was detected
- Time Started – The time that the playbook was executed
- Time Finished – The time that the playbook completed execution
- Status – The status of the playbook execution:
- Queued
- Running
- Complete
- Completed with Errors
- Canceled
- Failed
- View Log – View the log file for the playbook execution. Clicking View Log opens the Action Log window.
Action Log Window
The Action Log window contains a Logs tab and a Step Details tab.
Logs Tab
The Logs tab displays logs for the playbook execution.

The Logs tab displays a table with the following columns:
- Time – The timestamp for the log
- Level – Type of log message displayed, which indicates the severity of the log message
- Message – Informational text displayed for the log
Step Details Tab
The Step Details tab displays information about the action steps in the playbook execution.

The Step Details tab contains a table with the following columns:
- Action Step – The name of the action step in the playbook
- Status – The status of the action step
- Message – Any informational or output messages from the action step
- Executed On – The host where the playbook ran the action step