Create, Update, and Retrieve a Case in TheHive

This workflow enables the automatic creation, updating, and querying of security cases on TheHive platform. Users can trigger it with a single click, quickly generate cases, and flexibly adjust their severity levels while receiving real-time updates on the latest case information. By reducing manual operations, it significantly enhances the automation and response efficiency of case management, making it suitable for security operation centers and incident response teams. It helps optimize the security incident handling process, ensuring timely tracking and resolution of security incidents.

Tags

TheHiveSecurity Automation

Workflow Name

Create, Update, and Retrieve a Case in TheHive

Key Features and Highlights

This workflow automates the entire process of creating, updating, and retrieving cases within TheHive security incident response platform. With a single trigger, it enables rapid case generation, flexible adjustment of case severity levels, and real-time access to the latest case information, significantly enhancing automation and efficiency in case management and incident response.

Core Problems Addressed

Traditional security incident handling often relies on manual operations, which are cumbersome and prone to errors. This workflow reduces human intervention by automating case creation and updates, accelerating response times, and ensuring timely tracking and handling of security incidents.

Application Scenarios

Ideal for Security Operations Centers (SOC), incident response teams, and any organizations managing security incidents via TheHive platform. It helps automate case handling processes and improves the efficiency of security incident response and management.

Main Process Steps

  1. Trigger execution (manual trigger node)
  2. Create a new case in TheHive, including title, description, tags, and initial severity level
  3. Update case information by adjusting the severity level as needed
  4. Retrieve and return the latest case details

Systems or Services Involved

  • TheHive: A security incident response platform used for case creation, updating, and querying.

Target Users and Value

  • Security operations teams aiming to improve case handling efficiency through automation
  • Incident responders needing to quickly create and manage security incident cases
  • IT operations and security analysts seeking process standardization and reduction of human errors
  • Enterprise security managers looking to enhance overall incident response capabilities via automated workflows

By integrating core functionalities of TheHive, this workflow enables end-to-end automation of security case management, serving as a powerful tool to improve the quality and efficiency of security incident response.

Recommend Templates

Qualys Slack Shortcut Bot — Automated Workflow for Security Vulnerability Scanning and Report Generation

This workflow automates security vulnerability scanning and report generation through Slack integration. Users can initiate a scan with one click, select a report template, and customize the output format to quickly generate detailed reports. The system intelligently routes different interaction events and provides real-time feedback on operation results, simplifying the traditionally cumbersome processes. It is suitable for enterprise security teams, IT operations, and DevOps, enhancing work efficiency, enabling rapid responses to security risks, and promoting intelligent and efficient security management.

Vulnerability ScanAutomated Report

VPS Resource Usage Monitoring and Alerting

This workflow focuses on resource monitoring and alerting for VPS servers, capable of automatically checking CPU, memory, and disk usage every 15 minutes. Once any resource usage exceeds the preset threshold of 80%, the system immediately notifies the operations personnel via email, ensuring a timely response to prevent performance degradation or service interruption. This automated monitoring not only saves manual inspection time but also significantly enhances system stability and operational efficiency, making it suitable for various IT infrastructure management scenarios.

Server MonitoringAuto Alert

Send an SMS When a Workflow Fails

This workflow is designed to monitor the execution status of other workflows in real-time. Once a failure is detected, it immediately sends an SMS notification to relevant personnel via the Twilio service, ensuring that the issue is quickly recognized and addressed. The automated SMS alert mechanism significantly enhances event response speed, helping the operations and maintenance team to promptly identify system anomalies, thereby ensuring business continuity and user experience. This workflow serves as an effective tool for operations automation and anomaly management, suitable for various teams that require stable operation and rapid response.

Workflow MonitoringSMS Alert

Query List of Sign-in IPs

This workflow automatically retrieves authentication event data from the past 24 hours, including successful logins and OAuth authorizations. It filters and deduplicates IP information, generating a login report in CSV format. The report is automatically sent to users via the SMTP2Go email service, enhancing data accuracy and delivery efficiency. It addresses the issues of manual queries and information dispersion, making it suitable for IT security teams, SaaS platform administrators, and compliance management departments, significantly saving time and labor costs.

Login IPAuto Email

Error Trigger and Webhook Data Extraction Workflow

This workflow is designed to capture runtime errors and automatically extract relevant execution data and Webhook request payload information. By using custom code to accurately filter Webhook nodes and their data, users can conduct in-depth analysis of the error context and quickly pinpoint the root cause of issues. This workflow significantly enhances troubleshooting efficiency and is suitable for anomaly monitoring in automation projects, debugging interface call issues, and error log management for operations teams, helping enterprises achieve system stability and business continuity.

Error TriggerWebhook Data

Automated PDF Download and Password Protection Process

This workflow automates the downloading and password protection of PDF files, utilizing ConvertAPI for encryption processing. The encrypted files are simultaneously saved to both local disk and Google Drive. The entire process requires no manual intervention and supports flexible password settings, ensuring file security and convenient access. It is suitable for sending confidential documents within enterprises, managing sensitive documents in the legal and financial industries, and protecting important materials in remote work environments, significantly enhancing the efficiency and security of file management.

PDF EncryptionAutomation

n8n Execution History Auto-Cleanup Workflow

This workflow is designed to periodically scan and automatically delete old execution records that have been running for more than 10 days, thereby maintaining a clean and efficient system and preventing redundant data from occupying storage resources. By regularly cleaning up expired execution records, users can effectively manage historical data, ensuring system performance and response speed. Additionally, it supports manual triggering for testing and debugging purposes, simplifying data cleanup operations for maintenance personnel and enhancing the operational efficiency of the automation platform.

n8n Auto CleanupExecution History Management

Batch Message Sending with External Approval Waiting Workflow

This workflow focuses on batch processing customer data, sending personalized messages one by one through rate limiting, while generating approval links for external personnel to confirm. It combines batch processing, timed waiting, and external event triggering mechanisms to ensure that message sending is orderly and the process is controllable. It is suitable for scenarios requiring personalized marketing and online approval, effectively avoiding request overload and enhancing automation efficiency and customer experience. It is designed for use by automation operators, sales teams, and customer service departments.

Bulk SendExternal Approval