The Getting Started with XSOAR content pack accelerates the onboarding process by providing sample incident data, automations, and workflows.
What Does This Pack Contain?
- Sample Indicators of Compromise
 - Example Malware and Phishing incidents from a SEIM
 - Case workflows
 - SLA Timers
 - Optional Enrichment and Ticketing Integrations
 - Investigation Timelines
 - Built-in XSOAR Quick Actions and toolkits
 
Getting Started / How to Set up the Pack
For better user experience and easier onboarding, use the Deployment Wizard (Cortex XSOAR 6.13) or Deployment Wizard (Cortex XSOAR 8 Cloud) or Deployment Wizard (Cortex XSOAR 8.7 On-prem) after installing the content pack on the Marketplace page in Cortex XSOAR (Available from version 6.8).
For manual configuration, it is recommended to configure your integration instance to use:
- Primary Playbook: Case Management - Generic v2
 - Primary Incident Type: Case
 

For more information, visit our Cortex XSOAR Developer Docs.
Dependencies & Recommendations
Supported Integrations (Required):
- Sample Incident Generator
 
Supported Sandboxes and Enrichment (Optional):
- Palo Alto WildFire
 - CrowdStrike FalconX
 - Virus Total
 - Autofocus
 
Supported Case Management (Optional):
- ServiceNow
 - Atlassian Jira
 
Supported Messaging and Email applications (Optional):
- Mail Listener
 - Mail Sender
 - Microsoft Graph Mail
 - Gmail
 
Supported Threat Feeds (Optional):
- Abuse.ch SSL Blacklist Feed
 - Office 365 Feed
 - Tor Exit Addresses Feed
 
Supported Network Security integrations (Optional):
- PAN-OS by Palo Alto Networks
 































