| Tag Source IP Address | Run this action to label the source IP address based on an event |
| Tag Destination IP Address | Run this action to label the destination IP address based on an event |
| Tag Source IP Address from Alarm | Run this action to label the source IP address from an alarm |
| Tag Destination IP Address from Alarm | Run this action to label the destination IP address from an alarm |
| Tag Source IP from Rule | Run this action to label the source IP address from a predefined rule |
| Tag Destination IP Address from Rule | Run this action to label the destination IP address from a predefined rule |
| Add a Threat Indicator from Event Using File Hash | Run this action to add a threat indicator from an event using a file hash |
| Add a Threat Indicator from Event Using Source IP Address | Run this action to add a threat indicator from an event using the source IP address |
| Add a Threat Indicator from Event Using URL | Run this action to add a threat indicator from an event using a URL |
| Add a Threat Indicator from Event Using Source Domain | Run this action to add a threat indicator from an event using the source domain |
| Add a Threat Indicator from Event Using Destination Domain | Run this action to add a threat indicator from an event using the destination domain |
| Add a Threat Indicator from Event Using Destination IP Address | Run this action to add a threat indicator from an event using the destination IP address |
| Add a Threat Indicator from Alarm Using Source IP | Run this action to add a threat indicator from an alarm using the source IP address |
| Add Threat Indicator from Alarm Using Destination IP | Run this action to add a threat indicator from an alarm using the destination IP address |
| Add Threat Indicator from Alarm Using File Hash | Run this action to add a threat indicator from an alarm using a file hash for enhanced security |
| Add Threat Indicator from Alarm Using URL | Run this action to add a threat indicator from an alarm using a URL |
| Add Threat Indicator from Alarm Using Source Domain | Run this action to add a threat indicator from an alarm using the source domain |
| Add Threat Indicator from Alarm Using Destination Domain | Run this action to add a threat indicator from an alarm using the destination domain |
| Add Threat Indicator from Rule Using URL | Run this action to add a threat indicator from a predefined rule using a URL |
| Add Threat Indicator from Rule Using Source Domain | Run this action to add a threat indicator from a predefined rule using the source domain |
| Add Threat Indicator from Rule Using Destination Domain | Run this action to add a threat indicator from a predefined rule using the destination domain |
| Add Threat Indicator from Rule Using File Hash | Run this action to add a threat indicator from a predefined rule using a file hash for improved security analysis |
| Add Threat Indicator from Rule Using Source IP | Run this action to add a threat indicator from a predefined rule based on the source IP address |
| Add Threat Indicator from Rule Using Destination IP | Run this action to add a threat indicator from a predefined rule based on the destination IP address |