{"id":9882,"date":"2017-01-20T23:45:00","date_gmt":"2017-01-21T06:45:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/automate-threatgrid-investigation-response\/"},"modified":"2025-01-10T08:37:07","modified_gmt":"2025-01-10T15:37:07","slug":"automatiser-la-reponse-aux-enquetes-threatgrid","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/","title":{"rendered":"Automatisez les investigations et les r\u00e9ponses ThreatGrid gr\u00e2ce aux int\u00e9grations Swimlane pr\u00eates \u00e0 l&#039;emploi."},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Diagramme d&#039;automatisation du flux de travail de phishing avec branches de d\u00e9cision pour les URL malveillantes ou s\u00fbres.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2017-01-20T23:45:00-07:00\">20 janvier 2017<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Automatisez les investigations et les r\u00e9ponses ThreatGrid gr\u00e2ce aux int\u00e9grations Swimlane pr\u00eates \u00e0 l&#039;emploi.<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/fr\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"avatar de l&#039;utilisateur\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">2 <\/span> Lecture en une minute\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"E-mail\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Automate%20ThreatGrid%20investigation%20and%20response%20with%20out-of-the-box%20Swimlane%20integrations').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fautomate-threatgrid-investigation-response%2F', '_blank')\" title=\"E-mail\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Gazouillement\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Automate%20ThreatGrid%20investigation%20and%20response%20with%20out-of-the-box%20Swimlane%20integrations&url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fautomate-threatgrid-investigation-response%2F\" title=\"Gazouillement\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fautomate-threatgrid-investigation-response%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"LinkedIn\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fautomate-threatgrid-investigation-response%2F\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>Les int\u00e9grations pr\u00eates \u00e0 l&#039;emploi de Swimlane automatisent les processus de d\u00e9fense contre les logiciels malveillants Cisco AMP ThreatGrid<\/h2>\n<p>Une t\u00e2che r\u00e9p\u00e9titive courante dans un centre d&#039;op\u00e9rations de s\u00e9curit\u00e9 (SOC) consiste \u00e0 soumettre les fichiers suspects \u00e0 une technologie de sandboxing de logiciels malveillants. Ces technologies ex\u00e9cutent ensuite le fichier binaire dans un environnement s\u00e9curis\u00e9 et fournissent un rapport d\u00e9taill\u00e9 sur le fonctionnement de ce logiciel malveillant. Les analystes examinent ensuite les r\u00e9sultats et prennent diverses mesures\u00a0: collecte d&#039;informations suppl\u00e9mentaires aupr\u00e8s de sources de renseignements sur les menaces, mise \u00e0 jour des r\u00e8gles de s\u00e9curit\u00e9, application de proc\u00e9dures de rem\u00e9diation telles que l&#039;isolation d&#039;un h\u00f4te, etc. Malheureusement, mis \u00e0 part l&#039;ex\u00e9cution du sandbox lui-m\u00eame, ces processus sont manuels et tr\u00e8s chronophages.<\/p>\n<p><a href=\"https:\/\/swimlane.com\/assets\/uploads\/images\/wp\/2017\/01\/threatgrid-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1254 size-full\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/wp\/2017\/01\/threatgrid-1.png\" alt=\"Capture d&#039;\u00e9cran 1 de ThreatGrid\" width=\"777\" height=\"103\"><\/a><\/p>\n<p>L&#039;int\u00e9gration pr\u00eate \u00e0 l&#039;emploi de Swimlane avec <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/threat-grid\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco ThreatGrid<\/a> Ce module permet d&#039;automatiser une grande partie du processus d&#039;investigation et de r\u00e9ponse aux logiciels malveillants. Il peut soumettre des fichiers binaires suspects \u00e0 l&#039;environnement de test (sandbox) de ThreatGrid, r\u00e9cup\u00e9rer le rapport g\u00e9n\u00e9r\u00e9 et ex\u00e9cuter automatiquement une r\u00e9ponse appropri\u00e9e.<\/p>\n<p>Gr\u00e2ce aux fonctionnalit\u00e9s de workflow automatis\u00e9es int\u00e9gr\u00e9es \u00e0 Swimlane, diff\u00e9rentes actions correctives peuvent \u00eatre mises en \u0153uvre en fonction des r\u00e9sultats du rapport de test de ThreatGrid. Un exemple est pr\u00e9sent\u00e9 dans le workflow ci-dessous.<\/p>\n<p>Un cas d&#039;utilisation courant des int\u00e9grations Swimlane avec une technologie de sandbox comme ThreatGrid consiste \u00e0 analyser les pi\u00e8ces jointes suspectes des courriels. Souvent, une \u00e9quipe de s\u00e9curit\u00e9 met en place un programme permettant aux utilisateurs de soumettre les courriels suspects au SOC pour analyse. L&#039;analyse manuelle de ces courriels peut s&#039;av\u00e9rer tr\u00e8s chronophage\u00a0: extraction des en-t\u00eates, r\u00e9cup\u00e9ration des URL dans le corps du message, r\u00e9cup\u00e9ration des pi\u00e8ces jointes, soumission \u00e0 des technologies de sandbox et interrogation des sources de renseignements sur les menaces pour identifier les indicateurs.<\/p>\n<p>Et cela sert uniquement \u00e0 d\u00e9terminer si l&#039;e-mail est une v\u00e9ritable tentative d&#039;hame\u00e7onnage. Les actions \u00e0 entreprendre constituent un ensemble de t\u00e2ches manuelles distinctes, g\u00e9n\u00e9ralement effectu\u00e9es par un analyste de s\u00e9curit\u00e9. Mais elles peuvent d\u00e9sormais \u00eatre automatis\u00e9es intelligemment gr\u00e2ce au flux de travail bas\u00e9 sur les donn\u00e9es de Swimlane, combin\u00e9 \u00e0 l&#039;ensemble des int\u00e9grations disponibles dans Swimlane.<\/p>\n<p>Si vous souhaitez en savoir plus, regardez une <strong>d\u00e9mo en direct<\/strong> de nos int\u00e9grations avec les produits de s\u00e9curit\u00e9 Cisco dans un webinaire \u00e0 la demande \u201c<a href=\"https:\/\/swimlane.com\/fr\/stop-phishing-attacks-webinar-recording\/\"><strong>Bloquez les attaques de phishing gr\u00e2ce \u00e0 une r\u00e9ponse automatis\u00e9e aux incidents.<\/strong><\/a>\u201d\u00a0Pr\u00e9sent\u00e9 par Cisco AMP ThreatGrid et Swimlane.\u00a0\u00bb.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">\u00c9tiquettes<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/fr\/tag\/integrations\/'><span class='tag-content'>Int\u00e9grations<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Articles similaires<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69d083b5772ec bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/swimlane-updates-4-0\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>13 f\u00e9vrier 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Quelles sont les nouveaut\u00e9s chez Swimlane\u00a0? D\u00e9couvrez-les au RSA 2019\u00a0!<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69d083b578675 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/how-to-get-more-out-of-existing-cyber-security-tools\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>19 ao\u00fbt 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Comment tirer le meilleur parti des outils de cybers\u00e9curit\u00e9 existants au lieu de les remplacer ?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69d083b579b22 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/soar-automated-phishing-investigation-and-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>26 septembre 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Ne tombez pas dans le pi\u00e8ge\u00a0: Enqu\u00eate et r\u00e9ponse automatis\u00e9es en cas d\u2019hame\u00e7onnage<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">Vous souhaitez en savoir plus ?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Abonnez-vous d\u00e8s aujourd&#039;hui pour rester inform\u00e9 et recevoir r\u00e9guli\u00e8rement des mises \u00e0 jour de Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Contexte moderne de la s\u00e9curit\u00e9 op\u00e9rationnelle\u00a0: un graphique g\u00e9om\u00e9trique en d\u00e9grad\u00e9 repr\u00e9sentant un flux de donn\u00e9es fluide et l\u2019agilit\u00e9 native du cloud.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Les int\u00e9grations pr\u00eates \u00e0 l&#039;emploi de Swimlane automatisent les processus de d\u00e9fense contre les logiciels malveillants Cisco AMP ThreatGrid<\/p>","protected":false},"author":5,"featured_media":9883,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[83],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[74],"class_list":["post-9882","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-integrations","resource-type-blogs","blog-category-integrations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Automate ThreatGrid investigation and response with out-of-the-box\u2026<\/title>\n<meta name=\"description\" content=\"Swimlane\u2019s out-of-the-box integration with Cisco AMP ThreatGrid allows you to automate a large part of the malware investigation and response process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/blog\/automatiser-la-reponse-aux-enquetes-threatgrid\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automate ThreatGrid investigation and response with out-of-the-box Swimlane integrations\" \/>\n<meta property=\"og:description\" content=\"Swimlane\u2019s out-of-the-box integration with Cisco AMP ThreatGrid allows you to automate a large part of the malware investigation and response process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/blog\/automatiser-la-reponse-aux-enquetes-threatgrid\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T15:37:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/\",\"url\":\"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/\",\"name\":\"Automate ThreatGrid investigation and response with out-of-the-box\u2026\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration.png\",\"datePublished\":\"2017-01-21T06:45:00+00:00\",\"dateModified\":\"2025-01-10T15:37:07+00:00\",\"description\":\"Swimlane\u2019s out-of-the-box integration with Cisco AMP ThreatGrid allows you to automate a large part of the malware investigation and response process.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration.png\",\"width\":1120,\"height\":696,\"caption\":\"Phishing workflow automation diagram with decision branches for malicious or safe URLs.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Automate ThreatGrid investigation and response with out-of-the-box Swimlane integrations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/fr\/#website\",\"url\":\"https:\/\/swimlane.com\/fr\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/fr\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Automatisez l&#039;investigation et la r\u00e9ponse aux menaces ThreatGrid gr\u00e2ce \u00e0 des solutions pr\u00eates \u00e0 l&#039;emploi\u2026","description":"L&#039;int\u00e9gration pr\u00eate \u00e0 l&#039;emploi de Swimlane avec Cisco AMP ThreatGrid vous permet d&#039;automatiser une grande partie du processus d&#039;investigation et de r\u00e9ponse aux logiciels malveillants.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/blog\/automatiser-la-reponse-aux-enquetes-threatgrid\/","og_locale":"fr_FR","og_type":"article","og_title":"Automate ThreatGrid investigation and response with out-of-the-box Swimlane integrations","og_description":"Swimlane\u2019s out-of-the-box integration with Cisco AMP ThreatGrid allows you to automate a large part of the malware investigation and response process.","og_url":"https:\/\/swimlane.com\/fr\/blog\/automatiser-la-reponse-aux-enquetes-threatgrid\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T15:37:07+00:00","og_image":[{"width":1120,"height":696,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/","url":"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/","name":"Automatisez l&#039;investigation et la r\u00e9ponse aux menaces ThreatGrid gr\u00e2ce \u00e0 des solutions pr\u00eates \u00e0 l&#039;emploi\u2026","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration.png","datePublished":"2017-01-21T06:45:00+00:00","dateModified":"2025-01-10T15:37:07+00:00","description":"L&#039;int\u00e9gration pr\u00eate \u00e0 l&#039;emploi de Swimlane avec Cisco AMP ThreatGrid vous permet d&#039;automatiser une grande partie du processus d&#039;investigation et de r\u00e9ponse aux logiciels malveillants.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/01.20.17-threadgrid-and-swimlane-integration.png","width":1120,"height":696,"caption":"Phishing workflow automation diagram with decision branches for malicious or safe URLs."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/blog\/automate-threatgrid-investigation-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Automate ThreatGrid investigation and response with out-of-the-box Swimlane integrations"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9882\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/9883"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=9882"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=9882"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=9882"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=9882"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=9882"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=9882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}