Sneak Peak:
Dear community,
Based on part 1 of this series we are going to up-level to more sophisticated automation to block compromised SAP users. The basic playbook discussed before served the purpose of getting started quickly. On the downside it compromised on scalability.
Today’s post is about completing that workflow with secure credential handling and dynamic parameter setting with watchlists.
Navigate to the full post here.