Welcome to Torq, the cutting-edge platform revolutionizing cybersecurity through enterprise-grade, AI-driven hyperautomation. Torq seamlessly integrates your entire security infrastructure, enabling autonomous security operations that not only respond to security events instantly and accurately but also scale complex security processes efficiently. This article will guide you through the essentials of navigating Torq.
Workflows
Workflows are the core of Torq, designed to automate security tasks with triggers and a sequence of steps tailored to each automation use case. Torq enables automation at scale, freeing security professionals to concentrate on strategic initiatives.
Upon signing into Torq, the Workflows page displays all available workflows. Create a new workflow from our wide selection of templates or craft one from scratch by clicking Create Workflow.
Selecting a Trigger
Every workflow begins with a trigger that specifies the event initiating the execution.
Opt for the On Demand trigger for user-driven executions, a handy choice you can later modify. Other options include the Integrations trigger, which pulls data from third-party services, and the Schedule trigger for timed executions.
For more insights, refer to our detailed trigger guide.
Adding Steps
With the trigger established, you can begin adding stepsâthe building blocks for Torq workflows. The step finder on the left provides diverse options, from API-based steps and data manipulation utilities to scripting, CLIs, and case management automation.
Use the existing steps or create custom ones to automate any process.
Simply drag and drop steps from the step finder to build your workflow. For instance, if you want to automatically send a Slack message with IP enrichment results, add the VirusTotal Get IP Information and Slack Send Message steps.
Configuring Step Properties
When you select a step, its properties will appear on the right side, where you can rename the step and configure its input parameters.
To use data from previous steps or the trigger event, simply type $.
and utilize autocomplete to help construct the path to the data you need.
Discovering the Extensive Capabilities of Torq
Use Torq to automate processes across any domain, from threat intelligence and identity and access management to phishing prevention and beyond. Check out our templates library for inspiration and to easily import templates into your workspace.
Ready to take Torq for a spin? Start with your first workflow.