Solutions and Applications
turbine solutions are end to end use cases that contain components, playbooks, and assets that are mostly preconfigured to reduce an practitioner’s time and level of effort when creating common security solutions solution terminology true 179,482left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type why use solutions? helps newer users to learn turbine accelerates user's self sufficiency demonstrates playbook best practices saves time configuring a playbook from scratch, decreases user errors, and identifies established playbook practices for use in future playbooks achieves common outcomes quickly on an ongoing basis where can i find solutions? solutions are located in turbine on the integrated marketplace, along with components and connectors applications in solutions see docid\ v7buep268studyyj23lei for details about building and managing turbine applications and applets you can use applications separately or with turbine solutions applications can assist with threat intelligence, case and incident management, alert, and phishing triage, and any other situation where interacting with records is required this section provides information for the processes, installation, and configuration on current turbine solutions and/or applications