Customization is what makes Splunk SOAR powerful and flexible. It allows you to adjust the platform to fit your workflows, your data, and your team’s preferences — instead of forcing you to use a rigid system.
Three main types of customization:
Interface Customizations
Automation Customizations
Integration Points
These changes affect how users see and interact with SOAR through the user interface (UI).
You can add custom fields to:
Events
Artifacts
Cases
Example: If your SOC tracks asset location, you could add a field called “Region” or “Business Unit”.
These fields can be:
Text fields, dropdowns, checkboxes, or numbers.
Required or optional.
Used in searches, filters, reports, and dashboards.
You can change where and how fields appear on the screen.
Rearrange panels on event/case pages.
Group related fields together.
Hide or show fields depending on the case type or user role.
This helps analysts focus on what matters most to them.
Organizations often want the platform to reflect their identity.
You can change the logo, color scheme, and login page text.
This is especially useful for:
MSSPs (Managed Security Service Providers)
Companies using SOAR as part of a larger SOC suite
These let you extend or enhance automated behavior to better fit your playbooks, tools, and decision-making logic.
Sometimes the out-of-the-box actions provided by apps aren’t enough. In that case, you can write your own custom actions using Python.
These actions are added to apps or playbooks.
Can perform:
Advanced logic
API calls to internal tools
Data transformation
Example: A custom action that checks an internal vulnerability scanner before deciding to isolate a host.
Dynamic menus are used in user prompts (interactive blocks in playbooks).
Instead of a static list (e.g., "Yes / No"), the menu pulls data from inside SOAR or from an external system.
Example sources:
Asset list
Threat levels
Available user groups
This makes analyst input smarter and context-aware.
Tags help you classify and organize events automatically.
Example Tags: “phishing”, “malware”, “internal”, “VIP user”
Tags can be applied:
Manually by analysts
Automatically by playbooks or ingestion rules
Tags can trigger playbooks:
Think of tags as shortcuts to smart automation.
Custom integrations allow SOAR to talk to your internal tools, even if they’re not supported natively.
Splunk SOAR has a built-in REST API. But in some cases, you can:
Extend existing endpoints
Create new routes to expose your own data or workflows
This is useful for teams building custom dashboards or internal tools that need to push or pull data from SOAR.
You can create custom webhooks to allow external systems (like firewalls, ticketing tools, or SIEMs) to send data directly to SOAR.
Webhooks are simple and fast ways to enable event ingestion without needing a full app.
| Customization Area | What You Can Do |
|---|---|
| Custom Fields | Track extra data on cases, events, or artifacts |
| Custom Layouts | Reorganize how data appears in the UI |
| Branding | Apply company logos and colors |
| Custom Actions | Write Python code to add new logic or integrations |
| Dynamic Menus | Create intelligent, context-aware dropdowns in prompts |
| Event Tags | Use tags to classify and trigger automation |
| REST Extensions | Add custom APIs for internal system integration |
| Webhooks | Accept real-time data from external alerting systems |
Dynamic menus enhance user prompts by providing context-aware dropdowns based on live data. Unlike static lists, dynamic menus are populated at runtime.
Internal SOAR Objects:
Assets (e.g., list of configured VirusTotal or Splunk instances)
User Groups / Roles (e.g., show “SOC Tier 1”, “SOC Tier 2” options)
Labels or pre-existing artifacts within the container
External Systems:
Custom REST API calls (via playbooks or app actions)
Threat intel platforms
Configuration management databases (CMDBs)
This flexibility allows analysts to select from current and valid entries, reducing human error and enhancing automation precision.
“Which of the following is not a valid source for dynamic menu population in SOAR?”
Incorrect option trap: “Only hardcoded dropdown values are allowed”
Correct understanding:
Dynamic menus can pull from assets, user groups, API calls, or any queryable data source via playbook logic.
Custom fields allow SOAR to capture additional metadata for:
Cases
Events (containers)
Artifacts
Via Web UI:
Navigate to: Administration > Custom Fields
Define:
Field name and type (text, dropdown, checkbox, etc.)
Field scope (case, artifact, event)
Default values, validation rules, and required status
NOT required via code:
“Can custom fields only be created via code or API?”
Correct answer: No. They can be created and managed through the Admin UI.
“Are custom fields limited to cases?”
Correct answer: No. They can be used on containers, artifacts, or cases depending on configuration.
These two integration mechanisms serve different purposes. Many exam questions test your ability to distinguish between them in context.
| Feature | REST API | Webhook |
|---|---|---|
| Type | Active (poll or push) | Passive (waits for events) |
| Direction | Client sends requests to SOAR | External system sends data to SOAR |
| Use Case | Query case status, run playbooks, fetch artifacts | Receive alerts from firewalls, SIEMs, third-party systems |
| Auth | Token-based or session-based | May use shared secrets or IP allowlists |
| Common Use | Data sync, app integrations | Real-time alert ingestion |
REST API = SOAR asks or tells something
Webhook = SOAR listens for something
“Which mechanism is best suited for receiving immediate alerts from an external tool?”
Correct answer: Webhook
“Which integration type allows SOAR to pull asset configuration details on demand?”
Correct answer: REST API
| Topic | Key Insight |
|---|---|
| Dynamic Menu Sources | Can pull from SOAR assets, users, and external APIs |
| Custom Field Creation | Done via UI by Admins; no scripting required |
| REST vs. Webhook | REST = active interaction; Webhook = passive data reception |
Why would an organization customize severity levels in Splunk SOAR?
Organizations customize severity levels to align incident prioritization with internal risk classification policies.
Default severity levels may not reflect the organization’s operational priorities or risk model. By customizing severity definitions, teams can map alerts to categories that better represent business impact or response urgency. This ensures that the SOC prioritizes incidents consistently and that automated workflows respond appropriately to different threat levels.
Demand Score: 46
Exam Relevance Score: 62
What is the purpose of customizing CEF fields in Splunk SOAR?
Customizing CEF fields allows organizations to store additional structured data within containers and artifacts.
The Common Event Format (CEF) provides a standardized structure for event data. However, organizations may require additional fields to capture specific investigation details. Custom CEF fields extend the default schema so that custom data attributes can be ingested, processed by playbooks, and used during investigations. This capability allows the platform to adapt to organization-specific data requirements.
Demand Score: 42
Exam Relevance Score: 64
What advantage does adding global custom fields to containers provide?
Global custom fields allow consistent data attributes to be applied across all containers for standardized investigation data collection.
Global fields ensure that specific metadata is available for every container regardless of ingestion source. This allows analysts and playbooks to access consistent data elements such as investigation identifiers, risk classifications, or compliance tags. Standardizing these fields improves reporting, automation logic, and investigation tracking across the SOC.
Demand Score: 39
Exam Relevance Score: 60