From alerts to action, fully automated

Native SOAR in Log360

Build visual playbooks; execute response workflows; and remediate threats across endpoints, networks, and identities, all inside the same Log360 platform. No separate product. No per-execution fee.

What's inside
  Deeper
integrations
     
  Native
orchestration
     
  Built-in
playbooks

Thanks for your interest in ManageEngine Log360

We have received your request for a personalized demo and will contact you shortly.

Request a personalized demo

See how Log360 SOAR can cut your MTTR.

  •  
  •  
  •  
  •  
  • By clicking 'Schedule my demo' you agree to processing of personal data according to the Privacy Policy.
$0 add-on cost; SOAR is
included in your license
10X parallel execution branches
per playbook run
500 playbooks per organization,
with sub-playbook nesting
1,000 state transitions per
single execution
How it works

Three layers that run together

SOAR in Log360 is built across orchestration, automation, and remediation, not bolted on as a separate module.

01 / Orchestrate

Connect your security stack

Log360 pulls in data from AD, network devices, endpoints, cloud sources, and security tools into a single context. Use playbooks to dynamically enrich alerts with deep context and orchestrate response across your entire ecosystem.

02 / Automate

Build playbooks—no-code or low-code

Powered by the Zoho Qntrl orchestration engine, the drag-and-drop visual builder lets you construct full response workflows using Branch, Parallel, Wait, Batch, and Sub-playbook states. Drop in custom Python functions when you need low-code extensibility. Import from the built-in library and deploy in minutes.

03 / Remediate

Act on endpoints directly

Playbook actions execute on endpoints via the ManageEngine agent: restart, shut down, disable USB, log off users, stop services, or run scripts. Every action is logged with full audit trail.

Engine Architecture
What's available

Feature status

Feature Status Details
Visual drag-and-drop builder Available Branch, Parallel, Wait, Batch, and Sub-playbook states, all shipping now
Prebuilt playbook library Available Over 60 predefined playbook templates and a content server delivery, growing with each release; import, customize, and deploy workflows
Python custom scripting Available Standard Python; Deluge also supported for Zoho ecosystem users
Custom functions Available Reusable Python and Deluge functions, shared across playbooks and centrally managed
MSSP multi-tenant support Available Tenant-isolated execution, client read-only portal, and admin and operator role separation
Playbook builder

Visual no-code builder—no SPL, no KQL

Log360’s builder is powered by the Zoho Qntrl orchestration engine, an enterprise-grade foundation that brings mature state management and visual design to SOC automation. Build workflows by dragging and connecting states on the canvas to set conditions.

  • Branch: conditional if/else logic based on alert attributes, enrichment results, or custom Python output
  • Parallel: Up to 10 simultaneous execution paths. Enrich 10 IoCs at once, or remediate 10 endpoints in a single playbook run.
  • Wait: Time-delayed states for up to 30 days. Useful for follow-up checks or staged response steps.
  • Batch: Iterate over a list of entities (IPs, users, or hosts) and apply the same action to each.
  • Sub-playbooks: Reusable response modules. Build once, call from any parent playbook.
  • Custom scripting: Python for any custom logic. Deluge is also available for Zoho ecosystem users.
Play book builder
Playbook library

Start from templates, not from scratch

Log360 ships a curated library built for the security use cases SOCs actually run. Skip the blank canvas, import a playbook, adapt it to your environment, and deploy in minutes.

 

Built-in library

Access a library of more than 60 ManageEngine-curated playbooks delivered via our content server, offering prebuilt workflows that stay updated as the threat landscape evolves.

 

Extension marketplace

Log360 automatically maps and resolves all extension and sub-playbook dependencies during import, ensuring required functions are updated and ready.

 

Import and customize

Import a playbook from the library, adapt it to your environment, and promote it to production. Use the dedicated test execution mode to validate your workflows before going live.

 

MSSP multi-tenancy

Build playbooks once and run them across client tenants. Clients get read-only portal visibility into execution results. MSSPs retain full create and edit control.

 

Role-based access

Delegate playbook execution to analysts while restricting administrative controls and builder access to authorized admins. Ensure full accountability through granular audit logs and permission-based visibility into all automated response histories.

 

Execution history

Log360 provides three months of execution retention per organization, offering a comprehensive step-by-step trace of all inputs, outputs, and timestamps that can be easily filtered by playbook, alert, or date range.

Live webinar

A Deep Dive into Log360 SOAR Playbooks

Join our product team for a 45-minute working session on building, testing, and scaling playbooks across real SOC use cases. Includes a live Q&A.

Competitor comparison
Splunk SOAR

Relies on integrations with endpoint tools (e.g., EDR platforms) to execute actions. Endpoint response depends on external tools and their licensing.

Microsoft Sentinel

Advanced endpoint remediation is powered through Microsoft Defender for Endpoint. Full response capabilities typically depend on Defender licensing.

Log360

The existing ManageEngine agent supports both IT operations and security remediation. No additional agents or endpoint tools required.

Native endpoint remediation

Act on endpoints—no extra agent

Log360 executes endpoint actions through the existing ManageEngine agent, enabling direct remediation without additional software or separate security tools.

Endpoint
  • Restart or shut down machines.
  • Log off user sessions.
  • Disable USB ports.
  • Display pop-up alerts on device.
Script execution
  • Run PowerShell, Bash, and Shell scripts.
  • Execute EXE, CMD, and batch files.
  • Target any managed machine.
Service management
  • Start or stop Windows or Linux services.
  • Kill processes on compromised hosts.
  • Test connectivity via ping.
Network & firewall
  • Traceroute to identify path.
  • Add inbound and outbound rules for Cisco ASA.
  • Block IPs directly from a playbook step.
Why this matters

Reduce tool sprawl, avoid extra licensing layers, and respond faster using what's already deployed.

From signal to response

The full chain, automated in one platform

Use case 01 · Identity
Okta identity compromise response
Critical MITRE ATT&CK®: T1078
 
Data enrichment Stage 1
  • Pull user group, role, and privileged app access.
  • Check newly enrolled MFA factors in the last 24 hours.
  • Run IP reputation and risk scoring.
  • Fetch login history (like new device, new ASN, or new geolocation).
  • Correlate prior critical alerts on the user and the IP
 
Investigation and decision Stage 2
  • Score the signals: New device + new geolocation + new MFA factor.
  • Branch based on user privilege level and app exposure.
 
ResponseStage 3
  • Force password reset for the compromised user.
  • Remove newly enrolled MFA factors.
  • Block the malicious IP and ASN.
  • Notify the user and SOC of actions taken.
Use case 02 · EDR & admin abuse
CrowdStrike Falcon: unauthorized admin role assignment response
Critical MITRE ATT&CK®: T1078
 
Data enrichment Stage 1
  • Pull logon-failure history for active and target users (last 24h)
  • Fetch critical alerts tied to either user account
  • Verify account creation timestamps for both users
  • Check source IP reputation via VirusTotal Calculate risk score from threat intel feeds
 
Investigation and decision Stage 2
  • Branch if IP is malicious or risk score is high
  • Branch if either user has 5+ logon failures in 24h
  • Branch if alerts are present on either account
  • Branch if either account was recently created
  • Halt and notify if conditions are not met
 
ResponseStage 3
  • Trigger Block IP sub-playbook on malicious source
  • Force password reset on both active and target users
  • Revoke all roles assigned to both users
  • Run full system scan and quarantine threats
  • Isolate host and notify users with next steps
MITRE coverage

ATT&CK and D3FEND, both mapped

Every playbook in the library is tagged to MITRE ATT&CK tactics and D3FEND countermeasures, giving SOC teams full attack-to-defense traceability inside the same workflow.

Attack-to-defense traceability

ATT&CK tells you what the adversary did. D3FEND maps what your defensive action does about it. When both are on the same playbook, you can answer audit questions precisely:

  • Which playbooks respond to T1548 - Abuse Elevation Control Mechanism?
  • What defensive technique covers it?

That dual mapping turns every automated response into a verifiable, framework-aligned control, useful for incident reviews, audit prep, and SOC maturity reporting.

Example: Privilege escalation playbook
T1548Abuse Elevation Control Mechanism
 
Detected by process integrity monitoring
D3-EREndpoint Remediation
 
Playbook revokes administrative permissions
D3-OTProcess eviction
 
Unauthorized high-integrity processes killed
Contained Automated
 
Remediation logged, security team alerted
Resource library

How would you like to explore SOAR?

01

Read the datasheet

View a high-level overview of features, and learn the business value of native SOAR in Log360.

 
02

Watch the video

Check out the SOAR launch video for the complete feature list.

 
03

What is SOAR?

Read a brief on SOAR, where it fits in a SOC, and how it changes day-to-day analyst workflows.

 
04

Join the launch webinar

Attend our webinar, Mastering automation: A deep dive into Log360 SOAR playbooks, a live working session and Q&A with our product team.

 
01

Playbook library

Browse ready-to-import playbooks covering malware containment, credential compromise, IOC enrichment, and more.

 
02

How-to use cases

View step-by-step guides showing how to implement a specific use case from end to end, from trigger configuration to remediation.

 
01

Sign up for a free, 30-day trial

Spin up a Log360 Cloud trial tenant in minutes. Get full SOAR access, no credit card required.

 
02

Check out our help guide

View the full admin and playbook guide, including the Zoho Qntrl orchestration layer, custom functions, role configuration, and more.

 
03

Contact support

Get hands-on help from our SOAR specialists for setup, custom playbooks, integrations, and migration questions.

 

Watch and learn

Quick takes and highlights. From the official Log360 SOAR launch to expert insights from our product team.

Video Thumbnail  
Understanding playbooks
3 : 15
 
Video Thumbnail  
How to create a Playbook
2 : 58
 
Video Thumbnail  
CrowdStrike Integration
5 : 56
 
Video Thumbnail  
Bitdefender Integration
3 : 29
 
FAQ

Common questions

What is the difference between SOAR and SIEM?

SIEM collects, correlates, and alerts on log data from across your environment. SOAR takes that alert and executes a defined response (enrichment, containment, notification, or ticketing) automatically. Log360 does both in the same platform, so the alert context flows directly into the playbook without any handoff.

What scripting languages are supported for custom functions in Log360?

Python is the primary scripting language for custom playbook functions. Deluge (Zoho's scripting language) is also supported for teams already in the Zoho ecosystem. For any cross-platform or team, we recommend leading with Python.

What is the playbook limit in Log360?

The limit is 500 playbooks per organization. Most mid-market SOCs operate with 20 to 50 active playbooks, so this provides substantial headroom.

How long is playbook execution history retained?

Three months. This covers operational review and incident retrospectives for most use cases. For compliance audit requirements, note that the SIEM log data (not the SOAR execution log) is the authoritative audit record. SIEM retention follows your configured policy.

Is SOAR included in the existing Log360 license?

Yes, for Log360 Cloud. SOAR is included in the Enterprise plan at no additional cost. There is no per-playbook or per-execution fee.

SIEM + UEBA + SOAR, one license

Log360 Cloud gives you threat detection, behavioral analytics, and automated response in a single platform. No add-ons, no per-execution billing.

Start free trial