Security orchestration for RCCE engineers

ZelSOAR Command Center

ZelSOAR unifies incidents, evidence, assets, vulnerabilities, playbooks, response control, integrations, and analytics into one decisive operational cockpit. Exclusively licensed to RCCE engineers.

24/7
Operational visibility
360°
Case context
SLA
Remediation focus
RCCE
Exclusive license
Features

Everything a high-tempo security team needs in one command layer.

ZelSOAR is designed for coordinated detection, investigation, evidence control, automation, remediation, and executive reporting across modern security operations.

Command Center

A single executive and analyst cockpit for operational readiness, active cases, high-risk exposure, and response posture.

  • Live severity and priority tiles
  • Action queues and operational signals
  • Threat, vulnerability, and case summaries
  • Decision-ready security overview
Incident Operations

Move from alert intake to case resolution with queue management, assignments, timelines, recovery, and lessons learned.

  • Incident queue and alert review
  • Case workspace with owners and status
  • Timeline, containment, and recovery tracking
  • Post-incident learning capture
Response Control

Coordinate sensitive response actions with clear approval gates, tasks, ownership, audit trails, and operational guardrails.

  • Containment tasking and approvals
  • Analyst and responder handoff
  • Decision marking and pinning
  • Controlled execution of response steps
Playbooks

Transform repeatable operations into structured playbooks for phishing, ransomware, data exposure, vulnerability response, and more.

  • Guided triage and escalation
  • Automated enrichment steps
  • Approval-aware action sequences
  • Recovery and closure templates
Integrations

Connect security telemetry, asset context, identity signals, ticketing, communication, and enrichment sources into one workflow.

  • Connector catalog and integration status
  • Alert, asset, and evidence ingestion
  • Context enrichment and correlation
  • Case-linked operational actions
Evidence & Intel

Collect, hash, label, preserve, and review evidence with notes, validity status, ownership, and chain-of-custody context.

  • File, log, screenshot, and hash capture
  • Threat intelligence and IOC tracking
  • Attachment and analyst-note workflow
  • Evidence validity and review status
Assets & Exposure

Map security events to assets, identities, cloud resources, services, and business functions so analysts understand real impact.

  • Asset inventory and ownership
  • Identity and access context
  • Service and dependency mapping
  • Exposure views for prioritization
Vulnerability Operations

Prioritize CVEs by severity, exploitability, affected assets, patch state, SLA breach, and remediation status.

  • Critical, high, medium, and low severity views
  • Exploit, patch, and breached-SLA filters
  • Affected asset and owner tracking
  • Remediation and patched status labels
Analytics & Reporting

Turn security operations into measurable insights for leadership, compliance, engineering, and response teams.

  • Operational metrics and trend views
  • Risk, impact, and avoided-loss summaries
  • SLA and remediation reporting
  • Case closure and lessons learned reports
ZelC Terminal

Give responders a dedicated command surface for ZelSOAR-centered operations, structured checks, guided response, and analyst workflow.

  • Security operation command workflows
  • Case-aware response execution
  • Fast lookups and investigation support
  • Controlled analyst productivity layer
Roles & Settings

Centralize operational configuration, user roles, permissions, workflow defaults, notification preferences, and platform administration.

  • Role-aware access control
  • Admin settings and preferences
  • Notification and escalation tuning
  • Operational governance controls
Collaboration

Keep every investigation aligned with analyst notes, pinned decisions, attachments, tasks, owners, status updates, and approvals.

  • Analyst notes and decision marking
  • Task completion and approval status
  • Evidence attachment workflow
  • Cross-team investigation continuity

Expanded evidence type coverage

ZelSOAR evidence handling is designed for real investigations, where a case may include technical artifacts, business impact, approvals, user activity, and compliance notes.

File / Log Screenshot Memory Capture Packet Capture Endpoint Telemetry SIEM Event Firewall Log WAF Alert IDS / IPS Event DNS Record Email Header Phishing Sample URL Artifact Domain Artifact IP Artifact User Activity Asset Snapshot Process Tree Registry Change Service Change Persistence Finding Malware Sample YARA Rule Sigma Rule Vulnerability Scan Patch Record Change Request Approval Record Chain of Custody Business Impact Compliance Note Incident Timeline Command Output Cloud Audit Event Container Event Certificate Detail IOC Bundle
Response workflow
01
Intake

Collect alerts, case details, asset context, and evidence artifacts in one workspace.

02
Triage

Prioritize by severity, exploitability, asset exposure, business impact, and SLA urgency.

03
Respond

Run playbooks, coordinate tasks, request approvals, and track containment decisions.

04
Recover

Manage remediation, validation, recovery steps, ownership, and operational closure.

05
Report

Summarize outcomes, lessons learned, risk avoided, SLA performance, and evidence quality.

Live Case Demo

Ransomware attack — sample evidence & timeline.

A real-world ZelSOAR incident case showing evidence chain, timeline events, and response tasks for an active ransomware intrusion.

Incident Timeline
Day 0 — 02:14
Initial phishing email delivered to [email protected] containing macro-enabled .xlsm attachment
Alert
Day 0 — 02:31
User opened attachment; macro executed PowerShell stager — endpoint telemetry captured
Execution
Day 0 — 02:38
C2 beacon to 185.220.101.47:443 established — Cobalt Strike HTTPS listener identified
C2
Day 0 — 03:05
Lateral movement via SMB — compromised credentials used to access FILE-SERVER-01
Lateral
Day 0 — 04:17
ransomware.exe deployed via PSEXEC — encryption of \\FILE-SERVER-01\shares began
Ransom
Day 0 — 04:22
ZelSOAR alert triggered: mass file rename activity detected (*.ryuk extension) — case created
Detected
Day 0 — 04:35
Analyst assigned — containment playbook activated. Network isolation of FILE-SERVER-01 approved
Contain
Day 0 — 05:10
Compromised user account disabled. AD credential sweep initiated for lateral movement scope
Response
Day 1 — 08:00
Forensic imaging of affected endpoints complete. Evidence chain locked in ZelSOAR with SHA-256 hashes
Evidence
Day 3 — 14:30
Restore from backup completed. All affected systems re-imaged and re-joined to domain
Recover
Day 5 — 10:00
Lessons learned session. Executive report generated. IOC bundle exported from ZelSOAR
Closed
Evidence Chain
Phishing Sample IOC
Q3_Finance_Report_Final.xlsm
SHA-256: a3f8c2d1e9b4…7f2a
Macro-enabled Excel file. Contains VBA stager downloading beacon from pastebin. Analyst: confirmed malicious.
Endpoint Telemetry Log
WKST-FIN-014 — Sysmon Event Log
SHA-256: b7d4a1c3f0e2…9c8b
Process creation: powershell.exe -enc [base64]. Parent: EXCEL.EXE. Network connection to 185.220.101.47.
Packet Capture Network
c2-traffic-wkst014.pcap
SHA-256: e1b5d8c2a4f7…3d6e
Beacon traffic captured on WKST-FIN-014. Cobalt Strike HTTPS jitter profile confirmed. C2: 185.220.101.47:443.
Malware Sample Binary
ransomware.exe
SHA-256: 4c9e2f1b8d3a…6f1c
Ryuk variant. Dropped via PSEXEC from compromised admin account. Targets network shares and shadow copies.
Memory Capture Forensic
WKST-FIN-014-memdump.raw
SHA-256: 9f2d7c4b1a8e…2b7d
Full memory dump collected prior to isolation. Beacon injected into spoolsv.exe confirmed via YARA scan.
Firewall Log Network
fw-export-incident-2024-03-15.log
SHA-256: 2a8f4d6c9b1e…5a3f
Egress traffic to C2 IP. 47 connections in 3 hours. Block rule applied after containment approval at 04:35.
Chain of Custody Approved
Evidence custody log — INC-2024-0315
Analyst: J. Reyes — Approved: SOC Lead
All 6 evidence items collected, hashed, and locked. Validity: Confirmed. Ready for legal review.
Analytics

Security metrics, live and in motion.

Every incident, vulnerability, evidence item, and response action feeds your analytics story. ZelSOAR turns raw operations into measurable outcomes.

Incident Type Breakdown Last 90 days · 247 cases
Monthly Incident Volume 12-month rolling
Mean Time to Respond ↓ improving Hours · 6 months
SLA Compliance Rate Current quarter
Attack Time Distribution — Hour × Day of Week Aggregated 6 months · darker = higher frequency
Open Vulnerabilities by Asset Group Severity breakdown · active findings
Security Posture Radar ZelSOAR module scores
0
Evidence items / case
0
Avg containment time (h)
0%
Playbook automation rate
0
CVEs patched this month
Screenshots

Dark, sharp, operator-focused screens.

Screenshots from ZelSOAR showing the command center, case management, evidence workflows, vulnerabilities, playbooks, analytics, and response operations.

ZelSOAR product screenshots from core security operations workflows.

Gallery
Launch

Enter the ZelSOAR operations console.

ZelSOAR launch access is available for eligible RCCE engineers. Open the production console, review active work, investigate cases, manage evidence, coordinate response, and drive security operations forward.

Launch at zelsoar.rocheston.com
ZelFIRE Suite

ZelSOAR in the ZelFIRE product family.

ZelFIRE is a comprehensive suite of 15 cybersecurity products. ZelSOAR is the orchestration and response hub that ties them together.

FAQ

Detailed answers for users, engineers, and search indexing.

This FAQ describes ZelSOAR capabilities, licensing, workflows, evidence handling, vulnerability operations, automation, and launch access in clear language.

What is ZelSOAR?

ZelSOAR is a security orchestration, automation, response, evidence, and vulnerability operations platform. It gives analysts and security leaders a single workspace for incidents, alerts, cases, timelines, response tasks, evidence, threat intelligence, assets, vulnerabilities, business impact, recovery, lessons learned, analytics, and reporting.

Who is ZelSOAR licensed for?

ZelSOAR is exclusively licensed to RCCE engineers. The product, access model, onboarding, and operational use are intended for eligible RCCE engineers under the applicable licensing terms.

What are the primary menus in ZelSOAR?

The primary ZelSOAR menus are Home, Command Center, Incidents, Response Control, ZelC Terminal, Playbooks, Integrations, Assets & Exposure, Evidence & Intel, Analytics, and Settings. The public landing page includes Home, Features, FAQ, Screenshots, and Launch.

What does the Command Center do?

The ZelSOAR Command Center provides a high-level operational view of security work. It is designed to show incident activity, priority signals, vulnerability exposure, case status, automation readiness, and response posture so teams can act quickly with full context.

How does ZelSOAR manage incidents?

ZelSOAR manages incidents through intake queues, alert review, case creation, case ownership, status tracking, timelines, analyst notes, evidence attachments, tasks, approvals, containment decisions, recovery steps, lessons learned, and final reporting. The incident workflow helps teams keep investigations organized from the first alert to final closure.

What is Response Control?

Response Control is the area for coordinating containment, remediation, approval, and recovery actions. It helps teams manage sensitive response steps with assigned owners, task progress, approval status, documentation, and a clear operational record.

What is the ZelC Terminal in ZelSOAR?

The ZelC Terminal is a dedicated command surface for security operations inside the ZelSOAR experience. It is intended to support fast investigation workflows, case-aware command activity, structured checks, analyst productivity, and guided response actions.

Does ZelSOAR support playbooks?

Yes. ZelSOAR supports playbooks for structured and repeatable security response. Playbooks can guide triage, enrichment, approvals, containment, recovery, notification, evidence collection, and documentation. They help security teams standardize work without losing analyst judgment.

What integrations does ZelSOAR support?

ZelSOAR is designed to work with security telemetry, alerting sources, endpoint context, network context, identity signals, ticketing workflows, communication channels, enrichment sources, threat intelligence, asset systems, and reporting workflows. Integrations help bring data and response actions into a unified operational case.

What is Assets & Exposure?

Assets & Exposure is the ZelSOAR area for understanding what is affected, who owns it, which services depend on it, how identities relate to it, and how vulnerable or exposed it may be. This module helps analysts connect technical alerts to business impact and response priority.

Does ZelSOAR include vulnerability management?

Yes. ZelSOAR includes vulnerability operations for CVE tracking, severity classification, exploit status, patch status, affected asset mapping, SLA days, status labels, remediation ownership, filtering, prioritization, and executive visibility. Vulnerabilities can be reviewed by severity, affected asset, exploitability, patch state, and remediation status.

How does ZelSOAR prioritize vulnerabilities?

ZelSOAR helps prioritize vulnerabilities by combining severity, exploit status, patch availability, affected assets, SLA status, business exposure, and remediation progress. This lets teams focus on issues that are critical, actively exploitable, overdue, or tied to important assets and services.

What evidence types can be added to a case?

ZelSOAR can handle a broad range of evidence types including files, logs, screenshots, memory captures, packet captures, endpoint telemetry, SIEM events, firewall logs, WAF alerts, IDS and IPS events, DNS records, email headers, phishing samples, URL artifacts, domain artifacts, IP artifacts, user activity, asset snapshots, process trees, registry changes, service changes, persistence findings, malware samples, rules, vulnerability scans, patch records, change requests, approval records, chain-of-custody notes, business impact records, compliance notes, incident timelines, command output, cloud audit events, container events, certificate details, and IOC bundles.

How does ZelSOAR preserve evidence quality?

ZelSOAR evidence workflows are designed to capture evidence name, evidence type, hash value, notes, collection context, validity status, owner, timestamps, and chain-of-custody details. This helps analysts preserve integrity, show provenance, and keep evidence review-ready.

Can ZelSOAR track SHA-256 hashes?

Yes. ZelSOAR evidence records can include SHA-256 hash values for files and other artifacts. Hash tracking helps verify integrity, correlate artifacts, support malware review, and preserve a reliable investigation record.

Does ZelSOAR support analyst notes?

Yes. Analyst notes are part of the case workflow. Notes can document observations, decisions, containment status, owner updates, approvals, evidence context, business impact, and next steps. Notes help preserve continuity across shifts and teams.

Does ZelSOAR support task management?

Yes. ZelSOAR supports tasks with status such as complete, in progress, pending, and pending approval. Tasks can be used for investigation steps, response actions, evidence collection, business notifications, approvals, recovery, and closure requirements.

How does ZelSOAR represent business impact?

ZelSOAR can capture business impact details such as affected department, operational degradation, impacted users, data sensitivity, customer impact, downtime avoided, risk avoided, and compliance concerns. This helps technical security work translate into business-level decision support.

Can ZelSOAR show similar cases?

ZelSOAR can present similar case context so analysts can compare current incidents against previous patterns, outcomes, containment times, playbook selections, recovery decisions, and lessons learned. Similar-case context helps speed up triage and improves response consistency.

Does ZelSOAR support compliance workflows?

Yes. ZelSOAR can support compliance workflows by preserving evidence, approvals, timelines, risk statements, affected data notes, remediation records, audit-ready summaries, and business impact details. The platform helps teams document what happened, what was done, who approved it, and how the issue was resolved.

Does ZelSOAR replace existing security tools?

ZelSOAR is designed to orchestrate security operations across people, processes, signals, evidence, assets, vulnerabilities, and response actions. It can complement existing monitoring, endpoint, network, identity, ticketing, and reporting systems by providing an integrated operations layer.

How does ZelSOAR help with SLA management?

ZelSOAR can track SLA days, breached SLA status, overdue patching, remediation state, and affected assets. SLA visibility helps teams identify which vulnerabilities or cases require immediate attention and which actions are still pending.

What reporting capabilities are included?

ZelSOAR reporting and analytics can summarize incident trends, remediation progress, SLA status, risk avoided, evidence quality, response timing, vulnerability severity, exploit exposure, team workload, lessons learned, and operational performance. Reports are intended to support analysts, managers, engineering teams, and executives.

What makes ZelSOAR useful for security operations centers?

ZelSOAR is useful for security operations because it combines alert triage, incident response, evidence management, vulnerability operations, response control, playbooks, integrations, and analytics. Teams can reduce context switching, standardize response, preserve evidence, and keep investigations connected to business impact.

Can ZelSOAR be used for ransomware response?

Yes. ZelSOAR can support ransomware response with playbooks, affected asset mapping, evidence collection, containment tasks, analyst notes, approvals, recovery steps, user impact details, business impact tracking, lessons learned, and final reporting.

Can ZelSOAR be used for phishing investigations?

Yes. ZelSOAR can support phishing investigations by tracking email headers, sender domains, URLs, attachments, screenshots, user reports, affected identities, enrichment results, analyst notes, tasks, containment actions, and closure decisions.

Can ZelSOAR be used for vulnerability response?

Yes. ZelSOAR can support vulnerability response through CVE review, exploit status, patch status, affected asset mapping, owner assignment, SLA tracking, remediation status, approval records, patch validation, and reporting.

How does ZelSOAR help with handoffs?

ZelSOAR helps with handoffs by keeping cases, notes, tasks, evidence, owners, approvals, timelines, and response decisions in one place. A responder joining the case can quickly understand what happened, what was collected, what was approved, and what remains to be done.

How do users access ZelSOAR?

Eligible users can launch ZelSOAR at the official launch destination: https://zelsoar.rocheston.com. Access is intended for RCCE engineers according to the product licensing model.