Ready to help

Push runbooks for detection and response teams

This article provides a downloadable set of structured runbooks (step-by-step guidance) designed for detection and response teams to quickly and effectively manage security incidents surfaced by the Push platform.

These PDF runbooks cover in-browser threats, identity attacks, and SaaS risks, including:

How to use these runbooks

Each runbook follows a four-phase structure to guide your team from initial alert to final resolution:

  • Trigger: The event that initiates the runbook (typically a Push Security detection or a user report).

  • Investigation: The steps required to scope the breach, gather evidence, and identify persistence mechanisms.

  • Containment: Immediate actions to stop the attack and remove the threat.

  • Post-incident review: Steps for documentation, remediation confirmation, and procedural updates.