Support My IBM Log in

Email

You can configure your Resilient platform to receive email from one or more email servers, such as a phishing threat service. You can then create a new incident based on an email message or associate an email message with an existing incident.

You can access the various components of an email, such as its attachments, headers, body of the message, and the To, From, and CC fields. For example, you can write a script to add header information as a note on the associated incident. You can add any attachments, whether inline in the email body or a separate file attachment, to the incident.

The following script is an example of associating an email with an existing incident, or creating a new incident if one does not exist.

# Attempt to look up an existing incident (name contains the string "ABC123") query_builder.contains(fields.incident.name, "ABC123") query = query_builder.build() incidents = helper.findIncidents(query) if len(incidents) > 0: # found it! associate the email message with that emailmessage.associateWithIncident(incidents[0]) else: # no match, so create a new incident (owned by the specified user) emailmessage.createAssociatedIncident("ABC123", "owner_user@company.com")
Overview Annual report Corporate social responsibility Financing Investor Newsroom Security, privacy & trust Senior leadership Careers with IBM Website Blog Publications Automotive Banking Consumer Goods Energy Government Healthcare Insurance Life Sciences Manufacturing Retail Telecommunications Travel Our strategic partners Find a partner Become a partner - Partner Plus Partner Plus log in IBM TechXChange Community LinkedIn X Instagram YouTube Subscription Center Participate in user experience research Podcasts Contact IBM Privacy Terms of use Accessibility United States — English