<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to get the process id from crowdstrike (CS) integration in Cortex XSOAR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/how-to-get-the-process-id-from-crowdstrike-cs-integration/m-p/556328#M2603</link>
    <description>&lt;P&gt;hi,&lt;BR /&gt;I was not looking at transformation.&lt;BR /&gt;Q- "&lt;SPAN&gt;In my context I do have the malware process path and malware filename too, I need to find out the local process id in the host.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Please suggest what is best way to do it."&lt;BR /&gt;&lt;BR /&gt;Did some research and got some help from colleagues used powershell and runscript integrations to get the result; And used extend context to add it context data.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="ui-provider eo cwc cdj dac dae daf dag dah dai daj dak dal dam dan dao dap daq dar das dat dau dav daw dax day daz dba dbb dbc dbd dbe dbf dbg dbh dbi"&gt;!cs-falcon-run-script host_ids="1bbxxxxxxxxxxxxxxxx7f856e" raw="$t=Get-Process ${incident.malwarename} | Format-List Id,ProcessName;Write-Output $t|Out-String -Stream" timeout="30" queue_offline="false" extend-context=true&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 04 Sep 2023 05:31:49 GMT</pubDate>
    <dc:creator>sunipanda660</dc:creator>
    <dc:date>2023-09-04T05:31:49Z</dc:date>
    <item>
      <title>How to get the process id from crowdstrike (CS) integration</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/how-to-get-the-process-id-from-crowdstrike-cs-integration/m-p/555816#M2584</link>
      <description>&lt;OL&gt;
&lt;LI&gt;&lt;A href="https://xsoar.pan.dev/docs/reference/integrations/crowdstrike-falcon#30-cs-falcon-process-details" target="_blank"&gt;https://xsoar.pan.dev/docs/reference/integrations/crowdstrike-falcon#30-cs-falcon-process-details&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://xsoar.pan.dev/docs/reference/integrations/crowdstrike-falcon#51-cs-falcon-rtr-list-processes" target="_blank"&gt;https://xsoar.pan.dev/docs/reference/integrations/crowdstrike-falcon#51-cs-falcon-rtr-list-processes&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://xsoar.pan.dev/docs/reference/integrations/crowdstrike-falcon#7-cs-falcon-run-command" target="_blank"&gt;https://xsoar.pan.dev/docs/reference/integrations/crowdstrike-falcon#7-cs-falcon-run-command&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Hi Folks,&lt;BR /&gt;In my context I do have the malware process path and malware filename too, I need to find out the local process id in the host.&lt;BR /&gt;Please suggest what is best way to do it.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;case 1: When I try to use the cs-falcon-process-details it simply gives me the same input paramter in different fields, I was expecting to use the process_id_local, but it is the 2 part of the string split on ":". PFA result.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="case1" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53272i594D4F0ADF7869EC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-08-30 at 5.26.10 pm.png" alt="case1" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;case1&lt;/span&gt;&lt;/span&gt;&lt;BR /&gt;case 2: Try to remote fetch list of all running process but result is a big file and I can not process or use it in my playbook to filter&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="case2" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53274i65944FB1CCC31A28/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-08-30 at 5.37.55 pm.png" alt="case2" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;case2&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;case 3: Try to remote run the ps but the result is too big and I can not pass grep like sub commands to filter.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="case3" style="width: 815px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53273i9D3D69702051407A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-08-30 at 5.36.10 pm.png" alt="case3" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;case3&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 07:41:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/how-to-get-the-process-id-from-crowdstrike-cs-integration/m-p/555816#M2584</guid>
      <dc:creator>sunipanda660</dc:creator>
      <dc:date>2023-08-30T07:41:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to get the process id from crowdstrike (CS) integration</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/how-to-get-the-process-id-from-crowdstrike-cs-integration/m-p/556055#M2591</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use the Set automation, in the context key, name it with the key you want to save it as. For example, process_id. In the value, you can set the value where you’ve process ID in 2 parts. Use a split transformer and split it at : and call last array element transformer which will get and return the second element (which is last in this case). This will essentially transform and store the process ID in the process_id key.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;You can refer to&amp;nbsp;&lt;A href="https://youtu.be/795E42gz8M8?feature=shared" target="_blank"&gt;https://youtu.be/795E42gz8M8?feature=shared&lt;/A&gt; for video on using transformers.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2023 22:52:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/how-to-get-the-process-id-from-crowdstrike-cs-integration/m-p/556055#M2591</guid>
      <dc:creator>bhmurali</dc:creator>
      <dc:date>2023-08-31T22:52:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to get the process id from crowdstrike (CS) integration</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/how-to-get-the-process-id-from-crowdstrike-cs-integration/m-p/556328#M2603</link>
      <description>&lt;P&gt;hi,&lt;BR /&gt;I was not looking at transformation.&lt;BR /&gt;Q- "&lt;SPAN&gt;In my context I do have the malware process path and malware filename too, I need to find out the local process id in the host.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Please suggest what is best way to do it."&lt;BR /&gt;&lt;BR /&gt;Did some research and got some help from colleagues used powershell and runscript integrations to get the result; And used extend context to add it context data.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="ui-provider eo cwc cdj dac dae daf dag dah dai daj dak dal dam dan dao dap daq dar das dat dau dav daw dax day daz dba dbb dbc dbd dbe dbf dbg dbh dbi"&gt;!cs-falcon-run-script host_ids="1bbxxxxxxxxxxxxxxxx7f856e" raw="$t=Get-Process ${incident.malwarename} | Format-List Id,ProcessName;Write-Output $t|Out-String -Stream" timeout="30" queue_offline="false" extend-context=true&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Sep 2023 05:31:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/how-to-get-the-process-id-from-crowdstrike-cs-integration/m-p/556328#M2603</guid>
      <dc:creator>sunipanda660</dc:creator>
      <dc:date>2023-09-04T05:31:49Z</dc:date>
    </item>
  </channel>
</rss>

