Resolved! Search in incidents only task with errors
Hello,
Is there a form to search in "Search in incidents" at "incidents" section for tasks with errors?
Thanks
Hello,
Is there a form to search in "Search in incidents" at "incidents" section for tasks with errors?
Thanks
When I try to put a filepath that has white spaces as an input in the command "cs-falcon-rtr-remove-file", I receive the following error:
CrowdStrike Falcon The command was failed with the errors: {'d5716ded5d214d61a23884dd9ef64078': 'Max args is 1
...
"!SearchIncidentsV2 name:" is not working as expected. Doesn't find any entry.
Example command introduced:
!SearchIncidentsV2 name:"Example of incident name"
Answer:
Incidents found
No entries
For a while now, our DEV XSOAR server has been holding cpu percentage at 65%. 0 jobs, 0 active workers, less than 10 enabled integrations, and 99 containers. Why is it so high? Any help to diagnose or reduce this percentage is appreciated!
Dears,
We are trying to do the following scenario and we want to check if it is doable or not:
1- We have a phishing playbook.
2- We are extracting all the attachments that are included inside an email file (.eml file).
3- the extraction of the
...
Which task can be used to check if XSOAR machine has connection to an URL that will be used for an API?
Hello,
I'd like to use the information I have in a already closed incident into a new one I'm developing just to test it.
When I click in the "Debugger Panel"->"Test data" and I search by the id of the closed incident it doesn't show up.
Is there a wa
I want to be able to use this module with my automation scripts:
msal: https://github.com/AzureAD/microsoft-authentication-library-for-python
import msal
by default fails as the module is not installed or available by default.
How would i manual
...
Does anyone have any thoughts on how you would monitor a chat/note that's added to an incident.
Ultimately, i need to create a trigger script for some automation to occur once that new chat/note is added.
Hi,
In one of our playbook there are 2 enrichment type of integrations deployed for ip enrichment (virustotal and abusedb) all works well as expected and they feed indicator itself but shows only verdict in indicator layout although these enrichmen
...
Hi!
I can't find much data on Subplaybook naming numbers - how are they being assign and when do they change?
I've run into the following issue: i had a standalone playbook with some subplaybooks inside. In the main playbook I've been referring to
...
Using a script How to get only the malicious and suspicious Indicators and which Threat intelligence feed that identified them as Malicious to be uploaded to ticketing System?
Hi all
I'm trying to get Command-Arguments in a self-made script in Powershell.
On Python it is:
demisto.args().get('<command-argument>')
What is it in Powershell? Because I tried it with:
$demisto.Args()["<command-argument>"]
But this didn't worked on
...
We created a Bash Automation that we would like to automate within XSOAR. I see powershell as an option as a language, but not bash. Am I only allowed to create automations with these 3 languages (python, js, powershell)?
Thanks for any help!
Hi,
I want to find a way of maximum automatization of the next process: IOC are extracted from CSV file to Cortex XSOAR and than only this indicators are uploaded to firewalls.
I found automations for each step separately but maybe exist any pl
...User | Likes Count |
---|---|
1 | |
1 | |
1 | |
1 |