Upload Malicious and Suspicious Indicators to Ticketing System
Using a script How to get only the malicious and suspicious Indicators and which Threat intelligence feed that identified them as Malicious to be uploaded to ticketing System?
Using a script How to get only the malicious and suspicious Indicators and which Threat intelligence feed that identified them as Malicious to be uploaded to ticketing System?
Hi all
I'm trying to get Command-Arguments in a self-made script in Powershell.
On Python it is:
demisto.args().get('<command-argument>')
What is it in Powershell? Because I tried it with:
$demisto.Args()["<command-argument>"]
But this didn't worked on
...
We created a Bash Automation that we would like to automate within XSOAR. I see powershell as an option as a language, but not bash. Am I only allowed to create automations with these 3 languages (python, js, powershell)?
Thanks for any help!
Hi,
I want to find a way of maximum automatization of the next process: IOC are extracted from CSV file to Cortex XSOAR and than only this indicators are uploaded to firewalls.
I found automations for each step separately but maybe exist any pl
...
Hello,
Having installed XSOAR v6.8 in RH7.6, also configured Docker too.
Proxy and internal DNS is required in our environment.
Configured the Proxy on both WebUI and Docker as well.
We could login to GUI, but we cannot reach the marketplace.
Found
...
Hi there, I hope to find some help here.
We are facing issues to make the CrowdStrike Falcon mirroring options work. @
We are following the instruction provided in the documentation https://xsoar.pan.dev/docs/reference/integrations/crowdstrike-falcon
H
...
Hi,
How are the credentials for the integrations handled within the product? I.e., are passwords and keys stored in the cloud?
And how are these managed securely?
Thanks,
Hello,
A list of URLs splitted by "," is used in automation. The automation should create a new incident for each value, however it shouldn't be created in a sequential way. All incidents should be created at the same time (don't need to finish the f
...
Hi,
I am trying to read the mailbox that we created on Exchange. Other than IMAP is there any other option we have in XSOAR to read mails?
Background:
In our XSOAR platform setup, the XSOAR server is cloud hosted by Palo Alto and the XSOAR engines are deployed at 2 different data centers (on-prem). Each of these datacenters will have a single Cortex XSOAR engine server installed, which
Hello,
When an incident comes to XSOAR the classifier set the incident type.
I would like to know if the incident is updated with new alerts (for ex. in Cortex XDR), will the incident type in XSOAR be updated if needed or is the type set and never ch
...
1. What RHEL installer type (minimal or full fledge GUI) should be considered for XSOAR engine server?
2. Is there any documentation by Palo Alto on Podman proxy configuration for XSOAR Engine installation and any specific URLs required to be white
...
Hi all,
I wonder that if it is possible to show context data directly on layout, without mapping that data to incident field.
Hi,
When will the cisco prime integration available in marketplace. Is there any license limitation to use Cisco prime content pack?
Regards,
Deepa
Hi,
Here are two different emails subject:
1. Test email - Phishing Email
2. Test email - Ping
Two playbooks:
1. Phishing Email
2. Ping
Currently I have setup two instances of integration "Mail Listener v2" with corresponding incident types so
...
