Cortex XSOAR Discussions
Cortex XSOAR enables SOC analysts to manage alerts across all sources, standardize processes with playbooks, take action on threat intel, and automate response for any security use case.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Cortex XSOAR Discussions
Cortex XSOAR enables SOC analysts to manage alerts across all sources, standardize processes with playbooks, take action on threat intel, and automate response for any security use case.
About Cortex XSOAR Discussions
Cortex XSOAR enables SOC analysts to manage alerts across all sources, standardize processes with playbooks, take action on threat intel, and automate response for any security use case.

Discussions

Resolved! Wildfire Reports missing URL

Hello all I did some PDF-Requests to Wildfire and getting Info back as xml. One of those reports are marked as "Malicious" but I do not see, what/why it is Malicious.So I've investigated and did a curl extract of the sha265 Wildfire Request. And look! There are infos about URLs in the curl-api request (output as xml): <extracted_urls> &...

Resolved! Adding endpoint list to an AD group

Hi, I am currently building a new PlayBook and in one part of that PlayBook, I am trying to add computers, in an XSoar List, to a specific AD group. - I Created a List that contains 2 endpoints separated with a comma ","- My Playbook is using the Active Directory Query v2: ad-add-to-group- Field "computer-name" is filled with the query referenc...

War room: View full content in a new tab. Output in column instead of row

Hello If we press in the war room output to " View full content in a new tab" then the output is a table - and everything in one row.Is it possible to get the output in columns? Even csv is all in one row... so, instead first row with description, put that in one column. then the 2nd row put that in secound column.it is a bit nicer to scroll aro...

Cortex XQL searches in XSOAR - how to?

Hi, I am trying to integrate more and more XSOAR into my environment.I would like to be able to do XQL searches on xdr dataset, but I can't find a way to do that.I have Cortex Data Lake integration, but is seems to cover only logs from firewalls. Thx for help.Best,Przemek

Cortex XDR Halt Playbooks?

So we're utilizing XDR Prevent (not Pro) here. Appears to be all the preparation on PAN's site is carefully equipped towards the Proform, and Github hasn't been exceptionally productive. I'm contemplating whether anybody has any playbooks or work processes or (crosses fingers) contents they're utilizing to cooperate with XDR here?

Timeframe for Script in a widget

How can I get the Timeframe inside a Dashboard into an python script so that I can use it to query splunk for the same timeframe I haven't been able to find anything related to this in the documentation. Thanks, Juan

JuDiaz by L0 Member
  • 3397 Views
  • 3 replies
  • 0 Likes

SplunkPy | Integration test throws error

While testing SplunkPy integration, I am getting the following error. Error from SplunkPy is : Script failed to run:Error: Error [[Traceback (most recent call last): File "<string>", line 1, in <module> ImportError: No module named splunklib.binding]] - Stderr [] (2601) Stderr: Traceback (most recent call last): File "/va...

Resolved! Error: DB Version '##' and Insert version '##' do not match for id: ##### on bucket [] [incidents] (15)

I have a trigger script automation that updates the linked incidents of an incident. The update works, but then it produces the following error and refuses to update the field that triggered the automation. The script works fine if I run it from the command line. It's only when a triggered script runs that there's a problem. Here's a sample ...

DZerkle_0-1614912375236.png
DZerkle by L2 Linker
  • 17925 Views
  • 19 replies
  • 0 Likes

Resolved! Mapping the Microsoft Security Graph to a custom incident type

Hello, I am a noob in XSOAR, so if I am missing something obvious, my apologies.I am working on a implementation where the system owner has set up a custom incident type for their Microsoft Security Graph API. The idea is now to do the mapping and I am stuck. The JSON contains the classic key value pairs but some of the values are actually array...

Resolved! Output JSON for Incident Mapping

Hi all,We have several incidents that we need to work on the mapping of, but they are relatively rare and are not pulled from the (SplunkPy) integration often enough that they are in any of the events that we get when we do the mapping (6.0) and pull from the integration. They have been classified correctly, and we have several instances in XSOA...

Sean_L by L1 Bithead
  • 13601 Views
  • 5 replies
  • 1 Likes
  • 1298 Posts
  • 45 Subscriptions