What does this pack do?
The Aggregated Scripts pack contains scripts that execute multiple commands, significantly streamlining playbook creation and execution.
A pack containing all aggregated scripts.
The Aggregated Scripts pack contains scripts that execute multiple commands, significantly streamlining playbook creation and execution.
The Aggregated Scripts pack contains scripts that execute multiple commands, significantly streamlining playbook creation and execution.
| Name | Description |
|---|---|
| cve-enrichment | Enriches CVE indicators with reputation data from multiple integrations and outputs a consolidated CVEEnrichment object. This script exclusively supports indicators of type CVE and will automatically create the indicator in TIM if it is not already exists. |
| get-endpoint-data | This script gathers endpoint data from multiple integrations and returns an endpoint entity with consolidated information to the context. |
| ip-enrichment | Enriches IP indicators with reputation data from multiple integrations and outputs a consolidated IPEnrichment object. This script exclusively supports indicators of type IP and will automatically create the indicator in TIM if it is not already exists. Note: If enabled, get-endpoint-data is executed only for internal IP addresses. |
| domain-enrichment | Enriches Domain indicators with reputation data from multiple integrations and outputs a consolidated DomainEnrichment object. This script exclusively supports indicators of type Domain and will automatically create the indicator in TIM if it is not already exists. |
| expire-password | This script expires users password for multiple services. |
| block-external-ip | The script blocks a list of IP addresses in supported integrations. |
| isolate-endpoint | This script isolates endpoints using multiple integrations and returns a success or failure message. |
| clear-user-session | This script clears user sessions across multiple integrations for a list of usernames. |
| get-user-data | This script gathers user data from multiple integrations and returns an Account entity with consolidated information to the context. |
| quarantine-file | This script executes the 'quarantine-file' command on a specified file via the appropriate agent. This script is used to isolate files identified as suspicious. Currently supported brands are "Cortex XDR - IR", "Cortex Core - IR", and "Microsoft Defender Advanced Threat Protection". |
| indicator-enrichment | Enriches indicators from a provided list or a block of free text. This script detects the indicator type and runs the correct underlying enrichment script. Currently supports: IP, URL, Domain, CVE, and File. |
| file-enrichment | Enriches File indicators with reputation data from multiple integrations and outputs a consolidated FileEnrichment object. This script exclusively supports indicators of type File and will automatically create the indicator in TIM if it is not already exists. Note: The script runs core-get-hash-analytics-prevalence on SHA256 values only. |
| disable-user | This script disables users for multiple services. |
| url-enrichment | Enriches URL indicators with reputation data from multiple integrations and outputs a consolidated URLEnrichment object. This script exclusively supports indicators of type URL and will automatically create the indicator in TIM if it is not already exists. |
| Name | Description |
|---|---|
| get-user-data | This script gathers user data from multiple integrations and returns an Account entity with consolidated information to the context. |
| block-external-ip | The script blocks a list of IP addresses in supported integrations. |
| clear-user-session | This script clears user sessions across multiple integrations for a list of usernames. |
| disable-user | This script disables users for multiple services. |
| expire-password | This script expires users password for multiple services. |
| quarantine-file | This script executes the 'quarantine-file' command on a specified file via the appropriate agent. This script is used to isolate files identified as suspicious. Currently supported brands are "Cortex XDR - IR", "Cortex Core - IR", and "Microsoft Defender Advanced Threat Protection". |
| cve-enrichment | Enriches CVE indicators with reputation data from multiple integrations and outputs a consolidated CVEEnrichment object. This script exclusively supports indicators of type CVE and will automatically create the indicator in TIM if it is not already exists. |
| indicator-enrichment | Enriches indicators from a provided list or a block of free text. This script detects the indicator type and runs the correct underlying enrichment script. Currently supports: IP, URL, Domain, CVE, and File. |
| isolate-endpoint | This script isolates endpoints using multiple integrations and returns a success or failure message. |
| url-enrichment | Enriches URL indicators with reputation data from multiple integrations and outputs a consolidated URLEnrichment object. This script exclusively supports indicators of type URL and will automatically create the indicator in TIM if it is not already exists. |
| get-endpoint-data | This script gathers endpoint data from multiple integrations and returns an endpoint entity with consolidated information to the context. |
| domain-enrichment | Enriches Domain indicators with reputation data from multiple integrations and outputs a consolidated DomainEnrichment object. This script exclusively supports indicators of type Domain and will automatically create the indicator in TIM if it is not already exists. |
| file-enrichment | Enriches File indicators with reputation data from multiple integrations and outputs a consolidated FileEnrichment object. This script exclusively supports indicators of type File and will automatically create the indicator in TIM if it is not already exists. Note: The script runs core-get-hash-analytics-prevalence on SHA256 values only. |
| ip-enrichment | Enriches IP indicators with reputation data from multiple integrations and outputs a consolidated IPEnrichment object. This script exclusively supports indicators of type IP and will automatically create the indicator in TIM if it is not already exists. Note: If enabled, get-endpoint-data is executed only for internal IP addresses. |
| Pack Name | Pack By |
|---|---|
| Base | By: Cortex XSOAR |
| Pack Name | Pack By |
|---|---|
| WildFire by Palo Alto Networks | By: Cortex XSOAR |
| Pack Name | Pack By |
|---|---|
| Base | By: Cortex XSOAR |
file-enrichment script to not fail when encountering an unknown file hash.Added the quarantine-file script, which executes the quarantine-file command on a specified file via the appropriate agent.
This script is used to isolate files identified as suspicious. The integration used to perform the quarantine action is selected either by user input (the brands argument) or based on the available configured instances.
A pack containing all aggregated scripts.
file-enrichment script to not fail when encountering an unknown file hash.Added the quarantine-file script, which executes the quarantine-file command on a specified file via the appropriate agent.
This script is used to isolate files identified as suspicious. The integration used to perform the quarantine action is selected either by user input (the brands argument) or based on the available configured instances.
A pack containing all aggregated scripts.
| Certification | Certified | Read more |
| Supported By | Cortex | |
| Created | June 18, 2025 | |
| Last Release | January 29, 2026 |