Pack Contributors:
- barpec12
Contributions are welcome and appreciated. For more info, visit our Contribution Guide.
Frequently used scripts pack.
Contributions are welcome and appreciated. For more info, visit our Contribution Guide.
Contributions are welcome and appreciated. For more info, visit our Contribution Guide.
| Name | Description |
|---|---|
| VerifyJSON | Verifies if the supplied JSON string is valid and optionally verifies against a provided schema. The script utilizes Powershell's Test-JSON cmdlet. |
| GetListRow | Parses a list by header and value. |
| SetGridField | Creates a Grid table from items or key-value pairs. |
| AssignToMeButton | Assigns the current Incident to the Cortex XSOAR user who clicked the button |
| ConvertFile | Converts a file from one format to a different format by using the convert-to function of Libre Office. For a list of supported input/output formats see: https://wiki.openoffice.org/wiki/Framework/Article/Filter/FilterList_OOo_3_0 |
| CheckSenderDomainDistance | Get the string distance for the sender from our domain |
| GenerateInvestigationSummaryReport | A script to generate investigation summary report in an automated way |
| ParseEmailFiles | Deprecated. Use ParseEmailFilesV2 instead." Parse an email from an eml or msg file and populate all relevant context data to investigate the email. Also extracts inner attachments and returns them to the war room. The incident labels themselves are preserved and not modified - only the "Label/x" context items that originated from the labels, and the best practice is to rely on these for the remainder of the playbook. |
| Set | Set a value in context under the key you entered. |
| CheckContextValue | This script checks that a context key exists (and contains data), and optionally checks the value of the context key for a match against an input value. If a regex is not supplied, the script checks that the key is not empty. This script can be used with the "GenericPolling" playbook to poll for field population or that a field contains a specific value. This scripts does not support a context key which holds a list of values. |
| SendMessageToOnlineUsers | Send message to Demisto online users over Email, Slack, Mattermost or all. |
| SSDeepReputation | Calculate ssdeep reputation based on similar files (by ssdeep similarity) on the system. |
| EncodeToAscii | Input Text Data to Encode as ASCII (Ignores any chars that aren't interpreted as ASCII) |
| StringSimilarity | This automation calculates the similarity ratio between every string in 2 different arrays and outputs a decimal value between 0.0 and 1.0 (1.0 if the sequences are identical, and 0.0 if they don't have anything in common). |
| GetInstances | Returns integration instances configured in Cortex XSOAR. You can filter by instance status and/or brand name (vendor). |
| RepopulateFiles | After running DeleteContext, this script can repopulate all the file entries in the ${File} context key |
| Base64EncodeV2 | Encodes an input to Base64 format. |
| ToTable | Convert an array to a nice table display. Usually, from the context. |
| DecodeMimeHeader | Decode MIME base64 headers. |
| AssignAnalystToIncident | Assign analyst to incident. |
displayMappedFields | Display the mapped fields in a dynamic-section. |
| SearchIncidentsV2 | Searches Demisto incidents. A summarized version of this scrips is available with the summarizedversion argument. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| DisplayHTML | Display HTML in the War Room. |
| ShowOnMap | Returns a map entry with a marker on the given coordinates (lat,lng), or address (requires a configured GoogleMaps instance). |
| findIncidentsWithIndicator | Lookup incidents with specified indicator. Use currentIncidentId to omit the existing incident from output. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| ContextGetEmails | Gets all email addresses in context, excluding ones given. |
| CreateIndicatorsFromSTIX | Creates indicators from the submitted STIX file. Supports STIX 1.0 and STIX 2.x. This automation creates indicators and adds an indicator's relationships if available. |
| UnEscapeURLs | Extract URLs redirected by security tools like Proofpoint. |
| GetStringsDistance | Get the string distance between inputString and compareString (compareString can be a comma-separated list) based on Levenshtein Distance algorithm. |
| MarkAsNoteByTag | Mark entries as notes if they are tagged with given tag. |
| LoadJSON | Loads a json from string input, and returns a json object result. |
| ReplaceMatchGroup | Returns a string with all matches of a regex pattern groups replaced by a replacement. |
| enrich_exclude_button | This script is only meant to be used to disable the Enrich Excluded button in an indicator. It should not be used otherwise. |
| StringLength | Returns the length of the string passed as argument |
| ParseCSV | This script will parse a CSV file and place the unique IPs, Domains and Hashes into the context. |
| LookupCSV | Parses a CSV and looks for a specific value in a specific column, returning a dict of the entire matching row. If no column value is specified, the entire CSV is read into the context. |
| FetchIndicatorsFromFile | Fetches indicators from a file. Supports TXT, XLS, XLSX, CSV, DOC and DOCX file types. |
| IPToHost | Try to get the hostname correlated with the input IP. |
| CreateEmailHtmlBody | This script allows sending an HTML email, using a template stored as a list item under Lists (Settings -> Advanced -> Lists).
Note: Sending emails require an active Mail Sender integration instance. |
| MaliciousRatioReputation | Set indicator reputation to "suspicious" when malicious ratio is above threshold. |
| IsEmailAddressInternal | Checks if the email address is part of the internal domains. |
| FileReputation | A context script for hash entities. |
| SSDeepSimilarity | This script finds similar files that can be related to each other by fuzzy hash (SSDeep). |
| Strings | Extract strings from a file with optional filter - similar to binutils strings command |
| displayUtilitiesResults | This script displays the execution results of the tab's buttons in an HTML table format. |
| AreValuesEqual | Check whether the values provided in arguments are equal. If either of the arguments are missing, no is returned. |
| ConvertDatetoUTC | Converts a date from a different timezone to UTC timezone. |
| PFXAnalyzer | This script is designed to analyze a PFX (Personal Information Exchange) file for various suspicious or noteworthy characteristics from a security perspective. |
| PublishEntriesToContext | Publish entries to incident's context |
| listExecutedCommands | Lists executed commands in War Room |
| ExposeIncidentOwner | Expose the incident owner into IncidentOwner context key |
| GenerateAsBuiltConfiguration | Generate a JSON file that can be downloaded and used to create the As-Built document for Cortex XSOAR. |
| ContextSearchForString | Searches for string in a path in context. If path is null, string will be searched in full context. |
| NumberOfPhishingAttemptPerUser | Shows a bar chart of the number of incident the 'To' and 'From' email addresses. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| TextFromHTML | Extract regular text from the given HTML. |
| ExportToCSV | Export given array to csv file. |
| MathUtil | Script will run the provided mathematical action on 2 provided values and produce a result. |
| GenerateSummaryReports | Generate report summaries for the passed incidents. |
| CheckIndicatorValue | Check if indicators exist in the Threat Intel database. |
| JSONFileToCSV | Script to convert a War Room output JSON File to a CSV file. |
| FilterByList | Checks whether the specified item is in a list. The default list is the Demisto Indicators Whitelist. |
| ExifRead | Read image files metadata and provide Exif tags. |
| cvss_color | This dynamic automation parses the CVSS score of a CVE and presents it in the layout in color according to its score. |
| SetTime | Fill the current time in a custom incident field |
| DisableUserWrapper | This script allows disabling a specified user using one or more of the following integrations: SailPointIdentityIQ, ActiveDirectoryQuery, Okta, MicrosoftGraphUser, and IAM. |
| ShowScheduledEntries | Show all scheduled entries for specific incident. |
| ExportAuditLogsToFile | Uses the Core REST API integration to query the server audit trail logs, and return back a CSV or JSON file. |
| SetIndicatorGridField | This script updates an indicator's grid field in Cortex XSOAR with provided row data. You can input the rows directly or extract them from the context. |
| URLNumberOfAds | Fetches the numbers of ads in the given url. |
| IsTrue | Check if a given value is true. Will return 'no' otherwise |
| CertificateExtract | Extract fields from a certificate file and return the standard context. |
| GetDockerImageLatestTag | Gets docker image latest tag. Script simulates the docker pull flow but doesn't actually pull the image. Returns an entry with the docker image latest tag if all is good, otherwise will return an error. |
| FormatURL | Strips, unquotes and unescapes URLs. If the URL is a Proofpoint or ATP URL, extracts its redirect URL. If more than one URL is passed to the formatter, the separator must be a pipe ("|"). |
| UnEscapeIPs | Remove escaping chars from IP |
| DeduplicateValuesbyKey | Given a list of objects and a key found in each of those objects, return a unique list of values associated with that key. Returns error if the objects provided do not contain the key of interest. |
| IsUrlPartOfDomain | Checks if the supplied URLs are in the specified domains. |
| FileToBase64List | Encode a file as base64 and store it in a Demisto list. |
| GenerateAsBuilt | Generate an as built document, as HTML, based on the running XSOAR instance. Requires an instance of the Demisto API integration configured. |
| isError | Check whether given entry/entries returned an error. Use ${lastCompletedTaskEntries} to check the previous task entries. If array is provided, will return yes if one of the entries returned an error. |
| PrettyPrint | Pretty-print data using Python's pprint library. This is useful for seeing the structure of incident and context data. Here's how to use it: !PrettyPrint value=${incident} |
| AppendindicatorFieldWrapper | A wrapper script to the 'AppendindicatorField' script that enables adding tags to certain indicators. |
| ParseEmailFilesV2 | Parse an email from an eml or msg file and populate all relevant context data to investigate the email. Also extracts inner attachments and returns them to the war room. The incident labels themselves are preserved and not modified - only the "Label/x" context items that originated from the labels, and the best practice is to rely on these for the remainder of the playbook. This script is based on the parse-emails XSOAR python package, check the script documentation for more info. |
| ConvertCountryCodeCountryName | Convert country name to country code or country code to country name. |
| GetDataCollectionLink | Generates the URL for a Data Collection Task into Context. Can be used to get the url for tasks send via Email, Slack, or even if you select "By Task Only". To generate links for specific users, add an array of users in the users argument. |
| CopyContextToField | Copy a context key to an incident field of multiple incidents, based on an incident query. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| MarkRelatedIncidents | Marks given incidents as related to current incident. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| CertificateReputation | Enrich and calculate the reputation of a certificate indicator. |
| IsolationAssetWrapper | This is a wrapper to isolate or unisolate hash lists from Cortex XDR, MSDE or CrowdStrike (Available from Cortex XSOAR 6.0.0). |
| EmailAskUserResponse | Extract user's response from EmailAskUser reply. Returns the first textual response line of the provided entry that contains the reply body. Use ${lastCompletedTaskEntries} to analyze the previous playbook task containing the user's reply. |
| RemoveKeyFromList | Removes a key in key/value store backed by an XSOAR list. |
| PortListenCheck | Checks whether a port was open on given host. |
| AddEvidence | Adds provided entries to the incident Evidence Board. In playbook, can be positioned after a task to add the previous task's entries to Evidence Board automatically (with no need to provide arguments) |
| SetDateField | Sets a custom incident field with current date |
| ConvertXmlToJson | Converts XML string to JSON format |
| Sleep | Sleep for X seconds. |
| LessThanPercentage | Checks if one percentage is less than another |
| CheckFieldValue | This script checks that a field exists (and contains data), and optionally checks the value of the field for a match against an input value. If a regex is not supplied, the script checks that the field is not empty. This script can be used with the "GenericPolling" playbook to poll for field population or that a field contains a specific value. |
WordTokenizer | Deprecated. Use DBotPreProcessTextData instead. |
| GetEnabledInstances | Gets all currently enabled integration instances. |
| ExtractDomainFromUrlAndEmail | Extract Domain(s) from URL(s) and/or Email(s). |
| ProvidesCommand | Finds which integrations implement a specific Demisto command. The results will be returned as comma-separated values (CSV). The "Core REST API" integration must first be enabled. |
| ZipStrings | Joins values from two lists by index according to a given format. |
| VerifyIPv6Indicator | Verify that the address is a valid IPv6 address. |
| IsIPInRanges | Returns yes if the IP is in one of the ranges provided, returns no otherwise. |
| PDFUnlocker | Removing the password protection from a PDF file and adding a new file entry with the unlocked PDF. |
| SetMultipleValues | Set multiple keys/values to the context. |
| OnionURLReputation | This script adds the reputation to Onion URL indicators. The script is automatically triggered when a Onion URL indicator is auto-extracted. For instance, if you run a Cortex XSOAR CLI on a valid Onion URL, the indicators are extracted automatically and this script is triggered for the extracted indicators. |
| ServerLogs_docker | Uses the ssh integration to grab the host server logs. This script is supported only on Cortex XSOAR on-prem (version 6.X). |
| CEFParser | Parse CEF data into the context. Please notice that outputs will display only the 7 mandatory fields even if the CEF event includes many other custom or extended fields. |
| DisplayHTMLWithImages | Display HTML with embedded images. |
| commentsToContext | Takes the comments of a given entry ID and stores them in the incident context, under a provided context key. |
| MapValues | Map the given values to the translated values. If given values: a,b,c, and translated: 1,2,3, then the input will return 1. |
| LinkIncidentsWithRetry | Use this script to avoid DB version errors when simultaneously running multiple linked incidents. |
| BinarySearchPy | Deprecated. No available replacement. Search for a binary on an endpoint using Carbon Black |
| BMCTool | Parse RDP bitmap cache data into a single collage image file. |
| RemoteExec | Execute a command on a remote machine (without installing a D2 agent) |
| NotInContextVerification | Not in context verification is a script that executes the given command and verifies that the specified field is not in the context after execution. |
| GenerateRandomUUID | Generates a random UUID (UUID 4). |
| ConvertTableToHTML | Converts a given array to an HTML table |
| GetTime | Retrieves the current date and time. |
| http | Sends http request. Returns the response as json. |
| checkValue | Gets a value and return it. This is to be used in playbook conditional tasks - get a value from incident field, label or context, and act accordingly. |
| ExampleJSScript | This is only an example script, to showcase how to use and write JavaScript scripts |
| ScheduleGenericPolling | Called by the GenericPolling playbook, schedules the polling task. |
| SearchIncidentsSummary | Searches Cortex XSOAR Incidents and returnrs the most relevant fields. Default search range is the last 30 days, if you want to change this, use the fromDate argument. Returns the id, name, type, severity, status, owner, and created/closed times to context. You can add additional fields using the add_field_to_context argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. Based on the SearchIncidentsV2 from the Common Scripts pack, but more efficient. |
| hideFieldsOnNewIncident | When you apply this script to an incident field, that incident field is hidden for new incidents, and it displays in edit mode. |
| PreProcessImage | This script pre-processes (resizes, sharpens, and grayscales) an image file from context, given an entry_id. |
| ConvertTimezoneFromUTC | Takes UTC and converts it to the specified timezone. Format must match the UTC date's format and output will be the same format. Can use in conjunction with ConvertDateToString |
| GetByIncidentId | Gets a value from the specified incident's context. |
| IsGreaterThan | Checks if one number(float) as bigger than the other(float) |
| ContextGetPathForString | Searches for string in context and returns context path, returns null if not found. |
| StopScheduledTask | This stops the scheduled task whose ID is given in the taskID argument. |
| ReadPDFFileV2 | Load a PDF file's content and metadata into context. Supports extraction of hashes, urls, and emails when available. |
| DomainReputation | A context script for Domain entities |
| CountArraySize | Count an array size |
| IncidentFields | Returns a dict of all incident fields that exist in the system. |
| HTMLtoMD | Converts HTML to Markdown. |
| UnPackFile | Deprecated. Use the UnzipFile script instead. UnPack a file using fileName or entryID to specify a file. Files unpacked will be pushed to the war room and names will be pushed to the context. |
| ExtractIndicatorsFromTextFile | Extract indicators from a text-based file.
This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| IndicatorMaliciousRatioCalculation | Return indicators appears in resolved incidents, and resolved incident ids. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| IncreaseIncidentSeverity | Optionally increases the incident severity to the new value if it is greater than the existing severity. |
| CreateArray | Will create an array object in context from given string input |
| PopulateCriticalAssets | Populates critical assets in a grid field that has the section headers "Asset Type" and "Asset Name". |
| IsIntegrationAvailable | Returns 'yes' if integration brand is available. Otherwise returns 'no'. |
| IsPDFFileEncrypted | Checks whether the PDF file is encrypted. |
| VerifyValidIP | Verifies if the given input contains valid IP addresses (IPv4 or IPv6). |
| ShowIncidentIndicators | This script is used to display the indicators of an incident in an incident field of type Array. It can be used to select indicators from the incident in order to later perform some actions, like tagging the indicators for blocking via EDL. |
| HttpV2 | Sends a HTTP request with advanced capabilities. |
| GenericPollingScheduledTask | Runs the polling command repeatedly, completes a blocking manual task when polling is done. |
| ExtractHTMLTables | Find tables inside HTML and extract the contents into objects using the following logic:
|
| DBotClosedIncidentsPercentage | Data output script for populating dashboard pie graph widget with the percentage of incidents closed by DBot vs. incidents closed by analysts. |
| EmailAskUser | Ask a user a question via email and process the reply directly into the investigation. |
| Exists | Check if a given value exists in the context. Will return 'no' for empty empty arrays. To be used mostly with DQ and selectors. |
| LinkIncidentsButton | Incident action button script to link or unlink Incidents from an Incident |
| cveReputationV2 | Provides the severity of the CVE based on the CVSS score where available. |
| MatchRegexV2 | Extracts regex data from the provided text. The script support groups and looping. |
| GetDomainDNSDetails | Returns DNS details for a domain. |
| ExtractEmailV2 | Verifies that an email address is valid and only returns the address if it is valid. |
| AddDBotScoreToContext | Add DBot score to context for indicators with custom vendor, score, reliability, and type. |
| StringReplace | Replaces regex match/es in string. |
| ContextGetHashes | Gets hashes (MD5,SHA1,SHA256) from context. |
| EmailDomainSquattingReputation | Check if an email address's domain is trying to squat other domain using Levenshtein distance algorithm. |
| FileCreateAndUploadV2 | Creates a file (using the given data input or entry ID) and uploads it to the current investigation War Room. |
| SearchIndicator | Searches Cortex XSOAR Indicators. Search for XSOAR Indicators and returns the id, indicator_type, value, and score/verdict. You can add additional fields from the indicators using the add_field_to_context argument. |
| VerifyCIDR | Verify that the CIDRs are valid. |
| ConvertXmlFileToJson | Converts XML file entry to JSON format |
| ChangeRemediationSLAOnSevChange | Changes the remediation SLA once a change in incident severity occurs. |
| ResolveShortenedURL | This script resolves the original URL from a given shortened URL and places the resolved URL in the playbook context and output. |
| Base64ListToFile | Converts Base64 file in a list to a binary file and upload to warroom |
| ExtractAttackPattern | Extract Attack Pattern Threat Intel Object. After auto extract extracts the Attack Pattern IDs, this script is executed and extracts the value (name) of the Attack Pattern. |
| GetIndicatorDBotScoreFromCache | Get the overall score for the indicator as calculated by DBot. |
| JSONtoCSV | Convert a JSON War Room output via EntryID to a CSV file. |
| ticksToTime | Converting time in Ticks to readable time. Ticks are used to represent time by some vendors, most commonly by Microsoft. |
| SendEmailOnSLABreach | Sends an email informing the user of an SLA breach. The email is sent to the user who is assigned to the incident. It includes the incident name, ID, name of the SLA field that was breached, duration of that SLA field, and the date and time when that SLA was started. |
| AddKeyToList | Adds/Replaces a key in key/value store backed by an XSOAR list. |
| ContentPackInstaller | Content packs installer from marketplace. |
| MarkAsEvidenceByTag | Mark entries as evidence if they are tagged with given tag |
| JsonUnescape | Recursively un-escapes JSON data if escaped JSON is found |
| MatchRegex | Deprecated. Use the MatchRegexV2 script instead. |
| SetWithTemplate | Set a value built by a template in context under the key you entered. |
| UnzipFile | Unzip a file using fileName or entryID to specify a file. Unzipped files will be loaded to the War Room and names will be put into the context. |
| IsInternalDomainName | This script accepts multiple values for both arguments and will iterate through each of the domains to check if the specified subdomains are located in at least one of the specified main domains. If the tested subdomain is in one of the main domains, the result will be true. For example, if the domain_to_check values are apps.paloaltonetworks.com and apps.paloaltonetworks.bla and the domains_to_compare values are paloaltonetworks.com and demisto.com, the result for apps.paloaltonetworks.com will be true since it is a part of the paloaltonetworks.com domain. The result for apps.paloaltonetworks.bla will be false since it is not a part of the paloaltonetworks.com or demisto.com domain. |
| ScheduleCommand | Schedule a command to run inside the war room at a future time (once or reoccurring) |
| AnalyzeTimestampIntervals | Analyze a list of Unix timestamps in milliseconds, to detect simple patterns of consistency or high frequency. The script can aid in the investigation of multi-event alerts that contain a list of timestamps. |
| ExtractHyperlinksFromOfficeFiles | Extracts hyperlinks from office files. Supported file types are: xlsx, docx, pptx. |
| SetByIncidentId | Works the same as the 'Set' command, but can work across incidents by specifying 'id' as an argument. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| HTTPListRedirects | List the redirects for a given URL |
| CloseInvestigationAsDuplicate | Close the current investigation as duplicate to other investigation. |
| PrintContext | Pretty-print the contents of the playbook context. |
| GetFieldsByIncidentType | Returns the incident field names associated to the specified incident type. |
| DockerHardeningCheck | Checks if the Docker container running this script has been hardened according to the recommended settings at:
|
| CopyNotesToIncident | Copy all entries marked as notes from current incident to another incident. |
| GetEntries | Collect entries matching to the conditions in the war room. |
| GetLicenseID | Returns the license ID. |
| ContextContains | This script searches for a value in a context path. |
| ZipFile | Zip a file and upload to war room. |
| ServerLogs | Uses the ssh integration to grab the host server logs. This script is supported only on Cortex XSOAR on-prem (version 6.X). |
| ExportContextToJSONFile | Exports the Context for the current Incident to a JSON file in the war room. |
| DumpJSON | Dumps a json from context key input, and returns a json object string result |
| JSONDiff | compares two JSON files and returns their differences, such as added, removed, or changed fields, in a structured format. |
| GetErrorsFromEntry | Get the error(s) associated with a given entry/entries. Use ${lastCompletedTaskEntries} to check the previous task entries. The automation will return an array of the error contents from those entries. |
| CommandLineAnalysis | This script evaluates command-line threats by analyzing both original and decoded inputs. It assigns weighted scores to detected patterns, such as AMSI bypass or credential dumping, and applies risk combination bonuses for multiple detections. The total score is normalized to a 0-100 scale, with risk levels categorized as follows:
The scoring mechanism provides a comprehensive risk assessment, considering both the severity and frequency of malicious behaviors. |
| VerdictResult | This widget displays the incident verdict or the alert verdict based on the 'incident.verdict' or 'alert.verdict' field. |
| IdentifyAttachedEmail | Identify whether the incident includes an email message attached as an eml or msg file and return the answer to playbook. Also saves the identified entry ID to context for use for later. Commonly used in automated playbooks that handle phishing reports sent to a special phishing mailbox set up by the security team. |
| ContainsCreditCardInfo | Check if a given value is true. Will return 'no' otherwise |
| DBotAverageScore | The script calculates the average DBot score for each indicator in the context. |
| PrintErrorEntry | Prints an error entry with a given message. |
| GridFieldSetup | Automation used to more easily populate a grid field. This is necessary when you want to assign certain values as static or if you have context paths that you will assign to different values as well. Instead of a value you can enter |
| ContextGetIps | Gets all IP addresses in context, excluding ones given. |
| SetAndHandleEmpty | Set a value in context under the key you entered. If no value is entered, the script doesn't do anything. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| LoadJSONFileToContext | Loads a JSON file from the war room to context. |
| CreateNewIndicatorsOnly | Create indicators to the Threat Intel database only if they are not registered. All submitted indicators will be associated with the parent incident. When using the script with many indicators, or when the Threat Intel Management database is highly populated, this script may have low performance issue. |
| RunPollingCommand | Runs a specified polling command one time. This is useful for initiating a local playbook context before running a polling scheduled task. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| GenerateSummaryReportButton | This button will generate summary 'Case Report' template for a given Incident |
| ShowLocationOnMap | Show indicator geo location on map. |
| GenerateRandomString | Generates random string |
| TimeStampCompare | Compares a single timestamp to a list of timestamps. |
| EmailReputation | A context script for Email entities. |
| IsValueInArray | Indicates whether a given value is a member of given array |
| LanguageDetect | Language detection based on Google's language-detection. |
| ExportIncidentsToCSV | This automation uses the Core REST API Integration to batch export Incidents to CSV and return the resulting CSV file to the war room. |
| DownloadAndArchivePythonLibrary | The script downloads a Python library using PIP, archives it, and returns the file to the war room. |
| ContextFilter | Filter context keys by applying one of the various available manipulations and storing in a new context key. Please notice that the resulting context key will not be available automatically as an option but you can still specify it. |
Prints text to war room (Markdown supported) | |
| Base64Encode | Will encode an input using Base64 format. |
| ReadQRCode | Extracts the text from a QR code. The output of this script includes the output of the script "extractIndicators" run on the text extracted from the QR code. |
| GetIndicatorDBotScore | Add into the incident's context the system internal DBot score for the input indicator. |
| StixCreator | Gets a list of indicators from the indicators argument, and generates a JSON file in STIX 2.1 format. |
| ParseExcel | The automation takes Excel file (entryID) as an input and parses its content to the war room and context. |
| GetServerURL | Get the Server URL. |
| ChangeContext | Enables changing context in two ways. The first is to capitalize the first letter of each key in following level of the context key entered. The second is to change context keys to new values. |
| ParseWordDoc | Takes an input docx file (entryID) as an input and saves an output text file (file entry) with the original file's contents. |
| Dig | DNS lookup utility to provide 'A' and 'PTR' record. |
| URLSSLVerification | Verify URL SSL certificate. |
| FindSimilarIncidents | Deprecated. Use DBotFindSimilarIncidents instead. Finds similar incidents by common incident keys, labels, custom fields or context keys. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| SCPPullFiles | Take a list of devices and pull a specific file (given by path) from each using SCP. |
| IncidentAddSystem | Add a remote system (such as a desktop under investigation) to an investigation (this will allow you to install and agent on the system) |
| GeneratePassword | This function generates a password and allows various parameters to customize the properties of the password depending on the use case (e.g. password complexity requirements). The default behavior is to generate a password of random length including all four character classes (upper, lower, digits, symbols) with at least five and at most ten characters per class. The min_* values all default to 0. This means that if the command is executed in this way: The debug parameter will print certain properties of the command into the WarRoom for easy diagnostics. |
| PositiveDetectionsVSDetectionEngines | Shows a bar chart of the number of Positive Detections out of overall detections |
| FailedInstances | Executes a test for all integration instances available and returns detailed information about succeeded and failed integration instances. |
| ExportToXLSX | Exports context data to a Microsoft Excel Open XML Spreadsheet (XLSX) file. |
| CalculateTimeDifference | Calculate the time difference, in minutes. |
| IsIPPrivate | The script takes one or more IP addresses and checks whether they're in the private IP ranges defined in the PrivateIPsListName argument. By default, the PrivateIPsListName argument will use the Cortex XSOAR list called "PrivateIPs".
|
| IsDomainInternal | The script takes one or more domain names and checks whether they're in the Cortex XSOAR list defined in the InternalDomainsListName argument. By default, the InternalDomainsListName argument will use the Cortex XSOAR list called "InternalDomains". |
| CheckPDFEncryptionAndValidity | Returns wether a PDF is both valid and encrypted. |
| ParseYAML | Parses a YAML string into context. |
| DemistoVersion | Return the Demisto server version. |
| TopMaliciousRatioIndicators | Find the top malicious ratio indicators. |
| FeedRelatedIndicatorsWidget | Widget script to view information about the relationship between an indicator, entity and other indicators and connect to indicators, if relevant. |
| IPNetwork | Gather information regarding CIDR - |
| CalculateEntropy | Calculates the entropy for the given data. |
| ParseHTMLIndicators | This script will extract indicators from given HTML and will handle bad top-level domains to avoid false positives caused by file extensions. |
| PrintRaw | Prints a raw representation of a string or object, visualising things likes tabs and newlines. For instance, '\n' will be displayed instead of a newline character, or a Windows CR will be displayed as '\r\n'. This is useful for debugging issues where things aren't behaving as expected, such as when parsing a string with a regular expression. |
| CompareLists | Compare two lists and put the differences in context. |
| ArrayToCSV | Converts a simple Array into a textual comma separated string |
| PcapHTTPExtractor | Allows to parse and extract http flows (requests & responses) from a pcap/pcapng file. |
| AquatoneDiscoverV2 | aquatone-discover will find the targets nameservers and shuffle DNS lookups between them. Should a lookup fail on the target domains nameservers, aquatone-discover will fall back to using Google public DNS servers to maximize discovery. |
| FileCreateAndUpload | Deprecated. Use FileCreateAndUploadV2 instead. Will create a file (using the given data input or entry ID) and upload it to current investigation war room. |
| MITRENameByID_Formatter | Get a MITRE ATT&CK object name by its ID. The script is using TIMs IOCs to find the correct name. (MITRE ATT&CK IOCs must exist in the Threat Intel data). |
| ExportIndicatorsToCSV | This automation uses the Core REST API Integration to batch export Indicators to CSV and return the resulting CSV file to the war room. |
| ListUsedDockerImages | List all Docker images that are in use by the installed integrations and automations. |
| IsInternalHostName | Checks if the supplied hostnames match either the organization's internal naming convention or the domain suffix. |
| IPReputation | A context script for IP entities. |
| URLReputation | A context script for URL entities. |
| BreachConfirmationHTML | |
| CVSSCalculator | This script calculates the CVSS Base Score, Temporal Score, and Environmental Score using either the CVSS 3.0 or CVSS 3.1 calculator according to https://www.first.org/cvss/ calculation documentation. |
| DeleteContext | Delete field from context. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| ExtractDomainAndFQDNFromUrlAndEmail | Extracts domains and FQDNs from URLs and emails. |
| CompareIncidentsLabels | Compares the labels of two incidents. Returns the labels that are unique to each incident. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| UtilAnyResults | Utility script to use in playbooks - returns "yes" if the input is non-empty. |
| PCAPMiner | Deprecated. Use PCAPMinerV2 instead. PCAPMiner is a tool to parse PCAP files and will return things like extracted files that are found, HTTP flows, and a variety of other information. It is uses a docker instance located on docker hub trorabaugh/dempcap:1.0. To use simply upload a PCAP file and then run PCAPMiner entryId="<your_entry_id>". To get the entry id click on the link on the top right hand corner of a file attachment. |
| ExtractIndicatorsFromWordFile | Used to extract indicators from Word files (DOC, DOCX). This automation runs using the default Limited User role, unless you explicitly change the permissions. |
| StopTimeToAssignOnOwnerChange | Stops the "Time To Assign" timer if the owner of the incident was changed. |
GetDuplicatesMlv2 | Deprecated. Use the "PhishingDedupPreprocessingRule" script instead. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| ReadFile | Load the contents of a file into context. |
| EditServerConfig | Edit the server configuration (under settings/troubleshooting). You can either add a new configuration or update and remove an existing one. |
| IsListExist | Check if list exist in demisto lists. |
| IsMaliciousIndicatorFound | Checks if the investigation found any malicious indicators (file, URL, IP address, domain, or email). Returns "yes" if at least one malicious indicator is found. |
| emailFieldTriggered | Sends email to incident owner when selected field is triggered. |
| RunDockerCommand | This command will allow you to run commands against a local Docker Container. You can run commands like wc for instance with word count, or other types of commands that you want on the docker container. We recommend for tools that you want to use that are not part of the default Docker container, to cope this Automation script and then create a customer docker container with /docker_image_create with a custom docker container to add any command level tool to Demisto and output the results directly to the context. |
| Ping | Pings an IP or url address, to verify it's up. Note - On Cortex XSOAR 8 and Cortex XSIAM, the script can run only on a custom engine. |
| ExtractFQDNFromUrlAndEmail | Extracts FQDNs from URLs and emails. |
| CreateHash | Creating a hash of a given input, support sha1, sha256, sha512, md5 and blake. Wrapper for https://docs.python.org/3/library/hashlib.html. |
| Name | Description |
|---|---|
Likely Impact | "A data protection impact assessment (…) shall in particular be required in the case of: (a) a systematic and extensive evaluation of personal aspects relating to natural persons which is based on automated processing, including profiling, and on which decisions are based that produce legal effects concerning the natural person or similarly significantly affect the natural person; (b) processing on a large scale of special categories of data referred to in Article 9(1), or of personal data relating to criminal convictions and offences referred to in Article 10; or (c) a systematic monitoring of a publicly accessible area on a large scale. - GDPR Art. 35 |
Company Country | |
Company Name | |
Breach Confirmation | Is the DPO confirm the breach |
Medical Information breached | Is Medical Information breached |
Management Notification | |
Financial information breached | Is financial information breached |
State CISO Notification | |
Measures to Mitigate | " (d) describe the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects." - GDPR Art. 33 |
PII Data Type | |
Size - number of employees | |
Telephone no. | |
Unique biometric data breached | Is unique biometric data breached |
GDPR Notify Authorities | "In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons." - GDPR Art. 33 |
Where is data hosted | |
Contact Name | |
Company Address | |
Date/time of the breach | |
Company Postal Code | |
Contact Address | |
Attorney General Notification | |
State where the breach took place | |
Unique identification number breached | Is unique identification number breached |
Country where the breach took place | |
Secretary Notification | |
Other PII data breached | Is other PII data breached |
Affected data | "‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person;" - GDPR Art. 4 |
Contact Telephone number | |
Possible Cause of the Breach | |
Consumer Reporting Agencies Notification | |
Company has Insurance for the Breach | |
Company City | |
Individuals Notification | |
Malicious Cause (If the cause is a malicious attack) | |
E-mail Address | |
Contact Email address | |
Health insurance breached | Is health insurance breached |
Sector of Affected Party | |
Affected Individuals Contact Information | |
Affected Data Type | |
Approximate number of affected data subjects | |
Is the Data Subject to DPIA | |
Size - turnover | |
Data Encryption Status | |
Account information breached | Is account information breached |
Postal Code | |
Country where business has its main establishment | "‘main establishment’ means: as regards a controller with establishments in more than one Member State, the place of its central administration in the Union, unless the decisions on the purposes and means of the processing of personal data are taken in another establishment of the controller in the Union and the latter establishment has the power to have such decisions implemented, in which case the establishment having taken such decisions is to be considered to be the main establishment; as regards a processor with establishments in more than one Member State, the place of its central administration in the Union, or, if the processor has no central administration in the Union, the establishment of the processor in the Union where the main processing activities in the context of the activities of an establishment of the processor take place to the extent that the processor is subject to specific obligations under this Regulation;" - GDPR Art. 4 |
Resident Notification Option | |
DPO E-mail Address | |
DPO Notification | |
Media Notification | The status of the media notification |
Residents Email Address |
| Name | Description |
|---|---|
PrivateIPs | |
InternalDomains |
| Name | Description |
|---|---|
| cveReputationV2 | Provides the severity of the CVE based on the CVSS score where available. |
| IsUrlPartOfDomain | Checks if the supplied URLs are in the specified domains. |
| RepopulateFiles | After running DeleteContext, this script can repopulate all the file entries in the ${File} context key |
| findIncidentsWithIndicator | Lookup incidents with specified indicator. Use currentIncidentId to omit the existing incident from output. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
findAlertsWithIndicator | Lookup alerts with specified indicator. Use currentAlertId to omit the existing alert from output. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| ContextGetPathForString | Searches for string in context and returns context path, returns null if not found. |
| RunPollingCommand | Runs a specified polling command one time. This is useful for initiating a local playbook context before running a polling scheduled task. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| GetServerURL | Get the Server URL. |
| hideFieldsOnNewIncident | When you apply this script to an incident field, that incident field is hidden for new incidents, and it displays in edit mode. |
hideFieldsOnNewAlert | When you apply this script to an alert field, that alert field is hidden for new alerts, and it displays in edit mode. |
| commentsToContext | Takes the comments of a given entry ID and stores them in the incident context, under a provided context key. |
| AddEvidence | Adds provided entries to the incident Evidence Board. In playbook, can be positioned after a task to add the previous task's entries to Evidence Board automatically (with no need to provide arguments) |
| IPNetwork | Gather information regarding CIDR - |
| CheckContextValue | This script checks that a context key exists (and contains data), and optionally checks the value of the context key for a match against an input value. If a regex is not supplied, the script checks that the key is not empty. This script can be used with the "GenericPolling" playbook to poll for field population or that a field contains a specific value. This scripts does not support a context key which holds a list of values. |
| ExtractDomainFromUrlAndEmail | Extract Domain(s) from URL(s) and/or Email(s). |
| CompareIncidentsLabels | Compares the labels of two incidents. Returns the labels that are unique to each incident. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
CompareAlertsLabels | Compares the labels of two alerts. Returns the labels that are unique to each alert. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| GetFieldsByIncidentType | Returns the incident field names associated to the specified incident type. |
GetFieldsByAlertType | Returns the alert field names associated to the specified alert type. |
| SetDateField | Sets a custom incident field with current date |
| ConvertXmlToJson | Converts XML string to JSON format |
| PopulateCriticalAssets | Populates critical assets in a grid field that has the section headers "Asset Type" and "Asset Name". |
| BinarySearchPy | Deprecated. No available replacement. Search for a binary on an endpoint using Carbon Black |
| DomainReputation | A context script for Domain entities |
| RemoteExec | Execute a command on a remote machine (without installing a D2 agent) |
| ConvertTableToHTML | Converts a given array to an HTML table |
| TimeStampCompare | Compares a single timestamp to a list of timestamps. |
| DumpJSON | Dumps a json from context key input, and returns a json object string result |
WordTokenizer | Deprecated. Use DBotPreProcessTextData instead. |
| IsInternalHostName | Checks if the supplied hostnames match either the organization's internal naming convention or the domain suffix. |
| ExtractHyperlinksFromOfficeFiles | Extracts hyperlinks from office files. Supported file types are: xlsx, docx, pptx. |
| IncidentFields | Returns a dict of all incident fields that exist in the system. |
AlertFields | Returns a dict of all alert fields that exist in the system. |
| ShowScheduledEntries | Show all scheduled entries for specific incident. |
| MapValues | Map the given values to the translated values. If given values: a,b,c, and translated: 1,2,3, then the input will return 1. |
| UnzipFile | Unzip a file using fileName or entryID to specify a file. Unzipped files will be loaded to the War Room and names will be put into the context. |
| Exists | Check if a given value exists in the context. Will return 'no' for empty empty arrays. To be used mostly with DQ and selectors. |
| SetAndHandleEmpty | Set a value in context under the key you entered. If no value is entered, the script doesn't do anything. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| Strings | Extract strings from a file with optional filter - similar to binutils strings command |
| Dig | DNS lookup utility to provide 'A' and 'PTR' record. |
| ExtractFQDNFromUrlAndEmail | Extracts FQDNs from URLs and emails. |
| PCAPMiner | Deprecated. Use PCAPMinerV2 instead. PCAPMiner is a tool to parse PCAP files and will return things like extracted files that are found, HTTP flows, and a variety of other information. It is uses a docker instance located on docker hub trorabaugh/dempcap:1.0. To use simply upload a PCAP file and then run PCAPMiner entryId="<your_entry_id>". To get the entry id click on the link on the top right hand corner of a file attachment. |
| ScheduleCommand | Schedule a command to run inside the war room at a future time (once or reoccurring) |
| SetMultipleValues | Set multiple keys/values to the context. |
| ParseEmailFilesV2 | Parse an email from an eml or msg file and populate all relevant context data to investigate the email. Also extracts inner attachments and returns them to the war room. The incident labels themselves are preserved and not modified - only the "Label/x" context items that originated from the labels, and the best practice is to rely on these for the remainder of the playbook. This script is based on the parse-emails XSOAR python package, check the script documentation for more info. |
| listExecutedCommands | Lists executed commands in War Room |
| IndicatorMaliciousRatioCalculation | Return indicators appears in resolved incidents, and resolved incident ids. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| CreateNewIndicatorsOnly | Create indicators to the Threat Intel database only if they are not registered. All submitted indicators will be associated with the parent incident. When using the script with many indicators, or when the Threat Intel Management database is highly populated, this script may have low performance issue. |
| AnalyzeTimestampIntervals | Analyze a list of Unix timestamps in milliseconds, to detect simple patterns of consistency or high frequency. The script can aid in the investigation of multi-event alerts that contain a list of timestamps. |
| GetTime | Retrieves the current date and time. |
| NotInContextVerification | Not in context verification is a script that executes the given command and verifies that the specified field is not in the context after execution. |
| RemoveKeyFromList | Removes a key in key/value store backed by an XSOAR list. |
| ListUsedDockerImages | List all Docker images that are in use by the installed integrations and automations. |
| VerdictResult | This widget displays the incident verdict or the alert verdict based on the 'incident.verdict' or 'alert.verdict' field. |
| ContentPackInstaller | Content packs installer from marketplace. |
| MathUtil | Script will run the provided mathematical action on 2 provided values and produce a result. |
| GenerateSummaryReportButton | This button will generate summary 'Case Report' template for a given Incident |
| GetIndicatorDBotScoreFromCache | Get the overall score for the indicator as calculated by DBot. |
| ZipFile | Zip a file and upload to war room. |
| CheckIndicatorValue | Check if indicators exist in the Threat Intel database. |
| ParseCSV | This script will parse a CSV file and place the unique IPs, Domains and Hashes into the context. |
| ScheduleGenericPolling | Called by the GenericPolling playbook, schedules the polling task. |
| ConvertFile | Converts a file from one format to a different format by using the convert-to function of Libre Office. For a list of supported input/output formats see: https://wiki.openoffice.org/wiki/Framework/Article/Filter/FilterList_OOo_3_0 |
| LanguageDetect | Language detection based on Google's language-detection. |
| emailFieldTriggered | Sends email to incident owner when selected field is triggered. |
| AssignToMeButton | Assigns the current Incident to the Cortex user who clicked the button |
| AquatoneDiscoverV2 | aquatone-discover will find the targets nameservers and shuffle DNS lookups between them. Should a lookup fail on the target domains nameservers, aquatone-discover will fall back to using Google public DNS servers to maximize discovery. |
| ContextGetIps | Gets all IP addresses in context, excluding ones given. |
| FilterByList | Checks whether the specified item is in a list. The default list is the Demisto Indicators Whitelist. |
| AreValuesEqual | Check whether the values provided in arguments are equal. If either of the arguments are missing, no is returned. |
| VerifyIPv6Indicator | Verify that the address is a valid IPv6 address. |
| GetEnabledInstances | Gets all currently enabled integration instances. |
| GenerateSummaryReports | Generate report summaries for the passed incidents. |
| FindSimilarIncidents | Deprecated. Use DBotFindSimilarIncidents instead. Finds similar incidents by common incident keys, labels, custom fields or context keys. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
FindSimilarAlerts | Deprecated. Use DBotFindSimilarAlerts instead. Finds similar alerts by common alert keys, labels, custom fields or context keys. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| LessThanPercentage | Checks if one percentage is less than another |
| Base64Encode | Will encode an input using Base64 format. |
| SetGridField | Creates a Grid table from items or key-value pairs. |
| ParseYAML | Parses a YAML string into context. |
| FileCreateAndUpload | Deprecated. Use FileCreateAndUploadV2 instead. Will create a file (using the given data input or entry ID) and upload it to current investigation war room. |
| SearchIncidentsV2 | Searches Demisto incidents. A summarized version of this scrips is available with the summarizedversion argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
SearchAlertsV2 | Searches Demisto alerts. A summarized version of this scrips is available with the summarizedversion argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
| EmailAskUserResponse | Extract user's response from EmailAskUser reply. Returns the first textual response line of the provided entry that contains the reply body. Use ${lastCompletedTaskEntries} to analyze the previous playbook task containing the user's reply. |
| DBotClosedIncidentsPercentage | Data output script for populating dashboard pie graph widget with the percentage of incidents closed by DBot vs. incidents closed by analysts. |
DBotClosedAlertsPercentage | Data output script for populating dashboard pie graph widget with the percentage of alerts closed by DBot vs. alerts closed by analysts. |
| GenerateRandomString | Generates random string |
| IsTrue | Check if a given value is true. Will return 'no' otherwise |
| VerifyValidIP | Verifies if the given input contains valid IP addresses (IPv4 or IPv6). |
| ExtractEmailV2 | Verifies that an email address is valid and only returns the address if it is valid. |
| ShowIncidentIndicators | This script is used to display the indicators of an incident in an incident field of type Array. It can be used to select indicators from the incident in order to later perform some actions, like tagging the indicators for blocking via EDL. |
ShowAlertIndicators | This script is used to display the indicators of an alert in an alert field of type Array. It can be used to select indicators from the alert in order to later perform some actions, like tagging the indicators for blocking via EDL. |
| LinkIncidentsButton | Incident action button script to link or unlink Incidents from an Incident |
LinkAlertsButton | Alert action button script to link or unlink Alerts from an Alert |
| CommandLineAnalysis | This script evaluates command-line threats by analyzing both original and decoded inputs. It assigns weighted scores to detected patterns, such as AMSI bypass or credential dumping, and applies risk combination bonuses for multiple detections. The total score is normalized to a 0-100 scale, with risk levels categorized as follows:
The scoring mechanism provides a comprehensive risk assessment, considering both the severity and frequency of malicious behaviors. |
| ExportIndicatorsToCSV | This automation uses the Core REST API Integration to batch export Indicators to CSV and return the resulting CSV file to the war room. |
| GetByIncidentId | Gets a value from the specified incident's context. |
GetByAlertId | Gets a value from the specified alert's context. |
| DBotAverageScore | The script calculates the average DBot score for each indicator in the context. |
| CVSSCalculator | This script calculates the CVSS Base Score, Temporal Score, and Environmental Score using either the CVSS 3.0 or CVSS 3.1 calculator according to https://www.first.org/cvss/ calculation documentation. |
| Base64ListToFile | Converts Base64 file in a list to a binary file and upload to warroom |
| URLSSLVerification | Verify URL SSL certificate. |
| TopMaliciousRatioIndicators | Find the top malicious ratio indicators. |
| IsEmailAddressInternal | Checks if the email address is part of the internal domains. |
| GetDomainDNSDetails | Returns DNS details for a domain. |
| PrintContext | Pretty-print the contents of the playbook context. |
| CountArraySize | Count an array size |
| DockerHardeningCheck | Checks if the Docker container running this script has been hardened according to the recommended settings at:
|
| ContainsCreditCardInfo | Check if a given value is true. Will return 'no' otherwise |
| PrintRaw | Prints a raw representation of a string or object, visualising things likes tabs and newlines. For instance, '\n' will be displayed instead of a newline character, or a Windows CR will be displayed as '\r\n'. This is useful for debugging issues where things aren't behaving as expected, such as when parsing a string with a regular expression. |
| http | Sends http request. Returns the response as json. |
| ReadPDFFileV2 | Load a PDF file's content and metadata into context. Supports extraction of hashes, urls, and emails when available. |
| DisableUserWrapper | This script allows disabling a specified user using one or more of the following integrations: SailPointIdentityIQ, ActiveDirectoryQuery, Okta, MicrosoftGraphUser, and IAM. |
| IdentifyAttachedEmail | Identify whether the incident includes an email message attached as an eml or msg file and return the answer to playbook. Also saves the identified entry ID to context for use for later. Commonly used in automated playbooks that handle phishing reports sent to a special phishing mailbox set up by the security team. |
| ExtractIndicatorsFromWordFile | Used to extract indicators from Word files (DOC, DOCX). This automation runs using the default Limited User role, unless you explicitly change the permissions. |
| ReplaceMatchGroup | Returns a string with all matches of a regex pattern groups replaced by a replacement. |
| ContextGetEmails | Gets all email addresses in context, excluding ones given. |
| UnPackFile | Deprecated. Use the UnzipFile script instead. UnPack a file using fileName or entryID to specify a file. Files unpacked will be pushed to the war room and names will be pushed to the context. |
| FormatURL | Strips, unquotes and unescapes URLs. If the URL is a Proofpoint or ATP URL, extracts its redirect URL. If more than one URL is passed to the formatter, the separator must be a pipe ("|"). |
| RunDockerCommand | This command will allow you to run commands against a local Docker Container. You can run commands like wc for instance with word count, or other types of commands that you want on the docker container. We recommend for tools that you want to use that are not part of the default Docker container, to cope this Automation script and then create a customer docker container with /docker_image_create with a custom docker container to add any command level tool to Demisto and output the results directly to the context. |
| DeduplicateValuesbyKey | Given a list of objects and a key found in each of those objects, return a unique list of values associated with that key. Returns error if the objects provided do not contain the key of interest. |
| IncidentAddSystem | Add a remote system (such as a desktop under investigation) to an investigation (this will allow you to install and agent on the system) |
AlertAddSystem | Add a remote system (such as a desktop under investigation) to an investigation (this will allow you to install and agent on the system) |
| SetByIncidentId | Works the same as the 'Set' command, but can work across incidents by specifying 'id' as an argument. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
SetByAlertId | Works the same as the 'Set' command, but can work across alerts by specifying 'id' as an argument. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| GenerateInvestigationSummaryReport | A script to generate investigation summary report in an automated way |
| FileToBase64List | Encode a file as base64 and store it in a Demisto list. |
| ExtractAttackPattern | Extract Attack Pattern Threat Intel Object. After auto extract extracts the Attack Pattern IDs, this script is executed and extracts the value (name) of the Attack Pattern. |
| ConvertCountryCodeCountryName | Convert country name to country code or country code to country name. |
displayMappedFields | Display the mapped fields in a dynamic-section. |
| CalculateEntropy | Calculates the entropy for the given data. |
| GetInstances | Returns integration instances configured in Cortex. You can filter by instance status and/or brand name (vendor). |
| GeneratePassword | This function generates a password and allows various parameters to customize the properties of the password depending on the use case (e.g. password complexity requirements). The default behavior is to generate a password of random length including all four character classes (upper, lower, digits, symbols) with at least five and at most ten characters per class. The min_* values all default to 0. This means that if the command is executed in this way: The debug parameter will print certain properties of the command into the WarRoom for easy diagnostics. |
| GenerateAsBuilt | Generate an as built document, as HTML, based on the running XSOAR instance. Requires an instance of the Demisto API integration configured. |
| ShowLocationOnMap | Show indicator geo location on map. |
| EmailDomainSquattingReputation | Check if an email address's domain is trying to squat other domain using Levenshtein distance algorithm. |
| SetIndicatorGridField | This script updates an indicator's grid field in Cortex with provided row data. You can input the rows directly or extract them from the context. |
| ExposeIncidentOwner | Expose the incident owner into IncidentOwner context key |
ExposeAlertOwner | Expose the alert owner into AlertOwner context key |
| JSONFileToCSV | Script to convert a War Room output JSON File to a CSV file. |
| IsInternalDomainName | This script accepts multiple values for both arguments and will iterate through each of the domains to check if the specified subdomains are located in at least one of the specified main domains. If the tested subdomain is in one of the main domains, the result will be true. For example, if the domain_to_check values are apps.paloaltonetworks.com and apps.paloaltonetworks.bla and the domains_to_compare values are paloaltonetworks.com and demisto.com, the result for apps.paloaltonetworks.com will be true since it is a part of the paloaltonetworks.com domain. The result for apps.paloaltonetworks.bla will be false since it is not a part of the paloaltonetworks.com or demisto.com domain. |
| IsGreaterThan | Checks if one number(float) as bigger than the other(float) |
| IsMaliciousIndicatorFound | Checks if the investigation found any malicious indicators (file, URL, IP address, domain, or email). Returns "yes" if at least one malicious indicator is found. |
| StringSimilarity | This automation calculates the similarity ratio between every string in 2 different arrays and outputs a decimal value between 0.0 and 1.0 (1.0 if the sequences are identical, and 0.0 if they don't have anything in common). |
| URLNumberOfAds | Fetches the numbers of ads in the given url. |
| ExtractHTMLTables | Find tables inside HTML and extract the contents into objects using the following logic:
|
| EmailReputation | A context script for Email entities. |
| Sleep | Sleep for X seconds. |
| EditServerConfig | Edit the server configuration (under settings/troubleshooting). You can either add a new configuration or update and remove an existing one. |
| CertificateReputation | Enrich and calculate the reputation of a certificate indicator. |
| ParseHTMLIndicators | This script will extract indicators from given HTML and will handle bad top-level domains to avoid false positives caused by file extensions. |
| CreateEmailHtmlBody | This script allows sending an HTML email, using a template stored as a list item under Lists (Settings -> Advanced -> Lists).
Note: Sending emails require an active Mail Sender integration instance. |
| ShowOnMap | Returns a map entry with a marker on the given coordinates (lat,lng), or address (requires a configured GoogleMaps instance). |
| ToTable | Convert an array to a nice table display. Usually, from the context. |
| UnEscapeIPs | Remove escaping chars from IP |
| GetDataCollectionLink | Generates the URL for a Data Collection Task into Context. Can be used to get the url for tasks send via Email, Slack, or even if you select "By Task Only". To generate links for specific users, add an array of users in the users argument. |
| SearchIndicator | Searches Cortex Indicators. Search for XSOAR Indicators and returns the id, indicator_type, value, and score/verdict. You can add additional fields from the indicators using the add_field_to_context argument. |
| JsonUnescape | Recursively un-escapes JSON data if escaped JSON is found |
| FeedRelatedIndicatorsWidget | Widget script to view information about the relationship between an indicator, entity and other indicators and connect to indicators, if relevant. |
| CheckPDFEncryptionAndValidity | Returns wether a PDF is both valid and encrypted. |
| DecodeMimeHeader | Decode MIME base64 headers. |
| checkValue | Gets a value and return it. This is to be used in playbook conditional tasks - get a value from incident field, label or context, and act accordingly. |
| AppendindicatorFieldWrapper | A wrapper script to the 'AppendindicatorField' script that enables adding tags to certain indicators. |
| PrintErrorEntry | Prints an error entry with a given message. |
| FailedInstances | Executes a test for all integration instances available and returns detailed information about succeeded and failed integration instances. |
| ContextGetHashes | Gets hashes (MD5,SHA1,SHA256) from context. |
| ReadQRCode | Extracts the text from a QR code. The output of this script includes the output of the script "extractIndicators" run on the text extracted from the QR code. |
| DisplayHTML | Display HTML in the War Room. |
| GetLicenseID | Returns the license ID. |
| ExampleJSScript | This is only an example script, to showcase how to use and write JavaScript scripts |
| EncodeToAscii | Input Text Data to Encode as ASCII (Ignores any chars that aren't interpreted as ASCII) |
| ExtractDomainAndFQDNFromUrlAndEmail | Extracts domains and FQDNs from URLs and emails. |
| isError | Check whether given entry/entries returned an error. Use ${lastCompletedTaskEntries} to check the previous task entries. If array is provided, will return yes if one of the entries returned an error. |
| JSONtoCSV | Convert a JSON War Room output via EntryID to a CSV file. |
| CompareLists | Compare two lists and put the differences in context. |
| ConvertDatetoUTC | Converts a date from a different timezone to UTC timezone. |
| Base64EncodeV2 | Encodes an input to Base64 format. |
| CloseInvestigationAsDuplicate | Close the current investigation as duplicate to other investigation. |
| ticksToTime | Converting time in Ticks to readable time. Ticks are used to represent time by some vendors, most commonly by Microsoft. |
| ProvidesCommand | Finds which integrations implement a specific Demisto command. The results will be returned as comma-separated values (CSV). The "Core REST API" integration must first be enabled. |
| IPReputation | A context script for IP entities. |
| ContextContains | This script searches for a value in a context path. |
| MatchRegexV2 | Extracts regex data from the provided text. The script support groups and looping. |
| FileReputation | A context script for hash entities. |
| UnEscapeURLs | Extract URLs redirected by security tools like Proofpoint. |
| PDFUnlocker | Removing the password protection from a PDF file and adding a new file entry with the unlocked PDF. |
| ConvertXmlFileToJson | Converts XML file entry to JSON format |
| SearchIncidentsSummary | Searches Cortex Incidents and returnrs the most relevant fields. Default search range is the last 30 days, if you want to change this, use the fromDate argument. Returns the id, name, type, severity, status, owner, and created/closed times to context. You can add additional fields using the add_field_to_context argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. Based on the SearchIncidentsV2 from the Common Scripts pack, but more efficient. |
SearchAlertsSummary | Searches Cortex Alerts and returnrs the most relevant fields. Default search range is the last 30 days, if you want to change this, use the fromDate argument. Returns the id, name, type, severity, status, owner, and created/closed times to context. You can add additional fields using the add_field_to_context argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. Based on the SearchAlertsV2 from the Common Scripts pack, but more efficient. |
| EmailAskUser | Ask a user a question via email and process the reply directly into the investigation. |
| CopyContextToField | Copy a context key to an incident field of multiple incidents, based on an incident query. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| ResolveShortenedURL | This script resolves the original URL from a given shortened URL and places the resolved URL in the playbook context and output. |
| BMCTool | Parse RDP bitmap cache data into a single collage image file. |
| ReadFile | Load the contents of a file into context. |
| ExportContextToJSONFile | Exports the Context for the current Incident to a JSON file in the war room. |
| PortListenCheck | Checks whether a port was open on given host. |
| GridFieldSetup | Automation used to more easily populate a grid field. This is necessary when you want to assign certain values as static or if you have context paths that you will assign to different values as well. Instead of a value you can enter |
| ParseEmailFiles | Deprecated. Use ParseEmailFilesV2 instead." Parse an email from an eml or msg file and populate all relevant context data to investigate the email. Also extracts inner attachments and returns them to the war room. The incident labels themselves are preserved and not modified - only the "Label/x" context items that originated from the labels, and the best practice is to rely on these for the remainder of the playbook. |
| Ping | Pings an IP or url address, to verify it's up. Note - On Cortex and Cortex XSIAM, the script can run only on a custom engine. |
| IsIPInRanges | Returns yes if the IP is in one of the ranges provided, returns no otherwise. |
| IsIntegrationAvailable | Returns 'yes' if integration brand is available. Otherwise returns 'no'. |
| AssignAnalystToIncident | Assign analyst to incident. |
| PublishEntriesToContext | Publish entries to incident's context |
| ExportToXLSX | Exports context data to a Microsoft Excel Open XML Spreadsheet (XLSX) file. |
| IsolationAssetWrapper | This is a wrapper to isolate or unisolate hash lists from Cortex XDR, MSDE or CrowdStrike (Available from Cortex). |
Prints text to war room (Markdown supported) | |
| GetStringsDistance | Get the string distance between inputString and compareString (compareString can be a comma-separated list) based on Levenshtein Distance algorithm. |
| SendMessageToOnlineUsers | Send message to Demisto online users over Email, Slack, Mattermost or all. |
| CreateHash | Creating a hash of a given input, support sha1, sha256, sha512, md5 and blake. Wrapper for https://docs.python.org/3/library/hashlib.html. |
| AddDBotScoreToContext | Add DBot score to context for indicators with custom vendor, score, reliability, and type. |
| enrich_exclude_button | This script is only meant to be used to disable the Enrich Excluded button in an indicator. It should not be used otherwise. |
| GetErrorsFromEntry | Get the error(s) associated with a given entry/entries. Use ${lastCompletedTaskEntries} to check the previous task entries. The automation will return an array of the error contents from those entries. |
| NumberOfPhishingAttemptPerUser | Shows a bar chart of the number of incident the 'To' and 'From' email addresses. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| CopyNotesToIncident | Copy all entries marked as notes from current incident to another incident. |
CopyNotesToAlert | Copy all entries marked as notes from current alert to another alert. |
| IsValueInArray | Indicates whether a given value is a member of given array |
| SSDeepReputation | Calculate ssdeep reputation based on similar files (by ssdeep similarity) on the system. |
| GetEntries | Collect entries matching to the conditions in the war room. |
| VerifyJSON | Verifies if the supplied JSON string is valid and optionally verifies against a provided schema. The script utilizes Powershell's Test-JSON cmdlet. |
| StringReplace | Replaces regex match/es in string. |
| LoadJSON | Loads a json from string input, and returns a json object result. |
| FetchIndicatorsFromFile | Fetches indicators from a file. Supports TXT, XLS, XLSX, CSV, DOC and DOCX file types. |
| GetListRow | Parses a list by header and value. |
| GenericPollingScheduledTask | Runs the polling command repeatedly, completes a blocking manual task when polling is done. |
| SetTime | Fill the current time in a custom incident field |
| CreateArray | Will create an array object in context from given string input |
| DownloadAndArchivePythonLibrary | The script downloads a Python library using PIP, archives it, and returns the file to the war room. |
| PrintToParentIncident | Prints a value to the parent incident's war-room of the current alert. |
| ExtractIndicatorsFromTextFile | Extract indicators from a text-based file.
This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| MatchRegex | Deprecated. Use the MatchRegexV2 script instead. |
| ExifRead | Read image files metadata and provide Exif tags. |
| SCPPullFiles | Take a list of devices and pull a specific file (given by path) from each using SCP. |
| PcapHTTPExtractor | Allows to parse and extract http flows (requests & responses) from a pcap/pcapng file. |
| ChangeContext | Enables changing context in two ways. The first is to capitalize the first letter of each key in following level of the context key entered. The second is to change context keys to new values. |
| ExportAuditLogsToFile | Uses the Core REST API integration to query the server audit trail logs, and return back a CSV or JSON file. |
| PositiveDetectionsVSDetectionEngines | Shows a bar chart of the number of Positive Detections out of overall detections |
| CEFParser | Parse CEF data into the context. Please notice that outputs will display only the 7 mandatory fields even if the CEF event includes many other custom or extended fields. |
| CheckSenderDomainDistance | Get the string distance for the sender from our domain |
| Set | Set a value in context under the key you entered. |
| CheckFieldValue | This script checks that a field exists (and contains data), and optionally checks the value of the field for a match against an input value. If a regex is not supplied, the script checks that the field is not empty. This script can be used with the "GenericPolling" playbook to poll for field population or that a field contains a specific value. |
| IPToHost | Try to get the hostname correlated with the input IP. |
| ContextSearchForString | Searches for string in a path in context. If path is null, string will be searched in full context. |
| HttpV2 | Sends a HTTP request with advanced capabilities. |
| ContextFilter | Filter context keys by applying one of the various available manipulations and storing in a new context key. Please notice that the resulting context key will not be available automatically as an option but you can still specify it. |
| ParseExcel | The automation takes Excel file (entryID) as an input and parses its content to the war room and context. |
| ParseWordDoc | Takes an input docx file (entryID) as an input and saves an output text file (file entry) with the original file's contents. |
| PrettyPrint | Pretty-print data using Python's pprint library. This is useful for seeing the structure of incident and context data. Here's how to use it: !PrettyPrint value=${incident} |
| CertificateExtract | Extract fields from a certificate file and return the standard context. |
| GenerateRandomUUID | Generates a random UUID (UUID 4). |
| GetDockerImageLatestTag | Gets docker image latest tag. Script simulates the docker pull flow but doesn't actually pull the image. Returns an entry with the docker image latest tag if all is good, otherwise will return an error. |
| PrintToAlert | Prints a value to the specified alert's war-room. The alert must be in status "Under Investigation". |
| HTTPListRedirects | List the redirects for a given URL |
| HTMLtoMD | Converts HTML to Markdown. |
| ZipStrings | Joins values from two lists by index according to a given format. |
| AddKeyToList | Adds/Replaces a key in key/value store backed by an XSOAR list. |
| TextFromHTML | Extract regular text from the given HTML. |
| ExportIncidentsToCSV | This automation uses the Core REST API Integration to batch export Incidents to CSV and return the resulting CSV file to the war room. |
ExportAlertsToCSV | This automation uses the Core REST API Integration to batch export Alerts to CSV and return the resulting CSV file to the war room. |
| MarkAsNoteByTag | Mark entries as notes if they are tagged with given tag. |
| DeleteContext | Delete field from context. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| IsPDFFileEncrypted | Checks whether the PDF file is encrypted. |
GetDuplicatesMlv2 | Deprecated. Use the "PhishingDedupPreprocessingRule" script instead. This automation runs using the default Limited User role, unless you explicitly change the permissions.
|
| URLReputation | A context script for URL entities. |
| displayUtilitiesResults | This script displays the execution results of the tab's buttons in an HTML table format. |
| ConvertTimezoneFromUTC | Takes UTC and converts it to the specified timezone. Format must match the UTC date's format and output will be the same format. Can use in conjunction with ConvertDateToString |
| FileCreateAndUploadV2 | Creates a file (using the given data input or entry ID) and uploads it to the current investigation War Room. |
| CalculateTimeDifference | Calculate the time difference, in minutes. |
| StopScheduledTask | This stops the scheduled task whose ID is given in the taskID argument. |
| OnionURLReputation | This script adds the reputation to Onion URL indicators. The script is automatically triggered when a Onion URL indicator is auto-extracted. For instance, if you run a Cortex CLI on a valid Onion URL, the indicators are extracted automatically and this script is triggered for the extracted indicators. |
| LookupCSV | Parses a CSV and looks for a specific value in a specific column, returning a dict of the entire matching row. If no column value is specified, the entire CSV is read into the context. |
| UtilAnyResults | Utility script to use in playbooks - returns "yes" if the input is non-empty. |
| PrintToIncident | Prints a value to the specified incident's war-room. |
| IsListExist | Check if list exist in demisto lists. |
| StringLength | Returns the length of the string passed as argument |
| PFXAnalyzer | This script is designed to analyze a PFX (Personal Information Exchange) file for various suspicious or noteworthy characteristics from a security perspective. |
| MITRENameByID_Formatter | Get a MITRE ATT&CK object name by its ID. The script is using TIMs IOCs to find the correct name. (MITRE ATT&CK IOCs must exist in the Threat Intel data). |
| IncreaseIncidentSeverity | Optionally increases the incident severity to the new value if it is greater than the existing severity. |
IncreaseAlertSeverity | Optionally increases the alert severity to the new value if it is greater than the existing severity. |
| VerifyCIDR | Verify that the CIDRs are valid. |
| LoadJSONFileToContext | Loads a JSON file from the war room to context. |
| SSDeepSimilarity | This script finds similar files that can be related to each other by fuzzy hash (SSDeep). |
| MarkAsEvidenceByTag | Mark entries as evidence if they are tagged with given tag |
| MaliciousRatioReputation | Set indicator reputation to "suspicious" when malicious ratio is above threshold. |
| CreateIndicatorsFromSTIX | Creates indicators from the submitted STIX file. Supports STIX 1.0 and STIX 2.x. This automation creates indicators and adds an indicator's relationships if available. |
| cvss_color | This dynamic automation parses the CVSS score of a CVE and presents it in the layout in color according to its score. |
| PreProcessImage | This script pre-processes (resizes, sharpens, and grayscales) an image file from context, given an entry_id. |
| SetWithTemplate | Set a value built by a template in context under the key you entered. |
| JSONDiff | compares two JSON files and returns their differences, such as added, removed, or changed fields, in a structured format. |
| StixCreator | Gets a list of indicators from the indicators argument, and generates a JSON file in STIX 2.1 format. |
| ExportToCSV | Export given array to csv file. |
| GetIndicatorDBotScore | Add into the incident's context the system internal DBot score for the input indicator. |
| BreachConfirmationHTML | |
| ArrayToCSV | Converts a simple Array into a textual comma separated string |
| DisplayHTMLWithImages | Display HTML with embedded images. |
| Name | Description |
|---|---|
DPO Notification | |
E-mail Address | |
Secretary Notification | |
Affected data | "‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person;" - GDPR Art. 4 |
Individuals Notification | |
Contact Address | |
Company Postal Code | |
Media Notification | The status of the media notification |
Size - turnover | |
PII Data Type | |
Financial information breached | Is financial information breached |
Telephone no. | |
DPO E-mail Address | |
Approximate number of affected data subjects | |
Malicious Cause (If the cause is a malicious attack) | |
Postal Code | |
Breach Confirmation | Is the DPO confirm the breach |
Consumer Reporting Agencies Notification | |
Other PII data breached | Is other PII data breached |
Sector of Affected Party | |
Company City | |
Company has Insurance for the Breach | |
Company Name | |
Company Address | |
State where the breach took place | |
Contact Telephone number | |
Country where business has its main establishment | "‘main establishment’ means: as regards a controller with establishments in more than one Member State, the place of its central administration in the Union, unless the decisions on the purposes and means of the processing of personal data are taken in another establishment of the controller in the Union and the latter establishment has the power to have such decisions implemented, in which case the establishment having taken such decisions is to be considered to be the main establishment; as regards a processor with establishments in more than one Member State, the place of its central administration in the Union, or, if the processor has no central administration in the Union, the establishment of the processor in the Union where the main processing activities in the context of the activities of an establishment of the processor take place to the extent that the processor is subject to specific obligations under this Regulation;" - GDPR Art. 4 |
Affected Data Type | |
Data Encryption Status | |
Account information breached | Is account information breached |
Management Notification | |
Resident Notification Option | |
Measures to Mitigate | " (d) describe the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects." - GDPR Art. 33 |
Contact Email address | |
Possible Cause of the Breach | |
Affected Individuals Contact Information | |
Unique identification number breached | Is unique identification number breached |
GDPR Notify Authorities | "In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons." - GDPR Art. 33 |
Likely Impact | "A data protection impact assessment (…) shall in particular be required in the case of: (a) a systematic and extensive evaluation of personal aspects relating to natural persons which is based on automated processing, including profiling, and on which decisions are based that produce legal effects concerning the natural person or similarly significantly affect the natural person; (b) processing on a large scale of special categories of data referred to in Article 9(1), or of personal data relating to criminal convictions and offences referred to in Article 10; or (c) a systematic monitoring of a publicly accessible area on a large scale. - GDPR Art. 35 |
Medical Information breached | Is Medical Information breached |
Attorney General Notification | |
Size - number of employees | |
Unique biometric data breached | Is unique biometric data breached |
Residents Email Address | |
Contact Name | |
Health insurance breached | Is health insurance breached |
State CISO Notification | |
Where is data hosted | |
Is the Data Subject to DPIA |
| Name | Description |
|---|---|
PrivateIPs |
| Pack Name | Pack By |
|---|---|
| Base | By: Cortex XSOAR |
| Cortex REST API | By: Cortex XSOAR |
| Pack Name | Pack By |
|---|---|
| US - Breach Notification | By: Cortex XSOAR |
| Brute Force | By: Cortex XSOAR |
| Elasticsearch | By: Cortex XSOAR |
| MITRE ATT&CK | By: Cortex XSOAR |
| GDPR | By: Cortex XSOAR |
| Gmail | By: Cortex XSOAR |
| Gmail Single User | By: Cortex XSOAR |
| HIPAA - Breach Notification | By: Cortex XSOAR |
| IBM Security QRadar SOAR | By: Cortex XSOAR |
| Mail Sender (New) | By: Cortex XSOAR |
| Microsoft Graph Mail | By: Cortex XSOAR |
| ProtectWise | By: Cortex XSOAR |
| Remote Access | By: Cortex XSOAR |
| Shodan | By: Cortex XSOAR |
| Sumo Logic | By: Cortex XSOAR |
| Pack Name | Pack By |
|---|---|
| Base | By: Cortex XSOAR |
| Cortex REST API | By: Cortex XSOAR |
Changes are not relevant for XSOAR marketplace.
Changes are not relevant for XSOAR marketplace.
input or values arguments are objects.Company has Insurance for the Breach
Documentation and metadata improvements.
Sector of Affected Party
Documentation and metadata improvements.
Company Name
Documentation and metadata improvements.
Breach Confirmation
Documentation and metadata improvements.
Resident Notification Option
Documentation and metadata improvements.
Where is data hosted
Documentation and metadata improvements.
Other PII data breached
Documentation and metadata improvements.
Management Notification
Documentation and metadata improvements.
Financial information breached
Documentation and metadata improvements.
Individuals Notification
Documentation and metadata improvements.
Affected Individuals Contact Information
Documentation and metadata improvements.
Unique identification number breached
Documentation and metadata improvements.
Affected Data Type
Documentation and metadata improvements.
Account information breached
Documentation and metadata improvements.
DPO E-mail Address
Documentation and metadata improvements.
Malicious Cause (If the cause is a malicious attack)
Documentation and metadata improvements.
Affected data
Documentation and metadata improvements.
Measures to Mitigate
Documentation and metadata improvements.
Contact Address
Documentation and metadata improvements.
Company Postal Code
Documentation and metadata improvements.
Contact Telephone number
Documentation and metadata improvements.
Country where business has its main establishment
Documentation and metadata improvements.
Secretary Notification
Documentation and metadata improvements.
State where the breach took place
Documentation and metadata improvements.
PII Data Type
Documentation and metadata improvements.
Company City
Documentation and metadata improvements.
Residents Email Address
Documentation and metadata improvements.
Likely Impact
Documentation and metadata improvements.
State CISO Notification
Documentation and metadata improvements.
Contact Name
Documentation and metadata improvements.
Consumer Reporting Agencies Notification
Documentation and metadata improvements.
Company Address
Documentation and metadata improvements.
Medical Information breached
Documentation and metadata improvements.
Postal Code
Documentation and metadata improvements.
Health insurance breached
Documentation and metadata improvements.
Size - turnover
Documentation and metadata improvements.
GDPR Notify Authorities
Documentation and metadata improvements.
DPO Notification
Documentation and metadata improvements.
Possible Cause of the Breach
Documentation and metadata improvements.
Approximate number of affected data subjects
Documentation and metadata improvements.
Contact Email address
Documentation and metadata improvements.
Unique biometric data breached
Documentation and metadata improvements.
Data Encryption Status
Documentation and metadata improvements.
Is the Data Subject to DPIA
Documentation and metadata improvements.
Size - number of employees
Documentation and metadata improvements.
Attorney General Notification
Documentation and metadata improvements.
E-mail Address
Documentation and metadata improvements.
Telephone no.
Documentation and metadata improvements.
Media Notification
Documentation and metadata improvements.
Updated the ConvertFile script to handle invalid files by returning a failure error within the file context instead of causing a script failure.
New: Added a new script- CheckPDFEncryptionAndValidity that Returns if a PDF is valid and if it is encrypted.
New: Added a new script- JSONDiff that compares two JSON files and returns their differences, such as added, removed, or changed fields, in a structured format.
Fixed an issue where under specific conditions the exported times of the indicators were presented as UTC when they were actually in local time. All the exported times are now correctly parsed into UTC the time zone.
Fixed an issue where the timeout_between_retries argument was treated as a string instead of being converted to a number.
Updated the Docker image to: demisto/python3:3.11.11.1940698.
Updated the Docker image to: demisto/python3:3.11.11.1940698.
Updated the Docker image to: demisto/py3-tools:1.0.0.117220.
Code functionality and documentation improvements.
New: Get a MITRE ATT&CK object name by its ID. The script is using TIMs IOCs to find the correct name. (MITRE ATT&CK IOCs must exist in the Threat Intel data).
Fixed an issue where URLs were not parsed correctly when handling nested parenthesis in the URL query.
Internal code improvements.
Improved consistency of the script output by removing carriage return (\r) characters from the end of lines.
Changes are not relevant for XSIAM marketplace.
Changes are not relevant for XSIAM marketplace.
input or values arguments are objects.Company has Insurance for the Breach
Documentation and metadata improvements.
Sector of Affected Party
Documentation and metadata improvements.
Company Name
Documentation and metadata improvements.
Breach Confirmation
Documentation and metadata improvements.
Resident Notification Option
Documentation and metadata improvements.
Where is data hosted
Documentation and metadata improvements.
Other PII data breached
Documentation and metadata improvements.
Management Notification
Documentation and metadata improvements.
Financial information breached
Documentation and metadata improvements.
Individuals Notification
Documentation and metadata improvements.
Affected Individuals Contact Information
Documentation and metadata improvements.
Unique identification number breached
Documentation and metadata improvements.
Affected Data Type
Documentation and metadata improvements.
Account information breached
Documentation and metadata improvements.
DPO E-mail Address
Documentation and metadata improvements.
Malicious Cause (If the cause is a malicious attack)
Documentation and metadata improvements.
Affected data
Documentation and metadata improvements.
Measures to Mitigate
Documentation and metadata improvements.
Contact Address
Documentation and metadata improvements.
Company Postal Code
Documentation and metadata improvements.
Contact Telephone number
Documentation and metadata improvements.
Country where business has its main establishment
Documentation and metadata improvements.
Secretary Notification
Documentation and metadata improvements.
State where the breach took place
Documentation and metadata improvements.
PII Data Type
Documentation and metadata improvements.
Company City
Documentation and metadata improvements.
Residents Email Address
Documentation and metadata improvements.
Likely Impact
Documentation and metadata improvements.
State CISO Notification
Documentation and metadata improvements.
Contact Name
Documentation and metadata improvements.
Consumer Reporting Agencies Notification
Documentation and metadata improvements.
Company Address
Documentation and metadata improvements.
Medical Information breached
Documentation and metadata improvements.
Postal Code
Documentation and metadata improvements.
Health insurance breached
Documentation and metadata improvements.
Size - turnover
Documentation and metadata improvements.
GDPR Notify Authorities
Documentation and metadata improvements.
DPO Notification
Documentation and metadata improvements.
Possible Cause of the Breach
Documentation and metadata improvements.
Approximate number of affected data subjects
Documentation and metadata improvements.
Contact Email address
Documentation and metadata improvements.
Unique biometric data breached
Documentation and metadata improvements.
Data Encryption Status
Documentation and metadata improvements.
Is the Data Subject to DPIA
Documentation and metadata improvements.
Size - number of employees
Documentation and metadata improvements.
Attorney General Notification
Documentation and metadata improvements.
E-mail Address
Documentation and metadata improvements.
Telephone no.
Documentation and metadata improvements.
Media Notification
Documentation and metadata improvements.
Updated the ConvertFile script to handle invalid files by returning a failure error within the file context instead of causing a script failure.
New: Added a new script- CheckPDFEncryptionAndValidity that Returns if a PDF is valid and if it is encrypted.
New: Added a new script- JSONDiff that compares two JSON files and returns their differences, such as added, removed, or changed fields, in a structured format.
Fixed an issue where under specific conditions the exported times of the indicators were presented as UTC when they were actually in local time. All the exported times are now correctly parsed into UTC the time zone.
Fixed an issue where the timeout_between_retries argument was treated as a string instead of being converted to a number.
Updated the Docker image to: demisto/python3:3.11.11.1940698.
Updated the Docker image to: demisto/python3:3.11.11.1940698.
Updated the Docker image to: demisto/py3-tools:1.0.0.117220.
Code functionality and documentation improvements.
New: Get a MITRE ATT&CK object name by its ID. The script is using TIMs IOCs to find the correct name. (MITRE ATT&CK IOCs must exist in the Threat Intel data).
Fixed an issue where URLs were not parsed correctly when handling nested parenthesis in the URL query.
Internal code improvements.
Improved consistency of the script output by removing carriage return (\r) characters from the end of lines.
| Certification | Certified | Read more |
| Supported By | Cortex | |
| Created | July 27, 2020 | |
| Last Release | October 22, 2025 |













