This script updates an indicator's grid field in Cortex XSOAR with provided row data. You can input the rows directly or extract them from the context.
Common Scripts
- Details
- Content
- Dependencies
- Version History
Frequently used scripts pack.
Name | Description |
---|---|
SetIndicatorGridField | |
FileReputation | A context script for hash entities. |
isError | Check whether given entry/entries returned an error. Use ${lastCompletedTaskEntries} to check the previous task entries. If array is provided, will return yes if one of the entries returned an error. |
UtilAnyResults | Utility script to use in playbooks - returns "yes" if the input is non-empty. |
GetDomainDNSDetails | Returns DNS details for a domain. |
Ping | Pings an IP or url address, to verify it's up. Note - On Cortex XSOAR 8 and Cortex XSIAM, the script can run only on a custom engine. |
GetDataCollectionLink | Generates the URL for a Data Collection Task into Context. Can be used to get the url for tasks send via Email, Slack, or even if you select "By Task Only". To generate links for specific users, add an array of users in the users argument. |
ExampleJSScript | This is only an example script, to showcase how to use and write JavaScript scripts |
CertificateExtract | Extract fields from a certificate file and return the standard context. |
ConvertFile | Converts a file from one format to a different format by using the convert-to function of Libre Office. For a list of supported input/output formats see: https://wiki.openoffice.org/wiki/Framework/Article/Filter/FilterList_OOo_3_0 |
CopyContextToField | Copy a context key to an incident field of multiple incidents, based on an incident query. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
emailFieldTriggered | Sends email to incident owner when selected field is triggered. |
ParseCSV | This script will parse a CSV file and place the unique IPs, Domains and Hashes into the context. |
CreateHash | Creating a hash of a given input, support sha1, sha256, sha512, md5 and blake. Wrapper for https://docs.python.org/3/library/hashlib.html. |
GetServerURL | Get the Server URL. |
AssignToMeButton | Assigns the current Incident to the Cortex XSOAR user who clicked the button |
GetEnabledInstances | Gets all currently enabled integration instances. |
SendEmailOnSLABreach | Sends an email informing the user of an SLA breach. The email is sent to the user who is assigned to the incident. It includes the incident name, ID, name of the SLA field that was breached, duration of that SLA field, and the date and time when that SLA was started. |
GetIndicatorDBotScore | Add into the incident's context the system internal DBot score for the input indicator. |
ExportToXLSX | Exports context data to a Microsoft Excel Open XML Spreadsheet (XLSX) file. |
OnionURLReputation | This script adds the reputation to Onion URL indicators. The script is automatically triggered when a Onion URL indicator is auto-extracted. For instance, if you run a Cortex XSOAR CLI on a valid Onion URL, the indicators are extracted automatically and this script is triggered for the extracted indicators. |
ArrayToCSV | Converts a simple Array into a textual comma separated string |
SetAndHandleEmpty | Set a value in context under the key you entered. If no value is entered, the script doesn't do anything. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
JSONFileToCSV | Script to convert a War Room output JSON File to a CSV file. |
IPNetwork | Gather information regarding CIDR - |
LookupCSV | Parses a CSV and looks for a specific value in a specific column, returning a dict of the entire matching row. If no column value is specified, the entire CSV is read into the context. |
JsonUnescape | Recursively un-escapes JSON data if escaped JSON is found |
VerifyCIDR | Verify that the CIDRs are valid. |
MaliciousRatioReputation | Set indicator reputation to "suspicious" when malicious ratio is above threshold. |
HTTPListRedirects | List the redirects for a given URL |
IsIPPrivate | The script takes one or more IP addresses and checks whether they're in the private IP ranges defined in the PrivateIPsListName argument. By default, the PrivateIPsListName argument will use the Cortex XSOAR list called "PrivateIPs".
|
URLSSLVerification | Verify URL SSL certificate |
ParseWordDoc | Takes an input docx file (entryID) as an input and saves an output text file (file entry) with the original file's contents. |
EmailAskUser | Ask a user a question via email and process the reply directly into the investigation. |
ConvertCountryCodeCountryName | Convert country name to country code or country code to country name. |
ShowLocationOnMap | Show indicator geo location on map. |
MarkAsNoteByTag | Mark entries as notes if they are tagged with given tag. |
DomainReputation | A context script for Domain entities |
ExifRead | Read image files metadata and provide Exif tags. |
Exists | Check if a given value exists in the context. Will return 'no' for empty empty arrays. To be used mostly with DQ and selectors. |
ticksToTime | Converting time in Ticks to readable time. Ticks are used to represent time by some vendors, most commonly by Microsoft. |
IsTrue | Check if a given value is true. Will return 'no' otherwise |
ShowScheduledEntries | Show all scheduled entries for specific incident. |
MatchRegexV2 | Extracts regex data from the provided text. The script support groups and looping. |
Sleep | Sleep for X seconds. |
DemistoVersion | Return the Demisto server version. |
AddKeyToList | Adds/Replaces a key in key/value store backed by an XSOAR list. |
IncidentAddSystem | Add a remote system (such as a desktop under investigation) to an investigation (this will allow you to install and agent on the system) |
ExtractHTMLTables | Find tables inside HTML and extract the contents into objects using the following logic:
|
DBotAverageScore | The script calculates the average DBot score for each indicator in the context. |
ContextGetIps | Gets all IP addresses in context, excluding ones given. |
PortListenCheck | Checks whether a port was open on given host. |
JSONtoCSV | Convert a JSON War Room output via EntryID to a CSV file. |
WordTokenizer | Deprecated. Use DBotPreProcessTextData instead. |
CVSSCalculator | This script calculates the CVSS Base Score, Temporal Score, and Environmental Score using either the CVSS 3.0 or CVSS 3.1 calculator according to https://www.first.org/cvss/ calculation documentation. |
PrintRaw | Prints a raw representation of a string or object, visualising things likes tabs and newlines. For instance, '\n' will be displayed instead of a newline character, or a Windows CR will be displayed as '\r\n'. This is useful for debugging issues where things aren't behaving as expected, such as when parsing a string with a regular expression. |
HttpV2 | Sends a HTTP request with advanced capabilities |
LinkIncidentsButton | Incident action button script to link or unlink Incidents from an Incident |
HTMLtoMD | Converts HTML to Markdown. |
AssignAnalystToIncident | Assign analyst to incident. |
SetMultipleValues | Set multiple keys/values to the context. |
MarkRelatedIncidents | Marks given incidents as related to current incident. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
ZipStrings | Joins values from two lists by index according to a given format. |
ProvidesCommand | Finds which integrations implement a specific Demisto command. The results will be returned as comma-separated values (CSV). The "Core REST API" integration must first be enabled. |
ContextSearchForString | Searches for string in a path in context. If path is null, string will be searched in full context. |
ReplaceMatchGroup | Returns a string with all matches of a regex pattern groups replaced by a replacement. |
ExposeIncidentOwner | Expose the incident owner into IncidentOwner context key |
SearchIncidentsSummary | Searches Cortex XSOAR Incidents and returnrs the most relevant fields. Default search range is the last 30 days, if you want to change this, use the fromDate argument. Returns the id, name, type, severity, status, owner, and created/closed times to context. You can add additional fields using the add_field_to_context argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. Based on the SearchIncidentsV2 from the Common Scripts pack, but more efficient. |
URLNumberOfAds | Fetches the numbers of ads in the given url. |
CertificateReputation | Enrich and calculate the reputation of a certificate indicator. |
LoadJSON | Loads a json from string input, and returns a json object result. |
RemoteExec | Execute a command on a remote machine (without installing a D2 agent) |
displayUtilitiesResults | This script displays the execution results of the tab's buttons in an HTML table format. |
CEFParser | Parse CEF data into the context. Please notice that outputs will display only the 7 mandatory fields even if the CEF event includes many other custom or extended fields. |
ExtractHyperlinksFromOfficeFiles | Extracts hyperlinks from office files. Supported file types are: xlsx, docx, pptx. |
PrettyPrint | Pretty-print data using Python's pprint library. This is useful for seeing the structure of incident and context data. Here's how to use it: !PrettyPrint value=${incident} |
DownloadAndArchivePythonLibrary | The script downloads a Python library using PIP, archives it, and returns the file to the war room. |
CreateArray | Will create an array object in context from given string input |
GetDockerImageLatestTag | Gets docker image latest tag. Script simulates the docker pull flow but doesn't actually pull the image. Returns an entry with the docker image latest tag if all is good, otherwise will return an error. |
FeedRelatedIndicatorsWidget | Widget script to view information about the relationship between an indicator, entity and other indicators and connect to indicators, if relevant. |
UnEscapeURLs | Extract URLs redirected by security tools like Proofpoint. |
EmailDomainSquattingReputation | Check if an email address's domain is trying to squat other domain using Levenshtein distance algorithm. |
CreateEmailHtmlBody | This script allows sending an HTML email, using a template stored as a list item under Lists (Settings -> Advanced -> Lists).
Note: Sending emails require an active Mail Sender integration instance. |
CountArraySize | Count an array size |
GetTime | Retrieves the current date and time. |
TimeStampCompare | Compares a single timestamp to a list of timestamps. |
AddEvidence | Adds provided entries to the incident Evidence Board. In playbook, can be positioned after a task to add the previous task's entries to Evidence Board automatically (with no need to provide arguments) |
ChangeContext | Enables changing context in two ways. The first is to capitalize the first letter of each key in following level of the context key entered. The second is to change context keys to new values. |
CheckFieldValue | This script checks that a field exists (and contains data), and optionally checks the value of the field for a match against an input value. If a regex is not supplied, the script checks that the field is not empty. This script can be used with the "GenericPolling" playbook to poll for field population or that a field contains a specific value. |
TextFromHTML | Extract regular text from the given HTML. |
LinkIncidentsWithRetry | Use this script to avoid DB version errors when simultaneously running multiple linked incidents. |
CompareIncidentsLabels | Compares the labels of two incidents. Returns the labels that are unique to each incident. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
GenerateInvestigationSummaryReport | A script to generate investigation summary report in an automated way |
ZipFile | Zip a file and upload to war room. |
AddDBotScoreToContext | Add DBot score to context for indicators with custom vendor, score, reliability, and type. |
IsListExist | Check if list exist in demisto lists. |
Prints text to war room (Markdown supported) | |
IsInternalHostName | Checks if the supplied hostnames match either the organization's internal naming convention or the domain suffix. |
RunPollingCommand | Runs a specified polling command one time. This is useful for initiating a local playbook context before running a polling scheduled task. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
UnzipFile | Unzip a file using fileName or entryID to specify a file. Unzipped files will be loaded to the War Room and names will be put into the context. |
StringLength | Returns the length of the string passed as argument |
SetWithTemplate | Set a value built by a template in context under the key you entered. |
PublishEntriesToContext | Publish entries to incident's context |
ContextGetPathForString | Searches for string in context and returns context path, returns null if not found. |
PCAPMiner | Deprecated. Use PCAPMinerV2 instead. PCAPMiner is a tool to parse PCAP files and will return things like extracted files that are found, HTTP flows, and a variety of other information. It is uses a docker instance located on docker hub trorabaugh/dempcap:1.0. To use simply upload a PCAP file and then run PCAPMiner entryId="<your_entry_id>". To get the entry id click on the link on the top right hand corner of a file attachment. |
ParseYAML | Parses a YAML string into context |
GetIndicatorDBotScoreFromCache | Get the overall score for the indicator as calculated by DBot. |
PcapHTTPExtractor | Allows to parse and extract http flows (requests & responses) from a pcap/pcapng file. |
GenerateRandomUUID | Generates a random UUID (UUID 4). |
DumpJSON | Dumps a json from context key input, and returns a json object string result |
IsMaliciousIndicatorFound | Checks if the investigation found any malicious indicators (file, URL, IP address, domain, or email). Returns "yes" if at least one malicious indicator is found. |
GetLicenseID | Returns the license ID. |
GetErrorsFromEntry | Get the error(s) associated with a given entry/entries. Use ${lastCompletedTaskEntries} to check the previous task entries. The automation will return an array of the error contents from those entries. |
CreateNewIndicatorsOnly | Create indicators to the Threat Intel database only if they are not registered. All submitted indicators will be associated with the parent incident. When using the script with many indicators, or when the Threat Intel Management database is highly populated, this script may have low performance issue. |
CreateIndicatorsFromSTIX | Creates indicators from the submitted STIX file. Supports STIX 1.0 and STIX 2.x. This automation creates indicators and adds an indicator's relationships if available. |
EncodeToAscii | Input Text Data to Encode as ASCII (Ignores any chars that aren't interpreted as ASCII) |
ServerLogs | Uses the ssh integration to grab the host server logs. |
ConvertDatetoUTC | Converts a date from a different timezone to UTC timezone. |
IsDomainInternal | The script takes one or more domain names and checks whether they're in the Cortex XSOAR list defined in the InternalDomainsListName argument. By default, the InternalDomainsListName argument will use the Cortex XSOAR list called "InternalDomains". |
ConvertTableToHTML | Converts a given array to an HTML table |
ContentPackInstaller | Content packs installer from marketplace. |
SetByIncidentId | Works the same as the 'Set' command, but can work across incidents by specifying 'id' as an argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
DeleteContext | Delete field from context. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
DisableUserWrapper | This script allows disabling a specified user using one or more of the following integrations: SailPointIdentityIQ, ActiveDirectoryQuery, Okta, MicrosoftGraphUser, and IAM. |
IncidentFields | Returns a dict of all incident fields that exist in the system. |
Set | Set a value in context under the key you entered. |
LanguageDetect | Language detection based on Google's language-detection. |
PrintContext | Pretty-print the contents of the playbook context. |
FailedInstances | Executes a test for all integration instances available and returns detailed information about succeeded and failed integration instances. |
ParseHTMLIndicators | This script will extract indicators from given HTML and will handle bad top-level domains to avoid false positives caused by file extensions. |
TopMaliciousRatioIndicators | Find the top malicious ratio indicators. |
IncreaseIncidentSeverity | Optionally increases the incident severity to the new value if it is greater than the existing severity. |
PDFUnlocker | Removing the password protection from a PDF file and adding a new file entry with the unlocked PDF. |
ExtractIndicatorsFromWordFile | Used to extract indicators from Word files (DOC, DOCX). This automation runs using the default Limited User role, unless you explicitly change the permissions. |
DBotClosedIncidentsPercentage | Data output script for populating dashboard pie graph widget with the percentage of incidents closed by DBot vs. incidents closed by analysts. |
VerifyJSON | Verifies if the supplied JSON string is valid and optionally verifies against a provided schema. The script utilizes Powershell's Test-JSON cmdlet. |
CheckIndicatorValue | Check if indicators exist in the Threat Intel database. |
http | Sends http request. Returns the response as json. |
FindSimilarIncidents | Deprecated. Use DBotFindSimilarIncidents instead. Finds similar incidents by common incident keys, labels, custom fields or context keys. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
IndicatorMaliciousRatioCalculation | Return indicators appears in resolved incidents, and resolved incident ids. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
ExtractIndicatorsFromTextFile | Extract indicators from a text-based file.
This automation runs using the default Limited User role, unless you explicitly change the permissions. |
NumberOfPhishingAttemptPerUser | Shows a bar chart of the number of incident the 'To' and 'From' email addresses. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
CloseInvestigationAsDuplicate | Close the current investigation as duplicate to other investigation. |
GenerateSummaryReportButton | This button will generate summary 'Case Report' template for a given Incident |
SetDateField | Sets a custom incident field with current date |
ToTable | Convert an array to a nice table display. Usually, from the context. |
FilterByList | Checks whether the specified item is in a list. The default list is the Demisto Indicators Whitelist. |
CalculateEntropy | Calculates the entropy for the given data. |
GetListRow | Parses a list by header and value. |
cveReputationV2 | Provides the severity of the CVE based on the CVSS score where available. |
ConvertTimezoneFromUTC | Takes UTC and converts it to the specified timezone. Format must match the UTC date's format and output will be the same format. Can use in conjunction with ConvertDateToString |
SetGridField | Creates a Grid table from items or key-value pairs. |
URLReputation | A context script for URL entities. |
DockerHardeningCheck | Checks if the Docker container running this script has been hardened according to the recommended settings at: https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Docker-Hardening-Guide |
IsEmailAddressInternal | Checks if the email address is part of the internal domains. |
StixCreator | Gets a list of indicators from the indicators argument, and generates a JSON file in STIX 2.1 format. |
Base64Encode | Will encode an input using Base64 format. |
ExtractDomainAndFQDNFromUrlAndEmail | Extracts domains and FQDNs from URLs and emails. |
DecodeMimeHeader | Decode MIME base64 headers. |
ChangeRemediationSLAOnSevChange | Changes the remediation SLA once a change in incident severity occurs. |
ExportContextToJSONFile | Exports the Context for the current Incident to a JSON file in the war room. |
IsIPInRanges | Returns yes if the IP is in one of the ranges provided, returns no otherwise. |
GetByIncidentId | Gets a value from the specified incident's context. |
ExportIncidentsToCSV | This automation uses the Core REST API Integration to batch export Incidents to CSV and return the resulting CSV file to the war room. |
Dig | DNS lookup utility to provide 'A' and 'PTR' record |
ReadPDFFileV2 | Load a PDF file's content and metadata into context. Supports extraction of hashes, urls, and emails when available. |
MatchRegex | Deprecated. Use the MatchRegexV2 script instead. |
DisplayHTMLWithImages | Display HTML with embedded images. |
FetchIndicatorsFromFile | Fetches indicators from a file. Supports TXT, XLS, XLSX, CSV, DOC and DOCX file types. |
SCPPullFiles | Take a list of devices and pull a specific file (given by path) from each using SCP. |
NotInContextVerification | Not in context verification is a script that executes the given command and verifies that the specified field is not in the context after execution. |
GenerateAsBuiltConfiguration | Generate a JSON file that can be downloaded and used to create the As-Built document for Cortex XSOAR. |
displayMappedFields | Display the mapped fields in a dynamic-section. |
ContextGetEmails | Gets all email addresses in context, excluding ones given. |
SearchIncidentsV2 | Searches Demisto incidents. A summarized version of this scrips is avilable with the summarizedversion argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
DisplayHTML | Display HTML in the War Room. |
ReadQRCode | Extracts the text from a QR code. The output of this script includes the output of the script "extractIndicators" run on the text extracted from the QR code. |
ExtractAttackPattern | Extract Attack Pattern Threat Intel Object. After auto extract extracts the Attack Pattern IDs, this script is executed and extracts the value (name) of the Attack Pattern. |
VerifyIPv6Indicator | Verify that the address is a valid IPv6 address. |
AreValuesEqual | Check whether the values provided in arguments are equal. If either of the arguments are missing, no is returned. |
ExtractFQDNFromUrlAndEmail | Extracts FQDNs from URLs and emails. |
AppendindicatorFieldWrapper | A wrapper script to the 'AppendindicatorField' script that enables adding tags to certain indicators. |
SSDeepReputation | Calculate ssdeep reputation based on similar files (by ssdeep similarity) on the system. |
DeduplicateValuesbyKey | Given a list of objects and a key found in each of those objects, return a unique list of values associated with that key. Returns error if the objects provided do not contain the key of interest. |
UnEscapeIPs | Remove escaping chars from IP |
VerdictResult | This widget displays the incident verdict or the alert verdict based on the 'incident.verdict' or 'alert.verdict' field. |
CheckContextValue | This script checks that a context key exists (and contains data), and optionally checks the value of the context key for a match against an input value. If a regex is not supplied, the script checks that the key is not empty. This script can be used with the "GenericPolling" playbook to poll for field population or that a field contains a specific value. This scripts does not support a context key which holds a list of values. |
RunDockerCommand | This command will allow you to run commands against a local Docker Container. You can run commands like wc for instance with word count, or other types of commands that you want on the docker container. We recommend for tools that you want to use that are not part of the default Docker container, to cope this Automation script and then create a customer docker container with /docker_image_create with a custom docker container to add any command level tool to Demisto and output the results directly to the context. |
GenericPollingScheduledTask | Runs the polling command repeatedly, completes a blocking manual task when polling is done. |
ConvertXmlFileToJson | Converts XML file entry to JSON format |
cvss_color | This dynamic automation parses the CVSS score of a CVE and presents it in the layout in color according to its score. |
BinarySearchPy | Deprecated. No available replacement. Search for a binary on an endpoint using Carbon Black |
CheckSenderDomainDistance | Get the string distance for the sender from our domain |
ExportToCSV | Export given array to csv file. |
PrintErrorEntry | Prints an error entry with a given message. |
FileCreateAndUploadV2 | Creates a file (using the given data input or entry ID) and uploads it to the current investigation War Room. |
GetFieldsByIncidentType | Returns the incident field names associated to the specified incident type. |
ShowOnMap | Returns a map entry with a marker on the given coordinates (lat,lng), or address (requires a configured GoogleMaps instance). |
IsolationAssetWrapper | This is a wrapper to isolate or unisolate hash lists from Cortex XDR, MSDE or CrowdStrike (Available from Cortex XSOAR 6.0.0). |
GenerateSummaryReports | Generate report summaries for the passed incidents. |
hideFieldsOnNewIncident | When you apply this script to an incident field, that incident field is hidden for new incidents, and it displays in edit mode. |
listExecutedCommands | Lists executed commands in War Room |
StringReplace | Replaces regex match/es in string. |
MapValues | Map the given values to the translated values. If given values: a,b,c and translated: 1,2,3 then input is a will return 1 |
GetInstances | Returns integration instances configured in Cortex XSOAR. You can filter by instance status and/or brand name (vendor). |
ScheduleCommand | Schedule a command to run inside the war room at a future time (once or reoccurring) |
GridFieldSetup | Automation used to more easily populate a grid field. This is necessary when you want to assign certain values as static or if you have context paths that you will assign to different values as well. Instead of a value you can enter |
RepopulateFiles | After running DeleteContext, this script can repopulate all the file entries in the ${File} context key |
MarkAsEvidenceByTag | Mark entries as evidence if they are tagged with given tag |
ContextGetHashes | Gets hashes (MD5,SHA1,SHA256) from context. |
BreachConfirmationHTML | |
FileToBase64List | Encode a file as base64 and store it in a Demisto list. |
ResolveShortenedURL | This script resolves the original URL from a given shortened URL and places the resolved URL in the playbook context and output. |
commentsToContext | Takes the comments of a given entry ID and stores them in the incident context, under a provided context key. |
IsInternalDomainName | This script accepts multiple values for both arguments and will iterate through each of the domains to check if the specified subdomains are located in at least one of the specified main domains. If the tested subdomain is in one of the main domains, the result will be true. For example, if the domain_to_check values are apps.paloaltonetworks.com and apps.paloaltonetworks.bla and the domains_to_compare values are paloaltonetworks.com and demisto.com, the result for apps.paloaltonetworks.com will be true since it is a part of the paloaltonetworks.com domain. The result for apps.paloaltonetworks.bla will be false since it is not a part of the paloaltonetworks.com or demisto.com domain. |
ParseExcel | The automation takes Excel file (entryID) as an input and parses its content to the war room and context. |
PreProcessImage | This script pre-processes (resizes, sharpens, and grayscales) an image file from context, given an entry_id. |
EmailAskUserResponse | Extract user's response from EmailAskUser reply. Returns the first textual response line of the provided entry that contains the reply body. Use ${lastCompletedTaskEntries} to analyze the previous playbook task containing the user's reply. |
ContextContains | This script searches for a value in a context path. |
FileCreateAndUpload | Deprecated. Use FileCreateAndUploadV2 instead. Will create a file (using the given data input or entry ID) and upload it to current investigation war room. |
IsGreaterThan | Checks if one number(float) as bigger than the other(float) |
checkValue | Gets a value and return it. This is to be used in playbook conditional tasks - get a value from incident field, label or context, and act accordingly. |
IsValueInArray | Indicates whether a given value is a member of given array |
BMCTool | Parse RDP bitmap cache data into a single collage image file. |
IdentifyAttachedEmail | Identify whether the incident includes an email message attached as an eml or msg file and return the answer to playbook. Also saves the identified entry ID to context for use for later. Commonly used in automated playbooks that handle phishing reports sent to a special phishing mailbox set up by the security team. |
PositiveDetectionsVSDetectionEngines | Shows a bar chart of the number of Positive Detections out of overall detections |
ExtractDomainFromUrlAndEmail | Extract Domain(s) from URL(s) and/or Email(s). |
CopyNotesToIncident | Copy all entries marked as notes from current incident to another incident. |
IsUrlPartOfDomain | Checks if the supplied URLs are in the specified domains. |
ServerLogs_docker | Uses the ssh integration to grab the host server logs. |
ExtractEmailV2 | Verifies that an email address is valid and only returns the address if it is valid. |
SSDeepSimilarity | This script finds similar files that can be related to each other by fuzzy hash (SSDeep). |
MathUtil | Script will run the provided mathematical action on 2 provided values and produce a result. |
UnPackFile | Deprecated. Use the UnzipFile script instead. UnPack a file using fileName or entryID to specify a file. Files unpacked will be pushed to the war room and names will be pushed to the context. |
SearchIndicator | Searches Cortex XSOAR Indicators. Search for XSOAR Indicators and returns the id, indicator_type, value, and score/verdict. You can add additional fields from the indicators using the add_field_to_context argument. |
EmailReputation | A context script for Email entities. |
ConvertXmlToJson | Converts XML string to JSON format |
SendMessageToOnlineUsers | Send message to Demisto online users over Email, Slack, Mattermost or all. |
StopTimeToAssignOnOwnerChange | Stops the "Time To Assign" timer if the owner of the incident was changed. |
SetTime | Fill the current time in a custom incident field |
Base64EncodeV2 | Encodes an input to Base64 format. |
CalculateTimeDifference | Calculate the time difference, in minutes |
GenerateAsBuilt | Generate an as built document, as HTML, based on the running XSOAR instance. Requires an instance of the Demisto API integration configured. |
findIncidentsWithIndicator | Lookup incidents with specified indicator. Use currentIncidentId to omit the existing incident from output. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
PopulateCriticalAssets | Populates critical assets in a grid field that has the section headers "Asset Type" and "Asset Name". |
GeneratePassword | This function generates a password and allows various parameters to customize the properties of the password depending on the use case (e.g. password complexity requirements). The default behavior is to generate a password of random length including all four character classes (upper, lower, digits, symbols) with at least five and at most ten characters per class. The min_* values all default to 0. This means that if the command is executed in this way: The debug parameter will print certain properties of the command into the WarRoom for easy diagnostics. |
ExportIndicatorsToCSV | This automation uses the Core REST API Integration to batch export Indicators to CSV and return the resulting CSV file to the war room. |
LessThanPercentage | Checks if one percentage is less than another |
StopScheduledTask | This stops the scheduled task whose ID is given in the taskID argument. |
ParseEmailFilesV2 | Parse an email from an eml or msg file and populate all relevant context data to investigate the email. Also extracts inner attachments and returns them to the war room. The incident labels themselves are preserved and not modified - only the "Label/x" context items that originated from the labels, and the best practice is to rely on these for the remainder of the playbook. This script is based on the parse-emails XSOAR python package, check the script documentation for more info. |
GenerateRandomString | Generates random string |
AquatoneDiscoverV2 | aquatone-discover will find the targets nameservers and shuffle DNS lookups between them. Should a lookup fail on the target domains nameservers, aquatone-discover will fall back to using Google public DNS servers to maximize discovery. |
ContainsCreditCardInfo | Check if a given value is true. Will return 'no' otherwise |
CompareLists | Compare two lists and put the differences in context. |
ReadFile | Load the contents of a file into context. |
ExportAuditLogsToFile | Uses the Core REST API integration to query the server audit trail logs, and return back a CSV or JSON file. |
IPReputation | A context script for IP entities. |
ContextFilter | Filter context keys by applying one of the various available manipulations and storing in a new context key. Please notice that the resulting context key will not be available automatically as an option but you can still specify it. |
RemoveKeyFromList | Removes a key in key/value store backed by an XSOAR list. |
Strings | Extract strings from a file with optional filter - similar to binutils strings command |
EditServerConfig | Edit the server configuration (under settings/troubleshooting). You can either add a new configuration or update and remove an existing one. |
ShowIncidentIndicators | This script is used to display the indicators of an incident in an incident field of type Array. It can be used to select indicators from the incident in order to later perform some actions, like tagging the indicators for blocking via EDL. |
ListUsedDockerImages | List all Docker images that are in use by the installed integrations and automations. |
IsIntegrationAvailable | Returns 'yes' if integration brand is available. Otherwise returns 'no'. |
GetEntries | Collect entries matching to the conditions in the war room |
StringSimilarity | This automation calculates the similarity ratio between every string in 2 different arrays and outputs a decimal value between 0.0 and 1.0 (1.0 if the sequences are identical, and 0.0 if they don't have anything in common). |
LoadJSONFileToContext | Loads a JSON file from the war room to context. |
ScheduleGenericPolling | Called by the GenericPolling playbook, schedules the polling task. |
DBotUpdateLogoURLPhishing | Add, remove, or modify logos from the URL Phishing model. |
FormatURL | Strips, unquotes and unescapes URLs. If the URL is a Proofpoint or ATP URL, extracts its redirect URL. If more than one URL is passed to the formatter, the separator must be a pipe ("|"). |
Base64ListToFile | Converts Base64 file in a list to a binary file and upload to warroom |
ParseEmailFiles | Deprecated. Use ParseEmailFilesV2 instead." Parse an email from an eml or msg file and populate all relevant context data to investigate the email. Also extracts inner attachments and returns them to the war room. The incident labels themselves are preserved and not modified - only the "Label/x" context items that originated from the labels, and the best practice is to rely on these for the remainder of the playbook. |
GetStringsDistance | Get the string distance between inputString and compareString (compareString can be a comma-separated list) based on Levenshtein Distance algorithm. |
IPToHost | Try to get the hostname correlated with the input IP. |
GetDuplicatesMlv2 | Deprecated. Use the "PhishingDedupPreprocessingRule" script instead. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
Name | Description |
---|---|
Health insurance breached | Is health insurance breached |
Medical Information breached | Is Medical Information breached |
DPO E-mail Address | |
Company Address | |
Size - turnover | |
Date/time of the breach | |
Consumer Reporting Agencies Notification | |
Company Name | |
Affected Individuals Contact Information | |
Company Postal Code | |
Contact Address | |
GDPR Notify Authorities | "In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons." - GDPR Art. 33 |
Account information breached | Is account information breached |
Affected data | "‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person;" - GDPR Art. 4 |
Affected Data Type | |
Resident Notification Option | |
Country where the breach took place | |
Postal Code | |
Malicious Cause (If the cause is a malicious attack) | |
Attorney General Notification | |
Data Encryption Status | |
Where is data hosted | |
Approximate number of affected data subjects | |
State CISO Notification | |
State where the breach took place | |
Contact Telephone number | |
Breach Confirmation | Is the DPO confirm the breach |
Residents Email Address | |
PII Data Type | |
Contact Name | |
Other PII data breached | Is other PII data breached |
Management Notification | |
Sector of Affected Party | |
Secretary Notification | |
Likely Impact | "A data protection impact assessment (…) shall in particular be required in the case of: (a) a systematic and extensive evaluation of personal aspects relating to natural persons which is based on automated processing, including profiling, and on which decisions are based that produce legal effects concerning the natural person or similarly significantly affect the natural person; (b) processing on a large scale of special categories of data referred to in Article 9(1), or of personal data relating to criminal convictions and offences referred to in Article 10; or (c) a systematic monitoring of a publicly accessible area on a large scale. - GDPR Art. 35 |
E-mail Address | |
Individuals Notification | |
Financial information breached | Is financial information breached |
Company Country | |
Telephone no. | |
Possible Cause of the Breach | |
Size - number of employees | |
Unique biometric data breached | Is unique biometric data breached |
DPO Notification | |
Measures to Mitigate | " (d) describe the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects." - GDPR Art. 33 |
Media Notification | The status of the media notification |
Contact Email address | |
Company has Insurance for the Breach | |
Unique identification number breached | Is unique identification number breached |
Company City | |
Country where business has its main establishment | "‘main establishment’ means: as regards a controller with establishments in more than one Member State, the place of its central administration in the Union, unless the decisions on the purposes and means of the processing of personal data are taken in another establishment of the controller in the Union and the latter establishment has the power to have such decisions implemented, in which case the establishment having taken such decisions is to be considered to be the main establishment; as regards a processor with establishments in more than one Member State, the place of its central administration in the Union, or, if the processor has no central administration in the Union, the establishment of the processor in the Union where the main processing activities in the context of the activities of an establishment of the processor take place to the extent that the processor is subject to specific obligations under this Regulation;" - GDPR Art. 4 |
Is the Data Subject to DPIA |
Name | Description |
---|---|
InternalDomains | |
PrivateIPs |
Name | Description |
---|---|
ContentPackInstaller | Content packs installer from marketplace. |
SetTime | Fill the current time in a custom incident field |
ExifRead | Read image files metadata and provide Exif tags. |
ExtractIndicatorsFromTextFile | Extract indicators from a text-based file.
This automation runs using the default Limited User role, unless you explicitly change the permissions. |
ScheduleGenericPolling | Called by the GenericPolling playbook, schedules the polling task. |
ParseExcel | The automation takes Excel file (entryID) as an input and parses its content to the war room and context. |
IsValueInArray | Indicates whether a given value is a member of given array |
CloseInvestigationAsDuplicate | Close the current investigation as duplicate to other investigation. |
GetStringsDistance | Get the string distance between inputString and compareString (compareString can be a comma-separated list) based on Levenshtein Distance algorithm. |
ReplaceMatchGroup | Returns a string with all matches of a regex pattern groups replaced by a replacement. |
VerifyJSON | Verifies if the supplied JSON string is valid and optionally verifies against a provided schema. The script utilizes Powershell's Test-JSON cmdlet. |
SetMultipleValues | Set multiple keys/values to the context. |
SetDateField | Sets a custom incident field with current date |
GenerateSummaryReportButton | This button will generate summary 'Case Report' template for a given Incident |
ExportIndicatorsToCSV | This automation uses the Core REST API Integration to batch export Indicators to CSV and return the resulting CSV file to the war room. |
RunDockerCommand | This command will allow you to run commands against a local Docker Container. You can run commands like wc for instance with word count, or other types of commands that you want on the docker container. We recommend for tools that you want to use that are not part of the default Docker container, to cope this Automation script and then create a customer docker container with /docker_image_create with a custom docker container to add any command level tool to Demisto and output the results directly to the context. |
ReadPDFFileV2 | Load a PDF file's content and metadata into context. Supports extraction of hashes, urls, and emails when available. |
LookupCSV | Parses a CSV and looks for a specific value in a specific column, returning a dict of the entire matching row. If no column value is specified, the entire CSV is read into the context. |
IndicatorMaliciousRatioCalculation | Return indicators appears in resolved incidents, and resolved incident ids. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
AssignToMeButton | Assigns the current Incident to the Cortex XSIAM user who clicked the button |
OnionURLReputation | This script adds the reputation to Onion URL indicators. The script is automatically triggered when a Onion URL indicator is auto-extracted. For instance, if you run a Cortex XSIAM CLI on a valid Onion URL, the indicators are extracted automatically and this script is triggered for the extracted indicators. |
Base64EncodeV2 | Encodes an input to Base64 format. |
Base64Encode | Will encode an input using Base64 format. |
PortListenCheck | Checks whether a port was open on given host. |
IncreaseIncidentSeverity | Optionally increases the incident severity to the new value if it is greater than the existing severity. |
IncreaseAlertSeverity | Optionally increases the alert severity to the new value if it is greater than the existing severity. |
JSONFileToCSV | Script to convert a War Room output JSON File to a CSV file. |
ExposeIncidentOwner | Expose the incident owner into IncidentOwner context key |
ExposeAlertOwner | Expose the alert owner into AlertOwner context key |
SearchIndicator | Searches Cortex XSIAM Indicators. Search for XSOAR Indicators and returns the id, indicator_type, value, and score/verdict. You can add additional fields from the indicators using the add_field_to_context argument. |
RemoveKeyFromList | Removes a key in key/value store backed by an XSOAR list. |
GetListRow | Parses a list by header and value. |
SetAndHandleEmpty | Set a value in context under the key you entered. If no value is entered, the script doesn't do anything. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
GetEntries | Collect entries matching to the conditions in the war room |
CreateNewIndicatorsOnly | Create indicators to the Threat Intel database only if they are not registered. All submitted indicators will be associated with the parent incident. When using the script with many indicators, or when the Threat Intel Management database is highly populated, this script may have low performance issue. |
checkValue | Gets a value and return it. This is to be used in playbook conditional tasks - get a value from incident field, label or context, and act accordingly. |
SSDeepReputation | Calculate ssdeep reputation based on similar files (by ssdeep similarity) on the system. |
LinkIncidentsButton | Incident action button script to link or unlink Incidents from an Incident |
LinkAlertsButton | Alert action button script to link or unlink Alerts from an Alert |
IsolationAssetWrapper | This is a wrapper to isolate or unisolate hash lists from Cortex XDR, MSDE or CrowdStrike (Available from Cortex XSIAM 6.0.0). |
MatchRegexV2 | Extracts regex data from the provided text. The script support groups and looping. |
cveReputationV2 | Provides the severity of the CVE based on the CVSS score where available. |
AddDBotScoreToContext | Add DBot score to context for indicators with custom vendor, score, reliability, and type. |
SetGridField | Creates a Grid table from items or key-value pairs. |
EmailAskUser | Ask a user a question via email and process the reply directly into the investigation. |
ZipStrings | Joins values from two lists by index according to a given format. |
CheckSenderDomainDistance | Get the string distance for the sender from our domain |
CopyContextToField | Copy a context key to an incident field of multiple incidents, based on an incident query. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
DumpJSON | Dumps a json from context key input, and returns a json object string result |
ConvertXmlToJson | Converts XML string to JSON format |
cvss_color | This dynamic automation parses the CVSS score of a CVE and presents it in the layout in color according to its score. |
LessThanPercentage | Checks if one percentage is less than another |
Dig | DNS lookup utility to provide 'A' and 'PTR' record |
UnzipFile | Unzip a file using fileName or entryID to specify a file. Unzipped files will be loaded to the War Room and names will be put into the context. |
RemoteExec | Execute a command on a remote machine (without installing a D2 agent) |
IdentifyAttachedEmail | Identify whether the incident includes an email message attached as an eml or msg file and return the answer to playbook. Also saves the identified entry ID to context for use for later. Commonly used in automated playbooks that handle phishing reports sent to a special phishing mailbox set up by the security team. |
DeduplicateValuesbyKey | Given a list of objects and a key found in each of those objects, return a unique list of values associated with that key. Returns error if the objects provided do not contain the key of interest. |
DomainReputation | A context script for Domain entities |
MathUtil | Script will run the provided mathematical action on 2 provided values and produce a result. |
RunPollingCommand | Runs a specified polling command one time. This is useful for initiating a local playbook context before running a polling scheduled task. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
PopulateCriticalAssets | Populates critical assets in a grid field that has the section headers "Asset Type" and "Asset Name". |
GridFieldSetup | Automation used to more easily populate a grid field. This is necessary when you want to assign certain values as static or if you have context paths that you will assign to different values as well. Instead of a value you can enter |
GetTime | Retrieves the current date and time. |
ticksToTime | Converting time in Ticks to readable time. Ticks are used to represent time by some vendors, most commonly by Microsoft. |
DisplayHTML | Display HTML in the War Room. |
GenerateAsBuilt | Generate an as built document, as HTML, based on the running XSOAR instance. Requires an instance of the Demisto API integration configured. |
PcapHTTPExtractor | Allows to parse and extract http flows (requests & responses) from a pcap/pcapng file. |
HttpV2 | Sends a HTTP request with advanced capabilities |
GetEnabledInstances | Gets all currently enabled integration instances. |
ContextFilter | Filter context keys by applying one of the various available manipulations and storing in a new context key. Please notice that the resulting context key will not be available automatically as an option but you can still specify it. |
Set | Set a value in context under the key you entered. |
CalculateEntropy | Calculates the entropy for the given data. |
CertificateReputation | Enrich and calculate the reputation of a certificate indicator. |
VerifyIPv6Indicator | Verify that the address is a valid IPv6 address. |
CheckContextValue | This script checks that a context key exists (and contains data), and optionally checks the value of the context key for a match against an input value. If a regex is not supplied, the script checks that the key is not empty. This script can be used with the "GenericPolling" playbook to poll for field population or that a field contains a specific value. This scripts does not support a context key which holds a list of values. |
SCPPullFiles | Take a list of devices and pull a specific file (given by path) from each using SCP. |
IPReputation | A context script for IP entities. |
UnPackFile | Deprecated. Use the UnzipFile script instead. UnPack a file using fileName or entryID to specify a file. Files unpacked will be pushed to the war room and names will be pushed to the context. |
ProvidesCommand | Finds which integrations implement a specific Demisto command. The results will be returned as comma-separated values (CSV). The "Core REST API" integration must first be enabled. |
ParseCSV | This script will parse a CSV file and place the unique IPs, Domains and Hashes into the context. |
StringSimilarity | This automation calculates the similarity ratio between every string in 2 different arrays and outputs a decimal value between 0.0 and 1.0 (1.0 if the sequences are identical, and 0.0 if they don't have anything in common). |
ShowScheduledEntries | Show all scheduled entries for specific incident. |
findIncidentsWithIndicator | Lookup incidents with specified indicator. Use currentIncidentId to omit the existing incident from output. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
findAlertsWithIndicator | Lookup alerts with specified indicator. Use currentAlertId to omit the existing alert from output. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
JSONtoCSV | Convert a JSON War Room output via EntryID to a CSV file. |
GetErrorsFromEntry | Get the error(s) associated with a given entry/entries. Use ${lastCompletedTaskEntries} to check the previous task entries. The automation will return an array of the error contents from those entries. |
AddKeyToList | Adds/Replaces a key in key/value store backed by an XSOAR list. |
StringReplace | Replaces regex match/es in string. |
StringLength | Returns the length of the string passed as argument |
MaliciousRatioReputation | Set indicator reputation to "suspicious" when malicious ratio is above threshold. |
ZipFile | Zip a file and upload to war room. |
IsGreaterThan | Checks if one number(float) as bigger than the other(float) |
ConvertCountryCodeCountryName | Convert country name to country code or country code to country name. |
displayMappedFields | Display the mapped fields in a dynamic-section. |
FilterByList | Checks whether the specified item is in a list. The default list is the Demisto Indicators Whitelist. |
ExportToXLSX | Exports context data to a Microsoft Excel Open XML Spreadsheet (XLSX) file. |
FetchIndicatorsFromFile | Fetches indicators from a file. Supports TXT, XLS, XLSX, CSV, DOC and DOCX file types. |
LoadJSONFileToContext | Loads a JSON file from the war room to context. |
http | Sends http request. Returns the response as json. |
DecodeMimeHeader | Decode MIME base64 headers. |
TopMaliciousRatioIndicators | Find the top malicious ratio indicators. |
TextFromHTML | Extract regular text from the given HTML. |
ShowLocationOnMap | Show indicator geo location on map. |
GetLicenseID | Returns the license ID. |
ListUsedDockerImages | List all Docker images that are in use by the installed integrations and automations. |
ExampleJSScript | This is only an example script, to showcase how to use and write JavaScript scripts |
CEFParser | Parse CEF data into the context. Please notice that outputs will display only the 7 mandatory fields even if the CEF event includes many other custom or extended fields. |
ArrayToCSV | Converts a simple Array into a textual comma separated string |
StixCreator | Gets a list of indicators from the indicators argument, and generates a JSON file in STIX 2.1 format. |
GetServerURL | Get the Server URL. |
ExportAuditLogsToFile | Uses the Core REST API integration to query the server audit trail logs, and return back a CSV or JSON file. |
AquatoneDiscoverV2 | aquatone-discover will find the targets nameservers and shuffle DNS lookups between them. Should a lookup fail on the target domains nameservers, aquatone-discover will fall back to using Google public DNS servers to maximize discovery. |
GetInstances | Returns integration instances configured in Cortex XSIAM. You can filter by instance status and/or brand name (vendor). |
MatchRegex | Deprecated. Use the MatchRegexV2 script instead. |
DBotAverageScore | The script calculates the average DBot score for each indicator in the context. |
SetWithTemplate | Set a value built by a template in context under the key you entered. |
CalculateTimeDifference | Calculate the time difference, in minutes |
ExportIncidentsToCSV | This automation uses the Core REST API Integration to batch export Incidents to CSV and return the resulting CSV file to the war room. |
ExportAlertsToCSV | This automation uses the Core REST API Integration to batch export Alerts to CSV and return the resulting CSV file to the war room. |
ExtractEmailV2 | Verifies that an email address is valid and only returns the address if it is valid. |
IPNetwork | Gather information regarding CIDR - |
GenerateInvestigationSummaryReport | A script to generate investigation summary report in an automated way |
BinarySearchPy | Deprecated. No available replacement. Search for a binary on an endpoint using Carbon Black |
UtilAnyResults | Utility script to use in playbooks - returns "yes" if the input is non-empty. |
DockerHardeningCheck | Checks if the Docker container running this script has been hardened according to the recommended settings at: https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Docker-Hardening-Guide |
AreValuesEqual | Check whether the values provided in arguments are equal. If either of the arguments are missing, no is returned. |
MarkAsNoteByTag | Mark entries as notes if they are tagged with given tag. |
ContextGetPathForString | Searches for string in context and returns context path, returns null if not found. |
ExtractDomainFromUrlAndEmail | Extract Domain(s) from URL(s) and/or Email(s). |
ParseEmailFiles | Deprecated. Use ParseEmailFilesV2 instead." Parse an email from an eml or msg file and populate all relevant context data to investigate the email. Also extracts inner attachments and returns them to the war room. The incident labels themselves are preserved and not modified - only the "Label/x" context items that originated from the labels, and the best practice is to rely on these for the remainder of the playbook. |
ToTable | Convert an array to a nice table display. Usually, from the context. |
BreachConfirmationHTML | |
UnEscapeURLs | Extract URLs redirected by security tools like Proofpoint. |
PositiveDetectionsVSDetectionEngines | Shows a bar chart of the number of Positive Detections out of overall detections |
DBotClosedIncidentsPercentage | Data output script for populating dashboard pie graph widget with the percentage of incidents closed by DBot vs. incidents closed by analysts. |
DBotClosedAlertsPercentage | Data output script for populating dashboard pie graph widget with the percentage of alerts closed by DBot vs. alerts closed by analysts. |
AddEvidence | Adds provided entries to the incident Evidence Board. In playbook, can be positioned after a task to add the previous task's entries to Evidence Board automatically (with no need to provide arguments) |
PrintToParentIncident | Prints a value to the parent incident's war-room of the current alert. |
displayUtilitiesResults | This script displays the execution results of the tab's buttons in an HTML table format. |
IPToHost | Try to get the hostname correlated with the input IP. |
Exists | Check if a given value exists in the context. Will return 'no' for empty empty arrays. To be used mostly with DQ and selectors. |
GetFieldsByIncidentType | Returns the incident field names associated to the specified incident type. |
GetFieldsByAlertType | Returns the alert field names associated to the specified alert type. |
CreateHash | Creating a hash of a given input, support sha1, sha256, sha512, md5 and blake. Wrapper for https://docs.python.org/3/library/hashlib.html. |
FailedInstances | Executes a test for all integration instances available and returns detailed information about succeeded and failed integration instances. |
ConvertTableToHTML | Converts a given array to an HTML table |
Strings | Extract strings from a file with optional filter - similar to binutils strings command |
HTMLtoMD | Converts HTML to Markdown. |
MapValues | Map the given values to the translated values. If given values: a,b,c and translated: 1,2,3 then input is a will return 1 |
IsIPInRanges | Returns yes if the IP is in one of the ranges provided, returns no otherwise. |
FileCreateAndUploadV2 | Creates a file (using the given data input or entry ID) and uploads it to the current investigation War Room. |
PrintRaw | Prints a raw representation of a string or object, visualising things likes tabs and newlines. For instance, '\n' will be displayed instead of a newline character, or a Windows CR will be displayed as '\r\n'. This is useful for debugging issues where things aren't behaving as expected, such as when parsing a string with a regular expression. |
ParseEmailFilesV2 | Parse an email from an eml or msg file and populate all relevant context data to investigate the email. Also extracts inner attachments and returns them to the war room. The incident labels themselves are preserved and not modified - only the "Label/x" context items that originated from the labels, and the best practice is to rely on these for the remainder of the playbook. This script is based on the parse-emails XSOAR python package, check the script documentation for more info. |
ConvertXmlFileToJson | Converts XML file entry to JSON format |
PrintToIncident | Prints a value to the specified incident's war-room. |
ContextGetEmails | Gets all email addresses in context, excluding ones given. |
IsUrlPartOfDomain | Checks if the supplied URLs are in the specified domains. |
EditServerConfig | Edit the server configuration (under settings/troubleshooting). You can either add a new configuration or update and remove an existing one. |
ServerLogs_docker | Uses the ssh integration to grab the host server logs. |
HTTPListRedirects | List the redirects for a given URL |
IsInternalHostName | Checks if the supplied hostnames match either the organization's internal naming convention or the domain suffix. |
hideFieldsOnNewIncident | When you apply this script to an incident field, that incident field is hidden for new incidents, and it displays in edit mode. |
hideFieldsOnNewAlert | When you apply this script to an alert field, that alert field is hidden for new alerts, and it displays in edit mode. |
CheckIndicatorValue | Check if indicators exist in the Threat Intel database. |
GenericPollingScheduledTask | Runs the polling command repeatedly, completes a blocking manual task when polling is done. |
GenerateRandomUUID | Generates a random UUID (UUID 4). |
commentsToContext | Takes the comments of a given entry ID and stores them in the incident context, under a provided context key. |
PrintErrorEntry | Prints an error entry with a given message. |
ExtractFQDNFromUrlAndEmail | Extracts FQDNs from URLs and emails. |
ContainsCreditCardInfo | Check if a given value is true. Will return 'no' otherwise |
IsListExist | Check if list exist in demisto lists. |
ConvertFile | Converts a file from one format to a different format by using the convert-to function of Libre Office. For a list of supported input/output formats see: https://wiki.openoffice.org/wiki/Framework/Article/Filter/FilterList_OOo_3_0 |
Base64ListToFile | Converts Base64 file in a list to a binary file and upload to warroom |
DeleteContext | Delete field from context. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
ShowIncidentIndicators | This script is used to display the indicators of an incident in an incident field of type Array. It can be used to select indicators from the incident in order to later perform some actions, like tagging the indicators for blocking via EDL. |
ShowAlertIndicators | This script is used to display the indicators of an alert in an alert field of type Array. It can be used to select indicators from the alert in order to later perform some actions, like tagging the indicators for blocking via EDL. |
IsInternalDomainName | This script accepts multiple values for both arguments and will iterate through each of the domains to check if the specified subdomains are located in at least one of the specified main domains. If the tested subdomain is in one of the main domains, the result will be true. For example, if the domain_to_check values are apps.paloaltonetworks.com and apps.paloaltonetworks.bla and the domains_to_compare values are paloaltonetworks.com and demisto.com, the result for apps.paloaltonetworks.com will be true since it is a part of the paloaltonetworks.com domain. The result for apps.paloaltonetworks.bla will be false since it is not a part of the paloaltonetworks.com or demisto.com domain. |
PrintContext | Pretty-print the contents of the playbook context. |
ScheduleCommand | Schedule a command to run inside the war room at a future time (once or reoccurring) |
SendMessageToOnlineUsers | Send message to Demisto online users over Email, Slack, Mattermost or all. |
CreateIndicatorsFromSTIX | Creates indicators from the submitted STIX file. Supports STIX 1.0 and STIX 2.x. This automation creates indicators and adds an indicator's relationships if available. |
FileReputation | A context script for hash entities. |
CopyNotesToIncident | Copy all entries marked as notes from current incident to another incident. |
CopyNotesToAlert | Copy all entries marked as notes from current alert to another alert. |
PublishEntriesToContext | Publish entries to incident's context |
CheckFieldValue | This script checks that a field exists (and contains data), and optionally checks the value of the field for a match against an input value. If a regex is not supplied, the script checks that the field is not empty. This script can be used with the "GenericPolling" playbook to poll for field population or that a field contains a specific value. |
ParseWordDoc | Takes an input docx file (entryID) as an input and saves an output text file (file entry) with the original file's contents. |
GetDataCollectionLink | Generates the URL for a Data Collection Task into Context. Can be used to get the url for tasks send via Email, Slack, or even if you select "By Task Only". To generate links for specific users, add an array of users in the users argument. |
ExportToCSV | Export given array to csv file. |
PrettyPrint | Pretty-print data using Python's pprint library. This is useful for seeing the structure of incident and context data. Here's how to use it: !PrettyPrint value=${incident} |
IsIntegrationAvailable | Returns 'yes' if integration brand is available. Otherwise returns 'no'. |
SetByIncidentId | Works the same as the 'Set' command, but can work across incidents by specifying 'id' as an argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
SetByAlertId | Works the same as the 'Set' command, but can work across alerts by specifying 'id' as an argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
JsonUnescape | Recursively un-escapes JSON data if escaped JSON is found |
GetIndicatorDBotScore | Add into the incident's context the system internal DBot score for the input indicator. |
ConvertTimezoneFromUTC | Takes UTC and converts it to the specified timezone. Format must match the UTC date's format and output will be the same format. Can use in conjunction with ConvertDateToString |
Ping | Pings an IP or url address, to verify it's up. Note - On Cortex XSIAM 8 and Cortex XSIAM, the script can run only on a custom engine. |
URLReputation | A context script for URL entities. |
GenerateSummaryReports | Generate report summaries for the passed incidents. |
PrintToAlert | Prints a value to the specified alert's war-room. The alert must be in status "Under Investigation". |
GetDomainDNSDetails | Returns DNS details for a domain. |
GetDuplicatesMlv2 | Deprecated. Use the "PhishingDedupPreprocessingRule" script instead. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
IncidentAddSystem | Add a remote system (such as a desktop under investigation) to an investigation (this will allow you to install and agent on the system) |
AlertAddSystem | Add a remote system (such as a desktop under investigation) to an investigation (this will allow you to install and agent on the system) |
ExtractHyperlinksFromOfficeFiles | Extracts hyperlinks from office files. Supported file types are: xlsx, docx, pptx. |
ExtractIndicatorsFromWordFile | Used to extract indicators from Word files (DOC, DOCX). This automation runs using the default Limited User role, unless you explicitly change the permissions. |
ExtractDomainAndFQDNFromUrlAndEmail | Extracts domains and FQDNs from URLs and emails. |
BMCTool | Parse RDP bitmap cache data into a single collage image file. |
URLNumberOfAds | Fetches the numbers of ads in the given url. |
SearchIncidentsSummary | Searches Cortex XSIAM Incidents and returnrs the most relevant fields. Default search range is the last 30 days, if you want to change this, use the fromDate argument. Returns the id, name, type, severity, status, owner, and created/closed times to context. You can add additional fields using the add_field_to_context argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. Based on the SearchIncidentsV2 from the Common Scripts pack, but more efficient. |
SearchAlertsSummary | Searches Cortex XSIAM Alerts and returnrs the most relevant fields. Default search range is the last 30 days, if you want to change this, use the fromDate argument. Returns the id, name, type, severity, status, owner, and created/closed times to context. You can add additional fields using the add_field_to_context argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. Based on the SearchAlertsV2 from the Common Scripts pack, but more efficient. |
FindSimilarIncidents | Deprecated. Use DBotFindSimilarIncidents instead. Finds similar incidents by common incident keys, labels, custom fields or context keys. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
FindSimilarAlerts | Deprecated. Use DBotFindSimilarAlerts instead. Finds similar alerts by common alert keys, labels, custom fields or context keys. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
SetIndicatorGridField | This script updates an indicator's grid field in Cortex XSIAM with provided row data. You can input the rows directly or extract them from the context. |
PCAPMiner | Deprecated. Use PCAPMinerV2 instead. PCAPMiner is a tool to parse PCAP files and will return things like extracted files that are found, HTTP flows, and a variety of other information. It is uses a docker instance located on docker hub trorabaugh/dempcap:1.0. To use simply upload a PCAP file and then run PCAPMiner entryId="<your_entry_id>". To get the entry id click on the link on the top right hand corner of a file attachment. |
EmailDomainSquattingReputation | Check if an email address's domain is trying to squat other domain using Levenshtein distance algorithm. |
IncidentFields | Returns a dict of all incident fields that exist in the system. |
AlertFields | Returns a dict of all alert fields that exist in the system. |
VerifyCIDR | Verify that the CIDRs are valid. |
FormatURL | Strips, unquotes and unescapes URLs. If the URL is a Proofpoint or ATP URL, extracts its redirect URL. If more than one URL is passed to the formatter, the separator must be a pipe ("|"). |
CertificateExtract | Extract fields from a certificate file and return the standard context. |
IsEmailAddressInternal | Checks if the email address is part of the internal domains. |
DownloadAndArchivePythonLibrary | The script downloads a Python library using PIP, archives it, and returns the file to the war room. |
GetByIncidentId | Gets a value from the specified incident's context. |
GetByAlertId | Gets a value from the specified alert's context. |
FeedRelatedIndicatorsWidget | Widget script to view information about the relationship between an indicator, entity and other indicators and connect to indicators, if relevant. |
RepopulateFiles | After running DeleteContext, this script can repopulate all the file entries in the ${File} context key |
CompareIncidentsLabels | Compares the labels of two incidents. Returns the labels that are unique to each incident. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
CompareAlertsLabels | Compares the labels of two alerts. Returns the labels that are unique to each alert. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
PDFUnlocker | Removing the password protection from a PDF file and adding a new file entry with the unlocked PDF. |
EmailReputation | A context script for Email entities. |
AppendindicatorFieldWrapper | A wrapper script to the 'AppendindicatorField' script that enables adding tags to certain indicators. |
ContextContains | This script searches for a value in a context path. |
listExecutedCommands | Lists executed commands in War Room |
ContextGetIps | Gets all IP addresses in context, excluding ones given. |
URLSSLVerification | Verify URL SSL certificate |
TimeStampCompare | Compares a single timestamp to a list of timestamps. |
ExportContextToJSONFile | Exports the Context for the current Incident to a JSON file in the war room. |
MarkAsEvidenceByTag | Mark entries as evidence if they are tagged with given tag |
ResolveShortenedURL | This script resolves the original URL from a given shortened URL and places the resolved URL in the playbook context and output. |
Sleep | Sleep for X seconds. |
Prints text to war room (Markdown supported) | |
CreateEmailHtmlBody | This script allows sending an HTML email, using a template stored as a list item under Lists (Settings -> Advanced -> Lists).
Note: Sending emails require an active Mail Sender integration instance. |
GetDockerImageLatestTag | Gets docker image latest tag. Script simulates the docker pull flow but doesn't actually pull the image. Returns an entry with the docker image latest tag if all is good, otherwise will return an error. |
NotInContextVerification | Not in context verification is a script that executes the given command and verifies that the specified field is not in the context after execution. |
AssignAnalystToIncident | Assign analyst to incident. |
ChangeContext | Enables changing context in two ways. The first is to capitalize the first letter of each key in following level of the context key entered. The second is to change context keys to new values. |
ExtractAttackPattern | Extract Attack Pattern Threat Intel Object. After auto extract extracts the Attack Pattern IDs, this script is executed and extracts the value (name) of the Attack Pattern. |
CreateArray | Will create an array object in context from given string input |
GetIndicatorDBotScoreFromCache | Get the overall score for the indicator as calculated by DBot. |
NumberOfPhishingAttemptPerUser | Shows a bar chart of the number of incident the 'To' and 'From' email addresses. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
ReadQRCode | Extracts the text from a QR code. The output of this script includes the output of the script "extractIndicators" run on the text extracted from the QR code. |
StopScheduledTask | This stops the scheduled task whose ID is given in the taskID argument. |
WordTokenizer | Deprecated. Use DBotPreProcessTextData instead. |
DisplayHTMLWithImages | Display HTML with embedded images. |
LoadJSON | Loads a json from string input, and returns a json object result. |
FileCreateAndUpload | Deprecated. Use FileCreateAndUploadV2 instead. Will create a file (using the given data input or entry ID) and upload it to current investigation war room. |
GenerateRandomString | Generates random string |
VerdictResult | This widget displays the incident verdict or the alert verdict based on the 'incident.verdict' or 'alert.verdict' field. |
IsTrue | Check if a given value is true. Will return 'no' otherwise |
PreProcessImage | This script pre-processes (resizes, sharpens, and grayscales) an image file from context, given an entry_id. |
ConvertDatetoUTC | Converts a date from a different timezone to UTC timezone. |
IsMaliciousIndicatorFound | Checks if the investigation found any malicious indicators (file, URL, IP address, domain, or email). Returns "yes" if at least one malicious indicator is found. |
ContextGetHashes | Gets hashes (MD5,SHA1,SHA256) from context. |
LanguageDetect | Language detection based on Google's language-detection. |
ServerLogs | Uses the ssh integration to grab the host server logs. |
CVSSCalculator | This script calculates the CVSS Base Score, Temporal Score, and Environmental Score using either the CVSS 3.0 or CVSS 3.1 calculator according to https://www.first.org/cvss/ calculation documentation. |
ShowOnMap | Returns a map entry with a marker on the given coordinates (lat,lng), or address (requires a configured GoogleMaps instance). |
emailFieldTriggered | Sends email to incident owner when selected field is triggered. |
CompareLists | Compare two lists and put the differences in context. |
GeneratePassword | This function generates a password and allows various parameters to customize the properties of the password depending on the use case (e.g. password complexity requirements). The default behavior is to generate a password of random length including all four character classes (upper, lower, digits, symbols) with at least five and at most ten characters per class. The min_* values all default to 0. This means that if the command is executed in this way: The debug parameter will print certain properties of the command into the WarRoom for easy diagnostics. |
EncodeToAscii | Input Text Data to Encode as ASCII (Ignores any chars that aren't interpreted as ASCII) |
ParseYAML | Parses a YAML string into context |
SearchIncidentsV2 | Searches Demisto incidents. A summarized version of this scrips is avilable with the summarizedversion argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
SearchAlertsV2 | Searches Demisto alerts. A summarized version of this scrips is avilable with the summarizedversion argument. This automation runs using the default Limited User role, unless you explicitly change the permissions. |
ReadFile | Load the contents of a file into context. |
SSDeepSimilarity | This script finds similar files that can be related to each other by fuzzy hash (SSDeep). |
EmailAskUserResponse | Extract user's response from EmailAskUser reply. Returns the first textual response line of the provided entry that contains the reply body. Use ${lastCompletedTaskEntries} to analyze the previous playbook task containing the user's reply. |
isError | Check whether given entry/entries returned an error. Use ${lastCompletedTaskEntries} to check the previous task entries. If array is provided, will return yes if one of the entries returned an error. |
ExtractHTMLTables | Find tables inside HTML and extract the contents into objects using the following logic:
|
DisableUserWrapper | This script allows disabling a specified user using one or more of the following integrations: SailPointIdentityIQ, ActiveDirectoryQuery, Okta, MicrosoftGraphUser, and IAM. |
ContextSearchForString | Searches for string in a path in context. If path is null, string will be searched in full context. |
ParseHTMLIndicators | This script will extract indicators from given HTML and will handle bad top-level domains to avoid false positives caused by file extensions. |
FileToBase64List | Encode a file as base64 and store it in a Demisto list. |
CountArraySize | Count an array size |
UnEscapeIPs | Remove escaping chars from IP |
Name | Description |
---|---|
Secretary Notification | |
Other PII data breached | Is other PII data breached |
Consumer Reporting Agencies Notification | |
Health insurance breached | Is health insurance breached |
Resident Notification Option | |
Is the Data Subject to DPIA | |
Financial information breached | Is financial information breached |
Individuals Notification | |
Management Notification | |
Attorney General Notification | |
Company Name | |
Contact Telephone number | |
Country where business has its main establishment | "‘main establishment’ means: as regards a controller with establishments in more than one Member State, the place of its central administration in the Union, unless the decisions on the purposes and means of the processing of personal data are taken in another establishment of the controller in the Union and the latter establishment has the power to have such decisions implemented, in which case the establishment having taken such decisions is to be considered to be the main establishment; as regards a processor with establishments in more than one Member State, the place of its central administration in the Union, or, if the processor has no central administration in the Union, the establishment of the processor in the Union where the main processing activities in the context of the activities of an establishment of the processor take place to the extent that the processor is subject to specific obligations under this Regulation;" - GDPR Art. 4 |
Company Postal Code | |
PII Data Type | |
Telephone no. | |
Breach Confirmation | Is the DPO confirm the breach |
Contact Address | |
State where the breach took place | |
Company has Insurance for the Breach | |
E-mail Address | |
Company City | |
Contact Email address | |
Possible Cause of the Breach | |
DPO E-mail Address | |
State CISO Notification | |
Size - number of employees | |
Affected data | "‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person;" - GDPR Art. 4 |
Sector of Affected Party | |
Medical Information breached | Is Medical Information breached |
Media Notification | The status of the media notification |
Account information breached | Is account information breached |
Contact Name | |
Size - turnover | |
Approximate number of affected data subjects | |
Data Encryption Status | |
Unique biometric data breached | Is unique biometric data breached |
Affected Individuals Contact Information | |
DPO Notification | |
Measures to Mitigate | " (d) describe the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects." - GDPR Art. 33 |
Likely Impact | "A data protection impact assessment (…) shall in particular be required in the case of: (a) a systematic and extensive evaluation of personal aspects relating to natural persons which is based on automated processing, including profiling, and on which decisions are based that produce legal effects concerning the natural person or similarly significantly affect the natural person; (b) processing on a large scale of special categories of data referred to in Article 9(1), or of personal data relating to criminal convictions and offences referred to in Article 10; or (c) a systematic monitoring of a publicly accessible area on a large scale. - GDPR Art. 35 |
Affected Data Type | |
Where is data hosted | |
Malicious Cause (If the cause is a malicious attack) | |
Residents Email Address | |
Company Address | |
GDPR Notify Authorities | "In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons." - GDPR Art. 33 |
Unique identification number breached | Is unique identification number breached |
Postal Code |
Name | Description |
---|---|
PrivateIPs |
Pack Name | Pack By |
---|---|
Base | By: Cortex XSOAR |
Cortex REST API | By: Cortex XSOAR |
Pack Name | Pack By |
---|---|
US - Breach Notification | By: Cortex XSOAR |
Brute Force | By: Cortex XSOAR |
Elasticsearch | By: Cortex XSOAR |
MITRE ATT&CK | By: Cortex XSOAR |
GDPR | By: Cortex XSOAR |
Gmail | By: Cortex XSOAR |
Gmail Single User | By: Cortex XSOAR |
HIPAA - Breach Notification | By: Cortex XSOAR |
Mail Sender (New) | By: Cortex XSOAR |
Microsoft Graph Mail | By: Cortex XSOAR |
ProtectWise | By: Cortex XSOAR |
Remote Access | By: Cortex XSOAR |
Shodan | By: Cortex XSOAR |
Sumo Logic | By: Cortex XSOAR |
Pack Name | Pack By |
---|---|
Base | By: Cortex XSOAR |
Cortex REST API | By: Cortex XSOAR |
Scripts
DBotUpdateLogoURLPhishing
Updated the Docker image to: demisto/mlurlphishing:1.0.0.103417.
New: GenerateAsBuiltConfiguration
- New: Generate a JSON file that can be downloaded and used to create the As-Built document for Cortex XSOAR. (Available from Cortex XSOAR 6.10.0).
- 35178
- 35115
Download
Scripts
VerifyIPv6Indicator
- Updated the IPv6 formatter to remove unneeded prefixed characters.
- Updated the Docker image to: demisto/python3:3.10.14.101217.
DisplayHTMLWithImages
- Fixed an issue where embedded images not appear in the Email Body section in the Phishing incident layout.
- Updated the Docker image to: demisto/python3:3.10.14.99474.
- 35135
Download
Scripts
ReadQRCode
- Improved implementation of
stderr
redirection by removingwurlitzer.pipes()
and redirectingstderr
to a temporary file. - The automation now extracts QR codes exclusively to improve performance.
- Updated the Docker image to: demisto/qrcode:1.0.0.98232.
- 34579
Download
Scripts
FetchIndicatorsFromFile
- Updated the Docker image to: demisto/py3-tools:1.0.0.96102.
ExifRead
- Updated the Docker image to: demisto/py3-tools:1.0.0.96102.
ExtractDomainAndFQDNFromUrlAndEmail
- Updated the Docker image to: demisto/py3-tools:1.0.0.96102.
ExtractFQDNFromUrlAndEmail
- Updated the Docker image to: demisto/py3-tools:1.0.0.96102.
LanguageDetect
- Updated the Docker image to: demisto/py3-tools:1.0.0.96102.
StixCreator
- Updated the Docker image to: demisto/py3-tools:1.0.0.96102.
ExtractDomainFromUrlAndEmail
- Updated the Docker image to: demisto/py3-tools:1.0.0.96102.
ParseExcel
- Updated the Docker image to: demisto/py3-tools:1.0.0.96102.
- 34465
- 33830
- 33831
- 33828
- 33825
- 33805
- 33871
Download
Scripts
ParseWordDoc
- Updated the Docker image to: demisto/office-utils:2.0.0.93886.
DBotUpdateLogoURLPhishing
- Updated the Docker image to: demisto/mlurlphishing:1.0.0.90588.
SSDeepSimilarity
- Updated the Docker image to: demisto/ssdeep:1.0.0.93570.
PreProcessImage
- Updated the Docker image to: demisto/processing-image-file:1.0.0.93358.
AquatoneDiscoverV2
- Updated the Docker image to: demisto/aquatone:2.0.0.93318.
PcapHTTPExtractor
- Updated the Docker image to: demisto/pcap-http-extractor:1.0.0.93351.
ReadPDFFileV2
- Updated the Docker image to: demisto/readpdf:1.0.0.93363.
ExtractIndicatorsFromWordFile
- Updated the Docker image to: demisto/office-utils:2.0.0.93886.
PDFUnlocker
- Updated the Docker image to: demisto/readpdf:1.0.0.93363.
- 34378
Download
Scripts
ExtractDomainFromUrlAndEmail
- Updated the Docker image to: demisto/py3-tools:1.0.0.91504.
LanguageDetect
- Updated the Docker image to: demisto/py3-tools:1.0.0.91504.
ExifRead
- Updated the Docker image to: demisto/py3-tools:1.0.0.91504.
ParseExcel
- Updated the Docker image to: demisto/py3-tools:1.0.0.91504.
ZipFile
- Updated the Docker image to: demisto/py3-tools:1.0.0.91504.
ExtractFQDNFromUrlAndEmail
- Updated the Docker image to: demisto/py3-tools:1.0.0.91504.
- 33641
- 33516
- 33519
- 33515
- 33329
- 33314
- 33318
- 33328
- 33357
- 33344
- 33359
- 33458
- 33535
- 33534
- 33537
- 33552
- 33580
- 33553
- 33418
- 33583
- 33555
- 33556
- 33559
- 33560
- 33619
- 33591
- 33602
- 33600
- 33314
- 33318
- 33328
- 33357
- 33344
- 33359
- 33458
Download
Scripts
AquatoneDiscoverV2
- Updated the Docker image to: demisto/aquatone:2.0.0.89205.
FetchIndicatorsFromFile
- Updated the Docker image to: demisto/py3-tools:1.0.0.89345.
VerifyJSON
- Updated the Docker image to: demisto/powershell:7.4.0.80528.
- 33391
- 33314
- 33318
- 33328
- 33357
- 33344
- 33359
- 33348
Download
Scripts
ScheduleGenericPolling
- Added support for propagating the
auto-extract
argument in both the initial and subsequent executions by introducing the extractMode argument. - Updated the Docker image to: demisto/python3:3.10.13.89009.
GenericPollingScheduledTask
- Added support for propagating the
auto-extract
argument in both the initial and subsequent executions by introducing the extractMode argument.
- 33146
Download
Scripts
CertificateExtract
- New: Extract fields from a certificate file and return the standard context. (Available from Cortex XSOAR 6.0.0).
- Updated the Docker image to: demisto/crypto:1.0.0.88857.
New: CertificateReputation
- New: Enrich and calculate the reputation of a certificate indicator. (Available from Cortex XSOAR 6.0.0).
FileCreateAndUploadV2
- Updated the Docker image to: demisto/python3:3.10.13.89009.
- 31341
Download
Scripts
StixCreator
- Fixed an issue where Export Stix failed when exporting a not STIX compatible object of type
Report
. - Updated the Docker image to demisto/py3-tools:1.0.0.88283.
ScheduleGenericPolling
- Fixed an issue where a value was not sanitized.
- Updated the Docker image to: demisto/python3:3.10.13.87159.
- 32878
Download
Scripts
LinkIncidentsWithRetry
- Updated the Docker image to: demisto/python3:3.10.13.86272.
CVSSCalculator
- Updated the Docker image to: demisto/python3:3.10.13.86272.
ExportContextToJSONFile
- Updated the Docker image to: demisto/python3:3.10.13.86272.
displayUtilitiesResults
- Updated the Docker image to: demisto/python3:3.10.13.86272.
PopulateCriticalAssets
- Updated the Docker image to: demisto/python3:3.10.13.86272.
LinkIncidentsButton
- Updated the Docker image to: demisto/python3:3.10.13.86272.
ConvertDatetoUTC
- Updated the Docker image to: demisto/python3:3.10.13.86272.
AssignToMeButton
- Updated the Docker image to: demisto/python3:3.10.13.86272.
IsDomainInternal
- Updated the Docker image to: demisto/python3:3.10.13.86272.
IndicatorMaliciousRatioCalculation
- Updated the Docker image to: demisto/python3:3.10.13.86272.
IPToHost
- Updated the Docker image to: demisto/python3:3.10.13.86272.
MarkAsEvidenceByTag
- Updated the Docker image to: demisto/python3:3.10.13.86272.
CopyContextToField
- Updated the Docker image to: demisto/python3:3.10.13.86272.
AddDBotScoreToContext
- Updated the Docker image to: demisto/python3:3.10.13.86272.
CloseInvestigationAsDuplicate
- Updated the Docker image to: demisto/python3:3.10.13.86272.
SetDateField
- Updated the Docker image to: demisto/python3:3.10.13.86272.
CompareIncidentsLabels
- Updated the Docker image to: demisto/python3:3.10.13.86272.
ContextContains
- Updated the Docker image to: demisto/python3:3.10.13.86272.
GenerateSummaryReportButton
- Updated the Docker image to: demisto/python3:3.10.13.86272.
DemistoVersion
- Updated the Docker image to: demisto/python3:3.10.13.86272.
IsIPPrivate
- Updated the Docker image to: demisto/python3:3.10.13.86272.
GenerateRandomString
- Updated the Docker image to: demisto/python3:3.10.13.86272.
EncodeToAscii
- Updated the Docker image to: demisto/python3:3.10.13.86272.
LoadJSONFileToContext
- Updated the Docker image to: demisto/python3:3.10.13.86272.
CalculateTimeDifference
- Updated the Docker image to: demisto/python3:3.10.13.86272.
IdentifyAttachedEmail
- Fixed an issue where the script was erroring when there were no File entries in the warroom.
- Updated the Docker image to: demisto/python3:3.10.13.87159.
- 32966
Download
Scripts
ExportToXLSX
- Updated the Docker image to: demisto/xslxwriter:1.0.0.86441.
UnzipFile
- Updated the Docker image to: demisto/unzip:1.0.0.86000.
PcapHTTPExtractor
- Updated the Docker image to: demisto/pcap-http-extractor:1.0.0.85826.
Dig
- Updated the Docker image to: demisto/netutils:1.0.0.86390.
HTMLtoMD
- Updated the Docker image to: demisto/btfl-soup:1.0.1.86352.
JsonUnescape
- Updated the Docker image to: demisto/python3-deb:3.10.13.85666.
GetDomainDNSDetails
- Updated the Docker image to: demisto/netutils:1.0.0.86390.
Ping
- Updated the Docker image to: demisto/netutils:1.0.0.86390.
ParseHTMLIndicators
- Updated the Docker image to: demisto/bs4-tld:1.0.0.86470.
ConvertXmlFileToJson
- Updated the Docker image to: demisto/xml-feed:1.0.0.86490.
ExtractHTMLTables
- Updated the Docker image to: demisto/bs4-py3:1.0.0.86348.
WordTokenizer
- Updated the Docker image to: demisto/nltk:2.0.0.86396.
- 32938
- 32763
- 32762
- 32741
- 32744
- 32745
- 32752
- 32753
- 32754
- 32759
- 32761
Download
Scripts
GetIndicatorDBotScoreFromCache
- Fixed an issue where the GetIndicatorDBotScoreFromCache automation failed when no IOCs were returned from the cache.
- Updated the Docker image to demisto/python3:3.10.13.86272.
CompareLists
- Updated the Docker image to: demisto/python3:3.10.13.86272.
SSDeepReputation
- Updated the Docker image to: demisto/python3:3.10.13.86272.
IsInternalDomainName
- Updated the Docker image to: demisto/python3:3.10.13.86272.
ListUsedDockerImages
- Updated the Docker image to: demisto/python3:3.10.13.86272.
FilterByList
- Updated the Docker image to: demisto/python3:3.10.13.86272.
GenerateRandomUUID
- Updated the Docker image to: demisto/python3:3.10.13.86272.
NumberOfPhishingAttemptPerUser
- Updated the Docker image to: demisto/python3:3.10.13.86272.
DockerHardeningCheck
- Updated the Docker image to: demisto/python3:3.10.13.86272.
HttpV2
- Updated the Docker image to: demisto/python3:3.10.13.86272.
- 32445
Download
Scripts
DecodeMimeHeader
- Updated the Docker image to: demisto/python3:3.10.13.86272.
DisableUserWrapper
- Updated the Docker image to: demisto/python3:3.10.13.86272.
ParseYAML
- Updated the Docker image to: demisto/python3:3.10.13.86272.
GetInstances
- Updated the Docker image to: demisto/python3:3.10.13.86272.
PrettyPrint
- Updated the Docker image to: demisto/python3:3.10.13.86272.
Base64EncodeV2
- Updated the Docker image to: demisto/python3:3.10.13.86272.
DisplayHTML
- Updated the Docker image to: demisto/python3:3.10.13.86272.
SetByIncidentId
- Updated the Docker image to: demisto/python3:3.10.13.86272.
LookupCSV
- Updated the Docker image to: demisto/python3:3.10.13.86272.
FeedRelatedIndicatorsWidget
- Updated the Docker image to: demisto/python3:3.10.13.86272.
URLSSLVerification
- Updated the Docker image to: demisto/python3:3.10.13.86272.
ArrayToCSV
- Updated the Docker image to: demisto/python3:3.10.13.86272.
TimeStampCompare
- Updated the Docker image to: demisto/python3:3.10.13.86272.
IsListExist
- Updated the Docker image to: demisto/python3:3.10.13.86272.
MaliciousRatioReputation
- Updated the Docker image to: demisto/python3:3.10.13.86272.
SetMultipleValues
- Updated the Docker image to: demisto/python3:3.10.13.86272.
DomainReputation
- Updated the Docker image to: demisto/python3:3.10.13.86272.
DumpJSON
- Updated the Docker image to: demisto/python3:3.10.13.86272.
SearchIndicator
- Updated the Docker image to: demisto/python3:3.10.13.86272.
CheckFieldValue
- Updated the Docker image to: demisto/python3:3.10.13.86272.
IdentifyAttachedEmail
- Updated the Docker image to: demisto/python3:3.10.13.86272.
TopMaliciousRatioIndicators
- Updated the Docker image to: demisto/python3:3.10.13.86272.
GetLicenseID
- Updated the Docker image to: demisto/python3:3.10.13.86272.
Strings
- Updated the Docker image to: demisto/python3:3.10.13.86272.
CheckSenderDomainDistance
- Updated the Docker image to: demisto/python3:3.10.13.86272.
HTTPListRedirects
- Updated the Docker image to: demisto/python3:3.10.13.86272.
ConvertTimezoneFromUTC
- Updated the Docker image to: demisto/python3:3.10.13.86272.
SetWithTemplate
- Updated the Docker image to: demisto/python3:3.10.13.86272.
CheckIndicatorValue
- Updated the Docker image to: demisto/python3:3.10.13.86272.
RunPollingCommand
- Updated the Docker image to: demisto/python3:3.10.13.86272.
AddKeyToList
- Updated the Docker image to: demisto/python3:3.10.13.86272.
ResolveShortenedURL
- Updated the Docker image to: demisto/python3:3.10.13.86272.
ExtractAttackPattern
- Updated the Docker image to: demisto/python3:3.10.13.86272.
BreachConfirmationHTML
- Updated the Docker image to: demisto/python3:3.10.13.86272.
PortListenCheck
- Updated the Docker image to: demisto/python3:3.10.13.86272.
JSONtoCSV
- Updated the Docker image to: demisto/python3:3.10.13.86272.
ParseCSV
- Updated the Docker image to: demisto/python3:3.10.13.86272.
CalculateEntropy
- Updated the Docker image to: demisto/python3:3.10.13.86272.
CreateHash
- Updated the Docker image to: demisto/python3:3.10.13.86272.
SendEmailOnSLABreach
- Updated the Docker image to: demisto/python3:3.10.13.86272.
Base64ListToFile
- Updated the Docker image to: demisto/python3:3.10.13.86272.
PositiveDetectionsVSDetectionEngines
- Updated the Docker image to: demisto/python3:3.10.13.86272.
MatchRegexV2
- Updated the Docker image to: demisto/python3:3.10.13.86272.
RunDockerCommand
- Updated the Docker image to: demisto/python3:3.10.13.86272.
GetEntries
- Updated the Docker image to: demisto/python3:3.10.13.86272.
JSONFileToCSV
- Updated the Docker image to: demisto/python3:3.10.13.86272.
cveReputationV2
- Updated the Docker image to: demisto/python3:3.10.13.86272.
RepopulateFiles
- Updated the Docker image to: demisto/python3:3.10.13.86272.
SearchIncidentsSummary
- Updated the Docker image to: demisto/python3:3.10.13.86272.
StopScheduledTask
- Updated the Docker image to: demisto/python3:3.10.13.86272.
IsolationAssetWrapper
- Updated the Docker image to: demisto/python3:3.10.13.86272.
RemoveKeyFromList
- Updated the Docker image to: demisto/python3:3.10.13.86272.
VerifyIPv6Indicator
- Updated the Docker image to: demisto/python3:3.10.13.86272.
ReadFile
- Updated the Docker image to: demisto/python3:3.10.13.86272.
SetTime
- Updated the Docker image to: demisto/python3:3.10.13.86272.
- 32408
Download
Scripts
New: VerdictResult
New: This widget displays the incident verdict or the alert verdict based on the 'incident.verdict' or 'alert.verdict' field.
ParseEmailFilesV2
- Fixed a parsing issue when running on msg email files with headers only.
- Fixed an issue where EML multipart files were not parsed if they have a broken boundary.
- Updated the Docker image to: demisto/parse-emails:1.0.0.83945.
- 31683
Download
Scripts
IncidentFields
- Deprecated the demisto-api-* commands and replaced with the core-api-* commands. (Commands are identical, no effect is expected.)
ExportIndicatorsToCSV
- Deprecated the demisto-api-* commands and replaced with the core-api-* commands. (Commands are identical, no effect is expected.)
ExportIncidentsToCSV
- Deprecated the demisto-api-* commands and replaced with the core-api-* commands. (Commands are identical, no effect is expected.)
GetFieldsByIncidentType
- Deprecated the demisto-api-* commands and replaced with the core-api-* commands. (Commands are identical, no effect is expected.)
EditServerConfig
- Deprecated the demisto-api-* commands and replaced with the core-api-* commands. (Commands are identical, no effect is expected.)
- Updated the Docker image to: demisto/python3:3.10.13.83255.
GenerateAsBuilt
- Deprecated the demisto-api-* commands and replaced with the core-api-* commands. (Commands are identical, no effect is expected.)
ExportAuditLogsToFile
- Deprecated the demisto-api-* commands and replaced with the core-api-* commands. (Commands are identical, no effect is expected.)
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ContentPackInstaller
- Deprecated the demisto-api-* commands and replaced with the core-api-* commands. (Commands are identical, no effect is expected.)
- Updated the Docker image to: demisto/xsoar-tools:1.0.0.83431.
ProvidesCommand
- Deprecated the demisto-api-* commands and replaced with the core-api-* commands. (Commands are identical, no effect is expected.)
- 31388
Download
Scripts
ConvertFile
- Updated the Docker image to: demisto/office-utils:2.0.0.82639.
ScheduleGenericPolling
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ChangeContext
- Updated the Docker image to: demisto/python3:3.10.13.83255.
MarkAsNoteByTag
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ExportIncidentsToCSV
- Updated the Docker image to: demisto/python3:3.10.13.83255.
EmailReputation
- Updated the Docker image to: demisto/python3:3.10.13.83255.
OnionURLReputation
- Updated the Docker image to: demisto/python3:3.10.13.83255.
FileCreateAndUploadV2
- Updated the Docker image to: demisto/python3:3.10.13.83255.
GetServerURL
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ShowLocationOnMap
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ExportIndicatorsToCSV
- Updated the Docker image to: demisto/python3:3.10.13.83255.
CheckContextValue
- Updated the Docker image to: demisto/python3:3.10.13.83255.
GetEnabledInstances
- Updated the Docker image to: demisto/python3:3.10.13.83255.
FileReputation
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ConvertCountryCodeCountryName
- Updated the Docker image to: demisto/python3:3.10.13.83255.
IsUrlPartOfDomain
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ServerLogs
- Updated the Docker image to: demisto/python3:3.10.13.83255.
PrintRaw
- Updated the Docker image to: demisto/python3:3.10.13.83255.
DisplayHTMLWithImages
- Updated the Docker image to: demisto/python3:3.10.13.83255.
SCPPullFiles
- Updated the Docker image to: demisto/python3:3.10.13.83255.
StopTimeToAssignOnOwnerChange
- Updated the Docker image to: demisto/python3:3.10.13.83255.
CreateIndicatorsFromSTIX
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ShowIncidentIndicators
- Updated the Docker image to: demisto/python3:3.10.13.83255.
GetDataCollectionLink
- Updated the Docker image to: demisto/python3:3.10.13.83255.
PrintContext
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ServerLogs_docker
- Updated the Docker image to: demisto/python3:3.10.13.83255.
GetStringsDistance
- Updated the Docker image to: demisto/python3:3.10.13.83255.
GetDockerImageLatestTag
- Updated the Docker image to: demisto/python3:3.10.13.83255.
GetIndicatorDBotScore
- Updated the Docker image to: demisto/python3:3.10.13.83255.
CreateNewIndicatorsOnly
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ChangeRemediationSLAOnSevChange
- Updated the Docker image to: demisto/python3:3.10.13.83255.
DBotAverageScore
- Updated the Docker image to: demisto/python3:3.10.13.83255.
PrintErrorEntry
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ExtractIndicatorsFromTextFile
- Updated the Docker image to: demisto/python3:3.10.13.83255.
UtilAnyResults
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ZipStrings
- Updated the Docker image to: demisto/python3:3.10.13.83255.
GridFieldSetup
- Updated the Docker image to: demisto/python3:3.10.13.83255.
GetByIncidentId
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ProvidesCommand
- Updated the Docker image to: demisto/python3:3.10.13.83255.
ReplaceMatchGroup
- Updated the Docker image to: demisto/python3:3.10.13.83255.
VerifyCIDR
- Updated the Docker image to: demisto/python3:3.10.13.83255.
AppendindicatorFieldWrapper
- Updated the Docker image to: demisto/python3:3.10.13.83255.
URLNumberOfAds
- Updated the Docker image to: demisto/python3:3.10.13.83255.
FileToBase64List
- Updated the Docker image to: demisto/python3:3.10.13.83255.
GetFieldsByIncidentType
- Updated the Docker image to: demisto/python3:3.10.13.83255.
LoadJSON
- Updated the Docker image to: demisto/python3:3.10.13.83255.
URLReputation
- Updated the Docker image to: demisto/python3:3.10.13.83255.
IncidentFields
- Updated the Docker image to: demisto/python3:3.10.13.83255.
hideFieldsOnNewIncident
- Updated the Docker image to: demisto/python3:3.10.13.83255.
IPReputation
- Updated the Docker image to: demisto/python3:3.10.13.83255.
DeduplicateValuesbyKey
- Updated the Docker image to: demisto/python3:3.10.13.83255.
GenerateAsBuilt
- Updated the Docker image to: demisto/teams:1.0.0.83464.
- 31448
Download
Scripts
New: ReadQRCode
- New: This script uses the open-source library OpenCV to extract text from QR codes. The output of this script includes the output of the script "extractIndicators" run on the text extracted from the QR code. (Available from Cortex XSOAR 6.10.0).
- 31323
Download
Scripts
FormatURL
- Improved error handling for better performance when the script fails.
- Updated the Docker image to: demisto/python3:3.10.13.80593.
ExtractDomainAndFQDNFromUrlAndEmail
- Improved error handling for better performance when the script fails.
- Updated the Docker image to: demisto/py3-tools:1.0.0.81280.
ExtractEmailV2
- Improved error handling for better performance when the script fails.
- Updated the Docker image to: demisto/python3:3.10.13.80593.
Sleep
Improved performance for longer sleep times. When seconds is greater than the configured threshold (5 minutes by default), sleep will switch to a polling state instead of waiting.
- 30661
Download
Scripts
IsIntegrationAvailable
- Improved implementation for better performance.
- Updated the Docker image to: demisto/python3:3.10.13.80593.
GetListRow
- Fixed an issue where sometimes a redundant
\r
would appear at the end of the line. - Updated the Docker image to: demisto/python3:3.10.13.80593.
- 31020
Download
Scripts
TextFromHTML
- Added the allow_body_fallback argument, which allows using the full html as the body in case the input html does not have a
body
tag. - Added the replace_line_breaks argument, which allows replacing
br
tags in the html with line breaks in the extracted text. - Added the trim_result argument, which allows replacing leading and trailing whitespaces as well as collapsing multiple empty lines in the extracted text to a single empty line.
- Added the output_to_context argument, which allows storing the extracted text in context.
- Updated the Docker image to: demisto/python3:3.10.13.75921.
- 30036
- 29836
Download
Scripts
cvss_color
Updated the Docker image to: demisto/python3:3.10.13.74666.
Fixed an issue where the script failed if the indicator had no custom fields.
StixCreator
- Fixed an issue where spec_version was empty when exporting more than one indicator.
- Updated the Docker image to: demisto/py3-tools:1.0.0.74403.
ExportAuditLogsToFile
- Added support to XSOAR 8.
- Updated the Docker image to: demisto/python3:3.10.13.74666.
- 29781
Download
Scripts
New: BMCTool
New: Parse RDP bitmap cache data into a single collage image file. (Available from Cortex XSOAR 6.9.0).
PreProcessImage
Updated the Docker image to: demisto/processing-image-file:1.0.0.64430.
New: StringSimilarity
New: This automation calculates the similarity ratio between text and a list of strings and outputs a decimal value between 0.0 and 1.0 (1.0 if the sequences are identical, and 0.0 if they don't have anything in common). (Available from Cortex XSOAR 6.9.0).
- 26053
Download
PUBLISHER
![Cortex](https://storage.googleapis.com/marketplace-dist/content/packs/Base/Author_image.png)
PLATFORMS
INFO
Certification | Certified | Read more |
Supported By | Cortex | |
Created | July 27, 2020 | |
Last Release | July 24, 2024 |
WORKS WITH THE FOLLOWING INTEGRATIONS:
![Core REST API](https://storage.googleapis.com/marketplace-dist/content/packs/DemistoRESTAPI/CoreRESTAPI_image.png)
![Demisto REST API (Deprecated)](https://storage.googleapis.com/marketplace-dist/content/packs/DemistoRESTAPI/DemistoRESTAPI_image.png)
![MITRE ATT&CK](https://storage.googleapis.com/marketplace-dist/content/packs/FeedMitreAttackv2/MITREATT%26CKv2_image.png)
![Microsoft Graph Mail Single User](https://storage.googleapis.com/marketplace-dist/content/packs/MicrosoftGraphMail/MicrosoftGraphMailSingleUser_image.png)
![O365 Outlook Mail (Using Graph API)](https://storage.googleapis.com/marketplace-dist/content/packs/MicrosoftGraphMail/MicrosoftGraphMail_image.png)
![Mail Sender (New)](https://storage.googleapis.com/marketplace-dist/content/packs/MailSenderNew/MailSender%28New%29_image.png)
![Gmail](https://storage.googleapis.com/marketplace-dist/content/packs/Gmail/Gmail_image.png)
![RemoteAccess v2](https://storage.googleapis.com/marketplace-dist/content/packs/RemoteAccess/RemoteAccessv2_image.png)
![Gmail Single User](https://storage.googleapis.com/marketplace-dist/content/packs/GmailSingleUser/GmailSingleUser_image.png)
![Shodan v2](https://storage.googleapis.com/marketplace-dist/content/packs/Shodan/Shodan_v2_image.png)
![Elasticsearch v2](https://storage.googleapis.com/marketplace-dist/content/packs/Elasticsearch/Elasticsearchv2_image.png)
![ProtectWise](https://storage.googleapis.com/marketplace-dist/content/packs/ProtectWise/ProtectWise_image.png)
![SumoLogic](https://storage.googleapis.com/marketplace-dist/content/packs/SumoLogic/SumoLogic_image.png)