Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,28 +1,7 @@
{
"allRead": true,
"allReadWrite": true,
"cacheVersn": 0,
"data": "-",
"definitionId": "",
"description": "Maps SOC Framework action names to action classes for multi-vendor response routing. SOCCommandWrapper reads this to determine which responses.{class} key to use in SOCProductCategoryMap_V3.",
"detached": false,
"fromServerVersion": "6.5.0",
"id": "SOCActionClassMap_V3",
"isOverridable": false,
"itemVersion": "1.0.0",
"locked": false,
"name": "SOCActionClassMap_V3",
"nameLocked": false,
"packID": "",
"packName": "",
"previousAllRead": true,
"previousAllReadWrite": true,
"system": false,
"tags": null,
"toServerVersion": "",
"truncated": false,
"display_name": "SOCActionClassMap_V3",
"type": "json",
"version": -1,
"fromVersion": "6.5.0",
"display_name": "SOCActionClassMap_V3"
"fromVersion": "6.5.0"
}
Original file line number Diff line number Diff line change
@@ -1,28 +1,7 @@
{
"allRead": true,
"allReadWrite": true,
"cacheVersn": 0,
"data": "-",
"definitionId": "",
"description": "By default these playbooks will run the default playbook. These can be changed on a per tenant bases to test new development branches under custom. The values are either \"default\" or \"custom\"",
"detached": false,
"fromServerVersion": "",
"id": "SOCExecutionList_V3",
"isOverridable": false,
"itemVersion": "",
"locked": false,
"name": "SOCExecutionList_V3",
"nameLocked": false,
"packID": "",
"packName": "",
"previousAllRead": true,
"previousAllReadWrite": true,
"system": false,
"tags": null,
"toServerVersion": "",
"truncated": false,
"display_name": "SOCExecutionList_V3",
"type": "json",
"version": -1,
"fromVersion": "6.5.0",
"display_name": "SOCExecutionList_V3"
"fromVersion": "6.5.0"
}
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,5 @@
"name": "SOCFWConfig",
"display_name": "SOCFWConfig",
"type": "json",
"version": -1,
"fromVersion": "6.5.0",
"data": "",
"tags": ["soc-framework,soc"]
"fromVersion": "6.5.0"
}
Original file line number Diff line number Diff line change
@@ -1,28 +1,7 @@
{
"allRead": true,
"allReadWrite": true,
"cacheVersn": 0,
"data": "-",
"definitionId": "",
"description": "SOC Framework feature flags. All flags default false \u2014 Framework runs end-to-end with zero configuration. Enable individual capabilities as integrations are deployed. Each flag description explains the requirement.",
"detached": false,
"fromServerVersion": "",
"id": "SOCFWFeatureFlags",
"isOverridable": false,
"itemVersion": "",
"locked": false,
"name": "SOCFWFeatureFlags",
"nameLocked": false,
"packID": "",
"packName": "",
"previousAllRead": true,
"previousAllReadWrite": true,
"system": false,
"tags": null,
"toServerVersion": "",
"truncated": false,
"display_name": "SOCFWFeatureFlags",
"type": "json",
"version": -1,
"fromVersion": "6.5.0",
"display_name": "SOCFWFeatureFlags"
"fromVersion": "6.5.0"
}
Original file line number Diff line number Diff line change
Expand Up @@ -19,10 +19,10 @@
},
"email_indicator_hunting": {
"enabled": false,
"description": "Cross-platform indicator hunting for phishing IOCs. Enable when a hunting-capable platform is connected (e.g., Microsoft Defender 365). Expensive \u2014 runs per alert and queries connected platforms for all extracted IOCs."
"description": "Cross-platform indicator hunting for phishing IOCs. Enable when a hunting-capable platform is connected (e.g., Microsoft Defender 365). Expensive runs per alert and queries connected platforms for all extracted IOCs."
},
"email_phishing_ml": {
"enabled": false,
"description": "ML-based phishing content scoring via Phishing - Machine Learning Analysis. Enable after deploying a Phishing ML model. Requires email body content from email_process_original or direct alert body fields. Note: not available in XSIAM \u2014 XSOAR deployments only."
"description": "ML-based phishing content scoring via Phishing - Machine Learning Analysis. Enable after deploying a Phishing ML model. Requires email body content from email_process_original or direct alert body fields. Note: not available in XSIAM XSOAR deployments only."
}
}
Loading
Loading