Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
90 commits
Select commit Hold shift + click to select a range
985c6fa
Enrich Cyberint integration
TalGumi Jan 12, 2023
86f0423
Edit fetch function
TalGumi Jan 12, 2023
acd2cf9
Remove comments
TalGumi Jan 12, 2023
6df58f6
Improve incident creation
TalGumi Jan 16, 2023
a578abd
Update indicent creation
TalGumi Jan 16, 2023
82935d8
Fix incident creation
TalGumi Jan 16, 2023
800cf5c
Merge branch 'master' into cyberint-integration
TalGumi Jan 16, 2023
0e8ee83
Merge branch 'master' into cyberint-integration
TalGumi Jan 17, 2023
1f77496
Merge branch 'cyberint-integration' of https://github.com/qmasters-lt…
TalGumi Jan 17, 2023
f99e735
Change argument name
TalGumi Jan 18, 2023
cd6da72
Update incident creation
TalGumi Jan 19, 2023
f5d2482
Update fetch files
Benimanela Jan 22, 2023
17c317b
Update fetch files
Benimanela Jan 22, 2023
5025dce
Merge pull request #296 from qmasters-ltd/fetuars/security-engineer
TalGumi Jan 23, 2023
a8ab973
Update Packs/Cyberint/Integrations/Cyberint/Cyberint.py
TalGumi Jan 24, 2023
81d8963
Fix according to CR
TalGumi Jan 24, 2023
e16bb42
Reset integration name & ID to cyberint
TalGumi Jan 24, 2023
095f8d6
update
TalGumi Jan 24, 2023
7f42147
Compare files
Benimanela Jan 26, 2023
d3a9f5e
update CSV field
Benimanela Jan 29, 2023
82e5f96
Merge pull request #304 from qmasters-ltd/fetuars/security-engineer
TalGumi Jan 29, 2023
093923f
Merge remote-tracking branch 'origin/cyberint-integration' into fetua…
Benimanela Jan 29, 2023
f2adc98
update layout
Benimanela Jan 29, 2023
2c0b231
update layout
Benimanela Jan 29, 2023
59c07e5
Update integration name
TalGumi Jan 29, 2023
34b689f
Merge branch 'cyberint-integration' of https://github.com/qmasters-lt…
TalGumi Jan 29, 2023
1e4c116
Merge branch 'cyberint-integration' into fetuars/security-engineer
TalGumi Jan 31, 2023
f69bc51
Merge pull request #306 from qmasters-ltd/fetuars/security-engineer
TalGumi Jan 31, 2023
ef0552b
Fix according CR
TalGumi Feb 1, 2023
6cfd27a
Merge branch 'cyberint-integration' of https://github.com/qmasters-lt…
TalGumi Feb 1, 2023
557ebbb
Merge branch 'master' into cyberint-integration
TalGumi Feb 1, 2023
3a74b93
Add space to conf
TalGumi Feb 2, 2023
6670256
Revert "Add space to conf"
TalGumi Feb 2, 2023
2566f9a
update layout
Benimanela Feb 2, 2023
884bfe8
update layout
Benimanela Feb 2, 2023
84eaee9
Merge branch 'fetuars/security-engineer' of https://github.com/qmaste…
Benimanela Feb 2, 2023
c77fdd3
Merge branch 'cyberint-integration' into fetuars/security-engineer
TalGumi Feb 5, 2023
c563dfb
update filetype
Benimanela Feb 5, 2023
948f3e7
Merge branch 'fetuars/security-engineer' of https://github.com/qmaste…
Benimanela Feb 5, 2023
87caf6d
update layout and mapper
Benimanela Feb 5, 2023
5ee67c3
Merge branch 'master' of https://github.com/qmasters-ltd/content
Benimanela Feb 15, 2023
0733ffa
Update Cyberint CSV
Benimanela Feb 15, 2023
d64872c
Update Cyberint mapper
Benimanela Feb 15, 2023
e760829
Update Cyberint mapper
Benimanela Feb 15, 2023
f5e8fe5
Xdm.event.outcome bulk5 (#24667)
eepstain Feb 16, 2023
c7aafcd
Xdm.event.outcome bulk1 (#24594)
eepstain Feb 16, 2023
636c58d
Adding "error path" to the TIM process domains with whois playbook (#…
Ni-Knight Feb 16, 2023
4ec4231
DNS-XDR-Comparison (#24129)
nkanon Feb 16, 2023
bbdf2e1
Cisco ASA - Compatibility with XDR mapping #24168 (#23779)
guytamir10 Feb 16, 2023
ebb7f7d
[ASM] - EXPANDR - 1578 (#24380) (#24639)
content-bot Feb 16, 2023
206b8c9
Fixes for the 'Proofpoint TAP - Event Enrichment' playbook (#24642)
TalNos Feb 16, 2023
10da26e
[ASM] - EXPANDR-2322 Dependencies (#24443) (#24641)
content-bot Feb 16, 2023
46445b0
Corelight zeek xdm correlation (#24559)
eepstain Feb 16, 2023
e0a94f3
Xdm.event.outcome bulk2 (#24661)
eepstain Feb 16, 2023
a4805ed
Xdm.event.outcome bulk3 (#24664)
eepstain Feb 16, 2023
c4ff683
Xdm.event.outcome bulk4 (#24666)
eepstain Feb 16, 2023
a4ab463
XSIAM new triggers (#24681)
melamedbn Feb 16, 2023
f77593b
ignore (#24687)
YuvHayun Feb 16, 2023
e7e142f
Xdm.event.outcome bulk6 (#24668)
eepstain Feb 16, 2023
487743b
Xdm.event.outcome bulk7 (#24672)
eepstain Feb 16, 2023
b27895a
[Marketplace Contribution] EWS - Content Pack Update (#24563)
content-bot Feb 16, 2023
4eeeb3b
ms teams add support in credential store & fix (#24679)
michal-dagan Feb 16, 2023
1c67a38
xdm.event.outcome-Bulk8 (#24673)
eepstain Feb 16, 2023
4b70e0b
Fortinet fortigate xdm correlation (#24204)
eepstain Feb 16, 2023
513bc79
Enum updates (#24421)
guytamir10 Feb 16, 2023
8b9ac86
Added support for update_core_packs_list for all MPs (#24154)
ShahafBenYakir Feb 16, 2023
4b436b0
Update Docker Image To demisto/chromium (#24693)
content-bot Feb 17, 2023
76386a6
Update Docker Image To demisto/boto3py3 (#24696)
content-bot Feb 17, 2023
002add0
Lumu Integration - SecOps Operation (#24682)
content-bot Feb 17, 2023
050d56b
Update Docker Image To demisto/python3 (#24695)
content-bot Feb 17, 2023
9d505b5
Display mapped fields script (#24678)
melamedbn Feb 17, 2023
9793dea
Cryptomining name update (#24512)
melamedbn Feb 17, 2023
9a91a56
Stix bug (#24635)
eyalpalo Feb 19, 2023
07acf9d
Update Docker Image To demisto/python3 (#24702)
content-bot Feb 19, 2023
085265d
Add change endpoint name command -XDR (#24367)
RosenbergYehuda Feb 19, 2023
5b626a5
Zscaler ZPA - Compatibility with XDR mapping (#24162)
guytamir10 Feb 19, 2023
b4a880d
Updating Rapid7 - Nexpose - Enrichment playbook (#24535) (#24564)
content-bot Feb 19, 2023
40b3da9
Fix feed unit42 intel object (#24636)
AradCarmi Feb 19, 2023
9b8082e
Update Docker Image To demisto/python3 (#24694)
content-bot Feb 19, 2023
007228e
Jb xdr permission docs (#24633)
JasBeilin Feb 19, 2023
4a763ed
Increased timeout for ExpanseV2 (#24709)
moishce Feb 19, 2023
e5473a7
removed mandatory dependencies of Phishing and Malware (#24704)
anara123 Feb 19, 2023
93ce24c
Update Layout
Benimanela Feb 19, 2023
74fa324
update mapper
Benimanela Feb 19, 2023
710ced7
Update Docker Image To demisto/googleapi-python3 (#24703)
content-bot Feb 19, 2023
fbe7934
update fields
Benimanela Feb 19, 2023
33f0d50
update fields
Benimanela Feb 19, 2023
5b92ee4
Merge branch 'master' of https://github.com/qmasters-ltd/content
Benimanela Feb 19, 2023
04a92c0
Merge remote-tracking branch 'upstream/master'
Benimanela Feb 19, 2023
68876da
Merge branch 'master' into fetuars/security-engineer
Benimanela Feb 19, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
2 changes: 1 addition & 1 deletion Packs/AMP/Integrations/AMPv2/AMPv2.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2003,7 +2003,7 @@ script:
- contextPath: DBotScore.Score
description: The actual score.
type: Number
dockerimage: demisto/python3:3.10.9.46032
dockerimage: demisto/python3:3.10.10.48392
feed: false
isfetch: true
longRunning: false
Expand Down
3 changes: 3 additions & 0 deletions Packs/AMP/ReleaseNotes/2_0_2.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
#### Integrations
##### Cisco AMP v2
- Updated the Docker image to: *demisto/python3:3.10.10.48392*.
2 changes: 1 addition & 1 deletion Packs/AMP/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "Cisco AMP",
"description": "Uses CISCO AMP Endpoint",
"support": "xsoar",
"currentVersion": "2.0.1",
"currentVersion": "2.0.2",
"author": "Cortex XSOAR",
"url": "https://www.paloaltonetworks.com/cortex",
"email": "",
Expand Down
Original file line number Diff line number Diff line change
@@ -1,22 +1,20 @@
[MODEL: dataset="aws_guardduty_raw"]
alter
alter targetIP1 = json_extract_scalar(Service, "$.Action.NetworkConnectionAction.RemoteIpDetails.IpAddressV4"),
targetIP2 = json_extract_scalar(Service, "$.Action.KubernetesApiCallAction.RemoteIpDetails.IpAddressV4"),
username1 = trim(json_extract_scalar(Resource,"$.AccessKeyDetails.UserName"), "\""),
username2 = json_extract_scalar(Resource, "$.KubernetesDetails.KubernetesUserDetails.Username"),
userType = json_extract_scalar(Resource, "$.AccessKeyDetails.UserType")
| alter
xdm.alert.category = json_extract_scalar(Resource, "$.ResourceType"),
xdm.alert.subcategory = Type,
xdm.alert.description = Description,
xdm.event.outcome_reason = Title,
xdm.alert.severity = to_string(Severity),
xdm.target.host.hostname = json_extract_scalar(Resource, "$.EksClusterDetails.Name"),
xdm.source.user.user_type = json_extract_scalar(Resource, "$.AccessKeyDetails.UserType"),
xdm.source.user.user_type = if(userType in("Root","IAMUser","Role","FederatedUser","AWSAccount"),XDM_CONST.USER_TYPE_REGULAR , userType in("Directory","AWSService") ,XDM_CONST.USER_TYPE_SERVICE_ACCOUNT,userType in("AssumedRole") ,XDM_CONST.USER_TYPE_MACHINE_ACCOUNT ,to_string(userType)),
xdm.source.user.employee_id = json_extract_scalar(Resource, "$.AccessKeyDetails.PrincipalId"),
xdm.target.process.name = json_extract_scalar(Service, "$.ServiceName"),
xdm.source.host.ipv4_addresses = arraycreate(coalesce(json_extract_scalar(Service, "$.Action.AwsApiCallAction.RemoteIpDetails.IpAddressV4"), "")),
xdm.source.ipv4 = json_extract_scalar(Service, "$.Action.NetworkConnectionAction.LocalIpDetails.IpAddressV4")
| alter targetIP1 = json_extract_scalar(Service, "$.Action.NetworkConnectionAction.RemoteIpDetails.IpAddressV4"),
targetIP2 = json_extract_scalar(Service, "$.Action.KubernetesApiCallAction.RemoteIpDetails.IpAddressV4")
| alter
xdm.target.ipv4 = coalesce(targetIP1, targetIP2)
// UseNameExtraction
| alter
username1 = trim(json_extract_scalar(Resource,"$.AccessKeyDetails.UserName"), "\""),
username2 = json_extract_scalar(Resource, "$.KubernetesDetails.KubernetesUserDetails.Username")
| alter xdm.source.user.username = coalesce(username1, username2 );
xdm.source.ipv4 = json_extract_scalar(Service, "$.Action.NetworkConnectionAction.LocalIpDetails.IpAddressV4"),
xdm.target.ipv4 = coalesce(targetIP1, targetIP2),
xdm.source.user.username = coalesce(username1, username2 );
4 changes: 4 additions & 0 deletions Packs/AWS-GuardDuty/ReleaseNotes/1_3_13.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@

#### Modeling Rules
##### AWSGuardDuty Modeling Rule
- Update modeling rules.
2 changes: 1 addition & 1 deletion Packs/AWS-GuardDuty/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "AWS - GuardDuty",
"description": "Amazon Web Services Guard Duty Service (gd)",
"support": "xsoar",
"currentVersion": "1.3.12",
"currentVersion": "1.3.13",
"author": "Cortex XSOAR",
"url": "https://www.paloaltonetworks.com/cortex",
"email": "",
Expand Down
2 changes: 1 addition & 1 deletion Packs/AWS-IAM/Integrations/AWS-IAM/AWS-IAM.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2304,7 +2304,7 @@ script:
- contextPath: AWS.IAM.Users.LoginProfile.PasswordResetRequired
description: Specifies whether the user is required to set a new password on next sign-in.
type: Boolean
dockerimage: demisto/boto3py3:1.0.0.46675
dockerimage: demisto/boto3py3:1.0.0.48904
feed: false
isfetch: false
longRunning: false
Expand Down
3 changes: 3 additions & 0 deletions Packs/AWS-IAM/ReleaseNotes/1_1_23.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
#### Integrations
##### AWS - Identity and Access Management
- Updated the Docker image to: *demisto/boto3py3:1.0.0.48904*.
2 changes: 1 addition & 1 deletion Packs/AWS-IAM/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"description": "Amazon Web Services Identity and Access Management (IAM)",
"support": "xsoar",
"author": "Cortex XSOAR",
"currentVersion": "1.1.22",
"currentVersion": "1.1.23",
"url": "https://www.paloaltonetworks.com/cortex",
"email": "",
"created": "2020-04-14T00:00:00Z",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ alter
senderIpAddress = coalesce(arraycreate(senderIpAddress))
| alter
xdm.event.id = threatId,
xdm.event.outcome = remediationStatus,
xdm.event.outcome = if(remediationStatus = "Auto-Remediated", XDM_CONST.OUTCOME_SUCCESS, remediationStatus = "Post Remediated", XDM_CONST.OUTCOME_SUCCESS, remediationStatus = "Remediated", XDM_CONST.OUTCOME_SUCCESS, remediationStatus = "No Action Done", XDM_CONST.OUTCOME_FAILED, remediationStatus = "Would Remediate", XDM_CONST.OUTCOME_PARTIAL, remediationStatus = "Remediation Attempted", XDM_CONST.OUTCOME_PARTIAL, remediationStatus = null, null, to_string(remediationStatus)),
xdm.email.recipients = toAddresses,
xdm.email.attachment.filename = attachmentNames,
xdm.email.subject = subject,
Expand All @@ -18,6 +18,5 @@ alter
xdm.alert.category = attackType,
xdm.alert.name = attackStrategy,
xdm.alert.description = summaryInsights,
xdm.observer.product = abxPortalUrl,
xdm.observer.unique_identifier = to_string(abxMessageId),
xdm.target.host.ipv4_addresses = senderIpAddress;
4 changes: 4 additions & 0 deletions Packs/AbnormalSecurity/ReleaseNotes/2_0_7.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@

#### Modeling Rules
##### Abnormal Security Event Collector
- Updated Modeling Rules
2 changes: 1 addition & 1 deletion Packs/AbnormalSecurity/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "Abnormal Security",
"description": "Abnormal Security detects and protects against the whole spectrum of email attacks",
"support": "partner",
"currentVersion": "2.0.6",
"currentVersion": "2.0.7",
"author": "Abnormal Security",
"url": "",
"email": "support@abnormalsecurity.com",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,10 +9,10 @@ filter
xdm.target.resource.name = event_resourcename,
xdm.target.resource.type = event_resourcetype,
xdm.source.ipv4 = event_sourceipaddress,
xdm.source.user.user_type = event_useridentity_type,
xdm.source.user.user_type = if(event_useridentity_type in("root-account","cloudsso-user","saml-user","alibaba-cloud-account"),XDM_CONST.USER_TYPE_REGULAR, event_useridentity_type in("ram-user","assumed-role"),XDM_CONST.USER_TYPE_SERVICE_ACCOUNT ,to_string(event_useridentity_type)),
xdm.source.user.identifier = event_useridentity_principalid,
xdm.source.user.username = event_useridentity_username,
xdm.event.outcome=event_errormessage,
xdm.event.description=event_errormessage,
xdm.observer.vendor=_vendor,
xdm.observer.product=_product;

Expand All @@ -23,10 +23,10 @@ filter
xdm.event.id = event_eventid,
xdm.event.operation = event_eventname,
xdm.source.ipv4 = event_sourceipaddress,
xdm.source.user.user_type = event_useridentity_type,
xdm.source.user.user_type = if(event_useridentity_type in("root-account","cloudsso-user","saml-user","alibaba-cloud-account"),XDM_CONST.USER_TYPE_REGULAR, event_useridentity_type in("ram-user","assumed-role"),XDM_CONST.USER_TYPE_SERVICE_ACCOUNT ,to_string(event_useridentity_type)),
xdm.source.user.identifier = event_useridentity_principalid,
xdm.source.user.username = event_useridentity_username,
xdm.session_context_id=event_useridentity_accesskeyid,
xdm.event.outcome=event_errormessage,
xdm.event.description=event_errormessage,
xdm.observer.vendor=_vendor,
xdm.observer.product=_product;
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@
"xdm.event.operation": "DescribeDBClusters",
"xdm.target.resource.name": null,
"xdm.target.resource.type": null,
"xdm.event.outcome": null,
"xdm.event.description": null,
"xdm.target.cloud.region": "TLV",
"xdm.source.user.username": "aliyunserviceroleforslsaudit:Common_Data_Access",
"xdm.source.user.user_type": "testuser:Common_Data_Access",
Expand Down
4 changes: 4 additions & 0 deletions Packs/AlibabaActionTrail/ReleaseNotes/1_0_12.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@

#### Modeling Rules
##### Alibaba Modeling Rule
- Updated Modeling Rules
4 changes: 4 additions & 0 deletions Packs/AlibabaActionTrail/ReleaseNotes/1_0_13.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@

#### Modeling Rules
##### Alibaba Modeling Rule
- Update Modeling Rules.
2 changes: 1 addition & 1 deletion Packs/AlibabaActionTrail/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "Alibaba Action Trail",
"description": "An Integration Pack to fetch Alibaba action trail events.",
"support": "xsoar",
"currentVersion": "1.0.11",
"currentVersion": "1.0.13",
"author": "Cortex XSOAR",
"url": "https://www.paloaltonetworks.com/cortex",
"email": "",
Expand Down
85 changes: 85 additions & 0 deletions Packs/ApiModules/Scripts/CoreIRApiModule/CoreIRApiModule.py
Original file line number Diff line number Diff line change
Expand Up @@ -212,6 +212,26 @@ def get_endpoints(self,
endpoints = reply.get('reply').get('endpoints', [])
return endpoints

def set_endpoints_alias(self, filters: list[dict[str, str]], new_alias_name: str | None) -> dict: # pragma: no cover
"""
This func is used to set the alias name of an endpoint.

args:
filters: list of filters to get the endpoints
new_alias_name: the new alias name to set

returns: dict of the response(True if success else error message)
"""

request_data = {'filters': filters, 'alias': new_alias_name}

return self._http_request(
method='POST',
url_suffix='/endpoints/update_agent_name/',
json_data={'request_data': request_data},
timeout=self.timeout,
)

def isolate_endpoint(self, endpoint_id, incident_id=None):
request_data = {
'endpoint_id': endpoint_id,
Expand Down Expand Up @@ -1769,6 +1789,63 @@ def get_endpoints_command(client, args):
)


def endpoint_alias_change_command(client: CoreClient, **args) -> CommandResults:
# get arguments
endpoint_id_list = argToList(args.get('endpoint_id_list'))
dist_name_list = argToList(args.get('dist_name'))
ip_list = argToList(args.get('ip_list'))
group_name_list = argToList(args.get('group_name'))
platform_list = argToList(args.get('platform'))
alias_name_list = argToList(args.get('alias_name'))
isolate = args.get('isolate')
hostname_list = argToList(args.get('hostname'))
status = args.get('status')
scan_status = args.get('scan_status')
username_list = argToList(args.get('username'))
new_alias_name = args.get('new_alias_name')

# This is a workaround that is needed because of a specific behaviour of the system
# that converts an empty string to a string with double quotes.
if new_alias_name == '""':
new_alias_name = ""

first_seen_gte = arg_to_timestamp(
arg=args.get('first_seen_gte'),
arg_name='first_seen_gte'
)

first_seen_lte = arg_to_timestamp(
arg=args.get('first_seen_lte'),
arg_name='first_seen_lte'
)

last_seen_gte = arg_to_timestamp(
arg=args.get('last_seen_gte'),
arg_name='last_seen_gte'
)

last_seen_lte = arg_to_timestamp(
arg=args.get('last_seen_lte'),
arg_name='last_seen_lte'
)

# create filters
filters: list[dict[str, str]] = create_request_filters(
status=status, username=username_list, endpoint_id_list=endpoint_id_list, dist_name=dist_name_list,
ip_list=ip_list, group_name=group_name_list, platform=platform_list, alias_name=alias_name_list, isolate=isolate,
hostname=hostname_list, first_seen_gte=first_seen_gte, first_seen_lte=first_seen_lte,
last_seen_gte=last_seen_gte, last_seen_lte=last_seen_lte, scan_status=scan_status
)
if not filters:
raise DemistoException('Please provide at least one filter.')
# importent: the API will return True even if the endpoint does not exist, so its a good idea to check
# the results by a get_endpoints command
client.set_endpoints_alias(filters=filters, new_alias_name=new_alias_name)

return CommandResults(
readable_output="The endpoint alias was changed successfully.")


def unisolate_endpoint_command(client, args):
endpoint_id = args.get('endpoint_id')
incident_id = arg_to_number(args.get('incident_id'))
Expand Down Expand Up @@ -3267,6 +3344,7 @@ def create_request_filters(
first_seen_lte=None,
last_seen_gte=None,
last_seen_lte=None,
scan_status=None,
):
filters = []

Expand Down Expand Up @@ -3368,6 +3446,13 @@ def create_request_filters(
'value': last_seen_lte
})

if scan_status:
filters.append({
'field': 'scan_status',
'operator': 'IN',
'value': [scan_status]
})

return filters


Expand Down
45 changes: 45 additions & 0 deletions Packs/ApiModules/Scripts/CoreIRApiModule/CoreIRApiModule_test.py
Original file line number Diff line number Diff line change
Expand Up @@ -3058,3 +3058,48 @@ def test_add_or_remove_tag_endpoint_command(requests_mock, args, expected_filter
'tag': 'test'
}
}


excepted_output_1 = {'filters': [{'field': 'endpoint_status',
'operator': 'IN', 'value': ['connected']}], 'new_alias_name': 'test'}
excepted_output_2 = {'filters': [{'field': 'endpoint_status',
'operator': 'IN', 'value': ['connected']}], 'new_alias_name': ""}


@pytest.mark.parametrize('input, expected_output', [("test", excepted_output_1),
('""', excepted_output_2)])
def test_endpoint_alias_change_command__diffrent_alias_new_names(mocker, input, expected_output):
"""
Given:
- valid new alias name as string - empty new alias name (due to xsoar limitation,
represented by a string of double quote)

When:
- executing the endpoint-alias-change command

Then:
- Makes sure the request body is created correctly.

"""
client = CoreClient(base_url=f'{Core_URL}/public_api/v1/', headers={})
mocker_set = mocker.patch.object(client, 'set_endpoints_alias')
from CoreIRApiModule import endpoint_alias_change_command
endpoint_alias_change_command(client=client, status="connected", new_alias_name=input)
assert mocker_set.call_args[1] == expected_output


def test_endpoint_alias_change_command__no_filters(mocker):
"""
Given:
- command withot endpoint filters
when:
- executing the endpoint-alias-change command
then:
- make sure the correct error message wil raise.
"""
client = CoreClient(base_url=f'{Core_URL}/public_api/v1/', headers={})
mocker.patch.object(client, 'set_endpoints_alias')
from CoreIRApiModule import endpoint_alias_change_command
with pytest.raises(Exception) as e:
endpoint_alias_change_command(client=client, new_alias_name='test')
assert e.value.message == "Please provide at least one filter."
2 changes: 1 addition & 1 deletion Packs/AppNovi/Integrations/appNovi/appNovi.yml
Original file line number Diff line number Diff line change
Expand Up @@ -401,7 +401,7 @@ script:
type: textArea
description: Server IP to search
description: Search for servers using IP address
dockerimage: demisto/python3:3.10.9.46032
dockerimage: demisto/python3:3.10.10.48392
tests:
- No tests (auto formatted)
fromversion: 6.5.0
3 changes: 3 additions & 0 deletions Packs/AppNovi/ReleaseNotes/1_0_3.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
#### Integrations
##### appNovi
- Updated the Docker image to: *demisto/python3:3.10.10.48392*.
2 changes: 1 addition & 1 deletion Packs/AppNovi/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "AppNovi",
"description": "Search your combined security data in appNovi via simplified search or search via the appNovi security graph.",
"support": "partner",
"currentVersion": "1.0.2",
"currentVersion": "1.0.3",
"author": "appNovi",
"url": "https://appnovi.com/support",
"email": "",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2140,7 +2140,7 @@ script:
- contextPath: ConfluenceCloud.Group._links.self
description: Link to the group.
type: String
dockerimage: demisto/python3:3.10.9.46032
dockerimage: demisto/python3:3.10.10.48392
feed: false
isfetch: false
longRunning: false
Expand Down
3 changes: 3 additions & 0 deletions Packs/AtlassianConfluenceCloud/ReleaseNotes/1_0_7.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
#### Integrations
##### Atlassian Confluence Cloud
- Updated the Docker image to: *demisto/python3:3.10.10.48392*.
2 changes: 1 addition & 1 deletion Packs/AtlassianConfluenceCloud/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "Atlassian Confluence Cloud",
"description": "Atlassian Confluence Cloud allows users to interact with confluence entities like content, space, users and groups. Users can also manage the space permissions.",
"support": "xsoar",
"currentVersion": "1.0.6",
"currentVersion": "1.0.7",
"author": "Cortex XSOAR",
"url": "https://www.paloaltonetworks.com/cortex",
"email": "",
Expand Down
4 changes: 3 additions & 1 deletion Packs/Auditd/ModelingRules/Auditd_1_3/Auditd_1_3.xif
Original file line number Diff line number Diff line change
Expand Up @@ -13,11 +13,13 @@ addr = arrayindex(regextract(_raw_log ,"\saddr\=(\d+\.\d+\.\d+\.\d+)\s"),0),
pid = arrayindex(regextract(_raw_log ,"\spid\=(\S+)\s"),0),
comm = arrayindex(regextract(_raw_log ,"\scomm\=\"*([^\"]+)\"*\s"),0),
exe = arrayindex(regextract(_raw_log ,"\sexe\=\"*([^\"]+)\"*\s"),0)
| alter
outcome_result = coalesce(res,success)
| alter
xdm.event.id = eventid,
xdm.event.type = type,
xdm.session_context_id = ses,
xdm.event.outcome = coalesce(res,success),
xdm.event.outcome = if(outcome_result = "failed", XDM_CONST.OUTCOME_FAILED, outcome_result = "no", XDM_CONST.OUTCOME_FAILED, outcome_result = "success", XDM_CONST.OUTCOME_SUCCESS, outcome_result = "yes", XDM_CONST.OUTCOME_SUCCESS, outcome_result = null, null, to_string(outcome_result)),
xdm.event.operation = coalesce(op,key),
xdm.source.user.username = acct,
xdm.source.user.identifier = uid,
Expand Down
Loading