Skip to content

Commit c4c150c

Browse files
darkushinContent Bot
andauthored
Private upload mode docs #5 (demisto#28700)
* Updated Docs * added RNs * Bump pack from version SymantecBlueCoatMalwareAnalysis to 1.0.9. * Bump pack from version Palo_Alto_Networks_WildFire to 2.1.32. * Updated RNs --------- Co-authored-by: Content Bot <bot@demisto.com>
1 parent 8740104 commit c4c150c

File tree

21 files changed

+78
-11
lines changed

21 files changed

+78
-11
lines changed

Packs/Palo_Alto_Networks_WildFire/Integrations/Palo_Alto_Networks_WildFire_v2/Palo_Alto_Networks_WildFire_v2_description.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,5 +10,10 @@ This API key is used in the *API Key* field in the integration configuration.
1010
- Prisma Access
1111
- XSOAR TIM
1212

13+
Notice: Submitting indicators using the following commands of this integration might make the indicator data publicly available.
14+
- ***wildfire-upload-url***
15+
- ***wildfire-get-url-webartifacts***
16+
See the vendor’s documentation for more details.
17+
1318
---
1419
[View Integration Documentation](https://xsoar.pan.dev/docs/reference/integrations/wild-fire-v2)

Packs/Palo_Alto_Networks_WildFire/Integrations/Palo_Alto_Networks_WildFire_v2/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -488,6 +488,8 @@ Returns a verdict regarding multiple hashes, stored in a TXT file or given as li
488488
***
489489
Uploads a URL of a webpage to WildFire for analysis.
490490

491+
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
492+
491493

492494
#### Base Command
493495

@@ -621,6 +623,8 @@ There is no human-readable output for this command.
621623
***
622624
Get web artifacts for a URL webpage. An empty tgz will be returned, no matter what the verdict, or even if the URL is malformed.
623625

626+
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
627+
624628

625629
#### Base Command
626630

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
2+
#### Integrations
3+
4+
##### Palo Alto Networks WildFire v2
5+
6+
Documentation and metadata improvements.

Packs/Palo_Alto_Networks_WildFire/pack_metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "WildFire by Palo Alto Networks",
33
"description": "Perform malware dynamic analysis",
44
"support": "xsoar",
5-
"currentVersion": "2.1.31",
5+
"currentVersion": "2.1.32",
66
"author": "Cortex XSOAR",
77
"url": "https://www.paloaltonetworks.com/cortex",
88
"email": "",

Packs/QutteraWebsiteMalwareScanner/Integrations/QutteraWebsiteMalwareScanner/QutteraWebsiteMalwareScanner_description.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,3 +5,8 @@ This integration enables the Quttera scanner API
55
# Credentials
66

77
Use API key supply by Quttera. To get the key, send request to `contactus@quttera.com`.
8+
9+
Notice: Submitting indicators using the following commands of this integration might make the indicator data publicly available.
10+
- ***quttera-report-malware***
11+
- ***quttera-scan-start***
12+
See the vendor’s documentation for more details.

Packs/QutteraWebsiteMalwareScanner/Integrations/QutteraWebsiteMalwareScanner/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ After you successfully execute a command, a DBot message appears in the War Room
2020
***
2121
Start to scan a given domain
2222

23+
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
24+
2325

2426
#### Base Command
2527

@@ -101,6 +103,8 @@ Retrieve report of submitted domain
101103
***
102104
Retrieve url blacklist and reputation
103105

106+
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
107+
104108

105109
#### Base Command
106110

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
2+
#### Integrations
3+
4+
##### QutteraWebsiteMalwareScanner
5+
6+
Documentation and metadata improvements.

Packs/QutteraWebsiteMalwareScanner/pack_metadata.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "Quttera Website Malware Scanner",
33
"description": "Detect suspicious/malicious/blocklisted content on domains/URLs. Run real-time normal/heuristic scan and database queries.",
44
"support": "partner",
5-
"currentVersion": "1.0.7",
5+
"currentVersion": "1.0.8",
66
"author": "Quttera LTD",
77
"url": "https://scannerapi.quttera.com/api/v3",
88
"email": "support@quttera.com",
@@ -27,4 +27,4 @@
2727
"xsoar",
2828
"marketplacev2"
2929
]
30-
}
30+
}

Packs/SlashNextPhishingIncidentResponse/Integrations/SlashNextPhishingIncidentResponse/README.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -454,6 +454,7 @@
454454
<h3>3. url</h3>
455455
<hr>
456456
<p>Queries the SlashNext Cloud database and retrieves the reputation of a url.</p>
457+
<p>Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.</p>
457458
<h5>Base Command</h5>
458459
<p>
459460
<code>url</code>
@@ -725,6 +726,7 @@
725726
<h3>4. slashnext-host-reputation</h3>
726727
<hr>
727728
<p>Search in SlashNext Cloud database and retrieve reputation of a host.</p>
729+
<p>Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.</p>
728730
<h5>Base Command</h5>
729731
<p>
730732
<code>slashnext-host-reputation</code>
@@ -1944,6 +1946,7 @@ Forensics: Webpage Rendered Text for the Scanned URL = http://www.google.com/was
19441946
<h3>7. slashnext-url-reputation</h3>
19451947
<hr>
19461948
<p>Queries the SlashNext Cloud database and retrieves the reputation of a url.</p>
1949+
<p>Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.</p>
19471950
<h5>Base Command</h5>
19481951
<p>
19491952
<code>slashnext-url-reputation</code>

Packs/SlashNextPhishingIncidentResponse/Integrations/SlashNextPhishingIncidentResponse/SlashNextPhishingIncidentResponse_description.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,3 +7,9 @@ Use cases include abuse inbox management where SOC teams can automate URL analys
77
SlashNext not only provides accurate, binary verdicts (rather than threat scores), it provides IOC metadata and screen shots of detected phishing pages. These enables easier classification and reporting. Screen shots can be used as an aid in on-going employee phishing awareness training and testing.
88

99
The SlashNext Phishing Incident Response integration app uses an API key to authenticate with SlashNext cloud. If you don't have a valid API key, contact the SlashNext team: support@slashnext.com
10+
11+
Notice: Submitting indicators using the following commands of this integration might make the indicator data publicly available.
12+
- ***url***
13+
- ***slashnext-url-reputation***
14+
- ***slashnext-host-reputation***
15+
See the vendor’s documentation for more details.

0 commit comments

Comments
 (0)