Skip to content

Commit

Permalink
"contribution update to pack "Microsoft Defender for Endpoint"" (#30323)
Browse files Browse the repository at this point in the history
  • Loading branch information
xsoar-bot committed Oct 23, 2023
1 parent 91f3267 commit c310e63
Show file tree
Hide file tree
Showing 6 changed files with 38 additions and 65 deletions.
Original file line number Diff line number Diff line change
@@ -1,9 +1,10 @@
import demistomock as demisto # noqa: F401
from CommonServerPython import * # noqa: F401
import demistomock as demisto # noqa: F401

# pylint: disable=E9010, E9011
import traceback

from CommonServerUserPython import *

import requests
import re
import base64
Expand Down
Original file line number Diff line number Diff line change
@@ -1,12 +1,16 @@
import demistomock as demisto # noqa: F401
from CommonServerPython import * # noqa: F401

import copy
from itertools import product
from json import JSONDecodeError
from typing import Any
from collections.abc import Callable
from CommonServerPython import *

import urllib3
from dateutil.parser import parse
from requests import Response

from MicrosoftApiModule import * # noqa: E402

# Disable insecure warnings
Expand Down Expand Up @@ -1305,7 +1309,7 @@ def run_antivirus_scan(self, machine_id, comment, scan_type):
Args:
machine_id (str): Machine ID
comment (str): Comment to associate with the action
comment (str): Comment to associate with the action
scan_type (str): Defines the type of the Scan (Quick, Full)
Notes:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,4 @@
category: Endpoint

Check failure on line 1 in Packs/MicrosoftDefenderAdvancedThreatProtection/Integrations/MicrosoftDefenderAdvancedThreatProtection/MicrosoftDefenderAdvancedThreatProtection.yml

View workflow job for this annotation

GitHub Actions / pre-commit

Validation Error DO106

The docker image tag is not the latest numeric tag, please update it. The docker image tag in the yml file is: 1.0.0.78196 The latest docker image tag in docker hub is: 1.0.0.79207 You can check for the most updated version of demisto/crypto here: https://hub.docker.com/r/demisto/crypto/tags To update the docker image run: demisto-sdk format -ud -i Packs/MicrosoftDefenderAdvancedThreatProtection/Integrations/MicrosoftDefenderAdvancedThreatProtection/MicrosoftDefenderAdvancedThreatProtection.yml
sectionOrder:
- Connect
- Collect
commonfields:
id: Microsoft Defender Advanced Threat Protection
version: -1
Expand Down Expand Up @@ -39,6 +36,7 @@ configuration:
type: 9
hiddenusername: true
required: false
display: ''
- display: Certificate Thumbprint
name: creds_certificate
type: 9
Expand Down Expand Up @@ -96,6 +94,7 @@ configuration:
type: 9
section: Connect
required: false
display: ''
- name: Reliability
additionalinfo: Reliability of the source providing the intelligence data.
defaultvalue: B - Usually reliable
Expand Down Expand Up @@ -173,15 +172,13 @@ configuration:
type: 0
section: Connect
advanced: true
defaultvalue:
additionalinfo: More information can be found on https://cortex.marketplace.pan.dev/marketplace/details/MicrosoftDefenderAdvancedThreatProtection/
required: false
- additionalinfo: Select this checkbox if you are using a self-deployed Azure application.
display: Use a self-deployed Azure Application
name: self_deployed
type: 8
section: Connect
advanced: false
required: false
- display: Trust any certificate (not secure)
name: insecure
Expand Down Expand Up @@ -236,6 +233,11 @@ configuration:
section: Connect
advanced: true
required: false
- defaultvalue: '1'
display: Incidents Fetch Interval
name: incidentFetchInterval
required: false
type: 19
description: Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection (ATP)) is a unified platform for preventative protection, post-breach detection, automated investigation, and response.
display: Microsoft Defender for Endpoint
name: Microsoft Defender Advanced Threat Protection
Expand Down Expand Up @@ -806,6 +808,14 @@ script:
- Malware
- SecurityTesting
- UnwantedSoftware
- MultiStagedAttack
- MaliciousUserActivity
- CompromisedUser
- Phishing
- LineOfBusinessApplication
- ConfirmedUserActivity
- Clean
- InsufficientData
- Other
- description: Comment to be added to the alert.
name: comment
Expand Down Expand Up @@ -900,9 +910,9 @@ script:
name: timeout
- name: time_range
description: Time range to look back. The expected syntax is a human-readable time range, e.g., 60 minutes, 6 hours, 1 day, etc. If specified with query_batch, applies to all queries in the array.
defaultValue: ''
predefined:
- ''
auto: PREDEFINED
- deprecated: true
description: Flag for the rate limit retry.
name: ran_once_flag
Expand Down Expand Up @@ -1550,6 +1560,7 @@ script:
name: offset
predefined:
- ''
auto: PREDEFINED
- deprecated: true
description: Flag for the rate limit retry.
name: ran_once_flag
Expand Down Expand Up @@ -4830,7 +4841,6 @@ script:
- name: ran_once_flag
description: Flag for the rate limit retry.
deprecated: true
outputs: []
polling: true
execution: true
- name: microsoft-atp-advanced-hunting-lateral-movement-evidence
Expand All @@ -4840,33 +4850,25 @@ script:
auto: PREDEFINED
description: When you select a “query_purpose” argument, a designated query template is used. "network_connections" - The network connections initiated by the host/file to other internal hosts. "smb_connections" - SMB connections. "credential_dumping" - Was there a use of credential dumping? If so can we detect the use of the dumped users on other hosts on the network. "management_connection" - Management connection attempts to other hosts.
required: true
defaultValue: ''
predefined:
- network_connections
- smb_connections
- credential_dumping
- management_connection
- name: device_name
description: Device name to look for.
defaultValue: ''
- name: remote_ip_count
description: Threshold for network enumeration in smb_connection.
defaultValue: ''
- name: file_name
description: The file name to look for.
defaultValue: ''
- name: sha1
description: The SHA1 hash to look for.
defaultValue: ''
- name: sha256
description: The SHA256 hash to look for.
defaultValue: ''
- name: md5
description: The MD5 hash to look for.
defaultValue: ''
- name: device_id
description: The device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: The query operator to use with provided arguments.
Expand Down Expand Up @@ -4910,7 +4912,6 @@ script:
name: query_purpose
required: true
auto: PREDEFINED
defaultValue: ''
predefined:
- scheduled_job
- registry_entry
Expand All @@ -4925,22 +4926,16 @@ script:
- host_file_change
- description: Device name to look for.
name: device_name
defaultValue: ''
- name: file_name
description: File name to look for.
defaultValue: ''
- name: sha1
description: SHA1 hash to look for.
defaultValue: ''
- name: sha256
description: SHA256 hash to look for.
defaultValue: ''
- name: md5
description: MD5 hash to look for.
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with the provided arguments.
Expand Down Expand Up @@ -5007,22 +5002,16 @@ script:
- arguments:
- description: Device name to look for.
name: device_name
defaultValue: ''
- description: File name to look for.
name: file_name
defaultValue: ''
- name: sha1
description: SHA1 hash to look for.
defaultValue: ''
- name: sha256
description: SHA256 hash to look for.
defaultValue: ''
- name: md5
description: MD5 hash to look for.
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with provided arguments.
Expand Down Expand Up @@ -5059,7 +5048,6 @@ script:
name: query_purpose
required: true
auto: PREDEFINED
defaultValue: ''
predefined:
- parent_process
- grandparent_process
Expand All @@ -5069,22 +5057,16 @@ script:
- process_excecution_powershell
- description: Device name to look for.
name: device_name
defaultValue: ''
- description: File name to look for.
name: file_name
defaultValue: ''
- description: SHA1 hash to look for.
name: sha1
defaultValue: ''
- description: SHA256 hash to look for.
name: sha256
defaultValue: ''
- description: MD5 hash to look for.
name: md5
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with provided arguments.
Expand Down Expand Up @@ -5136,29 +5118,22 @@ script:
name: query_purpose
required: true
auto: PREDEFINED
defaultValue: ''
predefined:
- external_addresses
- dns_query
- encoded_commands
- description: Device name to look for.
name: device_name
defaultValue: ''
- description: File name to look for.
name: file_name
defaultValue: ''
- name: sha1
description: SHA1 hash to look for.
defaultValue: ''
- name: sha256
description: SHA256 hash to look for.
defaultValue: ''
- name: md5
description: MD5 hash to look for.
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with provided arguments.
Expand Down Expand Up @@ -5201,10 +5176,8 @@ script:
arguments:
- name: device_name
description: Device name to look for.
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with provided arguments.
Expand Down Expand Up @@ -5238,10 +5211,8 @@ script:
arguments:
- name: device_name
description: Device name to look for.
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with provided arguments.
Expand Down Expand Up @@ -5278,7 +5249,6 @@ script:
auto: PREDEFINED
description: When you select a “query_purpose” argument, a designated query template is used. "file_deleted" - Did the file delete itself? "event_log_cleared" - Was the event log cleared? Requires at least one of device arguments (device_name/device_id). "compromised_information" - Information on a compromised user and its activities. Requires only username argument. "connected_devices" - All connected devices by compromised user. Requires only username argument. "action_types" - All action types created by a user on each machine. Requires only username argument. "common_files" - Most common files associated with a user. Requires only username argument.
required: true
defaultValue: ''
predefined:
- file_deleted
- event_log_cleared
Expand All @@ -5288,25 +5258,18 @@ script:
- common_files
- name: device_name
description: Device name to look for.
defaultValue: ''
- name: file_name
description: File name to look for.
defaultValue: ''
- name: sha1
description: SHA1 hash to look for.
defaultValue: ''
- name: sha256
description: SHA256 hash to look for.
defaultValue: ''
- name: md5
description: MD5 hash to look for.
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: username
description: Username to look for in relevant query types.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with provided arguments.
Expand Down Expand Up @@ -5522,16 +5485,14 @@ script:
name: microsoft-atp-generate-login-url
arguments: []
- description: Run this command if for some reason you need to rerun the authentication process.
execution: false
name: microsoft-atp-auth-reset
arguments: []
dockerimage: demisto/crypto:1.0.0.78196
isfetch: true
runonce: false
script: '-'
script: ''
subtype: python3
type: python
defaultmapperin: Microsoft Defender For Endpoint Mapper
fromversion: 5.0.0
tests:
- Microsoft Defender Advanced Threat Protection - Test
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ There are 2 application authentication methods available:

* [Cortex XSOAR Application](https://xsoar.pan.dev/docs/reference/articles/microsoft-integrations---authentication#cortex-xsoar-application)
* [Self-Deployed Application](https://xsoar.pan.dev/docs/reference/articles/microsoft-integrations---authentication#self-deployed-application)

Depending on the authentication method that you use, the integration parameters might change.

To allow us access to Microsoft Defender Advanced Threat Protection, an admin has to approve our app using an admin consent flow, by clicking on the following [link](https://oproxy.demisto.ninja/ms-defender-atp).
Expand All @@ -17,8 +17,8 @@ After authorizing the Demisto app, you will get an ID, Token, and Key, which sho

There are two different authentication methods for self-deployed configuration:
- [Client Credentials flow](https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exposed-apis-create-app-webapp?view=o365-worldwide)
- [Authorization Code flow](https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exposed-apis-create-app-nativeapp?view=o365-worldwide)
### Authentication Using the Authorization Code Flow
- [Authorization Code flow](https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exposed-apis-create-app-nativeapp?view=o365-worldwide)
### Authentication Using the Authorization Code Flow
**Note**: When using the Authorization Code Flow, make sure the user you authenticate with has the required role permissions. See [this](https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/initiate-autoir-investigation?view=o365-worldwide#permissions) as an example.
1. To use a self-configured Azure application, add a new Azure App Registration in the Azure Portal. To add the registration, see this [Microsoft article](https://docs.microsoft.com/en-us/microsoft-365/security/defender/api-create-app-web?view=o365-worldwide#create-an-app) steps 1-8.
2. In the **ID** field, enter your Client/Application ID.
Expand All @@ -43,3 +43,4 @@ Follow one of these steps for authentication based on Azure Managed Identities:
3. Select the **Use Azure Managed Identities** checkbox.

For more information, see [Managed identities for Azure resources](https://learn.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview)

Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@

#### Integrations

##### Microsoft Defender for Endpoint

- Updated determination list options for microsoft-atp-update-alert command
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "Microsoft Defender for Endpoint",
"description": "Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection (ATP)) is a unified platform for preventative protection, post-breach detection, automated investigation, and response.",
"support": "xsoar",
"currentVersion": "1.16.14",
"currentVersion": "1.16.15",
"author": "Cortex XSOAR",
"url": "https://www.paloaltonetworks.com/cortex",
"email": "",
Expand Down

0 comments on commit c310e63

Please sign in to comment.