diff --git a/Packs/AbnormalSecurity/Integrations/AbnormalSecurityEventCollector/AbnormalSecurityEventCollector.yml b/Packs/AbnormalSecurity/Integrations/AbnormalSecurityEventCollector/AbnormalSecurityEventCollector.yml index c3d338c74ddc..5e2477a5f5a4 100644 --- a/Packs/AbnormalSecurity/Integrations/AbnormalSecurityEventCollector/AbnormalSecurityEventCollector.yml +++ b/Packs/AbnormalSecurity/Integrations/AbnormalSecurityEventCollector/AbnormalSecurityEventCollector.yml @@ -40,10 +40,11 @@ script: - 'True' - 'False' required: true - dockerimage: demisto/python3:3.10.13.75921 + dockerimage: demisto/python3:3.10.13.78960 isfetchevents: true subtype: python3 fromversion: 6.8.0 +supportlevelheader: xsoar marketplaces: - marketplacev2 tests: diff --git a/Packs/AbnormalSecurity/ReleaseNotes/2_1_1.md b/Packs/AbnormalSecurity/ReleaseNotes/2_1_1.md new file mode 100644 index 000000000000..397bb1792c03 --- /dev/null +++ b/Packs/AbnormalSecurity/ReleaseNotes/2_1_1.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Abnormal Security Event Collector +- Updated the Docker image to: *demisto/python3:3.10.13.78960*. +- Added a notice to the documentation that this integration is supported by Palo Alto Networks. diff --git a/Packs/AbnormalSecurity/pack_metadata.json b/Packs/AbnormalSecurity/pack_metadata.json index 21577ed5bcf9..d9fba7d4884f 100644 --- a/Packs/AbnormalSecurity/pack_metadata.json +++ b/Packs/AbnormalSecurity/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Abnormal Security", "description": "Abnormal Security detects and protects against the whole spectrum of email attacks", "support": "partner", - "currentVersion": "2.1.0", + "currentVersion": "2.1.1", "author": "Abnormal Security", "url": "", "email": "support@abnormalsecurity.com", diff --git a/Packs/Armis/Integrations/ArmisEventCollector/ArmisEventCollector.yml b/Packs/Armis/Integrations/ArmisEventCollector/ArmisEventCollector.yml index b021ddf8025e..996e6cad2104 100644 --- a/Packs/Armis/Integrations/ArmisEventCollector/ArmisEventCollector.yml +++ b/Packs/Armis/Integrations/ArmisEventCollector/ArmisEventCollector.yml @@ -42,6 +42,7 @@ configuration: description: Collects alerts & threat activities from Armis resources. display: Armis Event Collector name: ArmisEventCollector +supportlevelheader: xsoar script: commands: - arguments: @@ -63,7 +64,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.75921 + dockerimage: demisto/python3:3.10.13.78960 marketplaces: - marketplacev2 fromversion: 6.10.0 diff --git a/Packs/Armis/ReleaseNotes/1_1_4.md b/Packs/Armis/ReleaseNotes/1_1_4.md new file mode 100644 index 000000000000..4bb8848ce0a4 --- /dev/null +++ b/Packs/Armis/ReleaseNotes/1_1_4.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Armis Event Collector +- Updated the Docker image to: *demisto/python3:3.10.13.78960*. +- Added a notice to the documentation that this integration is supported by Palo Alto Networks. diff --git a/Packs/Armis/pack_metadata.json b/Packs/Armis/pack_metadata.json index 42944a654623..8ada87c0a776 100755 --- a/Packs/Armis/pack_metadata.json +++ b/Packs/Armis/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Armis", "description": "Agentless and passive security platform that sees, identifies, and classifies every device, tracks behavior, identifies threats, and takes action automatically to protect critical information and systems", "support": "partner", - "currentVersion": "1.1.3", + "currentVersion": "1.1.4", "author": "Armis Corporation", "url": "https://support.armis.com/", "email": "support@armis.com", diff --git a/Packs/Darktrace/Integrations/DarktraceEventCollector/DarktraceEventCollector.yml b/Packs/Darktrace/Integrations/DarktraceEventCollector/DarktraceEventCollector.yml index 4c2d9350945e..1b3e09f3264e 100644 --- a/Packs/Darktrace/Integrations/DarktraceEventCollector/DarktraceEventCollector.yml +++ b/Packs/Darktrace/Integrations/DarktraceEventCollector/DarktraceEventCollector.yml @@ -56,6 +56,7 @@ configuration: description: Use this integration to fetch model breaches from Darktrace as events in XSIAM. display: Darktrace Event Collector name: Darktrace Event Collector +supportlevelheader: xsoar script: commands: - arguments: @@ -81,7 +82,7 @@ script: type: python subtype: python3 isfetchevents: true - dockerimage: demisto/python3:3.10.12.68714 + dockerimage: demisto/python3:3.10.13.78960 marketplaces: - marketplacev2 fromversion: 6.9.0 diff --git a/Packs/Darktrace/ReleaseNotes/3_0_5.md b/Packs/Darktrace/ReleaseNotes/3_0_5.md new file mode 100644 index 000000000000..e8f7cba57c10 --- /dev/null +++ b/Packs/Darktrace/ReleaseNotes/3_0_5.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Darktrace Event Collector +- Updated the Docker image to: *demisto/python3:3.10.13.78960*. +- Added a notice to the documentation that this integration is supported by Palo Alto Networks. diff --git a/Packs/Darktrace/pack_metadata.json b/Packs/Darktrace/pack_metadata.json index 0cf1cc2cf2d8..9be880f5a8bd 100644 --- a/Packs/Darktrace/pack_metadata.json +++ b/Packs/Darktrace/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Darktrace", "description": "Populates Darktrace Model Breaches and AI Analyst Events in Cortex XSOAR, allowing for cross-platform automated investigation and response.", "support": "partner", - "currentVersion": "3.0.4", + "currentVersion": "3.0.5", "fromVersion": "5.0.0", "author": "Darktrace", "githubUser": "", diff --git a/Packs/DigitalGuardian/Integrations/DigitalGuardianARCEventCollector/DigitalGuardianARCEventCollector.yml b/Packs/DigitalGuardian/Integrations/DigitalGuardianARCEventCollector/DigitalGuardianARCEventCollector.yml index e74f8a47c2eb..781508e76673 100644 --- a/Packs/DigitalGuardian/Integrations/DigitalGuardianARCEventCollector/DigitalGuardianARCEventCollector.yml +++ b/Packs/DigitalGuardian/Integrations/DigitalGuardianARCEventCollector/DigitalGuardianARCEventCollector.yml @@ -43,9 +43,10 @@ configuration: required: false type: 8 section: Connect -description: Digital Guardian ARC event collector +description: Digital Guardian ARC event collector. display: Digital Guardian ARC Event Collector name: DigitalGuardianARCEventCollector +supportlevelheader: xsoar script: commands: - arguments: @@ -69,7 +70,7 @@ script: description: Gets events from Hello World. execution: false name: digital-guardian-get-events - dockerimage: demisto/python3:3.10.13.72123 + dockerimage: demisto/python3:3.10.13.78960 isfetchevents: true runonce: false script: '-' diff --git a/Packs/DigitalGuardian/ReleaseNotes/1_1_3.md b/Packs/DigitalGuardian/ReleaseNotes/1_1_3.md new file mode 100644 index 000000000000..4b2e37152246 --- /dev/null +++ b/Packs/DigitalGuardian/ReleaseNotes/1_1_3.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Digital Guardian ARC Event Collector +- Updated the Docker image to: *demisto/python3:3.10.13.78960*. +- Added a notice to the documentation that this integration is supported by Palo Alto Networks. diff --git a/Packs/DigitalGuardian/pack_metadata.json b/Packs/DigitalGuardian/pack_metadata.json index c3a99bd11c04..11eabe9b8a7e 100644 --- a/Packs/DigitalGuardian/pack_metadata.json +++ b/Packs/DigitalGuardian/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Digital Guardian", "description": "Digital Guardian ARC Watchlist Integration", "support": "partner", - "currentVersion": "1.1.2", + "currentVersion": "1.1.3", "author": "Digital Guardian", "url": "https://digitalguardian.com", "email": "support@digitalguardian.com", diff --git a/Packs/KnowBe4_KMSAT/Integrations/KnowBe4KMSATEventCollector/KnowBe4KMSATEventCollector.yml b/Packs/KnowBe4_KMSAT/Integrations/KnowBe4KMSATEventCollector/KnowBe4KMSATEventCollector.yml index 1cfe5757b0e8..b0fe1e7e3949 100644 --- a/Packs/KnowBe4_KMSAT/Integrations/KnowBe4KMSATEventCollector/KnowBe4KMSATEventCollector.yml +++ b/Packs/KnowBe4_KMSAT/Integrations/KnowBe4KMSATEventCollector/KnowBe4KMSATEventCollector.yml @@ -52,6 +52,7 @@ configuration: description: KnowBe4_KMSAT allows you to push and pull your external data to and from the KnowBe4 console. display: 'KnowBe4 KMSAT Event Collector' name: KnowBe4 KMSAT Event Collector +supportlevelheader: xsoar script: commands: - description: Manual command to fetch and display events. @@ -120,7 +121,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.77674 + dockerimage: demisto/python3:3.10.13.78960 isfetchevents: true fromversion: 6.8.0 tests: diff --git a/Packs/KnowBe4_KMSAT/ReleaseNotes/1_0_22.md b/Packs/KnowBe4_KMSAT/ReleaseNotes/1_0_22.md new file mode 100644 index 000000000000..e5aefa00094a --- /dev/null +++ b/Packs/KnowBe4_KMSAT/ReleaseNotes/1_0_22.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### KnowBe4 KMSAT Event Collector +- Updated the Docker image to: *demisto/python3:3.10.13.78960*. +- Added a notice to the documentation that this integration is supported by Palo Alto Networks. diff --git a/Packs/KnowBe4_KMSAT/pack_metadata.json b/Packs/KnowBe4_KMSAT/pack_metadata.json index d00dc8360ba1..e8403a45e432 100644 --- a/Packs/KnowBe4_KMSAT/pack_metadata.json +++ b/Packs/KnowBe4_KMSAT/pack_metadata.json @@ -2,7 +2,7 @@ "name": "KMSAT", "description": "KnowBe4 KMSAT Integration", "support": "partner", - "currentVersion": "1.0.21", + "currentVersion": "1.0.22", "author": "KnowBe4", "url": "https://www.knowbe4.com/products/kevin-mitnick-security-awareness-training", "email": "support@knowbe4.com", diff --git a/Packs/Orca/Integrations/OrcaEventCollector/OrcaEventCollector.yml b/Packs/Orca/Integrations/OrcaEventCollector/OrcaEventCollector.yml index 38b882d65a2d..17f86af47cb8 100644 --- a/Packs/Orca/Integrations/OrcaEventCollector/OrcaEventCollector.yml +++ b/Packs/Orca/Integrations/OrcaEventCollector/OrcaEventCollector.yml @@ -58,8 +58,9 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.12.66339 + dockerimage: demisto/python3:3.10.13.78960 fromversion: '6.8.0' +supportlevelheader: xsoar marketplaces: - marketplacev2 tests: diff --git a/Packs/Orca/ReleaseNotes/2_2_7.md b/Packs/Orca/ReleaseNotes/2_2_7.md new file mode 100644 index 000000000000..26b0acba93cf --- /dev/null +++ b/Packs/Orca/ReleaseNotes/2_2_7.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Orca Event Collector +- Updated the Docker image to: *demisto/python3:3.10.13.78960*. +- Added a notice to the documentation that this integration is supported by Palo Alto Networks. diff --git a/Packs/Orca/pack_metadata.json b/Packs/Orca/pack_metadata.json index d0f8dbd69f3c..a74a6afa5842 100644 --- a/Packs/Orca/pack_metadata.json +++ b/Packs/Orca/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Orca", "description": "Integrate with Orca security for bidirectional incident management and fetching of asset information. \n", "support": "partner", - "currentVersion": "2.2.6", + "currentVersion": "2.2.7", "author": "Orca Security", "url": "https://orca.security/", "email": "support@orca.security", diff --git a/Packs/RecordedFuture/Integrations/RecordedFutureEventCollector/RecordedFutureEventCollector.yml b/Packs/RecordedFuture/Integrations/RecordedFutureEventCollector/RecordedFutureEventCollector.yml index 1a87e1046ae2..f4a9dc2a36cf 100644 --- a/Packs/RecordedFuture/Integrations/RecordedFutureEventCollector/RecordedFutureEventCollector.yml +++ b/Packs/RecordedFuture/Integrations/RecordedFutureEventCollector/RecordedFutureEventCollector.yml @@ -38,6 +38,7 @@ configuration: description: This integration fetches alerts from Recorded Future. display: Recorded Future Event Collector name: RecordedFutureEventCollector +supportlevelheader: xsoar script: commands: - arguments: @@ -54,7 +55,7 @@ script: name: limit description: Gets events from Recorded Future. name: recorded-future-get-events - dockerimage: demisto/python3:3.10.13.72123 + dockerimage: demisto/python3:3.10.13.78960 isfetchevents: true script: '-' subtype: python3 diff --git a/Packs/RecordedFuture/ReleaseNotes/1_7_3.md b/Packs/RecordedFuture/ReleaseNotes/1_7_3.md new file mode 100644 index 000000000000..c2220c609ac6 --- /dev/null +++ b/Packs/RecordedFuture/ReleaseNotes/1_7_3.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Recorded Future Event Collector +- Updated the Docker image to: *demisto/python3:3.10.13.78960*. +- Added a notice to the documentation that this integration is supported by Palo Alto Networks. diff --git a/Packs/RecordedFuture/pack_metadata.json b/Packs/RecordedFuture/pack_metadata.json index ee435bb0fc1b..f5118c1e530e 100644 --- a/Packs/RecordedFuture/pack_metadata.json +++ b/Packs/RecordedFuture/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Recorded Future Intelligence", "description": "Recorded Future App, this pack is previously known as 'RecordedFuture v2'", "support": "partner", - "currentVersion": "1.7.2", + "currentVersion": "1.7.3", "author": "Recorded Future", "url": "https://www.recordedfuture.com/support/demisto-integration/", "email": "support@recordedfuture.com", diff --git a/Packs/SafeNet_Trusted_Access/Integrations/SafeNetTrustedAccessEventCollector/SafeNetTrustedAccessEventCollector.yml b/Packs/SafeNet_Trusted_Access/Integrations/SafeNetTrustedAccessEventCollector/SafeNetTrustedAccessEventCollector.yml index 4cb311a8ba05..889d6b1b0c32 100644 --- a/Packs/SafeNet_Trusted_Access/Integrations/SafeNetTrustedAccessEventCollector/SafeNetTrustedAccessEventCollector.yml +++ b/Packs/SafeNet_Trusted_Access/Integrations/SafeNetTrustedAccessEventCollector/SafeNetTrustedAccessEventCollector.yml @@ -51,6 +51,7 @@ configuration: description: 'Retrieve access, authentication, and audit logs and store them on a Security Information and Event Management (SIEM) system, local repository, or syslog file server. You can retrieve the logs only for the tenant that is associated with the API key, or for a direct or delegated child of that tenant.' display: 'Thales SafeNet Trusted Access Event Collector' name: SafeNetTrustedAccessEventCollector +supportlevelheader: xsoar script: commands: - arguments: @@ -74,7 +75,7 @@ script: type: python subtype: python3 isfetchevents: true - dockerimage: demisto/python3:3.10.13.77674 + dockerimage: demisto/python3:3.10.13.78960 marketplaces: - marketplacev2 fromversion: 6.8.0 diff --git a/Packs/SafeNet_Trusted_Access/ReleaseNotes/2_0_27.md b/Packs/SafeNet_Trusted_Access/ReleaseNotes/2_0_27.md new file mode 100644 index 000000000000..5a763e3ed9b5 --- /dev/null +++ b/Packs/SafeNet_Trusted_Access/ReleaseNotes/2_0_27.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Thales SafeNet Trusted Access Event Collector +- Updated the Docker image to: *demisto/python3:3.10.13.78960*. +- Added a notice to the documentation that this integration is supported by Palo Alto Networks. diff --git a/Packs/SafeNet_Trusted_Access/pack_metadata.json b/Packs/SafeNet_Trusted_Access/pack_metadata.json index 088c37b83d4c..21dc6eb102cf 100644 --- a/Packs/SafeNet_Trusted_Access/pack_metadata.json +++ b/Packs/SafeNet_Trusted_Access/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Thales SafeNet Trusted Access", "description": "SafeNet Trusted Access by Thales is an access management solution that allows organizations to centrally manage and secure access to business applications.", "support": "partner", - "currentVersion": "2.0.26", + "currentVersion": "2.0.27", "author": "Thales", "url": "https://supportportal.gemalto.com/csm/?id=portal_home_page", "email": "", diff --git a/Packs/SentinelOne/Integrations/SentinelOneEventCollector/SentinelOneEventCollector.yml b/Packs/SentinelOne/Integrations/SentinelOneEventCollector/SentinelOneEventCollector.yml index d98f1c917fd2..80a9a61e65ca 100644 --- a/Packs/SentinelOne/Integrations/SentinelOneEventCollector/SentinelOneEventCollector.yml +++ b/Packs/SentinelOne/Integrations/SentinelOneEventCollector/SentinelOneEventCollector.yml @@ -56,6 +56,7 @@ configuration: description: This integration fetches activities, threats, and alerts from SentinelOne. display: SentinelOne Event Collector name: SentinelOneEventCollector +supportlevelheader: xsoar script: commands: - arguments: @@ -71,7 +72,7 @@ script: name: limit description: Gets events from SentinelOne. name: sentinelone-get-events - dockerimage: demisto/python3:3.10.13.73190 + dockerimage: demisto/python3:3.10.13.78960 isfetchevents: true script: '-' subtype: python3 diff --git a/Packs/SentinelOne/ReleaseNotes/3_2_11.md b/Packs/SentinelOne/ReleaseNotes/3_2_11.md new file mode 100644 index 000000000000..2c3caa1e55bc --- /dev/null +++ b/Packs/SentinelOne/ReleaseNotes/3_2_11.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### SentinelOne Event Collector +- Updated the Docker image to: *demisto/python3:3.10.13.78960*. +- Added a notice to the documentation that this integration is supported by Palo Alto Networks. diff --git a/Packs/SentinelOne/pack_metadata.json b/Packs/SentinelOne/pack_metadata.json index b7ed04972f60..000c6759c4d0 100644 --- a/Packs/SentinelOne/pack_metadata.json +++ b/Packs/SentinelOne/pack_metadata.json @@ -2,7 +2,7 @@ "name": "SentinelOne", "description": "Endpoint protection", "support": "partner", - "currentVersion": "3.2.10", + "currentVersion": "3.2.11", "author": "SentinelOne", "url": "https://www.sentinelone.com/support/", "email": "support@sentinelone.com", diff --git a/Packs/TrendMicroVisionOne/Integrations/TrendMicroVisionOneEventCollector/TrendMicroVisionOneEventCollector.yml b/Packs/TrendMicroVisionOne/Integrations/TrendMicroVisionOneEventCollector/TrendMicroVisionOneEventCollector.yml index da8f55010d65..1be25a9d851b 100644 --- a/Packs/TrendMicroVisionOne/Integrations/TrendMicroVisionOneEventCollector/TrendMicroVisionOneEventCollector.yml +++ b/Packs/TrendMicroVisionOne/Integrations/TrendMicroVisionOneEventCollector/TrendMicroVisionOneEventCollector.yml @@ -52,6 +52,7 @@ configuration: description: Palo Alto Networks Trend Micro Vision One Event Collector integration for Cortex XSIAM collects the Workbench, Observed Attack Techniques, Search Detections and Audit logs. display: 'Trend Micro Vision One Event Collector' name: TrendMicroVisionOneEventCollector +supportlevelheader: xsoar script: commands: - description: Returns a list of logs. @@ -85,7 +86,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.12.66339 + dockerimage: demisto/python3:3.10.13.78960 fromversion: 6.10.0 marketplaces: - marketplacev2 diff --git a/Packs/TrendMicroVisionOne/ReleaseNotes/3_0_3.md b/Packs/TrendMicroVisionOne/ReleaseNotes/3_0_3.md new file mode 100644 index 000000000000..cd2a2e611141 --- /dev/null +++ b/Packs/TrendMicroVisionOne/ReleaseNotes/3_0_3.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Trend Micro Vision One Event Collector +- Updated the Docker image to: *demisto/python3:3.10.13.78960*. +- Added a notice to the documentation that this integration is supported by Palo Alto Networks. diff --git a/Packs/TrendMicroVisionOne/pack_metadata.json b/Packs/TrendMicroVisionOne/pack_metadata.json index 3b0e19c93a7c..5cec58990560 100755 --- a/Packs/TrendMicroVisionOne/pack_metadata.json +++ b/Packs/TrendMicroVisionOne/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Trend Micro Vision One", "description": "Trend Micro Vision One is a purpose-built threat defense platform that provides added value and new benefits beyond XDR solutions, allowing you to see more and respond faster. Providing deep and broad extended detection and response(XDR) capabilities that collect and automatically correlate data across multiple security layers—email, endpoints, servers, cloud workloads, and networks—Trend Micro Vision One prevents the majority of attacks with automated protection.", "support": "partner", - "currentVersion": "3.0.2", + "currentVersion": "3.0.3", "serverMinVersion": "6.2.0", "author": "Trend Micro", "url": "https://success.trendmicro.com", diff --git a/Packs/Vectra_AI/Integrations/VectraAIEventCollector/VectraAIEventCollector.yml b/Packs/Vectra_AI/Integrations/VectraAIEventCollector/VectraAIEventCollector.yml index ea06ac386409..dae71c3e7bec 100644 --- a/Packs/Vectra_AI/Integrations/VectraAIEventCollector/VectraAIEventCollector.yml +++ b/Packs/Vectra_AI/Integrations/VectraAIEventCollector/VectraAIEventCollector.yml @@ -40,6 +40,7 @@ configuration: description: 'Collects Vectra Detections and Audits into XSIAM Events.' display: 'Vectra AI Event Collector' name: VectraAIEventCollector +supportlevelheader: xsoar script: commands: - name: vectra-get-events @@ -56,7 +57,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.75921 + dockerimage: demisto/python3:3.10.13.78960 marketplaces: - marketplacev2 fromversion: 6.10.0 diff --git a/Packs/Vectra_AI/ReleaseNotes/1_2_10.md b/Packs/Vectra_AI/ReleaseNotes/1_2_10.md new file mode 100644 index 000000000000..4f7e4a320107 --- /dev/null +++ b/Packs/Vectra_AI/ReleaseNotes/1_2_10.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Vectra AI Event Collector +- Updated the Docker image to: *demisto/python3:3.10.13.78960*. +- Added a notice to the documentation that this integration is supported by Palo Alto Networks. diff --git a/Packs/Vectra_AI/pack_metadata.json b/Packs/Vectra_AI/pack_metadata.json index 64a9025fe887..a3b0a8b142dc 100644 --- a/Packs/Vectra_AI/pack_metadata.json +++ b/Packs/Vectra_AI/pack_metadata.json @@ -4,7 +4,7 @@ "Network Security" ], "created": "2022-06-27T10:00:00Z", - "currentVersion": "1.2.9", + "currentVersion": "1.2.10", "description": "This content pack allows to create incidents based on Vectra Accounts/Hosts/Detections objects.", "devEmail": [ "tme@vectra.ai"