Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Marketplace Contribution] Microsoft Defender for Endpoint - Content Pack Update #30323

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,9 +1,10 @@
import demistomock as demisto # noqa: F401
from CommonServerPython import * # noqa: F401
import demistomock as demisto # noqa: F401

# pylint: disable=E9010, E9011
Comment on lines 1 to +3
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
from CommonServerPython import * # noqa: F401
import demistomock as demisto # noqa: F401
import demistomock as demisto # noqa: F401
from CommonServerPython import * # noqa: F401

Revert just to remove the diff.

import traceback

from CommonServerUserPython import *

import requests
import re
import base64
Expand Down
Original file line number Diff line number Diff line change
@@ -1,12 +1,16 @@
import demistomock as demisto # noqa: F401
from CommonServerPython import * # noqa: F401
Comment on lines +1 to +2
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
import demistomock as demisto # noqa: F401
from CommonServerPython import * # noqa: F401

Please remove.


import copy
from itertools import product
from json import JSONDecodeError
from typing import Any
from collections.abc import Callable
from CommonServerPython import *

import urllib3
from dateutil.parser import parse
from requests import Response

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change

Revert just to remove the diff.

from MicrosoftApiModule import * # noqa: E402

# Disable insecure warnings
Expand Down Expand Up @@ -1305,7 +1309,7 @@ def run_antivirus_scan(self, machine_id, comment, scan_type):

Args:
machine_id (str): Machine ID
comment (str): Comment to associate with the action
comment (str): Comment to associate with the action
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
comment (str): Comment to associate with the action
comment (str): Comment to associate with the action

scan_type (str): Defines the type of the Scan (Quick, Full)

Notes:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,4 @@
category: Endpoint
sectionOrder:
- Connect
- Collect
Comment on lines -2 to -4
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please revert.

commonfields:
id: Microsoft Defender Advanced Threat Protection
version: -1
Expand Down Expand Up @@ -39,6 +36,7 @@ configuration:
type: 9
hiddenusername: true
required: false
display: ''
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
display: ''

- display: Certificate Thumbprint
name: creds_certificate
type: 9
Expand Down Expand Up @@ -96,6 +94,7 @@ configuration:
type: 9
section: Connect
required: false
display: ''
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
display: ''

- name: Reliability
additionalinfo: Reliability of the source providing the intelligence data.
defaultvalue: B - Usually reliable
Expand Down Expand Up @@ -173,15 +172,13 @@ configuration:
type: 0
section: Connect
advanced: true
defaultvalue:
additionalinfo: More information can be found on https://cortex.marketplace.pan.dev/marketplace/details/MicrosoftDefenderAdvancedThreatProtection/
required: false
- additionalinfo: Select this checkbox if you are using a self-deployed Azure application.
display: Use a self-deployed Azure Application
name: self_deployed
type: 8
section: Connect
advanced: false
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You removed it in purpose?

required: false
- display: Trust any certificate (not secure)
name: insecure
Expand Down Expand Up @@ -236,6 +233,11 @@ configuration:
section: Connect
advanced: true
required: false
- defaultvalue: '1'
display: Incidents Fetch Interval
name: incidentFetchInterval
required: false
type: 19
Comment on lines +236 to +240
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why did you add this parameter?

description: Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection (ATP)) is a unified platform for preventative protection, post-breach detection, automated investigation, and response.
display: Microsoft Defender for Endpoint
name: Microsoft Defender Advanced Threat Protection
Expand Down Expand Up @@ -806,6 +808,14 @@ script:
- Malware
- SecurityTesting
- UnwantedSoftware
- MultiStagedAttack
- MaliciousUserActivity
- CompromisedUser
- Phishing
- LineOfBusinessApplication
- ConfirmedUserActivity
- Clean
- InsufficientData
- Other
- description: Comment to be added to the alert.
name: comment
Expand Down Expand Up @@ -900,9 +910,9 @@ script:
name: timeout
- name: time_range
description: Time range to look back. The expected syntax is a human-readable time range, e.g., 60 minutes, 6 hours, 1 day, etc. If specified with query_batch, applies to all queries in the array.
defaultValue: ''
predefined:
- ''
auto: PREDEFINED
- deprecated: true
description: Flag for the rate limit retry.
name: ran_once_flag
Expand Down Expand Up @@ -1550,6 +1560,7 @@ script:
name: offset
predefined:
- ''
auto: PREDEFINED
- deprecated: true
description: Flag for the rate limit retry.
name: ran_once_flag
Expand Down Expand Up @@ -4830,7 +4841,6 @@ script:
- name: ran_once_flag
description: Flag for the rate limit retry.
deprecated: true
outputs: []
polling: true
execution: true
- name: microsoft-atp-advanced-hunting-lateral-movement-evidence
Expand All @@ -4840,33 +4850,25 @@ script:
auto: PREDEFINED
description: When you select a “query_purpose” argument, a designated query template is used. "network_connections" - The network connections initiated by the host/file to other internal hosts. "smb_connections" - SMB connections. "credential_dumping" - Was there a use of credential dumping? If so can we detect the use of the dumped users on other hosts on the network. "management_connection" - Management connection attempts to other hosts.
required: true
defaultValue: ''
predefined:
- network_connections
- smb_connections
- credential_dumping
- management_connection
- name: device_name
description: Device name to look for.
defaultValue: ''
- name: remote_ip_count
description: Threshold for network enumeration in smb_connection.
defaultValue: ''
- name: file_name
description: The file name to look for.
defaultValue: ''
- name: sha1
description: The SHA1 hash to look for.
defaultValue: ''
- name: sha256
description: The SHA256 hash to look for.
defaultValue: ''
- name: md5
description: The MD5 hash to look for.
defaultValue: ''
- name: device_id
description: The device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: The query operator to use with provided arguments.
Expand Down Expand Up @@ -4910,7 +4912,6 @@ script:
name: query_purpose
required: true
auto: PREDEFINED
defaultValue: ''
predefined:
- scheduled_job
- registry_entry
Expand All @@ -4925,22 +4926,16 @@ script:
- host_file_change
- description: Device name to look for.
name: device_name
defaultValue: ''
- name: file_name
description: File name to look for.
defaultValue: ''
- name: sha1
description: SHA1 hash to look for.
defaultValue: ''
- name: sha256
description: SHA256 hash to look for.
defaultValue: ''
- name: md5
description: MD5 hash to look for.
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with the provided arguments.
Expand Down Expand Up @@ -5007,22 +5002,16 @@ script:
- arguments:
- description: Device name to look for.
name: device_name
defaultValue: ''
- description: File name to look for.
name: file_name
defaultValue: ''
- name: sha1
description: SHA1 hash to look for.
defaultValue: ''
- name: sha256
description: SHA256 hash to look for.
defaultValue: ''
- name: md5
description: MD5 hash to look for.
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with provided arguments.
Expand Down Expand Up @@ -5059,7 +5048,6 @@ script:
name: query_purpose
required: true
auto: PREDEFINED
defaultValue: ''
predefined:
- parent_process
- grandparent_process
Expand All @@ -5069,22 +5057,16 @@ script:
- process_excecution_powershell
- description: Device name to look for.
name: device_name
defaultValue: ''
- description: File name to look for.
name: file_name
defaultValue: ''
- description: SHA1 hash to look for.
name: sha1
defaultValue: ''
- description: SHA256 hash to look for.
name: sha256
defaultValue: ''
- description: MD5 hash to look for.
name: md5
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with provided arguments.
Expand Down Expand Up @@ -5136,29 +5118,22 @@ script:
name: query_purpose
required: true
auto: PREDEFINED
defaultValue: ''
predefined:
- external_addresses
- dns_query
- encoded_commands
- description: Device name to look for.
name: device_name
defaultValue: ''
- description: File name to look for.
name: file_name
defaultValue: ''
- name: sha1
description: SHA1 hash to look for.
defaultValue: ''
- name: sha256
description: SHA256 hash to look for.
defaultValue: ''
- name: md5
description: MD5 hash to look for.
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with provided arguments.
Expand Down Expand Up @@ -5201,10 +5176,8 @@ script:
arguments:
- name: device_name
description: Device name to look for.
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with provided arguments.
Expand Down Expand Up @@ -5238,10 +5211,8 @@ script:
arguments:
- name: device_name
description: Device name to look for.
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with provided arguments.
Expand Down Expand Up @@ -5278,7 +5249,6 @@ script:
auto: PREDEFINED
description: When you select a “query_purpose” argument, a designated query template is used. "file_deleted" - Did the file delete itself? "event_log_cleared" - Was the event log cleared? Requires at least one of device arguments (device_name/device_id). "compromised_information" - Information on a compromised user and its activities. Requires only username argument. "connected_devices" - All connected devices by compromised user. Requires only username argument. "action_types" - All action types created by a user on each machine. Requires only username argument. "common_files" - Most common files associated with a user. Requires only username argument.
required: true
defaultValue: ''
predefined:
- file_deleted
- event_log_cleared
Expand All @@ -5288,25 +5258,18 @@ script:
- common_files
- name: device_name
description: Device name to look for.
defaultValue: ''
- name: file_name
description: File name to look for.
defaultValue: ''
- name: sha1
description: SHA1 hash to look for.
defaultValue: ''
- name: sha256
description: SHA256 hash to look for.
defaultValue: ''
- name: md5
description: MD5 hash to look for.
defaultValue: ''
- name: device_id
description: Device ID to look for.
defaultValue: ''
- name: username
description: Username to look for in relevant query types.
defaultValue: ''
- name: query_operation
auto: PREDEFINED
description: Query operator to use with provided arguments.
Expand Down Expand Up @@ -5522,16 +5485,14 @@ script:
name: microsoft-atp-generate-login-url
arguments: []
- description: Run this command if for some reason you need to rerun the authentication process.
execution: false
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You removed it in purpose?

name: microsoft-atp-auth-reset
arguments: []
dockerimage: demisto/crypto:1.0.0.78196
isfetch: true
runonce: false
script: '-'
script: ''
subtype: python3
type: python
defaultmapperin: Microsoft Defender For Endpoint Mapper
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please revert.

fromversion: 5.0.0
tests:
- Microsoft Defender Advanced Threat Protection - Test
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ There are 2 application authentication methods available:

* [Cortex XSOAR Application](https://xsoar.pan.dev/docs/reference/articles/microsoft-integrations---authentication#cortex-xsoar-application)
* [Self-Deployed Application](https://xsoar.pan.dev/docs/reference/articles/microsoft-integrations---authentication#self-deployed-application)

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change

Revert just to remove the diff.

Depending on the authentication method that you use, the integration parameters might change.

To allow us access to Microsoft Defender Advanced Threat Protection, an admin has to approve our app using an admin consent flow, by clicking on the following [link](https://oproxy.demisto.ninja/ms-defender-atp).
Expand All @@ -17,8 +17,8 @@ After authorizing the Demisto app, you will get an ID, Token, and Key, which sho

There are two different authentication methods for self-deployed configuration:
- [Client Credentials flow](https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exposed-apis-create-app-webapp?view=o365-worldwide)
- [Authorization Code flow](https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exposed-apis-create-app-nativeapp?view=o365-worldwide)
### Authentication Using the Authorization Code Flow
- [Authorization Code flow](https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exposed-apis-create-app-nativeapp?view=o365-worldwide)
### Authentication Using the Authorization Code Flow
Comment on lines +20 to +21
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- [Authorization Code flow](https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exposed-apis-create-app-nativeapp?view=o365-worldwide)
### Authentication Using the Authorization Code Flow
- [Authorization Code flow](https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exposed-apis-create-app-nativeapp?view=o365-worldwide)
### Authentication Using the Authorization Code Flow

Revert just to remove the diff.

**Note**: When using the Authorization Code Flow, make sure the user you authenticate with has the required role permissions. See [this](https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/initiate-autoir-investigation?view=o365-worldwide#permissions) as an example.
1. To use a self-configured Azure application, add a new Azure App Registration in the Azure Portal. To add the registration, see this [Microsoft article](https://docs.microsoft.com/en-us/microsoft-365/security/defender/api-create-app-web?view=o365-worldwide#create-an-app) steps 1-8.
2. In the **ID** field, enter your Client/Application ID.
Expand All @@ -43,3 +43,4 @@ Follow one of these steps for authentication based on Azure Managed Identities:
3. Select the **Use Azure Managed Identities** checkbox.

For more information, see [Managed identities for Azure resources](https://learn.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview)

Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@

#### Integrations

##### Microsoft Defender for Endpoint

- Updated determination list options for microsoft-atp-update-alert command
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "Microsoft Defender for Endpoint",
"description": "Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection (ATP)) is a unified platform for preventative protection, post-breach detection, automated investigation, and response.",
"support": "xsoar",
"currentVersion": "1.16.14",
"currentVersion": "1.16.15",
"author": "Cortex XSOAR",
"url": "https://www.paloaltonetworks.com/cortex",
"email": "",
Expand Down