Skip to content

Commit 836117a

Browse files
darkushinContent Bot
andauthored
Private upload mode docs #3 (demisto#28648)
* Updated Docs * Added RNs * updated known words * updated known words * Bump pack from version ThreatConnect to 3.0.8. * Bump pack from version CrowdStrikeFalconX to 1.2.33. --------- Co-authored-by: Content Bot <bot@demisto.com>
1 parent a85937b commit 836117a

21 files changed

Lines changed: 76 additions & 9 deletions

File tree

Packs/CrowdStrikeFalconX/Integrations/CrowdStrikeFalconX/CrowdStrikeFalconX_description.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,3 +8,5 @@ First we upload the file and retrieve its SHA256 hash. Then, we use that ID to u
88
If you want to upload a file to the sandbox in a single command, use the cs-fx-upload-file and supply the following argument and value: submit_file=yes.
99

1010
For more information on CrowdStrike Falcon Intelligence Sandbox, see the [CrowdStrike Falcon Intelligence Sandbox FAQ](https://www.crowdstrike.com/endpoint-security-products/falcon-x-threat-intelligence/crowdstrike-falcon-x-faq/).
11+
12+
Notice: Submitting indicators using the **cs-fx-submit-url** command of this integration might make the indicator data publicly available. See the vendor’s documentation for more details

Packs/CrowdStrikeFalconX/Integrations/CrowdStrikeFalconX/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1887,6 +1887,8 @@ Gets reputation info for one or more files, by their sha256 hash.
18871887
***
18881888
Submits a URL or FTP for sandbox analysis.
18891889

1890+
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
1891+
18901892

18911893
#### Base Command
18921894

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
2+
#### Integrations
3+
4+
##### CrowdStrike Falcon Intelligence Sandbox
5+
6+
Documentation and metadata improvements.

Packs/CrowdStrikeFalconX/pack_metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"description": "Fully automated malware analysis",
44
"support": "xsoar",
55
"serverMinVersion": "5.0.0",
6-
"currentVersion": "1.2.32",
6+
"currentVersion": "1.2.33",
77
"author": "Cortex XSOAR",
88
"url": "https://www.paloaltonetworks.com/cortex",
99
"email": "",
Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,4 @@
11
#### Authenticate with an API token
2-
In new Cuckoo installations, a random API token is automatically generated for you, and located in the cuckoo.conf file. In order to authenticate with an API token, insert '__token' in the "Username" textbox, and the token itself in the "Password" textbox.
2+
In new Cuckoo installations, a random API token is automatically generated for you, and located in the cuckoo.conf file. In order to authenticate with an API token, insert '__token' in the "Username" textbox, and the token itself in the "Password" textbox.
3+
4+
Notice: Submitting indicators using the **cuckoo-create-task-from-url** command of this integration might make the indicator data publicly available. See the vendor’s documentation for more details

Packs/CuckooSandbox/Integrations/CuckooSandbox/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -416,6 +416,7 @@
416416
<h3 id="h_9023664726051543479018156">4. Submit a URL for analysis</h3>
417417
<hr>
418418
<p>Submits a URL to Cuckoo Sandbox for analysis.</p>
419+
<p>Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.</p>
419420
<h5>Base Command</h5>
420421
<pre><code>cuckoo-create-task-from-url</code></pre>
421422
<h5>Input</h5>
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
2+
#### Integrations
3+
4+
##### Cuckoo Sandbox
5+
6+
Documentation and metadata improvements.

Packs/CuckooSandbox/pack_metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "Cuckoo Sandbox",
33
"description": "Malware dynamic analysis sandboxing",
44
"support": "xsoar",
5-
"currentVersion": "1.1.3",
5+
"currentVersion": "1.1.4",
66
"author": "Cortex XSOAR",
77
"url": "https://www.paloaltonetworks.com/cortex",
88
"email": "",

Packs/FortiSandbox/.pack-ignore

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,4 +2,8 @@
22
ignore=RM104
33

44
[file:FortiSandbox_image.png]
5-
ignore=IM111
5+
ignore=IM111
6+
7+
[known_words]
8+
FortiSandbox
9+
Forti
Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
If no hostname use IP address in URL in the http://IP/ format. Please make sure XSOAR server can connect to FortiSandbox server.
22

33
Recommended playbook to use to upload file for analysis and get report:
4-
Detonate File - FortiSandbox
4+
Detonate File - FortiSandbox
5+
6+
Notice: Submitting indicators using the following commands of this integration might make the indicator data publicly available.
7+
- ***fortisandbox-url-rating***
8+
- ***fortisandbox-upload-urls***
9+
See the vendor’s documentation for more details.

0 commit comments

Comments
 (0)