AlgoSec
AlgoSec Pack.#
This Integration is part of theAlgosec AppViz, Firewall Analyzer (AFA) and FireFlow(AFF).
#
Configure AlgoSec on XSOAR- Navigate to Settings > Integrations > Servers & Services.
- Search for AlgoSec.
- Click Add instance to create and configure a new integration instance.
- Name: a textual name for the integration instance.
- Server URL (e.g. https://192.168.0.1)
- Credentials
- Trust any certificate (not secure)
- Use system proxy settings
- Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
- algosec-get-ticket
- algosec-create-ticket
- algosec-get-applications
- algosec-get-network-object
- algosec-query
#
1. algosec-get-ticketRetrieves a FireFlow change request by its ID
#
Base Commandalgosec-get-ticket
#
InputArgument Name | Description | Required |
---|---|---|
ticketId | ID of requested change request | Required |
#
Context OutputThere is no context output for this command.
#
2. algosec-create-ticketCreates a new FireFlow change request
#
Base Commandalgosec-create-ticket
#
InputArgument Name | Description | Required |
---|---|---|
description | A free text description of the issue | Optional |
devices | A list of device names, on which the change should be made | Optional |
action | The device action to perform for the traffic. This can be either of the following: \U0010FC00 1 - Allow the traffic \U0010FC00 0 - Block the traffic | Required |
destAddress | The destination address to perform the action on | Required |
sourceAddress | The source address to perform the action on | Required |
requestor | The email address of the requestor | Required |
subject | The change request's title | Required |
service | The device service or port for the connection, for example, "http" or Mandatory "tcp/123" | Required |
user | The user for the connection | Required |
application | The application for the connection | Required |
#
Context OutputThere is no context output for this command.
#
3. algosec-get-applicationsFind applications containing network objects related to IP address using AppViz
#
Base Commandalgosec-get-applications
#
InputArgument Name | Description | Required |
---|---|---|
address | The IP/Subnet to search | Required |
type | The search method for the address | Optional |
#
Context OutputThere is no context output for this command.
#
4. algosec-get-network-objectFind network objects related to IP address
#
Base Commandalgosec-get-network-object
#
InputArgument Name | Description | Required |
---|---|---|
address | The IP/Subnet to search | Required |
type | The search method for the address (default is INTERSECT) | Optional |
#
Context OutputThere is no context output for this command.
#
5. algosec-queryPerforms a batch traffic simulation query using Firewall Analyzer
#
Base Commandalgosec-query
#
InputArgument Name | Description | Required |
---|---|---|
source | source(s) for the query. Multiple values are separated by commas (,) | Required |
destination | destination(s) for the query. Multiple values are separated by commas (,) | Required |
service | service(s) for the query. Multiple values are separated by commas (,) | Required |
user | user for the query | Optional |
application | application for the query | Optional |
#
Context OutputThere is no context output for this command.