AWS - GuardDuty
AWS - GuardDuty Pack.#
This Integration is part of theAmazon Web Services Guard Duty Service (gd) Use this integration to detect and manage threats to your AWS system. We recommend that you use roles that have the following built-in AWS policies:
- AmazonGuardDutyFullAccess
- AmazonGuardDutyReadOnlyAccess
For detailed instructions about setting up authentication, see: AWS Integrations - Authentication.
#
PrerequisitesIt is important that you familiarize yourself with and complete all steps detailed in the Amazon AWS Integrations Configuration Guide
Some changes have been made that might affect your existing content. If you are upgrading from a previous of this integration, see Breaking Changes.
#
Configure AWS - GuardDuty on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for AWS - GuardDuty.
Click Add instance to create and configure a new integration instance.
Parameter Description Required AWS Default Region The AWS Region for this instance of the integration. For example, us-west-2 True Role Arn The Amazon Resource Name (ARN) role used for EC2 instance authentication. If this is used, an access key and secret key are not required. False Fetch incidents False Incident type Incident type False Role Session Name A descriptive name for the assumed role session. For example, xsiam-IAM.integration-Role_SESSION False Role Session Duration The maximum length of each session in seconds. Default: 900 seconds. The Cortex XSOAR integration will have the permissions assigned only when the session is initiated and for the defined duration. False Access Key The access key ID used for authentication, that was configured during IAM user configuration. If this is used, Role ARN is not required. False Secret Key The secret key used for authentication, that was configured during IAM user configuration. If this is used, Role ARN is not required. False Timeout The time in seconds until a timeout exception is reached. You can specify just the read timeout (for example 60) or also the connect timeout followed after a comma (for example 60,10). If a connect timeout is not specified, a default of 10 second will be used. False Retries The maximum number of retry attempts when connection or throttling errors are encountered. Set to 0 to disable retries. The default value is 5 and the limit is 10. Note: Increasing the number of retries will increase the execution time. False How many incidents to fetch each time Default 10
False First fetch timestamp First fetch query <number> <time unit>
, e.g.,7 days
. Default3 days
False Guard Duty Severity level The severity level or higher of findings to be fetched: Low, Medium, or High. For example, if you set the severity level to Medium, only findings with severity level Medium or High will be fetched. False Archive findings After Fetch You can set whether findings that are fetched will be moved to the GuardDuty archive. False Incidents Fetch Interval Time interval for fetching incidents. False Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
Fetched Incidents Data- The integration fetches newly created Guard DutyFindings. Each integration instance can fetch findings from a single AWS Region.
- Each region can have a maximum of 1,000 member accounts that are linked to a guard duty master account. For more information see the Amazon GuardDuty documentation.
- You can set the severity level of the findings to be fetched. "Low", "Medium", "High". For example, if you set the severity level to "Medium", the integration will only fetch findings with severity level of Medium and higher.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
aws-gd-create-detectorCreate an AWS Guard Duty Detector on the integration instance specified aws account.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:CreateDetector
#
Base Commandaws-gd-create-detector
#
InputArgument Name | Description | Required |
---|---|---|
enabled | A boolean value that specifies whether the detector is to be enabled. Possible values are: True, False. Default is True. | Required |
enableS3Logs | The status of S3 data event logs as a data source. Possible values are: True, False. | Optional |
enableKubernetesLogs | The status of Kubernetes audit logs as a data source. Possible values are: True, False. | Optional |
ebsVolumesMalwareProtection | Describes the configuration for scanning EBS volumes as a data source. Possible values are: True, False. | Optional |
findingFrequency | Specifies how frequently updated findings are exported. Possible values are: Fifteen Minutes, One Hour, Six Hours. | Optional |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Detectors.DetectorId | string | The unique ID of the created detector. |
#
Command Example!aws-gd-create-detector enabled=True region=eu-west-2
#
aws-gd-delete-detectorDeletes a Amazon GuardDuty detector specified by the detector ID.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:DeleteDetector
#
Base Commandaws-gd-delete-detector
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The unique ID that specifies the detector that you want to delete. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputThere is no context output for this command.
#
Command Example!aws-gd-delete-detector detectorId=38b1235ed3fe245279cd0c8e235db0715ac5561eb
#
aws-gd-get-detectorRetrieves an Amazon GuardDuty detector specified by the detectorId.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:GetDetector
#
Base Commandaws-gd-get-detector
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The unique ID of the detector that you want to retrieve. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Detectors.DetectorId | string | The unique ID of the created detector. |
AWS.GuardDuty.Detectors.CreatedAt | string | The first time a resource was created. |
AWS.GuardDuty.Detectors.ServiceRole | string | Customer serviceRole name or ARN for accessing customer resources. |
AWS.GuardDuty.Detectors.Status | string | The status of detector. |
AWS.GuardDuty.Detectors.UpdatedAt | string | The time a resource was last updated. |
AWS.GuardDuty.Detectors.CloudTrailStatus | string | Describes whether CloudTrail is enabled as a data source for the detector. |
AWS.GuardDuty.Detectors.DNSLogsStatus | string | Denotes whether DNS logs are enabled as a data source. |
AWS.GuardDuty.Detectors.FlowLogsStatus | string | Denotes whether VPC flow logs are enabled as a data source. |
AWS.GuardDuty.Detectors.S3LogsStatus | string | Describes whether S3 data event logs are automatically enabled for new members of the organization. |
AWS.GuardDuty.Detectors.KubernetesAuditLogsStatus | string | Describes whether Kubernetes audit logs are enabled as a data source. |
AWS.GuardDuty.Detectors.MalwareProtectionStatus | string | Describes whether scanning EBS volumes is enabled as a data source. |
AWS.GuardDuty.Detectors.MalwareProtectionReason | string | Specifies the reason why scanning EBS volumes (Malware Protection) was not enabled as a data source. |
AWS.GuardDuty.Detectors.Tags | string | The tags of the detector resource. |
#
Command Example!aws-gd-get-detector detectorId=38b1ed3fe279fdascd0c8edb071dsf5ac5561eb region=eu-west-2
#
aws-gd-update-detectorUpdates an Amazon GuardDuty detector specified by the detectorId.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:UpdateDetector
#
Base Commandaws-gd-update-detector
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The unique ID of the detector that you want to update. | Required |
enable | Updated boolean value for the detector that specifies whether the detector is enabled. Possible values are: True, False. Default is True. | Required |
enableS3Logs | The status of S3 data event logs as a data source. Possible values are: True, False. | Optional |
enableKubernetesLogs | The status of Kubernetes audit logs as a data source. Possible values are: True, False. | Optional |
ebsVolumesMalwareProtection | Describes the configuration for scanning EBS volumes as data source. Possible values are: True, False. | Optional |
findingFrequency | A value that specifies how frequently updated findings are exported. Possible values are: Fifteen Minutes, One Hour, Six Hours. | Optional |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputThere is no context output for this command.
#
Command Exampleaws-gd-update-detector detectorId=38b1ed3fe279fdascd0c8edb071dsf5ac5561eb enable=True
#
aws-gd-create-ip-setA list of trusted IP addresses on allow list for secure communication with AWS infrastructure and applications.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:CreateIPSet
#
Base Commandaws-gd-create-ip-set
#
InputArgument Name | Description | Required |
---|---|---|
activate | A boolean value that indicates whether GuardDuty is to start using the uploaded IPSet. Possible values are: True, False. Default is True. | Optional |
detectorId | The unique ID of the detector that you want to update. | Required |
format | The format of the file that contains the IPSet. Possible values are: TXT, STIX, OTX_CSV, ALIEN_VAULT, PROOF_POINT, FIRE_EYE. | Required |
location | The URI of the file that contains the IPSet. For example (https://s3.us-west-2.amazonaws.com/my-bucket/my-object-key). | Optional |
name | The user friendly name to identify the IPSet. This name is displayed in all findings that are triggered by activity that involves IP addresses included in this IPSet. | Optional |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Detectors.IPSet.IpSetId | unknown | The unique identifier for an IP Set. |
#
Command Example!aws-gd-create-ip-set format=TXT location=https://s3.eu-central-1.amazonaws.com/test/ipset.txt activate=True detectorId=38b1ed3fe279czvasdd0c8edb0715azdsfc5561eb name=test region=eu-west-2
#
aws-gd-delete-ip-setDeletes the IPSet specified by the IPSet ID.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:DeleteIPSet
#
Base Commandaws-gd-delete-ip-set
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The detectorID that specifies the GuardDuty service whose IPSet you want to delete. | Required |
ipSetId | The unique ID that specifies the IPSet that you want to delete. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputThere is no context output for this command.
#
Command Example!aws-gd-delete-ip-set detectorId=38b1ed3fe279cd0c8edb0715ac5561eb ipSetId=7eb1f440be5931f168280b574a26d44d region=eu-west-2
#
aws-gd-list-detectorsLists detectorIds of all the existing Amazon GuardDuty detector resources.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:ListDetectors
#
Base Commandaws-gd-list-detectors
#
InputArgument Name | Description | Required |
---|---|---|
limit | Number of total results to query. Default is 50 . | Optional |
page | Specific page to query. | Optional |
page_size | Number of total results in each page. Default is 50 . | Optional |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Detectors.DetectorId | string | The unique identifier for a detector. |
#
Command Example!aws-gd-list-detectors region=eu-west-2
#
aws-gd-update-ip-setUpdates the IPSet specified by the IPSet ID.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:UpdateIPSet
#
Base Commandaws-gd-update-ip-set
#
InputArgument Name | Description | Required |
---|---|---|
activate | The updated boolean value that specifies whether the IPSet is active or not. Possible values are: True, False. | Optional |
detectorId | The detectorID that specifies the GuardDuty service whose IPSet you want to update. | Required |
ipSetId | The unique ID that specifies the IPSet that you want to update. | Required |
location | The updated URI of the file that contains the IPSet. For example (https://s3.us-west-2.amazonaws.com/my-bucket/my-object-key). | Optional |
name | The user friendly name to identify the IPSet. | Optional |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputThere is no context output for this command.
#
Command Example!aws-gd-update-ip-set detectorId=38b1ed3fe279cd0c8edb0715ac5561eb ipSetId=7eb1f440be5931f168280b574a26d44d activate=False region=eu-west-2
#
aws-gd-get-ip-setRetrieves the IPSet specified by the IPSet ID.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:GetIPSet
#
Base Commandaws-gd-get-ip-set
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The detectorID that specifies the GuardDuty service whose IPSet you want to retrieve. | Required |
ipSetId | The unique ID that specifies the IPSet that you want to describe. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Detectors.IPSet.IpSetId | string | The unique ID for the IPSet. |
AWS.GuardDuty.Detectors.IPSet.Format | string | The format of the file that contains the IPSet. |
AWS.GuardDuty.Detectors.IPSet.Location | string | The URI of the file that contains the IPSet. |
AWS.GuardDuty.Detectors.IPSet.Name | string | he user friendly name to identify the IPSet. |
AWS.GuardDuty.Detectors.IPSet.Status | string | The status of ipSet file uploaded. |
#
Command Example!aws-gd-get-ip-set detectorId=38b1ed3fesdf279cd0c8edbdsf071sdgfac5561eb ipSetId=7eb1sdff440be5931f1682adf80b574a26d44d region=eu-west-2
#
aws-gd-list-ip-setsLists the IPSets of the GuardDuty service specified by the detector ID.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:ListIPSet
#
Base Commandaws-gd-list-ip-sets
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The unique ID of the detector that you want to retrieve. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
limit | Number of total results to query. Default is 50 . | Optional |
page | Specific page to query. | Optional |
page_size | Number of total results in each page. Default is 50 . | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Detectors.IPSet.IpSetId | unknown | The unique identifier for an IP Set |
#
Command Example!aws-gd-list-ip-sets detectorId=38b1ed3fesdf279cd0c8edbdsf071sdgfac5561eb region=eu-west-2
#
aws-gd-create-threatintel-setCreate a new ThreatIntelSet. ThreatIntelSets consist of known malicious IP addresses. GuardDuty generates findings based on ThreatIntelSets.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:CreateThreatIntelSet
#
Base Commandaws-gd-create-threatintel-set
#
InputArgument Name | Description | Required |
---|---|---|
activate | A boolean value that indicates whether GuardDuty is to start using the uploaded ThreatIntelSet. Possible values are: True, False. Default is True. | Required |
detectorId | The unique ID of the detector that you want to update. | Required |
format | The format of the file that contains the ThreatIntelSet. Possible values are: TXT, STIX, OTX_CSV, ALIEN_VAULT, PROOF_POINT, FIRE_EYE. | Required |
location | The URI of the file that contains the ThreatIntelSet. For example (https://s3.us-west-2.amazonaws.com/my-bucket/my-object-key). | Required |
name | A user-friendly ThreatIntelSet name that is displayed in all finding generated by activity that involves IP addresses included in this ThreatIntelSet. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Detectors.ThreatIntelSet.ThreatIntelSetId | string | The unique identifier for an threat intel set. |
#
Command Example!aws-gd-create-threatintel-set format=TXT location=https://s3.eu-central-1.amazonaws.com/test/threatintel.txt activate=True detectorId=38b1ed3fe279czvasdd0c8edb0715azdsfc5561eb name=test region=eu-west-2
#
aws-gd-delete-threatintel-setDeletes ThreatIntelSet specified by the ThreatIntelSet ID.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:DeleteThreatIntelSet
#
Base Commandaws-gd-delete-threatintel-set
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The detectorID that specifies the GuardDuty service whose ThreatIntelSet you want to delete. | Required |
threatIntelSetId | The unique ID that specifies the ThreatIntelSet that you want to delete. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputThere is no context output for this command.
#
Command Example!aws-gd-delete-threatintel-set detectorId=38b1ed3fe279cd0c8edb0715ac5561eb threatIntelSetId=7eb1f440be5931f168280b574a26d44d region=eu-west-2
#
aws-gd-get-threatintel-setRetrieves the ThreatIntelSet that is specified by the ThreatIntelSet ID.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:GetThreatIntelSet
#
Base Commandaws-gd-get-threatintel-set
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The detectorID that specifies the GuardDuty service whose ThreatIntelSet you want to describe. | Required |
threatIntelSetId | The unique ID that specifies the ThreatIntelSet that you want to describe. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Detectors.ThreatIntelSet.ThreatIntelSetId | string | The unique ID that specifies the ThreatIntelSet. |
AWS.GuardDuty.Detectors.ThreatIntelSet.Format | string | The format of the threatIntelSet. |
AWS.GuardDuty.Detectors.ThreatIntelSet.Location | string | The URI of the file that contains the ThreatIntelSet. |
AWS.GuardDuty.Detectors.ThreatIntelSet.Name | string | A user-friendly ThreatIntelSet name. |
AWS.GuardDuty.Detectors.ThreatIntelSet.Status | string | The status of threatIntelSet file uploaded. |
#
Command Example!aws-gd-get-threatintel-set detectorId=38b1ed3fe279cd0c8edb0715ac5561eb threatIntelSetId=7eb1f440be5931f168280b574a26d44d region=eu-west-2
#
aws-gd-list-threatintel-setsLists the ThreatIntelSets of the GuardDuty service specified by the detector ID.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:ListThreatIntelSet
#
Base Commandaws-gd-list-threatintel-sets
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The detectorID that specifies the GuardDuty service whose ThreatIntelSets you want to list. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
limit | Number of total results to query. Default is 50 . | Optional |
page | Specific page to query. | Optional |
page_size | Number of total results in each page. Default is 50 . | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Detectors.ThreatIntelSet.ThreatIntelSetId | string | The unique identifier for an threat intel set |
#
Command Example!aws-gd-list-threatintel-sets detectorId=38b1ed3fe279cd0c8edb0715ac5561eb region=eu-west-2
#
aws-gd-update-threatintel-setUpdates the ThreatIntelSet specified by ThreatIntelSet ID.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:UpdateThreatIntelSet
#
Base Commandaws-gd-update-threatintel-set
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The detectorID that specifies the GuardDuty service whose ThreatIntelSet you want to update. | Required |
threatIntelSetId | The unique ID that specifies the ThreatIntelSet that you want to update. | Optional |
activate | The updated boolean value that specifies whether the ThreatIntelSet is active or not. Possible values are: True, False. | Optional |
location | The updated URI of the file that contains the ThreatIntelSet. For example (https://s3.us-west-2.amazonaws.com/my-bucket/my-object-key). | Optional |
name | The user-friendly ThreatIntelSet name. | Optional |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputThere is no context output for this command.
#
Command Example!aws-gd-update-threatintel-set detectorId=38b1ed3fe279cd0c8edb0715ac5561eb threatIntelSetId=7eb1f440be5931f168280b574a26d44d activate=False region=eu-west-2
#
aws-gd-list-findingsLists Amazon GuardDuty findings for the specified detector ID.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:ListFindings
#
Base Commandaws-gd-list-findings
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The ID of the detector that specifies the GuardDuty service whose findings you want to list. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
limit | Number of total results to query. Default is 50 . | Optional |
page | Specific page to query. | Optional |
page_size | Number of total results in each page. Default is 50 . | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Findings.FindingId | string | The unique identifier for the Finding |
#
Command Example!aws-gd-list-findings detectorId=38b1ed3fe279cd0c8edb0715ac5561eb region=eu-west-2
#
aws-gd-get-findingsDescribes Amazon GuardDuty findings specified by finding IDs.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:GetFindings
#
Base Commandaws-gd-get-findings
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The ID of the detector that specifies the GuardDuty service whose findings you want to retrieve. | Required |
findingIds | IDs of the findings that you want to retrieve. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
returnRawResponse | Select 'true' to save all fields from the response to the context. Otherwise, complex fields will be stored in JSON format. Default value is False. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Findings.AccountId | string | The ID of the account in which the finding was generated. |
AWS.GuardDuty.Findings.CreatedAt | string | The time and date when the finding was created. |
AWS.GuardDuty.Findings.Description | string | The description of the finding. |
AWS.GuardDuty.Findings.Region | string | The region where the finding was generated. |
AWS.GuardDuty.Findings.Id | string | The ID of the finding. |
AWS.GuardDuty.Findings.Title | string | The title of the finding. |
AWS.GuardDuty.Findings.Severity | string | The severity of the finding. |
AWS.GuardDuty.Findings.Type | string | The type of finding. |
AWS.GuardDuty.Findings.UpdatedAt | string | The time and date when the finding was last updated. |
AWS.GuardDuty.Findings.Arn | string | The ARN of the finding. |
AWS.GuardDuty.Findings.Confidence | string | The confidence score for the finding. |
AWS.GuardDuty.Findings.Partition | string | The partition associated with the finding. |
AWS.GuardDuty.Findings.ResourceType | string | The type of Amazon Web Services resource. |
AWS.GuardDuty.Findings.SchemaVersion | string | The version of the schema used for the finding. |
AWS.GuardDuty.Findings.Service | string | Contains additional information about the generated finding. |
AWS.GuardDuty.Findings.Resource.AccessKeyDetails | string | The IAM access key details (IAM user information) of a user that engaged in the activity that prompted GuardDuty to generate a finding. |
AWS.GuardDuty.Findings.Resource.InstanceDetails | string | The information about the EC2 instance associated with the activity that prompted GuardDuty to generate a finding. |
AWS.GuardDuty.Findings.Resource.EksClusterDetails | string | Details about the EKS cluster involved in a Kubernetes finding. |
AWS.GuardDuty.Findings.Resource.KubernetesDetails | string | Details about the Kubernetes user and workload involved in a Kubernetes finding. |
AWS.GuardDuty.Findings.Resource.EbsVolumeDetails | string | Contains a list of scanned and skipped EBS volumes with details. |
AWS.GuardDuty.Findings.Resource.EcsClusterDetails | string | Contains information about the details of the ECS Cluster. |
AWS.GuardDuty.Findings.Resource.ContainerDetails | string | Details of a container. |
AWS.GuardDuty.Findings.Resource.S3BucketDetails | string | Contains information on the S3 bucket. |
#
Command Example!aws-gd-get-findings detectorIds=4f1fc7cd7dsg26sdf4328d8dc813 findingIds=96b1ac608sdf00e5183c3dds115c36aac328b,0ab180f5801sdg954418f3806c2a45282c9
#
aws-gd-create-sample-findingsGenerates example findings of types specified by the list of finding types. If 'NULL' is specified for findingTypes, the API generates example findings of all supported finding types.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:CreateSampleFindings
#
Base Commandaws-gd-create-sample-findings
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The ID of the detector to create sample findings for. | Required |
findingTypes | Types of sample findings that you want to generate. Separated by comma. | Optional |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputThere is no context output for this command.
#
Command Example!aws-gd-create-sample-findings detectorId=4f1fc7cd7dsg2adf6sdf4328d8dc813 findingTypes=NULL region=eu-central-1
#
aws-gd-archive-findingsArchives Amazon GuardDuty findings specified by the list of finding IDs.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:ArchiveFindings
#
Base Commandaws-gd-archive-findings
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The ID of the detector that specifies the GuardDuty service whose findings you want to archive. | Required |
findingIds | IDs of the findings that you want to archive. Separated by comma. | Optional |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputThere is no context output for this command.
#
Command Example!aws-gd-archive-findings detectorIds=4f1fc7cd7dsg26sdf4328d8dc813 findingIds=96b1ac608sdf00e5183c3dds115c36aac328b,0ab180f5801sdg954418f3806c2a45282c9
#
aws-gd-unarchive-findingsUnarchives Amazon GuardDuty findings specified by the list of finding IDs.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:UnarchiveFindings
#
Base Commandaws-gd-unarchive-findings
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The ID of the detector that specifies the GuardDuty service whose findings you want to unarchive. | Required |
findingIds | IDs of the findings that you want to unarchive. | Optional |
#
Context OutputThere is no context output for this command.
#
Command Example!aws-gd-unarchive-findings detectorIds=4f1fc7cd7dsg26sdf4328d8dc813 findingIds=96b1ac608sdf00e5183c3dds115c36aac328b,0ab180f5801sdg954418f3806c2a45282c9
#
aws-gd-update-findings-feedbackMarks specified Amazon GuardDuty findings as useful or not useful.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:UpdateFindingsFeedback
#
Base Commandaws-gd-update-findings-feedback
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The ID of the detector that specifies the GuardDuty service whose findings you want to mark as useful or not useful. | Required |
findingIds | IDs of the findings that you want to mark as useful or not useful. | Optional |
comments | Additional feedback about the GuardDuty findings. | Optional |
feedback | Specify whether the finding was useful or not. Possible values are: USEFUL, NOT_USEFUL. | Optional |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputThere is no context output for this command.
#
Command Example!aws-gd-update-findings-feedback detectorIds=4f1fc7cd7dsg26sdf4328d8dc813 findingIds=96b1ac608sdf00e5183c3dds115c36aac328b comments=Good Job feedback=USEFUL
#
aws-gd-list-membersDescribes Amazon GuardDuty members for the specified detector ID.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:ListMembers
#
Base Commandaws-gd-list-members
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The ID of the detector that specifies the GuardDuty service whose members you want to retrieve. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
limit | Number of total results to query. Default is 50 . | Optional |
page | Specific page to query. | Optional |
page_size | Number of total results in each page. Default is 50 . | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Members.AccountId | string | The unique account ID of the member. |
AWS.GuardDuty.Members.DetectorId | string | The unique detector ID of the member. |
AWS.GuardDuty.Members.MasterId | string | The unique detector ID of the master. |
AWS.GuardDuty.Members.Email | string | The email of the member. |
AWS.GuardDuty.Members.RelationshipStatus | string | The relationship status of member. |
AWS.GuardDuty.Members.InvitedAt | string | The first time a member was invited. |
AWS.GuardDuty.Members.UpdatedAt | string | The time a member was last updated. |
#
Command Example!aws-gd-list-members detectorIds=4f1fc7cd7dsg26sdf4328d8dc813
#
aws-gd-get-membersDescribes Amazon GuardDuty members for the specified detector ID & account ID.
#
AWS IAM Policy PermissionEffect: Allow
Action: guardduty:GetMembers
#
Base Commandaws-gd-get-members
#
InputArgument Name | Description | Required |
---|---|---|
detectorId | The ID of the detector that specifies the GuardDuty service whose members you want to retrieve. | Required |
accountIds | The ID of the account that specifies the GuardDuty service whose details you want to retrieve. | Required |
region | The AWS Region, if not specified the default region will be used. | Optional |
roleArn | The Amazon Resource Name (ARN) of the role to assume. | Optional |
roleSessionName | An identifier for the assumed role session. | Optional |
roleSessionDuration | The duration, in seconds, of the role session. The value can range from 900 seconds (15 minutes) up to the maximum session duration setting for the role. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
AWS.GuardDuty.Members.AccountId | string | The unique account ID of the member. |
AWS.GuardDuty.Members.DetectorId | string | The unique detector ID of the member. |
AWS.GuardDuty.Members.MasterId | string | The unique detector ID of the master. |
AWS.GuardDuty.Members.Email | string | The email of the member. |
AWS.GuardDuty.Members.RelationshipStatus | string | The relationship status of member. |
AWS.GuardDuty.Members.InvitedAt | string | The first time a member was invited. |
AWS.GuardDuty.Members.UpdatedAt | string | The time a member was last updated. |
#
Command Example!aws-gd-get-members detectorIds=4f1fc7cd7dsg26sdf4328d8dc813 accountIds=1f3fc2cd1dag26sdf4338d8aa813
#
Breaking changes from the previous version of this integration - AWS-GuardDutyThe following sections list the changes in this version.
#
CommandsFetch incidents command - Findings that are fetched are no longer moved automatically to the GuardDuty archive.
#
ParametersThe following parameters were added in this version:
- How many incidents to fetch each time
- First fetch timestamp
- Archive findings After Fetch