CohesityHelios
Cohesity Helios Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.0.0 and later.
Integrate with Cohesity Helios services to fetch alerts and take remedial action. This integration was integrated and tested with version 08.01 of CohesityHelios.
#
Configure CohesityHelios on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for CohesityHelios.
Click Add instance to create and configure a new integration instance.
Parameter Description Required Your server URL True API Key The API Key to use for connection True Trust any certificate (not secure) Trust any certificate (not secure). False Use system proxy settings Use system proxy settings. False Incident type False Maximum number of incidents to fetch every time True First fetch timestamp False Fetch incidents False Incidents Fetch Interval False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
cohesity-helios-get-ransomware-alertsGet Cohesity Helios ransomware alerts.
#
Base Commandcohesity-helios-get-ransomware-alerts
#
InputArgument Name | Description | Required |
---|---|---|
created_after | Returns only alerts created after the provided timestamp (ISO8601 format YYYY-MM-DDTHH:MM:SSZ). | Optional |
created_before | Returns only alerts created before the provided timestamp (ISO8601 format YYYY-MM-DDTHH:MM:SSZ). | Optional |
limit | Limits the number of alerts to return. Default is 200. | Optional |
alert_id_list | List of comma-separated alert identifiers to filter alerts. | Optional |
cluster_id_list | List of comma-separated cluster identifiers to filter alerts. | Optional |
region_id_list | List of comma-separated region identifiers to filter alerts. | Optional |
alert_state_list | One or more state values. Possible values are: kOpen, kSuppressed, kResolved, kNote. Default is kOpen. | Optional |
alert_severity_list | One or more severity levels. Possible values are: kCritical, kWarning, kInfo. Default is kCritical,kWarning. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
CohesityHelios.RansomwareAlert.alert_id | String | Identifier for the ransomware alert. |
CohesityHelios.RansomwareAlert.occurrence_time | Date | Name of the detected anomalous object. |
CohesityHelios.RansomwareAlert.severity | String | Severity of the ransomware alert. |
CohesityHelios.RansomwareAlert.alert_description | String | Description for the ransomware alert. |
CohesityHelios.RansomwareAlert.alert_cause | String | Cause for the ransomware alert. |
CohesityHelios.RansomwareAlert.anomalous_object_name | String | Name of the detected anomalous object. |
CohesityHelios.RansomwareAlert.anomalous_object_env | String | Env of the detected anomalous object. |
CohesityHelios.RansomwareAlert.anomaly_strength | Number | Strength of the detected ransomware alert. |
#
Command Example!cohesity-helios-get-ransomware-alerts created_after=2021-09-26T created_before=2021-09-230T limit=2 alert_severity_list=kCritical,kInfo
#
Context Example#
Human Readable Output#
Cohesity Helios Ransomware Alerts
Alert Id Alert Description Alert Cause Anomalous Object Env Anomalous Object Name Anomaly Strength 9346668452014081:1632849269030240 Anomalous change in file system detected on pankajk-ubuntu18-06, a symptom of potential ransomware attack on your primary environment The recent protection run of Protection Group testSimJobCWWMwith job id 24248 has dramatic changes in the composition of files, which is a significant deviation from the previously observed protection runs kVMware pankajk-ubuntu18-06 66 2122491972847952:1632848348897740 Anomalous change in file system detected on pankajk-ubuntu18-05, a symptom of potential ransomware attack on your primary environment The recent protection run of Protection Group testSimJobBTYAwith job id 24229 has dramatic changes in the composition of files, which is a significant deviation from the previously observed protection runs kVMware pankajk-ubuntu18-05 63
#
cohesity-helios-ignore-anomalous-objectIgnore detected anomalous object.
#
Base Commandcohesity-helios-ignore-anomalous-object
#
InputArgument Name | Description | Required |
---|---|---|
object_name | Anomalous object name to be ignored. Can be retrieved by running the command cohesity-helios-get-ransomware-alerts. | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!cohesity-helios-ignore-anomalous-object object_name=pankajk-ubuntu18-02
#
Human Readable OutputIgnored object pankajk-ubuntu18-02
#
cohesity-helios-restore-latest-clean-snapshotRestore the latest clean snapshot for the given object.
#
Base Commandcohesity-helios-restore-latest-clean-snapshot
#
InputArgument Name | Description | Required |
---|---|---|
object_name | Anomalous object name to be restored. Can be retrieved by running the command cohesity-helios-get-ransomware-alerts. | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!cohesity-helios-restore-latest-clean-snapshot object_name=pankajk-ubuntu18-05
#
Human Readable OutputRestored object pankajk-ubuntu18-05.