Skip to main content

Generic Export Indicators Service

This Integration is part of the Generic Export Indicators Service Pack.#

Supported versions

Supported Cortex XSOAR versions: 5.5.0 and later.

Use the Generic Export Indicators Service integration to provide an endpoint with a list of indicators as a service for the system indicators. For Cortex XSOAR 8, see Manage External Dynamic Lists in the Cortex XSOAR Administrator Guide.

PAN-OS EDL Management to Export Indicators Service (PAN-OS EDL Service) migration steps#

Unlike PAN-OS EDL Management, this integration hosts the EDL on the Cortex XSOAR server. Follow these steps to migrate your EDLs.

  1. Convert existing EDL lists to indicators in Cortex XSOAR. This can be done automatically:
    1. Extract your EDL as a text file from the web server it's currently hosted on.
    2. Upload it as a file to the Playground and use the ExtractIndicatorsFromTextFile automation. e.g., !ExtractIndicatorsFromTextFile entryID=<entry_id>
  2. Go to the Indicators page and filter to find all of the indicators you extracted from the text file.
  3. If needed, batch select the indicators and add a tag to the indicators you want to host as a specific EDL. Use this tag in the Indicator Query integration parameter when configuring the integration. For example, if you want to create an allowed list of indicators and a blocked list of indicators.
  4. Edit the EDL object on the PAN-OS device to pull from the Export Indicators Service (PAN-OS EDL Service) instance, as explained in Access the Export Indicators Service by Instance Name (HTTPS). You can edit the EDL object using the panorama-edit-edl command in the Palo Alto Networks PAN-OS integration.
  5. Commit and push the configuration from the Panorama device to its respective Firewalls using the PAN-OS Commit Configuration playbook.
  6. If you have a deployment with 100 firewalls or more, we recommend using your Panorama device and creating an EDL object there, which will be populated from the PAN-OS EDL Service. Then push the EDL object to the respective firewalls.
  7. Follow the instructions in the rest of this guide to make sure that the PAN-OS device is connected to the EDL service.

Important Notes:

  • EDL is designed to spawn on two processes: NGNIX and Python. NGNIX is the process that listens on the configured port, while the Python process listens on the configured port + 1. This means that if an integration was configured for port 9009, the NGNIX process will listen on port 9009 and Python on port 9010. When running without --network=host, the Python port is not exposed to the machine.
  • If constantly using different queries for the same EDL instance through the q inline argument, it is recommended to use different instances of the EDL (one for each query), and set each one with a default query for better performance.
  • When using the q inline argument, the number of exported indicators is limited to 100,000 due to performance reasons. To export more than 100,000 indicators, create a new instance of the integration with the desired Indicator Query and List Size.
  • Note: After a successful configuration of an instance, if the 'test button' is clicked again, it may result in a failure due to an incorrect assumption that the port is already in use. Nevertheless, it is important to highlight that despite this issue, the instance will continue to function correctly.

Troubleshooting#

504 Gateway error#

  1. Increase the NGINX Read Timeout in the instance configuration (for 1,000,000 indicators, it is recommended to increase the timeout up to 1 hour).
  2. If the issue persists, try to increase the Load Balancer timeout through the Devops team (for 800,000 indicators, it is recommended to increase the timeout up to 1 hour (depends on the indicator query)).

Deleted or expired indicators showing in EDL export#

Append expirationStatus:active to the end of the query.

Use Cases#


  1. Export a list of malicious IPs to block via a firewall.
  2. Export a list of indicators to a service such as Splunk, using a supported output format.
  3. Generate feeds to be used on PAN-OS as External Dynamic Lists.
  4. Create External Dynamic Lists (EDLs) of the IP addresses, URLs, and domains used by ransomware, known APT groups, and active malware campaigns for tracking in AutoFocus.
  5. Create External Dynamic Lists to track IPs and URLs commonly used by Microsoft Office365 or CDNs and cloud services, or used as tor exit nodes.

Configure Generic Export Indicators Service on Cortex XSOAR#


  1. Navigate to Settings > Integrations > Servers & Services.
  2. Search for Generic Export Indicators Service.
  3. Click Add instance to create and configure a new integration instance.
ParameterDescriptionRequired
Update list on demand onlyEnabling this prevents automatic list refresh.False
Indicator QueryThe query to run to update the indicators list. To view expected results, run the following command from the Cortex XSOAR CLI !findIndicators query=<your query> (Field names in your query should match the machine name for each field.)False
Outbound FormatThe format of the exported list.True
Exported FieldsFor use with JSON and CSV formats - select specific Cortex XSOAR fields to export. If given the value 'all' - all Cortex XSOAR fields are exported. If empty - only value and type are exported.False
List SizeMaximum number of items in the list.True
Refresh RateHow often to refresh the list (e.g., less than 1 minute, 5 minutes, 12 hours, 7 days, 3 months, 1 year). For performance reasons, we do not recommend setting this value at less than 1 minute.False
Listen PortRuns the service on this port from within Cortex XSOAR. Requires a unique port for each long-running integration instance. Do not use the same port for multiple instances.
Note: If you click the test button more than once, a failure may occur mistakenly indicating that the port is already in use.
(For Cortex XSOAR 8 and Cortex XSIAM) If you do not enter a Listen Port, an unused port for the EDL will automatically be generated when the instance is saved. However, if using an engine, you must enter a Listen Port.
True
Certificate (Required for HTTPS)(For Cortex XSOAR 6.x) For use with HTTPS - the certificate that the service should use.
(For Cortex XSOAR 8 and Cortex XSIAM) Custom certificates are not supported.
False
Private Key (Required for HTTPS)For Cortex XSOAR 6.x) For use with HTTPS - the private key that the service should use.
(For Cortex XSOAR 8 and Cortex XSIAM) When using an engine, configure a private API key. Not supported on the Cortex XSOAR​​ or Cortex XSIAM server.
False
UsernameUses basic authentication for accessing the list. If empty, no authentication is enforced.(For Cortex XSOAR 6.x) False
(For Cortex XSOAR 8 and Cortex XSIAM) Optional for engines, otherwise mandatory.
PasswordUses basic authentication for accessing the list. If empty, no authentication is enforced.(For Cortex XSOAR 6.x) False
(For Cortex XSOAR 8 and Cortex XSIAM) Optional for engines, otherwise mandatory.
Add comment to empty listIf selected, add to an empty list the comment "# Empty list".False
Strip ports from URLsIf selected, ports in URLs are removed. For example, 'www.example.com:9999/path' becomes 'www.example.com/path'.False
Strip protocols from URLsIf selected, strips the protocol from URLs (http/https)/.False
Truncate URL lengthIf selected, URLs are truncated to no more than 254 characters.False
Prepend string to listString to add to beginning of published list. Supports newline characters (\n).False
Append string to listString to add to end of published list. Supports newline characters (\n).False
IP CollapsingFor use with PAN-OS (text) format - collapse method for IPs (none, range, CIDR).False
PAN-OS: drop invalid URL entriesFor use with PAN-OS (text) format - if selected, any URL entry that is not compliant with PAN-OS URL format is dropped instead of rewritten.False
McAfee Gateway: Indicator List TypeFor use with McAfee Web Gateway format - set the indicator list type.False
Symantec ProxySG: Default CategoryFor use with Symantec ProxySG format - set the default category for the output.False
Symantec ProxySG: Listed CategoriesFor use with Symantec ProxySG format - set the categories that should be listed in the output. If not set, lists all existing categories.False
Show CSV formats as TextIf selected, CSV format appears in a textual webpage instead of initiating a file download.False
XSOAR Indicator Page SizeInternal page size used when querying Cortex XSOAR for the indicators.False
Maximum CIDR network prefix bits sizeCIDRs with a lower network prefix bits number are not included. For example - if the number is 8, then 0.0.0.0/2 is excluded from the list.False
Exclude top level domainGlobsOption to remove top level domainGlobs from the list. For example - *.com.False
Advanced: NGINX Global DirectivesNGINX global directives to be passed on the command line using the -g option. Each directive should end with ;. For example: worker_processes 4; timer_resolution 100ms;. Advanced configuration to be used only if instructed by Cortex XSOAR Support.False
Advanced: NGINX Server ConfNGINX server configuration to be used instead of the default NGINX_SERVER_CONF used in the integration code. Advanced configuration to be used only if instructed by Cortex XSOAR Support.False
Advanced: NGINX Read TimeoutNGNIX read timeout in seconds.False
Advanced: use legacy queriesWhen enabled, the integration queries the server using full queries. Advanced configuration to be used only if instructed by Cortex XSOAR Support, or you've encountered log errors in the form of: 'msgpack: invalid code.'False

Safeguards#

There are two integrations parameters used as safeguards: Maximum CIDR network prefix bits size and Exclude top level domainGlobs.

These parameters prevent the integration from incorrectly inserting unwanted TLDs or a CIDR with a too wide range.

The default value for Maximum CIDR network prefix bits size is 8, which means that CIDRs with a lower network prefix bits number are not included (such as 0.0.0.0/2).

The default value for Exclude top level domainGlobs is off. If enabled, the exported list does not hold indicators such as *.com, *.co.uk, *.org and other top level domains.

Unique Behaviors#

domainGlob#

When parsing domainGlob indicator types, the parser creates two different inputs (usually how DNS Firewalls work). For example if the domainGlob *.bad.com is parsed, it outputs two lines to the list:

  1. *.bad.com
  2. bad.com

The DNS also blocks bad.com which does not happen if only *.bad.com is listed.

IP Collapsing#

When IP Collapsing is enabled, duplications of IP ranges are removed. For example if there are 2 CIDRs in the list - 1.2.3.0/8 and 1.2.3.0/16 - only 1.2.3.0/8 will be included in the exported list.

Append string to list#

Option to add a list of constant values to the exported list. Expected value is a string, supports newline characters (\n).

PAN-OS: drop invalid URL entries#

When PAN-OS: drop invalid URL entries is enabled, any URL entry that is not compliant with PAN-OS URL format is dropped instead of rewritten.

Exported Fields#

This applies to the JSON and CSV formats - select specific Cortex XSOAR fields to export. If given the value all - all of Cortex XSOAR's available fields will be exported. If set to empty - only the indicator value and type will be exported.

Optional system fields are:

  • id
  • modified
  • sortValues
  • comments
  • indicator
  • value
  • source
  • sourceInstances
  • sourceBrands
  • investigationIDs
  • lastSeen
  • firstSeen
  • lastSeenEntryID
  • firstSeenEntryID
  • CustomFields
  • tags
  • expirationStatus
  • expirationSource
  • calculatedTime
  • lastReputationRun
  • modifiedTime
  • aggregatedReliability
  • communitynotes

In addition to the system fields, you can also search for custom fields. In order to get the list of all available fields to search by, you can configure the Exported Fields parameter with the all option and check the list returned.

Access the Export Indicators Service by Instance Name (HTTPS)#

Note: By default, the route is open without security hardening and might expose you to network risks. Cortex XSOAR recommends that you use credentials to connect to the integration.

To access the Export Indicators service by instance name, make sure Instance execute external is enabled.

  1. For Cortex XSOAR 6.x:

    1. Navigate to Settings > About > Troubleshooting.
    2. In the Server Configuration section, verify that the instance.execute.external key is set to true. If this key does not exist, click + Add Server Configuration and add the instance.execute.external and set the value to true. See this documentation for further information.
  2. In a web browser, go to:

    • (For Cortex XSOAR 6.x) https://*<xsoar_address>*/instance/execute/*<instance_name>*
    • (For Cortex XSOAR 8 or Cortex XSIAM) https://ext-<tenant>.crtx.<region>.paloaltonetworks.com/xsoar/instance/execute/<instance-name>

URL Inline Arguments#

Use the following arguments in the URL to change the request:

Argument NameDescriptionExample
nThe maximum number of entries in the output. If no value is provided, uses the value specified in the List Size parameter configured in the instance configuration.https://{server_host}/instance/execute/{instance_name}?n=50
sThe starting entry index from which to export the indicators when index 0 is the first position.https://{server_host}/instance/execute/{instance_name}?s=10&n=50
vThe output format. Supports PAN-OS (text), CSV, JSON, mwg and proxysg (alias: bluecoat).https://{server_host}/instance/execute/{instance_name}?v=JSON
qThe query used to retrieve indicators from the system. If you are using this argument, no more than 100,000 can be exported through the EDL.https://{server_host}/instance/execute/{instance_name}?q="type:ip and sourceBrand:my_source"
tOnly with mwg format. The type indicated on the top of the exported list. Supports: string, applcontrol, dimension, category, ip, mediatype, number and regex.https://{server_host}/instance/execute/{instance_name}?v=mwg&t=ip
spIf set, strips ports off URLs.https://{server_host}/instance/execute/{instance_name}?v=PAN-OS (text)&sp
prIf set, strips protocol off URLs.https://{server_host}/instance/execute/{instance_name}?v=text&pr
diOnly with PAN-OS (text) format. If set, ignores URLs which are not compliant with PAN-OS URL format instead of rewriting the URLs.https://{server_host}/instance/execute/{instance_name}?v=PAN-OS (text)&di
trOnly with PAN-OS (text)Whether to collapse IPs. 0 - to not collapse, 1 - collapse to ranges or 2 - collapse to CIDRshttps://{server_host}/instance/execute/{instance_name}?q="type:ip and sourceBrand:my_source"&tr=1
cdOnly with proxysg format. The default category for the exported indicators.https://{server_host}/instance/execute/{instance_name}?v=proxysg&cd=default_category
caOnly with proxysg format. The categories which are exported. Indicators not falling into these categories are classified as the default category.https://{server_host}/instance/execute/{instance_name}?v=proxysg&ca=category1,category2
txWhether to output CSV format as textual web pages.https://{server_host}/instance/execute/{instance_name}?v=CSV&tx
mcConfigure max CIDR size.https://{server_host}/instance/execute/{instance_name}?mc=10
ntConfigure whether to exclude top level domainGlobs.https://{server_host}/instance/execute/{instance_name}?nt=true

Commands#

You can execute these commands from the Cortex XSOAR CLI as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

export-indicators-list-update#


Updates values stored in the List (only available On-Demand).

Base Command#

export-indicators-list-update

Input#
Argument NameDescriptionRequired
queryThe query used to retrieve indicators from the system. Leave empty to use the query from the integration parameters.Optional
formatThe output format.Optional
edl_sizeThe maximum number of entries in the output. If no value is provided, uses the value specified in the List Size parameter configured in the instance configuration.Optional
print_indicatorsIf set to true, prints the indicators that were saved to the export indicators service.Required
mwg_typeFor use with McAfee Web Gateway format to indicate the list type.Optional
url_port_strippingIf true, strips the port off URLs.Optional
url_protocol_strippingIf true, strips the port off URLs.Optional
drop_invalidsFor use with PAN-OS (text) format - if checked any URL entry which is not compliant with PAN-OS EDL URL format is dropped instead of rewritten.Optional
category_attributeFor use with Symantec ProxySG format - set the categories that should be listed in the output. If not set lists all existing categories.Optional
category_defaultFor use with Symantec ProxySG format - set the default category for the output.Optional
collapse_ipsFor use with PAN-OS (text) format - Whether to collapse IPs, and if so - to ranges or CIDRsOptional
csv_textIf true, outputs csv format as textual web pagesOptional
add_comment_if_emptyIf selected, add to an empty List the comment "# Empty List".Optional
Context Output#

There is no context output for this command.

Command Example#

!export-indicators-list-update=type:IP edl_size=2

Human Readable Output#

'EDL will be updated the next time you access it'

Troubleshooting#

  • Indicators that are passed through the integration undergo formatting and deduplication, which may lead to an apparent loss of indicators.
    For instance, enabling the Strip ports from URLs option may cause two URLs that are similar but use different ports to be merged into a single indicator after formatting, resulting in the removal of one of them as a duplicate.
  • In case all fields are selected, there is a potential memory issue when dealing with CSV or JSON format files that exceed 150,000 entries.

Custom HTTP Headers#

The response from EDL's endpoint includes custom headers, starting with the X-EDL prefix, that can be used for debugging purposes.
The headers are:

  • X-EDL-Created - The date and time the response was created.
  • X-EDL-Query-Time-Secs - The time it took to execute the query and format the response.
  • X-EDL-Size - The number of indicators returned in the response.
  • X-EDL-Origin-Size - The number of indicators originally fetched before formatting and deduplication.

Execution Time#

  • 10,000 indicators can take 10-20 seconds.
  • 100,000 indicators can take up to 1-3 minutes.
  • 1,000,000 indicators can take over half an hour.

In 5 minutes (the default timeout of the integration) the integration can export between 200,000 to 400,000 indicators, depending on the load of the server, the existing indicators in the server, and the query used.

The NGINX Read Timeout can be set to increase the timeout.