Skip to main content

FireEye Central Management

This Integration is part of the FireEye Central Management Pack.#

Supported versions

Supported Cortex XSOAR versions: 5.5.0 and later.

FireEye Central Management (CM Series) is the FireEye threat intelligence hub. It services the FireEye ecosystem, ensuring that FireEye products share the latest intelligence and correlate across attack vectors to detect and prevent cyber attacks This integration was integrated and tested with version 9.0.2 of FireEye Central Management

API Key management#

This integration generates an API Key from the username and password given to be authenticated with FireEye. The API Key is valid for 15 minutes. The integration manages the storage of this key, and its re-generation when the key expires.

Fetch FireEye EX Alert Emails#

To fetch a FireEye EX alert email, you will need the UUID.

  1. Run the *fireeye-cm-get-alert-details command with the alert ID. For example, !fireeye-cm-get-alert-details alert_id=542
  2. Locate the UUID in the context data and run the fireeye-cm-get-artifacts-by-uuid command with the UUID. For example: !fireeye-cm-get-artifacts-by-uuid uuid=243a2555-a915-47a1-a947-e71049f4971c
  3. Download the email.

Access the FireEye Alert URL#

To display a proper link in the FireEye NX Alert URL field of the FireEye NX or EX Alert layout, you need to configure the hostname in the appliance settings of the FireEye application.

  1. Log in to your FireEye application.
  2. Navigate to Appliance Settings > Network > Hostname.
  3. In the Hostname field, enter your URL/server/ip address.

Configure FireEye Central Management in Cortex#

ParameterRequired
Your server URLTrue
UsernameTrue
Fetch incidentsFalse
Max incidents to fetchFalse
First fetch timestamp (<number> <time unit>, e.g., 12 hours, 7 days, 3 months, 1 year)False
Incident typeFalse
Info level for fetched alertsFalse
Trust any certificate (not secure)False
Use system proxy settingsFalse

Commands#

You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

fireeye-cm-get-alerts#


Searches and retrieves FireEye CM alerts based on several filters.

Base Command#

fireeye-cm-get-alerts

Input#

Argument NameDescriptionRequired
alert_idThe ID number of the alert to retrieve.Optional
durationThe time interval to search. This filter is used with either the start_time or end_time filter. If duration, start time, and end time are not specified, the system defaults to duration=12_hours, end_time=current_time. If only the duration is specified, the end_time defaults to the current_time. Possible values are: 1_hour, 2_hours, 6_hours, 12_hours, 24_hours, 48_hours.Optional
start_timeThe start time of the search. This filter is optional. Syntax: start_time=YYYY-MM-DDTHH:mm:ss.sss-OH:om or '1 day/month/year'. Default is 1 day.Optional
end_timeThe end time of the search. This filter is used with the duration filter. If the end_time is specified but not the duration, the system defaults to duration=12_hours, ending at the specified end_time. Syntax: end_time=YYYY-MM-DDTHH:mm:ss.sss-OH:om.Optional
callback_domainSearches for alerts that include callbacks to the specified domain.Optional
dst_ipThe destination IPv4 address related to the malware alert.Optional
src_ipThe source IPv4 address related to the malware alert.Optional
file_nameThe name of the malware file.Optional
file_typeThe malware file type.Optional
info_levelThe level of information to be returned. Possible values: "concise", "normal", and "extended". Possible values are: concise, normal, extended. Default is concise.Optional
malware_nameThe name of the malware object.Optional
malware_typeThe type of the malware object. Possible values: "domain_match", "malware_callback", "malware_object", "web_infection", "infection_match", "riskware-infection", "riskware-callback", "riskware-object". Possible values are: domain_match, malware_callback, malware_object, web_infection, infection_match, riskware-infection, riskware-callback, riskware-object.Optional
md5Searches for alerts that include a specific MD5 hash.Optional
recipient_emailThe email address of the malware object receiver.Optional
sender_emailThe email address of the malware object sender.Optional
urlSearches for a specific alert URL.Optional
limitMaximum number of alerts to return. Default is 20.Optional

Context Output#

PathTypeDescription
FireEyeCM.Alerts.idStringThe ID of the alert.
FireEyeCM.Alerts.uuidStringThe UUID of the alert.
FireEyeCM.Alerts.occurredStringThe time when the alert occurred.
FireEyeCM.Alerts.productStringThe product name of the alert.
FireEyeCM.Alerts.rootInfectionStringThe ID of the infection associated with the malware alert.
FireEyeCM.Alerts.nameStringThe link to the infection associated with the malware alert.
FireEyeCM.Alerts.vlanStringThe virtual LAN (VLAN) of the alert.
FireEyeCM.Alerts.maliciousStringA flag indicating whether the alert is malicious.
FireEyeCM.Alerts.severityStringThe severity of the alert.
FireEyeCM.Alerts.sensorStringThe sensor name that the alert is associated with.
FireEyeCM.Alerts.applianceIdStringThe appliance ID of the alert.
FireEyeCM.Alerts.sensorIpStringThe sensor IP that the alert is associated with.
FireEyeCM.Alerts.ackStringA flag indicating whether an acknowledgment is received.
FireEyeCM.Alerts.srcUnknownThe source of the alert.
FireEyeCM.Alerts.dstUnknownThe destination of the alert.
FireEyeCM.Alerts.explanationUnknownThe explanation data of the alert.

Command Example#

!fireeye-cm-get-alerts

Context Example#

{
"FireEyeCM": {
"Alerts": [
{
"ack": "no",
"action": "notified",
"alertUrl": "https://FireEyeCM/event_stream/events_for_bot?ev_id=35685",
"applianceId": "test",
"attackTime": "2021-06-10 21:52:43 +0000",
"dst": {
"ip": "1.1.1.1",
"mac": "00:50:56:94:b8:42",
"port": 443
},
"explanation": {
"malwareDetected": {
"malware": [
{
"name": "Trojan.Malicious.SSL.Certificate.Dridex"
}
]
},
"osChanges": []
},
"id": 35685,
"malicious": "yes",
"name": "MALWARE_CALLBACK",
"occurred": "2021-06-10 21:52:43 +0000",
"product": "WEB_MPS",
"rootInfection": 34670,
"scVersion": "1163.102",
"sensor": "sensor",
"sensorIp": "1.1.1.1",
"severity": "CRIT",
"src": {
"ip": "1.1.1.1",
"port": 8080
},
"uuid": "529023c0-6ddf-4933-9241-fe4ec71a788e",
"vlan": 0
}
]
}
}

Human Readable Output#

FireEye Central Management Alerts:#

idoccurredproductnamemaliciousseverityalertUrl
356852021-06-10 21:52:43 +0000WEB_MPSMALWARE_CALLBACKyesCRIThttps://FireEyeCM/event_stream/events_for_bot?ev_id=35685

fireeye-cm-get-alert-details#


Searches and retrieves the details of a single alert.

Base Command#

fireeye-cm-get-alert-details

Input#

Argument NameDescriptionRequired
alert_idThe ID of the alert for which to retrieve its details.Required
timeoutTimeout to retrieve the artifacts. Default is 30 seconds.Optional

Context Output#

PathTypeDescription
FireEyeCM.Alerts.idStringThe ID of the alert.
FireEyeCM.Alerts.uuidStringThe UUID of the alert.
FireEyeCM.Alerts.occurredStringThe time when the alert occurred.
FireEyeCM.Alerts.productStringThe product name of the alert.
FireEyeCM.Alerts.rootInfectionStringThe ID of the infection associated with the malware alert.
FireEyeCM.Alerts.nameStringThe link to the infection associated with the malware alert.
FireEyeCM.Alerts.vlanStringThe virtual LAN (VLAN) of the alert.
FireEyeCM.Alerts.maliciousStringA flag indicating whether the alert is malicious.
FireEyeCM.Alerts.severityStringThe severity of the alert.
FireEyeCM.Alerts.sensorStringThe sensor name that the alert is associated with.
FireEyeCM.Alerts.applianceIdStringThe appliance ID of the alert.
FireEyeCM.Alerts.sensorIpStringThe sensor IP that the alert is associated with.
FireEyeCM.Alerts.ackStringA flag indicating whether an acknowledgment is received.
FireEyeCM.Alerts.srcUnknownThe source of the alert.
FireEyeCM.Alerts.dstUnknownThe destination of the alert.
FireEyeCM.Alerts.explanationUnknownThe explanation data of the alert.

Command Example#

!fireeye-cm-get-alert-details alert_id=35685

Context Example#

{
"FireEyeCM": {
"Alerts": {
"ack": "no",
"action": "notified",
"alertUrl": "https://FireEyeCM/event_stream/events_for_bot?ev_id=35685",
"applianceId": "test",
"attackTime": "2021-06-10 21:52:43 +0000",
"dst": {
"ip": "1.1.1.1",
"mac": "00:50:56:94:b8:42",
"port": 443
},
"explanation": {
"malwareDetected": {
"malware": [
{
"name": "Trojan.Malicious.SSL.Certificate.Dridex"
}
]
},
"osChanges": []
},
"id": 35685,
"malicious": "yes",
"name": "MALWARE_CALLBACK",
"occurred": "2021-06-10 21:52:43 +0000",
"product": "WEB_MPS",
"rootInfection": 34670,
"scVersion": "1163.102",
"sensor": "sensor",
"sensorIp": "1.1.1.1",
"severity": "CRIT",
"src": {
"ip": "1.1.1.1",
"port": 8080
},
"uuid": "529023c0-6ddf-4933-9241-fe4ec71a788e",
"vlan": 0
}
}
}

Human Readable Output#

FireEye Central Management Alerts:#

idoccurredproductnamemaliciousactionsrcdstseverityalertUrl
356852021-06-10 21:52:43 +0000WEB_MPSMALWARE_CALLBACKyesnotifiedip: 34.252.247.142
port: 51270
mac: 00:50:56:94:b8:42
port: 443
ip: 192.168.1.202
CRIThttps://FireEyeCM/event_stream/events_for_bot?ev_id=35685

fireeye-cm-alert-acknowledge#


Confirms that the alert has been reviewed.

Base Command#

fireeye-cm-alert-acknowledge

Input#

Argument NameDescriptionRequired
uuidThe universally unique identifier (UUID) for the alert.Required

Context Output#

There is no context output for this command.

Command Example#

!fireeye-cm-alert-acknowledge uuid=529023c0-6ddf-4933-9241-fe4ec71a788e

Human Readable Output#

Alert 529023c0-6ddf-4933-9241-fe4ec71a788e was acknowledged successfully.

fireeye-cm-get-artifacts-by-uuid#


Downloads malware artifacts data for the specified UUID as a zip file.

Base Command#

fireeye-cm-get-artifacts-by-uuid

Input#

Argument NameDescriptionRequired
uuidThe universally unique identifier (UUID) for the alert.Required
timeoutTimeout to retrieve the artifacts. Default is 120 seconds.Optional

Context Output#

PathTypeDescription
InfoFile.EntryIDstringThe EntryID of the artifact file.
InfoFile.ExtensionstringThe extension of the artifact file.
InfoFile.NamestringThe name of the artifact file.
InfoFile.InfostringThe info of the artifact file.
InfoFile.SizenumberThe size of the artifact file.
InfoFile.TypestringThe type of the artifact file.

Command Example#

!fireeye-cm-get-artifacts-by-uuid uuid=b38b83a0-4b96-408c-999f-4e97a5099f61

Context Example#

{
"InfoFile": {
"EntryID": "400@2c246757-e02c-458a-8620-dbc236283fb8",
"Extension": "zip",
"Info": "application/zip",
"Name": "artifacts_b38b83a0-4b96-408c-999f-4e97a5099f61.zip",
"Size": 5501,
"Type": "Zip archive data, at least v2.0 to extract"
}
}

Human Readable Output#

fireeye-cm-get-artifacts-metadata-by-uuid#


Gets artifacts metadata for the specified UUID.

Base Command#

fireeye-cm-get-artifacts-metadata-by-uuid

Input#

Argument NameDescriptionRequired
uuidThe universally unique identifier (UUID) for the alert.Required

Context Output#

PathTypeDescription
FireEyeCM.Alerts.uuidstringUniversally unique ID (UUID) of the alert.
FireEyeCM.Alerts.artifactsInfoList.artifactTypestringThe artifact type.
FireEyeCM.Alerts.artifactsInfoList.artifactNamestringThe artifact name.
FireEyeCM.Alerts.artifactsInfoList.artifactSizestringThe zipped artifact size in bytes.

Command Example#

!fireeye-cm-get-artifacts-metadata-by-uuid uuid=b38b83a0-4b96-408c-999f-4e97a5099f61

Context Example#

{
"FireEyeCM": {
"Alerts": {
"artifactsInfoList": [
{
"artifactName": "34.252.247.142-192.168.1.202-1620538334558058-33354739.txt.gz",
"artifactSize": "1641",
"artifactType": "l7_context_file"
},
{
"artifactName": "192.168.1.202-34.252.247.142-1620538334557811-33354739-cs.pcap",
"artifactSize": "3645",
"artifactType": "bott_communication_capture"
}
],
"uuid": "b38b83a0-4b96-408c-999f-4e97a5099f61"
}
}
}

Human Readable Output#

FireEye Central Management b38b83a0-4b96-408c-999f-4e97a5099f61 Artifact metadata:#

artifactNameartifactSizeartifactType
34.252.247.142-192.168.1.202-1620538334558058-33354739.txt.gz1641l7_context_file
192.168.1.202-34.252.247.142-1620538334557811-33354739-cs.pcap3645bott_communication_capture

fireeye-cm-get-events#


Retrieves information about existing IPS NX events. An IPS enabled appliance is a prerequisite to be able to retrieve IPS event data.

Base Command#

fireeye-cm-get-events

Input#

Argument NameDescriptionRequired
durationThe time interval in which to search. This filter is used with the end_time filter. If the duration is not specified, the system defaults to duration=12_hours, end_time=current_time. Possible values are: 1_hour, 2_hours, 6_hours, 12_hours, 24_hours, 48_hours.Optional
end_timeThe end time of the search. This filter is used with the duration filter. If the end_time is specified but not the duration, the system defaults to duration=12_hours, ending at the specified end_time. Syntax: end_time=YYYY-MM-DDTHH:mm:ss.sss-OH:om.Optional
mvx_correlated_onlySpecifies whether to include all IPS events or MVX-correlated events only. Possible values: "true" and "false". Possible values are: false, true. Default is false.Optional
limitMaximum number of events to return. Default is 20.Optional

Context Output#

PathTypeDescription
FireEyeCM.Events.eventIdNumberThe ID of the event.
FireEyeCM.Events.occurredstringThe date and time when the event occurred.
FireEyeCM.Events.srcIpstringThe IP address of the victim.
FireEyeCM.Events.srcPortNumberThe port address of the victim.
FireEyeCM.Events.dstIpstringThe IP address of the attacker.
FireEyeCM.Events.dstPortNumberThe port address of the attacker.
FireEyeCM.Events.vlanNumberThe virtual LAN (VLAN) of the event.
FireEyeCM.Events.signatureMatchCntStringThe date and time when the event occurred.
FireEyeCM.Events.signatureIdStringThe ID of the event.
FireEyeCM.Events.signatureRevStringThe date and time when the event occurred.
FireEyeCM.Events.severityStringThe ID of the event.
FireEyeCM.Events.vmVerifiedStringThe date and time when the event occurred.
FireEyeCM.Events.srcMacStringThe MAC address of the source machine.
FireEyeCM.Events.dstMacStringThe MAC address of the destination machine.
FireEyeCM.Events.ruleNameStringThe rule name for the event.
FireEyeCM.Events.sensorIdStringThe sensor ID of the FireEye machine.
FireEyeCM.Events.cveIdStringThe CVE ID found in the event.
FireEyeCM.Events.actionTakenStringThe IPS blocking action taken on the event.
FireEyeCM.Events.attackModeStringThe attack mode mentioned in the event.
FireEyeCM.Events.interfaceIdNumberThe interface ID of the event.
FireEyeCM.Events.protocolNumberThe protocol used in the event.
FireEyeCM.Events.incidentIdNumberThe incident ID of the event on FireEye.

Command Example#

!fireeye-cm-get-events duration="48_hours" end_time="2021-05-14T01:08:04.000-02:00" mvx_correlated_only="true"

Human Readable Output#

No events in the given timeframe were found.

fireeye-cm-get-quarantined-emails#


Searches and retrieves quarantined emails.

Base Command#

fireeye-cm-get-quarantined-emails

Input#

Argument NameDescriptionRequired
start_timeSpecifies the start time of the search. This filter is optional. Syntax: start_time=YYYY-MM-DDTHH:mm:ss.sss-OH:om or '1 day/month/year'. Default is 1 day.Optional
end_timeSpecifies the end time of the search. Default is now. Syntax: end_time=YYYY-MM-DDTHH:mm:ss.sss-OH:om or '1 day/month/year'.Optional
fromThe sender email.Optional
subjectThe email subject. Must be URL encoded.Optional
appliance_idThe appliance ID.Optional
limitNumber of emails to return. Default is 20.Optional

Context Output#

PathTypeDescription
FireEyeCM.QuarantinedEmail.appliance_idstringThe appliance ID associated with the quarantined email.
FireEyeCM.QuarantinedEmail.completed_atstringThe time the email has been quarantined.
FireEyeCM.QuarantinedEmail.email_uuidstringThe quarantined email UUID.
FireEyeCM.QuarantinedEmail.fromstringThe quarantined email sender.
FireEyeCM.QuarantinedEmail.message_idstringThe quarantined email message ID.
FireEyeCM.QuarantinedEmail.quarantine_pathstringThe quarantined email path.
FireEyeCM.QuarantinedEmail.The quarantined email queue id.stringThe quarantined email queue ID.
FireEyeCM.QuarantinedEmail.subjectstringThe quarantined email subject.

Command Example#

!fireeye-cm-get-quarantined-emails start_time="1 month" limit=4

Context Example#

{
"FireEyeCM": {
"QuarantinedEmail": [
{
"appliance_id": "test",
"completed_at": "2021-05-24T09:04:03",
"email_uuid": "d7738eb0-7fe7-4b5d-8fcb-2b053ef57e13",
"from": "test@malicious.net",
"message_id": "queue-id-test@no-message-id",
"quarantine_path": "/data/email-analysis/quarantine2/2021-05-24/09/test",
"queue_id": "4FpWV31wpbzTgF9",
"subject": "test"
},
{
"appliance_id": "test",
"completed_at": "2021-05-24T16:01:16",
"email_uuid": "9e73ca23-b935-47c2-8d2a-fe1a10071db2",
"from": "test@malicious.net",
"message_id": "queue-id-test@no-message-id",
"quarantine_path": "/data/email-analysis/quarantine2/2021-05-24/16/test",
"queue_id": "test",
"subject": "test"
},
{
"appliance_id": "test",
"completed_at": "2021-05-24T16:01:16",
"email_uuid": "e7b52446-555d-40d0-b8ad-e8f1f2a7ab7a",
"from": "test@malicious.net",
"message_id": "queue-id-test@no-message-id",
"quarantine_path": "/data/email-analysis/quarantine2/2021-05-24/16/test",
"queue_id": "test",
"subject": "test"
},
{
"appliance_id": "test",
"completed_at": "2021-05-24T16:01:16",
"email_uuid": "ebb991b5-06ef-44f4-b44d-e1daef67ce70",
"from": "test@malicious.net",
"message_id": "queue-id-test@no-message-id",
"quarantine_path": "/data/email-analysis/quarantine2/2021-05-24/16/test",
"queue_id": "test",
"subject": "test"
}
]
}
}

Human Readable Output#

FireEye Central Management Quarantined emails:#

email_uuidfromsubjectmessage_idcompleted_at
d7738eb0-7fe7-4b5d-8fcb-2b053ef57e13test@malicious.nettestqueue-id-test@no-message-id2021-05-24T09:04:03
9e73ca23-b935-47c2-8d2a-fe1a10071db2test@malicious.nettestqueue-id-test@no-message-id2021-05-24T16:01:16
e7b52446-555d-40d0-b8ad-e8f1f2a7ab7atest@malicious.nettestqueue-id-test@no-message-id2021-05-24T16:01:16
ebb991b5-06ef-44f4-b44d-e1daef67ce70test@malicious.nettestqueue-id-test@no-message-id2021-05-24T16:01:16

fireeye-cm-release-quarantined-emails#


Releases and deletes quarantined emails. This is not available when Email Security is in Drop mode.

Base Command#

fireeye-cm-release-quarantined-emails

Input#

Argument NameDescriptionRequired
queue_idsA comma-separated list of quarantined email queue IDs. Supports up to 100 IDs.Required
sensor_nameThe sensor display name.Required

Context Output#

There is no context output for this command.

fireeye-cm-delete-quarantined-emails#


Deletes quarantined emails. This is not available when Email Security is in Drop mode.

Base Command#

fireeye-cm-delete-quarantined-emails

Input#

Argument NameDescriptionRequired
queue_idsA comma-separated list of quarantined email queue IDs. Supports up to 100 IDs.Required
sensor_nameThe sensor display name.Required

Context Output#

There is no context output for this command.

fireeye-cm-download-quarantined-emails#


Download quarantined emails.

Base Command#

fireeye-cm-download-quarantined-emails

Input#

Argument NameDescriptionRequired
queue_idThe quarantined emails queue ID.Required
sensor_nameThe sensor display name.Required

Context Output#

PathTypeDescription
File.NameStringThe name of the email.
File.MD5StringThe MD5 hash of the email.
File.SHA1StringThe SHA1 hash of the email.
File.SHA256StringThe SHA256 hash of the email.
File.TypeStringThe file type.
File.SizeNumberThe size of the email in bytes.
File.SSDeepStringThe SSDeep hash of the email.

Command Example#

!fireeye-cm-download-quarantined-emails sensor_name=FireEyeEX queue_id=test

Context Example#

{
"File": {
"EntryID": "420@2c246757-e02c-458a-8620-dbc236283fb8",
"Extension": "eml",
"Info": "message/rfc822",
"MD5": "634996e695399dfc43488047c8316eaf",
"Name": "quarantined_email_4FpWV31wpbzTgF9.eml",
"SHA1": "5e6f89930c81da3f562eb630b4f881315bb56103",
"SHA256": "218f9c5975dc12e3e3857474669cda62df063051a46213042f5b404ae8bf138f",
"SHA512": "a7c19471fb4f2b752024246c28a37127ea7475148c04ace743392334d0ecc4762baf30b892d6a24b335e1065b254166f905fc46cc3ba5dba89e757bb7023a211",
"SSDeep": "6:tnWrw+bcnWd4jXQ93f9FfZPny8ZijRSF1OZKi1rzfSY4SXfT8oERf:tnWrwWcnWd4M9fZvy8SUF184MfPE5",
"Size": 269,
"Type": "RFC 822 mail text, ASCII text"
}
}

Human Readable Output#

fireeye-cm-get-reports#


Returns reports on selected alerts.

Base Command#

fireeye-cm-get-reports

Input#

Argument NameDescriptionRequired
report_typeThe report type. Requests for ipsTopNAttack, ipsTopNAttacker, ipsTopNVictim, or ipsTopNMvxVerified reports must be used with the limit parameter set to either 25, 50, 75, or 100. You must have an Intrusion Prevention System (IPS)-enabled appliance to be able to generate the IPS reports. Possible values are: empsEmailAVReport, empsEmailActivity, empsEmailExecutiveSummary, empsEmailHourlyStat, mpsCallBackServer, mpsExecutiveSummary, mpsInfectedHostsTrend, mpsMalwareActivity, mpsWebAVReport, ipsExecutiveSummary, ipsTopNAttack, ipsTopNAttacker, ipsTopNVictim, ipsTopNMvxVerified, alertDetailsReport.Required
start_timeThe start time of the search. This filter is optional. Syntax: start_time=YYYY-MM-DDTHH:mm:ss.sss-OH:om or '1 day/month/year'. Default is 1 week.Optional
end_timeSpecifies the end time of the search. Default is now. Syntax: end_time=YYYY-MM-DDTHH:mm:ss.sss-OH:om or '1 day/month/year'.Optional
limitThe maximum number of items covered by each report. This option is required only for IPS TopN reports. Default is 100.Optional
interfaceThe internet interface to one of the values. This option is required only for IPS reports. Possible values are: A, B, AB.Optional
alert_idAlert ID. This argument is only relevant when retrieving a report of type alertDetailsReport.Optional
infection_idInfection ID. This argument is only relevant when retrieving a report of type alertDetailsReport with conjunction to the infection_type argument.Optional
infection_typeInfection type. Possible values: "malware-object", "malware-callback", "infection-match", "domain-match", "web-infection". This argument is only relevant when retrieving a report of type alertDetailsReport with conjunction to the infection_id argument. Possible values are: malware-object, malware-callback, infection-match, domain-match, web-infection.Optional
timeoutTimeout to retrieve the reports. Default is 120 seconds.Optional

Context Output#

PathTypeDescription
InfoFile.EntryIDstringThe EntryID of the artifact file.
InfoFile.ExtensionstringThe extension of the artifact file.
InfoFile.NamestringThe name of the artifact file.
InfoFile.InfostringThe info of the artifact file.
InfoFile.SizenumberThe size of the artifact file.
InfoFile.TypestringThe type of the artifact file.

Command Example#

Human Readable Output#

Known Limitations#

Clicking the Test button of the Integration instance settings window verifies that the instance configuration is correct. Due to a known limitation, clicking the Test button several times in quick succession may result in an "Unauthorized" error, even after a successful result was initially returned. It is enough to receive one success message to verify that the configuration is correct. "Unauthorized" error messages received from repeated clicking of the instance configuration Test button do not affect the validity of the instance if the initial response was successful.