Skip to main content

GCenter 103

This Integration is part of the Gatewatcher AionIQ Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

This integration fetch events generated by the GCenter appliance. This integration was integrated and tested with version 2.5.3.103 of GCenter 103.

This is the default integration for this content pack when configured by the Data Onboarder in Cortex XSIAM.

Configure GCenter 103 in Cortex#

ParameterDescriptionRequired
GCenter IP addressThe IP of the GCenter from where the events will be fetched.True
GCenter API tokenFalse
GCenter accountFalse
PasswordFalse
GCenter VersionFalse
Check the TLS certificateFalse
Use system proxy settingsFalse
Fetch incidentsFalse
Fetch incidents from typeFalse
Engine alerts selectionFalse
First fetchThis value represents how far the first fetch will grab the events stored in the GCenter e.g. 2 daysFalse
Fetch limitThis value represents the maximum events fetched by instruction, this integration can handle up to 10000. The default value is 200 and is the optimum for Cortex XSOAR.False
Incident type

Commands#

You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

gcenter103-alerts-list#


List all alerts.

Base Command#

gcenter103-alerts-list

Input#

Argument NameDescriptionRequired
date_fromStarting date filter. ISO-8601 date format.Optional
date_toEnding data filter. ISO-8601 date format.Optional
sinceNot compatible with date_from and date_to parameters. Possible values are: 15d, yesterday.Optional
idsA comma-separated list of alert IDs.Optional
excluded_idsA comma-separated list of alert IDs to exclude.Optional
acknowledgedWhether to filter on the acknowledgement status. Possible values are: true, false.Optional
gcap_idComma-separated list of GCap IDs. First GCap has ID 1.Optional
ipComma-separated list of IP addresses of the alerts.Optional
src_ipComma-separated list of source IP addresses of the alerts.Optional
dest_ipComma-separated list of destination IP addresses of the alerts.Optional
risk_minMinimal risk value.Optional
risk_maxMaximal risk value.Optional
nameFilter on alert signature. Comma-separated list of signatures.Optional
descriptionFilter alerts on their description.Optional
tagFilter on alerts containing tags. Comma-separated list of tag names.Optional
no_tagWhether to include users with no tags. Possible values are: true, false.Optional
excluded_tagsFilter out alerts containing tags. Comma-separated list of tags. Logical OR between the tags.Optional
sort_byThe filter by which to sort the results. Possible values are: date, -date, risk, -risk, name, -name.Optional
typeThe type by which to filter alerts on engines. Possible values are: active_cti, beacon_detect, dga_detect, malcore, malcore_retroanalyzer, malicious_powershell_detect, ransomware_detect, retrohunt, shellcode_detect, sigflow_alert.Optional
mitre_tactic_nameFilter alert by MITRE tactic name. Possible values are: Collection, Collection (ICS), Collection (Mobile), Command and Control, Command and Control (ICS), Command and Control (Mobile), Credential Access, Credential Access (Mobile), Defense Evasion, Defense Evasion (Mobile), Discovery, Discovery (ICS), Discovery (Mobile), Evasion, Execution, Execution (ICS), Execution (Mobile), Exfiltration, Exfiltration (Mobile), Impact, Impact (ICS), Impact (Mobile), Impair Process Control, Inhibit Response Function, Initial Access, Initial Access (ICS), Initial Access (Mobile), Lateral Movement, Lateral Movement (ICS), Lateral Movement (Mobile), Persistence, Persistence (ICS), Persistence (Mobile), Privilege Escalation, Privilege Escalation (ICS), Privilege Escalation (Mobile), Reconnaissance, Resource Development.Optional
hostnameComma-separated list of hostnames.Optional
src_hostnameComma-separated list of source hostnames.Optional
dest_hostnameComma-separated list of destination hostnames.Optional
usernameComma-separated list of usernames.Optional
noteUser note content.Optional
stateFilter alerts on their state. Possible values are: closed, mute, open.Optional
searchA search term.Optional
pageA page to select in the results set.Optional
page_sizeNumber of results per page.Optional

Context Output#

PathTypeDescription
Gatewatcher.Alerts.List.uuidstringAlert UUIDs.

gcenter103-alerts-get#


Get an alert with its UUID (corresponds to event.id field) or the GCenter ID of the alert.

Base Command#

gcenter103-alerts-get

Input#

Argument NameDescriptionRequired
uuidUUID or GCenter ID of the alert.Required

Context Output#

PathTypeDescription
Gatewatcher.Alerts.Get.uuidstringThe UUID of the alert fetched.

gcenter103-alerts-note-add#


Add or update a note to an alert.

Base Command#

gcenter103-alerts-note-add

Input#

Argument NameDescriptionRequired
noteThe note to set on the alert.Required
uuidThe UUID of the alert to set the note on (corresponds to event.id field).Required
overwriteWhether to overwrite the note. Possible values are: true, false.Required

Context Output#

PathTypeDescription
Gatewatcher.Alerts.Note.Add.notestringThe note added to the alert.

gcenter103-alerts-note-remove#


Delete the note of an alert.

Base Command#

gcenter103-alerts-note-remove

Input#

Argument NameDescriptionRequired
uuidThe UUID of the alert to delete the note on (corresponds to event.id field).Required

Context Output#

PathTypeDescription
Gatewatcher.Alerts.Note.Remove.uuidstringThe UUID of the alert whose note was removed.

gcenter103-alerts-tags-get#


Get the tags of an alert.

Base Command#

gcenter103-alerts-tags-get

Input#

Argument NameDescriptionRequired
uuidThe UUID of the alert to get tags (corresponds to event.id field).Required

Context Output#

PathTypeDescription
Gatewatcher.Alerts.Tags.Get.tagsstringThe tags of the alert.
Gatewatcher.Alerts.Tags.Get.uuidstringThe UUID of the alert having these tags.

gcenter103-alerts-tags-add#


Add or update tags of an alert.

Base Command#

gcenter103-alerts-tags-add

Input#

Argument NameDescriptionRequired
uuidThe UUID of the alert to add tags (corresponds to event.id field).Required
tagsA comma-separated list of tag names to add to the alert.Required

Context Output#

PathTypeDescription
Gatewatcher.Alerts.Tags.Add.tagsstringThe tags added to the alert.
Gatewatcher.Alerts.Tags.Add.uuidstringThe UUID of the alert where the tags were added.

gcenter103-alerts-tags-remove#


Remove tags from an alert.

Base Command#

gcenter103-alerts-tags-remove

Input#

Argument NameDescriptionRequired
uuidThe UUID of the alert from which to remove tags (corresponds to event.id field).Required
tagsA comma-separated list of tag names to remove to the alert.Required

Context Output#

PathTypeDescription
Gatewatcher.Alerts.Tags.RemovestringThe tags present in the alert.

gcenter103-alerts-status-update#


Update status of an alert.

Base Command#

gcenter103-alerts-status-update

Input#

Argument NameDescriptionRequired
note_uA note to add/update.Optional
tag_uTags to add/update.Optional
date_fromStarting date filter. ISO-8601 date format.Optional
date_toEnding data filter. ISO-8601 date format.Optional
sinceNot compatible with date_from and date_to parameters. Possible values are: 15d, yesterday.Optional
uuidUUID of the alert to perform action (corresponds to event.id field).Required
acknowledgedWhether to filter on the acknowledgement status. Possible values are: true, false.Optional
gcap_idComma-separated list of GCap IDs. First GCap has ID 1.Optional
ipComma-separated list of IP addresses of the alerts.Optional
src_ipComma-separated list of source IP addresses of the alerts.Optional
dest_ipComma-separated list of destination IP addresses of the alerts.Optional
risk_minMinimal risk value.Optional
risk_maxMaximal risk value.Optional
nameFilter on alert signature. Comma-separated list of signatures.Optional
descriptionFilter alerts on their description.Optional
tagFilter on alerts containing tags. Comma-separated list of tag names.Optional
no_tagWhether to include users with no tags. Possible values are: true, false.Optional
excluded_tagsFilter out alerts containing tags. Comma-separated list of tags. Logical OR between the tags.Optional
sort_byThe filter by which to sort the results. Possible values are: date, -date, risk, -risk, name, -name.Optional
typeThe type by which to filter alerts on engines. Possible values are: active_cti, beacon_detect, dga_detect, malcore, malcore_retroanalyzer, malicious_powershell_detect, ransomware_detect, retrohunt, shellcode_detect, sigflow_alert.Optional
mitre_tactic_nameFilter alert by MITRE tactic name. Possible values are: Collection, Collection (ICS), Collection (Mobile), Command and Control, Command and Control (ICS), Command and Control (Mobile), Credential Access, Credential Access (Mobile), Defense Evasion, Defense Evasion (Mobile), Discovery, Discovery (ICS), Discovery (Mobile), Evasion, Execution, Execution (ICS), Execution (Mobile), Exfiltration, Exfiltration (Mobile), Impact, Impact (ICS), Impact (Mobile), Impair Process Control, Inhibit Response Function, Initial Access, Initial Access (ICS), Initial Access (Mobile), Lateral Movement, Lateral Movement (ICS), Lateral Movement (Mobile), Persistence, Persistence (ICS), Persistence (Mobile), Privilege Escalation, Privilege Escalation (ICS), Privilege Escalation (Mobile), Reconnaissance, Resource Development.Optional
hostnameComma-separated list of hostnames.Optional
src_hostnameComma-separated list of source hostnames.Optional
dest_hostnameComma-separated list of destination hostnames.Optional
usernameComma-separated list of usernames.Optional
noteUser note content.Optional
stateFilter alerts on their state. Possible values are: closed, mute, open.Optional
searchA search term.Optional
actionThe action to perform on the alerts. Possible values are: acknowledge, open, tag, untag, note, open_related, close_related, mute_signature, unmute_signature.Required

Context Output#

PathTypeDescription
Gatewatcher.Alerts.Status.UpdatestringThe updated status of the alerts.

gcenter103-raw-alerts-get#


Get a raw alert with its UUID.

Base Command#

gcenter103-raw-alerts-get

Input#

Argument NameDescriptionRequired
uuidUUID of the alert to fetch (corresponds to event.id field).Required

Context Output#

PathTypeDescription
Gatewatcher.Raw.Alerts.GetstringThe alert content.

gcenter103-raw-alerts-file-get#


Get a file attached to an alert with its UUID.

Base Command#

gcenter103-raw-alerts-file-get

Input#

Argument NameDescriptionRequired
uuidUUID of the alert to fetch (corresponds to event.id field).Required

Context Output#

PathTypeDescription
Gatewatcher.Raw.Alerts.File.GetstringThe zip file.

gcenter103-file-scan#


Scan a file on a selected engine. You must upload the file to scan before execution.

Base Command#

gcenter103-file-scan

Input#

Argument NameDescriptionRequired
engineEngine that will scan the file. Possible values are: malcore, powershell, shellcode.Required
entryIDEntry ID of the file to scan.Required

Context Output#

PathTypeDescription
Gatewatcher.File.ScanstringResults of the scan.

gcenter103-file-scan-result-get#


Retrieve previous scan by its ID.

Base Command#

gcenter103-file-scan-result-get

Input#

Argument NameDescriptionRequired
idID of a previous file scan.Required

Context Output#

PathTypeDescription
Gatewatcher.File.Scan.Result.GetstringResult of the file scan.

gcenter103-assets-list#


List all assets.

Base Command#

gcenter103-assets-list

Input#

Argument NameDescriptionRequired
date_fromStarting date filter. ISO-8601 date format.Optional
date_toEnding data filter. ISO-8601 date format.Optional
sinceNot compatible with date_from and date_to parameters. Possible values are: 15d, yesterday.Optional
gcap_idComma-separated list of GCap IDs. First GCap has ID 1.Optional
ipComma-separated list of IP addresses of the alerts.Optional
risk_minMinimal risk value.Optional
risk_maxMaximal risk value.Optional
nameComma-separated list of hostnames of the asset.Optional
tagFilter on assets containing tags. Comma-separated list of tag names.Optional
no_tagWhether to include users with no tags. Possible values are: true, false.Optional
sort_byThe filter by which to sort the results. Possible values are: risk, -risk, name, -name.Optional
typeAsset type. Possible values are: Smartphone, IoT, Laptop, Videogame, TV, Other, Firewall, Hypervisor, IPBX, Printer, Proxy, Router, Server, Storage, Virtual Machine, WAF, WiFi, unknown.Optional
noteAsset note content.Optional
searchA search term.Optional
pageA page to select in the results set.Optional
page_sizeNumber of results per page.Optional
fastThe fast mode uses cached data to present faster results. Disabled by default. Possible values are: true, false.Optional
os_firmwareOS/Firwmare of the asset.Optional
mac_addressAsset MAC addresses.Optional

Context Output#

PathTypeDescription
Gatewatcher.Assets.ListstringList of assets.

gcenter103-assets-alerts-get#


Retrieve alerts of a given asset.

Base Command#

gcenter103-assets-alerts-get

Input#

Argument NameDescriptionRequired
date_fromStarting date filter. ISO-8601 date format.Optional
date_toEnding data filter. ISO-8601 date format.Optional
sinceNot compatible with date_from and date_to parameters. Possible values are: 15d, yesterday.Optional
idsA comma-separated list of alert IDs.Optional
excluded_idsA comma-separated list of alert IDs to exclude.Optional
acknowledgedWhether to filter on the acknowledgement status. Possible values are: true, false.Optional
gcap_idComma-separated list of GCap IDs. First GCap has ID 1.Optional
ipComma-separated list of IP addresses of the alerts.Optional
src_ipComma-separated list of source IP addresses of the alerts.Optional
dest_ipComma-separated list of destination IP addresses of the alerts.Optional
risk_minMinimal risk value.Optional
risk_maxMaximal risk value.Optional
nameFilter on alert signature. Comma-separated list of signatures.Optional
descriptionFilter alerts on their description.Optional
tagFilter on alerts containing tags. Comma-separated list of tag names.Optional
no_tagWhether to include users with no tags. Possible values are: true, false.Optional
excluded_tagsFilter out alerts containing tags. Comma-separated list of tags. Logical OR between the tags.Optional
sort_byThe filter by which to sort the results. Possible values are: date, -date, risk, -risk, name, -name.Optional
typeThe type by which to filter alerts on engines. Possible values are: active_cti, beacon_detect, dga_detect, malcore, malcore_retroanalyzer, malicious_powershell_detect, ransomware_detect, retrohunt, shellcode_detect, sigflow_alert.Optional
mitre_tactic_nameFilter alert by MITRE tactic name. Possible values are: Collection, Collection (ICS), Collection (Mobile), Command and Control, Command and Control (ICS), Command and Control (Mobile), Credential Access, Credential Access (Mobile), Defense Evasion, Defense Evasion (Mobile), Discovery, Discovery (ICS), Discovery (Mobile), Evasion, Execution, Execution (ICS), Execution (Mobile), Exfiltration, Exfiltration (Mobile), Impact, Impact (ICS), Impact (Mobile), Impair Process Control, Inhibit Response Function, Initial Access, Initial Access (ICS), Initial Access (Mobile), Lateral Movement, Lateral Movement (ICS), Lateral Movement (Mobile), Persistence, Persistence (ICS), Persistence (Mobile), Privilege Escalation, Privilege Escalation (ICS), Privilege Escalation (Mobile), Reconnaissance, Resource Development.Optional
hostnameComma-separated list of hostnames.Optional
src_hostnameComma-separated list of source hostnames.Optional
dest_hostnameComma-separated list of destination hostnames.Optional
usernameComma-separated list of usernames.Optional
noteUser note content.Optional
stateFilter alerts on their state. Possible values are: closed, mute, open.Optional
pageA page number within the results pages.Optional
page_sizeNumber of results per page.Optional
asset_nameName of the asset.Required

Context Output#

PathTypeDescription
Gatewatcher.Assets.Alerts.GetstringGet alerts for an asset.

gcenter103-assets-get#


Retrieve specific asset data.

Base Command#

gcenter103-assets-get

Input#

Argument NameDescriptionRequired
date_fromStarting date filter. ISO-8601 date format.Optional
date_toEnding data filter. ISO-8601 date format.Optional
sinceNot compatible with date_from and date_to parameters. Possible values are: 15d, yesterday.Optional
fastThe fast mode uses cached data to present faster results. Disabled by default. Possible values are: true, false.Optional
asset_nameAsset name.Required

Context Output#

PathTypeDescription
Gatewatcher.Assets.GetstringAsset data.

gcenter103-assets-note-add#


Add or update a note to an asset.

Base Command#

gcenter103-assets-note-add

Input#

Argument NameDescriptionRequired
asset_nameAsset name.Required
noteNote to update.Required
overwriteWhether to overwrite the note. Possible values are: true, false.Required

Context Output#

PathTypeDescription
Gatewatcher.Assets.Note.AddstringThe note added or updated.

gcenter103-assets-note-remove#


Remove a note from an asset.

Base Command#

gcenter103-assets-note-remove

Input#

Argument NameDescriptionRequired
asset_nameAsset name.Required

Context Output#

PathTypeDescription
Gatewatcher.Assets.Note.RemovestringThe request response code.

gcenter103-assets-tags-get#


Get the tags of an asset.

Base Command#

gcenter103-assets-tags-get

Input#

Argument NameDescriptionRequired
asset_nameAsset name.Required

Context Output#

PathTypeDescription
Gatewatcher.Assets.Tags.GetstringThe tags of the asset.

gcenter103-assets-tags-add#


Add or update the tags of an asset.

Base Command#

gcenter103-assets-tags-add

Input#

Argument NameDescriptionRequired
asset_nameAsset name.Required
tagsA comma-separated list of tag names to add to the asset.Required

Context Output#

PathTypeDescription
Gatewatcher.Assets.Tags.AddstringAdded or updated tags of the asset.

gcenter103-assets-tags-remove#


Remove tags of an asset.

Base Command#

gcenter103-assets-tags-remove

Input#

Argument NameDescriptionRequired
asset_nameAsset name.Required
tagsA comma-separated list of tag names to remove to the asset.Required

Context Output#

PathTypeDescription
Gatewatcher.Assets.Tags.RemovestringRemoved tags of the asset.

gcenter103-users-list#


Retrieves a list of Kerberos users.

Base Command#

gcenter103-users-list

Input#

Argument NameDescriptionRequired
searchA search term.Optional
pageA page to select in the results set.Optional
page_sizeNumber of results per page.Optional
date_fromStarting date filter. ISO-8601 date format.Optional
date_toEnding data filter. ISO-8601 date format.Optional
sinceNot compatible with date_from and date_to parameters. Possible values are: 15d, yesterday.Optional
fastThe fast mode uses cached data to present faster results. Disabled by default. Possible values are: true, false.Optional
gcap_idComma-separated list of GCap IDs. First GCap has ID 1.Optional
sort_byThe filter by which to sort the results. Possible values are: risk, -risk, name, -name.Optional
risk_minMinimal risk value.Optional
risk_maxMaximal risk value.Optional
usernameComma-separated list of usernames.Optional
ipComma-separated list of IP addresses of the alerts.Optional
hostnameComma-separated list of hostnames.Optional
tagFilter on users containing tags. Comma-separated list of tag names.Optional
noteUser note content.Optional
no_tagWhether to include users with no tags. Possible values are: true, false.Optional

Context Output#

PathTypeDescription
Gatewatcher.Users.ListstringThe list of Kerberos users.

gcenter103-users-alerts-get#


Retrieves a list of the alerts of a Kerberos user.

Base Command#

gcenter103-users-alerts-get

Input#

Argument NameDescriptionRequired
date_fromStarting date filter. ISO-8601 date format.Optional
date_toEnding data filter. ISO-8601 date format.Optional
sinceNot compatible with date_from and date_to parameters. Possible values are: 15d, yesterday.Optional
idsA comma-separated list of alert IDs.Optional
excluded_idsA comma-separated list of alert IDs to exclude.Optional
acknowledgedWhether to filter on the acknowledgement status. Possible values are: true, false.Optional
gcap_idComma-separated list of GCap IDs. First GCap has ID 1.Optional
ipComma-separated list of IP addresses of the alerts.Optional
src_ipComma-separated list of source IP addresses of the alerts.Optional
dest_ipComma-separated list of destination IP addresses of the alerts.Optional
risk_minMinimal risk value.Optional
risk_maxMaximal risk value.Optional
nameFilter on alert signature. Comma-separated list of signatures.Optional
descriptionFilter alerts on their description.Optional
tagFilter on users containing tags. Comma-separated list of tag names.Optional
no_tagWhether to include users with no tags. Possible values are: true, false.Optional
excluded_tagsFilter out alerts containing tags. Comma-separated list of tags. Logical OR between the tags.Optional
sort_byThe filter by which to sort the results. Possible values are: date, -date, risk, -risk, name, -name.Optional
typeThe type by which to filter alerts on engines. Possible values are: active_cti, beacon_detect, dga_detect, malcore, malcore_retroanalyzer, malicious_powershell_detect, ransomware_detect, retrohunt, shellcode_detect, sigflow_alert.Optional
mitre_tactic_nameFilter alert by MITRE tactic name. Possible values are: Collection, Collection (ICS), Collection (Mobile), Command and Control, Command and Control (ICS), Command and Control (Mobile), Credential Access, Credential Access (Mobile), Defense Evasion, Defense Evasion (Mobile), Discovery, Discovery (ICS), Discovery (Mobile), Evasion, Execution, Execution (ICS), Execution (Mobile), Exfiltration, Exfiltration (Mobile), Impact, Impact (ICS), Impact (Mobile), Impair Process Control, Inhibit Response Function, Initial Access, Initial Access (ICS), Initial Access (Mobile), Lateral Movement, Lateral Movement (ICS), Lateral Movement (Mobile), Persistence, Persistence (ICS), Persistence (Mobile), Privilege Escalation, Privilege Escalation (ICS), Privilege Escalation (Mobile), Reconnaissance, Resource Development.Optional
hostnameComma-separated list of hostnames.Optional
src_hostnameComma-separated list of source hostnames.Optional
dest_hostnameComma-separated list of destination hostnames.Optional
usernameComma-separated list of usernames.Optional
noteUser note content.Optional
stateFilter alerts on their state. Possible values are: closed, mute, open.Optional
pageA page number within the results pages.Optional
page_sizeNumber of results per page.Optional
kuser_nameAlerts of this Kerberos user name.Required

Context Output#

PathTypeDescription
Gatewatcher.Users.Alerts.GetstringThe list of alerts of a Kerberos user.

gcenter103-users-get#


Retrieves Kerberos user data.

Base Command#

gcenter103-users-get

Input#

Argument NameDescriptionRequired
date_fromStarting date filter. ISO-8601 date format.Optional
date_toEnding data filter. ISO-8601 date format.Optional
sinceNot compatible with date_from and date_to parameters. Possible values are: 15d, yesterday.Optional
fastThe fast mode uses cached data to present faster results. Disabled by default. Possible values are: true, false.Optional
kuser_nameAlerts of this Kerberos user name.Required

Context Output#

PathTypeDescription
Gatewatcher.Users.GetstringGet information of a Kerberos user.

gcenter103-users-note-add#


Add or update the note of a Kerberos user.

Base Command#

gcenter103-users-note-add

Input#

Argument NameDescriptionRequired
noteNote content to add/update.Required
kuser_nameKerberos user name.Required
overwriteWhether to overwrite the note. Possible values are: true, false.Required

Context Output#

PathTypeDescription
Gatewatcher.Users.Note.AddstringAdded/updated note.

gcenter103-users-note-remove#


Remove the note of a Kerberos user.

Base Command#

gcenter103-users-note-remove

Input#

Argument NameDescriptionRequired
kuser_nameKerberos user name.Required

Context Output#

PathTypeDescription
Gatewatcher.Users.Note.RemovestringRequest response code.

gcenter103-users-tags-get#


Get the tags of a Kerberos user.

Base Command#

gcenter103-users-tags-get

Input#

Argument NameDescriptionRequired
kuser_nameKerberos user name to get tags of.Required

Context Output#

PathTypeDescription
Gatewatcher.Users.Tags.GetstringThe tags associated to the Kerberos user.

gcenter103-users-tags-add#


Add or update the tags of a Kerberos user.

Base Command#

gcenter103-users-tags-add

Input#

Argument NameDescriptionRequired
tagsA comma-separated list of tags to add to the Kerberos user.Required
kuser_nameKerberos user name to add tags of.Required

Context Output#

PathTypeDescription
Gatewatcher.Users.Tags.AddstringAdded/updated tags associated to the Kerberos user.

gcenter103-users-tags-remove#


Remove tags of a Kerberos user.

Base Command#

gcenter103-users-tags-remove

Input#

Argument NameDescriptionRequired
tagsA comma-separated list of tag names to remove to the Kerberos user.Required
kuser_nameKerberos user name to remove tags from.Required

Context Output#

PathTypeDescription
Gatewatcher.Users.Tags.RemovestringTags of the Kerberos user.

gcenter103-yara-rules-get#


Get YARA settings.

Base Command#

gcenter103-yara-rules-get

Input#

Argument NameDescriptionRequired
exportExport state. Possible values are: true, false.Optional

Context Output#

PathTypeDescription
Gatewatcher.Yara.Rules.GetstringThe YARA settings.

gcenter103-yara-rules-add#


Add YARA rules to Malcore. You must upload the YARA file before execution.

Base Command#

gcenter103-yara-rules-add

Input#

Argument NameDescriptionRequired
enabledSet if YARA is enabled or not. Possible values are: true, false.Required
nameName of the YARA ruleset.Required
entryIDEntryID of the YARA file.Required

Context Output#

PathTypeDescription
Gatewatcher.Yara.Rules.AddstringThe updated YARA settings.

gcenter103-malcore-fingerprints-get#


Get fingerprints of the white or black list of Malcore.

Base Command#

gcenter103-malcore-fingerprints-get

Input#

Argument NameDescriptionRequired
orderingThe order by which the results should be sorted. Possible values are: created, sha256, user, -created, -sha256, -user.Optional
pageA page to select in the results set.Optional
list_typeThe type of list given. Possible values are: white, black.Required

Context Output#

PathTypeDescription
Gatewatcher.Malcore.Fingerprints.GetstringHash list informations.

gcenter103-malcore-fingerprints-add#


Add fingerprints to white or black list to Malcore.

Base Command#

gcenter103-malcore-fingerprints-add

Input#

Argument NameDescriptionRequired
sha256The SHA256 to add.Required
commentAn attached comment (200 chars max).Required
threatName of the threat for reference (100 chars max).Required
list_typeThe type of list given. Possible values are: white, black.Required

Context Output#

PathTypeDescription
Gatewatcher.Malcore.Fingerprints.AddstringHash list informations.

gcenter103-malcore-fingerprints-remove#


Remove fingerprints to white or black list to Malcore.

Base Command#

gcenter103-malcore-fingerprints-remove

Input#

Argument NameDescriptionRequired
sha256The SHA256 to remove.Required
list_typeThe type of list to remove from. Possible values are: white, black.Required

Context Output#

PathTypeDescription
Gatewatcher.Malcore.Fingerprints.RemovestringHash list informations.