GCenter 103
Gatewatcher AionIQ Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.5.0 and later.
This integration fetch events generated by the GCenter appliance. This integration was integrated and tested with version 2.5.3.103 of GCenter 103.
This is the default integration for this content pack when configured by the Data Onboarder in Cortex XSIAM.
#
Configure GCenter 103 in CortexParameter | Description | Required |
---|---|---|
GCenter IP address | The IP of the GCenter from where the events will be fetched. | True |
GCenter API token | False | |
GCenter account | False | |
Password | False | |
GCenter Version | False | |
Check the TLS certificate | False | |
Use system proxy settings | False | |
Fetch incidents | False | |
Fetch incidents from type | False | |
Engine alerts selection | False | |
First fetch | This value represents how far the first fetch will grab the events stored in the GCenter e.g. 2 days | False |
Fetch limit | This value represents the maximum events fetched by instruction, this integration can handle up to 10000. The default value is 200 and is the optimum for Cortex XSOAR. | False |
Incident type |
#
CommandsYou can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
gcenter103-alerts-listList all alerts.
#
Base Commandgcenter103-alerts-list
#
InputArgument Name | Description | Required |
---|---|---|
date_from | Starting date filter. ISO-8601 date format. | Optional |
date_to | Ending data filter. ISO-8601 date format. | Optional |
since | Not compatible with date_from and date_to parameters. Possible values are: 15d, yesterday. | Optional |
ids | A comma-separated list of alert IDs. | Optional |
excluded_ids | A comma-separated list of alert IDs to exclude. | Optional |
acknowledged | Whether to filter on the acknowledgement status. Possible values are: true, false. | Optional |
gcap_id | Comma-separated list of GCap IDs. First GCap has ID 1. | Optional |
ip | Comma-separated list of IP addresses of the alerts. | Optional |
src_ip | Comma-separated list of source IP addresses of the alerts. | Optional |
dest_ip | Comma-separated list of destination IP addresses of the alerts. | Optional |
risk_min | Minimal risk value. | Optional |
risk_max | Maximal risk value. | Optional |
name | Filter on alert signature. Comma-separated list of signatures. | Optional |
description | Filter alerts on their description. | Optional |
tag | Filter on alerts containing tags. Comma-separated list of tag names. | Optional |
no_tag | Whether to include users with no tags. Possible values are: true, false. | Optional |
excluded_tags | Filter out alerts containing tags. Comma-separated list of tags. Logical OR between the tags. | Optional |
sort_by | The filter by which to sort the results. Possible values are: date, -date, risk, -risk, name, -name. | Optional |
type | The type by which to filter alerts on engines. Possible values are: active_cti, beacon_detect, dga_detect, malcore, malcore_retroanalyzer, malicious_powershell_detect, ransomware_detect, retrohunt, shellcode_detect, sigflow_alert. | Optional |
mitre_tactic_name | Filter alert by MITRE tactic name. Possible values are: Collection, Collection (ICS), Collection (Mobile), Command and Control, Command and Control (ICS), Command and Control (Mobile), Credential Access, Credential Access (Mobile), Defense Evasion, Defense Evasion (Mobile), Discovery, Discovery (ICS), Discovery (Mobile), Evasion, Execution, Execution (ICS), Execution (Mobile), Exfiltration, Exfiltration (Mobile), Impact, Impact (ICS), Impact (Mobile), Impair Process Control, Inhibit Response Function, Initial Access, Initial Access (ICS), Initial Access (Mobile), Lateral Movement, Lateral Movement (ICS), Lateral Movement (Mobile), Persistence, Persistence (ICS), Persistence (Mobile), Privilege Escalation, Privilege Escalation (ICS), Privilege Escalation (Mobile), Reconnaissance, Resource Development. | Optional |
hostname | Comma-separated list of hostnames. | Optional |
src_hostname | Comma-separated list of source hostnames. | Optional |
dest_hostname | Comma-separated list of destination hostnames. | Optional |
username | Comma-separated list of usernames. | Optional |
note | User note content. | Optional |
state | Filter alerts on their state. Possible values are: closed, mute, open. | Optional |
search | A search term. | Optional |
page | A page to select in the results set. | Optional |
page_size | Number of results per page. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Alerts.List.uuid | string | Alert UUIDs. |
#
gcenter103-alerts-getGet an alert with its UUID (corresponds to event.id field) or the GCenter ID of the alert.
#
Base Commandgcenter103-alerts-get
#
InputArgument Name | Description | Required |
---|---|---|
uuid | UUID or GCenter ID of the alert. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Alerts.Get.uuid | string | The UUID of the alert fetched. |
#
gcenter103-alerts-note-addAdd or update a note to an alert.
#
Base Commandgcenter103-alerts-note-add
#
InputArgument Name | Description | Required |
---|---|---|
note | The note to set on the alert. | Required |
uuid | The UUID of the alert to set the note on (corresponds to event.id field). | Required |
overwrite | Whether to overwrite the note. Possible values are: true, false. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Alerts.Note.Add.note | string | The note added to the alert. |
#
gcenter103-alerts-note-removeDelete the note of an alert.
#
Base Commandgcenter103-alerts-note-remove
#
InputArgument Name | Description | Required |
---|---|---|
uuid | The UUID of the alert to delete the note on (corresponds to event.id field). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Alerts.Note.Remove.uuid | string | The UUID of the alert whose note was removed. |
#
gcenter103-alerts-tags-getGet the tags of an alert.
#
Base Commandgcenter103-alerts-tags-get
#
InputArgument Name | Description | Required |
---|---|---|
uuid | The UUID of the alert to get tags (corresponds to event.id field). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Alerts.Tags.Get.tags | string | The tags of the alert. |
Gatewatcher.Alerts.Tags.Get.uuid | string | The UUID of the alert having these tags. |
#
gcenter103-alerts-tags-addAdd or update tags of an alert.
#
Base Commandgcenter103-alerts-tags-add
#
InputArgument Name | Description | Required |
---|---|---|
uuid | The UUID of the alert to add tags (corresponds to event.id field). | Required |
tags | A comma-separated list of tag names to add to the alert. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Alerts.Tags.Add.tags | string | The tags added to the alert. |
Gatewatcher.Alerts.Tags.Add.uuid | string | The UUID of the alert where the tags were added. |
#
gcenter103-alerts-tags-removeRemove tags from an alert.
#
Base Commandgcenter103-alerts-tags-remove
#
InputArgument Name | Description | Required |
---|---|---|
uuid | The UUID of the alert from which to remove tags (corresponds to event.id field). | Required |
tags | A comma-separated list of tag names to remove to the alert. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Alerts.Tags.Remove | string | The tags present in the alert. |
#
gcenter103-alerts-status-updateUpdate status of an alert.
#
Base Commandgcenter103-alerts-status-update
#
InputArgument Name | Description | Required |
---|---|---|
note_u | A note to add/update. | Optional |
tag_u | Tags to add/update. | Optional |
date_from | Starting date filter. ISO-8601 date format. | Optional |
date_to | Ending data filter. ISO-8601 date format. | Optional |
since | Not compatible with date_from and date_to parameters. Possible values are: 15d, yesterday. | Optional |
uuid | UUID of the alert to perform action (corresponds to event.id field). | Required |
acknowledged | Whether to filter on the acknowledgement status. Possible values are: true, false. | Optional |
gcap_id | Comma-separated list of GCap IDs. First GCap has ID 1. | Optional |
ip | Comma-separated list of IP addresses of the alerts. | Optional |
src_ip | Comma-separated list of source IP addresses of the alerts. | Optional |
dest_ip | Comma-separated list of destination IP addresses of the alerts. | Optional |
risk_min | Minimal risk value. | Optional |
risk_max | Maximal risk value. | Optional |
name | Filter on alert signature. Comma-separated list of signatures. | Optional |
description | Filter alerts on their description. | Optional |
tag | Filter on alerts containing tags. Comma-separated list of tag names. | Optional |
no_tag | Whether to include users with no tags. Possible values are: true, false. | Optional |
excluded_tags | Filter out alerts containing tags. Comma-separated list of tags. Logical OR between the tags. | Optional |
sort_by | The filter by which to sort the results. Possible values are: date, -date, risk, -risk, name, -name. | Optional |
type | The type by which to filter alerts on engines. Possible values are: active_cti, beacon_detect, dga_detect, malcore, malcore_retroanalyzer, malicious_powershell_detect, ransomware_detect, retrohunt, shellcode_detect, sigflow_alert. | Optional |
mitre_tactic_name | Filter alert by MITRE tactic name. Possible values are: Collection, Collection (ICS), Collection (Mobile), Command and Control, Command and Control (ICS), Command and Control (Mobile), Credential Access, Credential Access (Mobile), Defense Evasion, Defense Evasion (Mobile), Discovery, Discovery (ICS), Discovery (Mobile), Evasion, Execution, Execution (ICS), Execution (Mobile), Exfiltration, Exfiltration (Mobile), Impact, Impact (ICS), Impact (Mobile), Impair Process Control, Inhibit Response Function, Initial Access, Initial Access (ICS), Initial Access (Mobile), Lateral Movement, Lateral Movement (ICS), Lateral Movement (Mobile), Persistence, Persistence (ICS), Persistence (Mobile), Privilege Escalation, Privilege Escalation (ICS), Privilege Escalation (Mobile), Reconnaissance, Resource Development. | Optional |
hostname | Comma-separated list of hostnames. | Optional |
src_hostname | Comma-separated list of source hostnames. | Optional |
dest_hostname | Comma-separated list of destination hostnames. | Optional |
username | Comma-separated list of usernames. | Optional |
note | User note content. | Optional |
state | Filter alerts on their state. Possible values are: closed, mute, open. | Optional |
search | A search term. | Optional |
action | The action to perform on the alerts. Possible values are: acknowledge, open, tag, untag, note, open_related, close_related, mute_signature, unmute_signature. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Alerts.Status.Update | string | The updated status of the alerts. |
#
gcenter103-raw-alerts-getGet a raw alert with its UUID.
#
Base Commandgcenter103-raw-alerts-get
#
InputArgument Name | Description | Required |
---|---|---|
uuid | UUID of the alert to fetch (corresponds to event.id field). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Raw.Alerts.Get | string | The alert content. |
#
gcenter103-raw-alerts-file-getGet a file attached to an alert with its UUID.
#
Base Commandgcenter103-raw-alerts-file-get
#
InputArgument Name | Description | Required |
---|---|---|
uuid | UUID of the alert to fetch (corresponds to event.id field). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Raw.Alerts.File.Get | string | The zip file. |
#
gcenter103-file-scanScan a file on a selected engine. You must upload the file to scan before execution.
#
Base Commandgcenter103-file-scan
#
InputArgument Name | Description | Required |
---|---|---|
engine | Engine that will scan the file. Possible values are: malcore, powershell, shellcode. | Required |
entryID | Entry ID of the file to scan. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.File.Scan | string | Results of the scan. |
#
gcenter103-file-scan-result-getRetrieve previous scan by its ID.
#
Base Commandgcenter103-file-scan-result-get
#
InputArgument Name | Description | Required |
---|---|---|
id | ID of a previous file scan. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.File.Scan.Result.Get | string | Result of the file scan. |
#
gcenter103-assets-listList all assets.
#
Base Commandgcenter103-assets-list
#
InputArgument Name | Description | Required |
---|---|---|
date_from | Starting date filter. ISO-8601 date format. | Optional |
date_to | Ending data filter. ISO-8601 date format. | Optional |
since | Not compatible with date_from and date_to parameters. Possible values are: 15d, yesterday. | Optional |
gcap_id | Comma-separated list of GCap IDs. First GCap has ID 1. | Optional |
ip | Comma-separated list of IP addresses of the alerts. | Optional |
risk_min | Minimal risk value. | Optional |
risk_max | Maximal risk value. | Optional |
name | Comma-separated list of hostnames of the asset. | Optional |
tag | Filter on assets containing tags. Comma-separated list of tag names. | Optional |
no_tag | Whether to include users with no tags. Possible values are: true, false. | Optional |
sort_by | The filter by which to sort the results. Possible values are: risk, -risk, name, -name. | Optional |
type | Asset type. Possible values are: Smartphone, IoT, Laptop, Videogame, TV, Other, Firewall, Hypervisor, IPBX, Printer, Proxy, Router, Server, Storage, Virtual Machine, WAF, WiFi, unknown. | Optional |
note | Asset note content. | Optional |
search | A search term. | Optional |
page | A page to select in the results set. | Optional |
page_size | Number of results per page. | Optional |
fast | The fast mode uses cached data to present faster results. Disabled by default. Possible values are: true, false. | Optional |
os_firmware | OS/Firwmare of the asset. | Optional |
mac_address | Asset MAC addresses. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Assets.List | string | List of assets. |
#
gcenter103-assets-alerts-getRetrieve alerts of a given asset.
#
Base Commandgcenter103-assets-alerts-get
#
InputArgument Name | Description | Required |
---|---|---|
date_from | Starting date filter. ISO-8601 date format. | Optional |
date_to | Ending data filter. ISO-8601 date format. | Optional |
since | Not compatible with date_from and date_to parameters. Possible values are: 15d, yesterday. | Optional |
ids | A comma-separated list of alert IDs. | Optional |
excluded_ids | A comma-separated list of alert IDs to exclude. | Optional |
acknowledged | Whether to filter on the acknowledgement status. Possible values are: true, false. | Optional |
gcap_id | Comma-separated list of GCap IDs. First GCap has ID 1. | Optional |
ip | Comma-separated list of IP addresses of the alerts. | Optional |
src_ip | Comma-separated list of source IP addresses of the alerts. | Optional |
dest_ip | Comma-separated list of destination IP addresses of the alerts. | Optional |
risk_min | Minimal risk value. | Optional |
risk_max | Maximal risk value. | Optional |
name | Filter on alert signature. Comma-separated list of signatures. | Optional |
description | Filter alerts on their description. | Optional |
tag | Filter on alerts containing tags. Comma-separated list of tag names. | Optional |
no_tag | Whether to include users with no tags. Possible values are: true, false. | Optional |
excluded_tags | Filter out alerts containing tags. Comma-separated list of tags. Logical OR between the tags. | Optional |
sort_by | The filter by which to sort the results. Possible values are: date, -date, risk, -risk, name, -name. | Optional |
type | The type by which to filter alerts on engines. Possible values are: active_cti, beacon_detect, dga_detect, malcore, malcore_retroanalyzer, malicious_powershell_detect, ransomware_detect, retrohunt, shellcode_detect, sigflow_alert. | Optional |
mitre_tactic_name | Filter alert by MITRE tactic name. Possible values are: Collection, Collection (ICS), Collection (Mobile), Command and Control, Command and Control (ICS), Command and Control (Mobile), Credential Access, Credential Access (Mobile), Defense Evasion, Defense Evasion (Mobile), Discovery, Discovery (ICS), Discovery (Mobile), Evasion, Execution, Execution (ICS), Execution (Mobile), Exfiltration, Exfiltration (Mobile), Impact, Impact (ICS), Impact (Mobile), Impair Process Control, Inhibit Response Function, Initial Access, Initial Access (ICS), Initial Access (Mobile), Lateral Movement, Lateral Movement (ICS), Lateral Movement (Mobile), Persistence, Persistence (ICS), Persistence (Mobile), Privilege Escalation, Privilege Escalation (ICS), Privilege Escalation (Mobile), Reconnaissance, Resource Development. | Optional |
hostname | Comma-separated list of hostnames. | Optional |
src_hostname | Comma-separated list of source hostnames. | Optional |
dest_hostname | Comma-separated list of destination hostnames. | Optional |
username | Comma-separated list of usernames. | Optional |
note | User note content. | Optional |
state | Filter alerts on their state. Possible values are: closed, mute, open. | Optional |
page | A page number within the results pages. | Optional |
page_size | Number of results per page. | Optional |
asset_name | Name of the asset. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Assets.Alerts.Get | string | Get alerts for an asset. |
#
gcenter103-assets-getRetrieve specific asset data.
#
Base Commandgcenter103-assets-get
#
InputArgument Name | Description | Required |
---|---|---|
date_from | Starting date filter. ISO-8601 date format. | Optional |
date_to | Ending data filter. ISO-8601 date format. | Optional |
since | Not compatible with date_from and date_to parameters. Possible values are: 15d, yesterday. | Optional |
fast | The fast mode uses cached data to present faster results. Disabled by default. Possible values are: true, false. | Optional |
asset_name | Asset name. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Assets.Get | string | Asset data. |
#
gcenter103-assets-note-addAdd or update a note to an asset.
#
Base Commandgcenter103-assets-note-add
#
InputArgument Name | Description | Required |
---|---|---|
asset_name | Asset name. | Required |
note | Note to update. | Required |
overwrite | Whether to overwrite the note. Possible values are: true, false. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Assets.Note.Add | string | The note added or updated. |
#
gcenter103-assets-note-removeRemove a note from an asset.
#
Base Commandgcenter103-assets-note-remove
#
InputArgument Name | Description | Required |
---|---|---|
asset_name | Asset name. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Assets.Note.Remove | string | The request response code. |
#
gcenter103-assets-tags-getGet the tags of an asset.
#
Base Commandgcenter103-assets-tags-get
#
InputArgument Name | Description | Required |
---|---|---|
asset_name | Asset name. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Assets.Tags.Get | string | The tags of the asset. |
#
gcenter103-assets-tags-addAdd or update the tags of an asset.
#
Base Commandgcenter103-assets-tags-add
#
InputArgument Name | Description | Required |
---|---|---|
asset_name | Asset name. | Required |
tags | A comma-separated list of tag names to add to the asset. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Assets.Tags.Add | string | Added or updated tags of the asset. |
#
gcenter103-assets-tags-removeRemove tags of an asset.
#
Base Commandgcenter103-assets-tags-remove
#
InputArgument Name | Description | Required |
---|---|---|
asset_name | Asset name. | Required |
tags | A comma-separated list of tag names to remove to the asset. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Assets.Tags.Remove | string | Removed tags of the asset. |
#
gcenter103-users-listRetrieves a list of Kerberos users.
#
Base Commandgcenter103-users-list
#
InputArgument Name | Description | Required |
---|---|---|
search | A search term. | Optional |
page | A page to select in the results set. | Optional |
page_size | Number of results per page. | Optional |
date_from | Starting date filter. ISO-8601 date format. | Optional |
date_to | Ending data filter. ISO-8601 date format. | Optional |
since | Not compatible with date_from and date_to parameters. Possible values are: 15d, yesterday. | Optional |
fast | The fast mode uses cached data to present faster results. Disabled by default. Possible values are: true, false. | Optional |
gcap_id | Comma-separated list of GCap IDs. First GCap has ID 1. | Optional |
sort_by | The filter by which to sort the results. Possible values are: risk, -risk, name, -name. | Optional |
risk_min | Minimal risk value. | Optional |
risk_max | Maximal risk value. | Optional |
username | Comma-separated list of usernames. | Optional |
ip | Comma-separated list of IP addresses of the alerts. | Optional |
hostname | Comma-separated list of hostnames. | Optional |
tag | Filter on users containing tags. Comma-separated list of tag names. | Optional |
note | User note content. | Optional |
no_tag | Whether to include users with no tags. Possible values are: true, false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Users.List | string | The list of Kerberos users. |
#
gcenter103-users-alerts-getRetrieves a list of the alerts of a Kerberos user.
#
Base Commandgcenter103-users-alerts-get
#
InputArgument Name | Description | Required |
---|---|---|
date_from | Starting date filter. ISO-8601 date format. | Optional |
date_to | Ending data filter. ISO-8601 date format. | Optional |
since | Not compatible with date_from and date_to parameters. Possible values are: 15d, yesterday. | Optional |
ids | A comma-separated list of alert IDs. | Optional |
excluded_ids | A comma-separated list of alert IDs to exclude. | Optional |
acknowledged | Whether to filter on the acknowledgement status. Possible values are: true, false. | Optional |
gcap_id | Comma-separated list of GCap IDs. First GCap has ID 1. | Optional |
ip | Comma-separated list of IP addresses of the alerts. | Optional |
src_ip | Comma-separated list of source IP addresses of the alerts. | Optional |
dest_ip | Comma-separated list of destination IP addresses of the alerts. | Optional |
risk_min | Minimal risk value. | Optional |
risk_max | Maximal risk value. | Optional |
name | Filter on alert signature. Comma-separated list of signatures. | Optional |
description | Filter alerts on their description. | Optional |
tag | Filter on users containing tags. Comma-separated list of tag names. | Optional |
no_tag | Whether to include users with no tags. Possible values are: true, false. | Optional |
excluded_tags | Filter out alerts containing tags. Comma-separated list of tags. Logical OR between the tags. | Optional |
sort_by | The filter by which to sort the results. Possible values are: date, -date, risk, -risk, name, -name. | Optional |
type | The type by which to filter alerts on engines. Possible values are: active_cti, beacon_detect, dga_detect, malcore, malcore_retroanalyzer, malicious_powershell_detect, ransomware_detect, retrohunt, shellcode_detect, sigflow_alert. | Optional |
mitre_tactic_name | Filter alert by MITRE tactic name. Possible values are: Collection, Collection (ICS), Collection (Mobile), Command and Control, Command and Control (ICS), Command and Control (Mobile), Credential Access, Credential Access (Mobile), Defense Evasion, Defense Evasion (Mobile), Discovery, Discovery (ICS), Discovery (Mobile), Evasion, Execution, Execution (ICS), Execution (Mobile), Exfiltration, Exfiltration (Mobile), Impact, Impact (ICS), Impact (Mobile), Impair Process Control, Inhibit Response Function, Initial Access, Initial Access (ICS), Initial Access (Mobile), Lateral Movement, Lateral Movement (ICS), Lateral Movement (Mobile), Persistence, Persistence (ICS), Persistence (Mobile), Privilege Escalation, Privilege Escalation (ICS), Privilege Escalation (Mobile), Reconnaissance, Resource Development. | Optional |
hostname | Comma-separated list of hostnames. | Optional |
src_hostname | Comma-separated list of source hostnames. | Optional |
dest_hostname | Comma-separated list of destination hostnames. | Optional |
username | Comma-separated list of usernames. | Optional |
note | User note content. | Optional |
state | Filter alerts on their state. Possible values are: closed, mute, open. | Optional |
page | A page number within the results pages. | Optional |
page_size | Number of results per page. | Optional |
kuser_name | Alerts of this Kerberos user name. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Users.Alerts.Get | string | The list of alerts of a Kerberos user. |
#
gcenter103-users-getRetrieves Kerberos user data.
#
Base Commandgcenter103-users-get
#
InputArgument Name | Description | Required |
---|---|---|
date_from | Starting date filter. ISO-8601 date format. | Optional |
date_to | Ending data filter. ISO-8601 date format. | Optional |
since | Not compatible with date_from and date_to parameters. Possible values are: 15d, yesterday. | Optional |
fast | The fast mode uses cached data to present faster results. Disabled by default. Possible values are: true, false. | Optional |
kuser_name | Alerts of this Kerberos user name. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Users.Get | string | Get information of a Kerberos user. |
#
gcenter103-users-note-addAdd or update the note of a Kerberos user.
#
Base Commandgcenter103-users-note-add
#
InputArgument Name | Description | Required |
---|---|---|
note | Note content to add/update. | Required |
kuser_name | Kerberos user name. | Required |
overwrite | Whether to overwrite the note. Possible values are: true, false. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Users.Note.Add | string | Added/updated note. |
#
gcenter103-users-note-removeRemove the note of a Kerberos user.
#
Base Commandgcenter103-users-note-remove
#
InputArgument Name | Description | Required |
---|---|---|
kuser_name | Kerberos user name. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Users.Note.Remove | string | Request response code. |
#
gcenter103-users-tags-getGet the tags of a Kerberos user.
#
Base Commandgcenter103-users-tags-get
#
InputArgument Name | Description | Required |
---|---|---|
kuser_name | Kerberos user name to get tags of. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Users.Tags.Get | string | The tags associated to the Kerberos user. |
#
gcenter103-users-tags-addAdd or update the tags of a Kerberos user.
#
Base Commandgcenter103-users-tags-add
#
InputArgument Name | Description | Required |
---|---|---|
tags | A comma-separated list of tags to add to the Kerberos user. | Required |
kuser_name | Kerberos user name to add tags of. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Users.Tags.Add | string | Added/updated tags associated to the Kerberos user. |
#
gcenter103-users-tags-removeRemove tags of a Kerberos user.
#
Base Commandgcenter103-users-tags-remove
#
InputArgument Name | Description | Required |
---|---|---|
tags | A comma-separated list of tag names to remove to the Kerberos user. | Required |
kuser_name | Kerberos user name to remove tags from. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Users.Tags.Remove | string | Tags of the Kerberos user. |
#
gcenter103-yara-rules-getGet YARA settings.
#
Base Commandgcenter103-yara-rules-get
#
InputArgument Name | Description | Required |
---|---|---|
export | Export state. Possible values are: true, false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Yara.Rules.Get | string | The YARA settings. |
#
gcenter103-yara-rules-addAdd YARA rules to Malcore. You must upload the YARA file before execution.
#
Base Commandgcenter103-yara-rules-add
#
InputArgument Name | Description | Required |
---|---|---|
enabled | Set if YARA is enabled or not. Possible values are: true, false. | Required |
name | Name of the YARA ruleset. | Required |
entryID | EntryID of the YARA file. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Yara.Rules.Add | string | The updated YARA settings. |
#
gcenter103-malcore-fingerprints-getGet fingerprints of the white or black list of Malcore.
#
Base Commandgcenter103-malcore-fingerprints-get
#
InputArgument Name | Description | Required |
---|---|---|
ordering | The order by which the results should be sorted. Possible values are: created, sha256, user, -created, -sha256, -user. | Optional |
page | A page to select in the results set. | Optional |
list_type | The type of list given. Possible values are: white, black. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Malcore.Fingerprints.Get | string | Hash list informations. |
#
gcenter103-malcore-fingerprints-addAdd fingerprints to white or black list to Malcore.
#
Base Commandgcenter103-malcore-fingerprints-add
#
InputArgument Name | Description | Required |
---|---|---|
sha256 | The SHA256 to add. | Required |
comment | An attached comment (200 chars max). | Required |
threat | Name of the threat for reference (100 chars max). | Required |
list_type | The type of list given. Possible values are: white, black. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Malcore.Fingerprints.Add | string | Hash list informations. |
#
gcenter103-malcore-fingerprints-removeRemove fingerprints to white or black list to Malcore.
#
Base Commandgcenter103-malcore-fingerprints-remove
#
InputArgument Name | Description | Required |
---|---|---|
sha256 | The SHA256 to remove. | Required |
list_type | The type of list to remove from. Possible values are: white, black. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Gatewatcher.Malcore.Fingerprints.Remove | string | Hash list informations. |