Skip to main content

Hoxhunt

This Integration is part of the Hoxhunt Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.10.0 and later.

Use the Hoxhunt integration to send feedback to reporters of incidents, set incident sensitivity, and apply SOC classification to incidents. This integration was integrated and tested with version August 2024 of Hoxhunt.

Configure Hoxhunt on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for Hoxhunt.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    Server URL (e.g. https://api.hoxhunt.com/graphql-external)True
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
    API KeyInput your api key from HoxhuntFalse
    Fetch incidentsFalse
    Incidents Fetch IntervalFalse
    Incident typeFalse
    First fetch timestamp (<number> <time unit>, e.g., 12 hours, 7 days)False
    Query FilterInput a query filter for incidents to be fetchedFalse
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

hoxhunt-get-current-user#


Gets the current user information from Hoxhunt.

Base Command#

hoxhunt-get-current-user

Input#

Argument NameDescriptionRequired

Context Output#

PathTypeDescription
HoxHunt.CurrentUserstringCurrent User information from Hoxhunt.

hoxhunt-get-incidents#


Gets incidents from Hoxhunt.

Base Command#

hoxhunt-get-incidents

Input#

Argument NameDescriptionRequired
filterInput here the filter or other arguments.Optional

Context Output#

PathTypeDescription
Hoxhunt.IncidentsstringIncidents from Hoxhunt.

hoxhunt-get-threats#


Gets threats from Hoxhunt.

Base Command#

hoxhunt-get-threats

Input#

Argument NameDescriptionRequired
filterInput here the filter or other arguments.Optional

Context Output#

PathTypeDescription
Hoxhunt.ThreatsstringThreats from Hoxhunt.

hoxhunt-add-incident-note#


Add Incident note.

Base Command#

hoxhunt-add-incident-note

Input#

Argument NameDescriptionRequired
incident_idThe ID of the incident to which the note will be added.Required
noteThe content of the note to add to the incident.Required

Context Output#

PathTypeDescription
Hoxhunt.addIncidentNodestringAdd Incident note.

hoxhunt-remove-incident-threats#


Remove all threats that belong to an incident.

Base Command#

hoxhunt-remove-incident-threats

Input#

Argument NameDescriptionRequired
incident_idThe ID of the incident from which threats will be removed.Required

Context Output#

PathTypeDescription
Hoxhunt.removeIncidentThreatsnumberReturns number of removed threats.

hoxhunt-send-incident-soc-feedback#


Send feedback to reporters of incident about whether the reported email was safe, spam or malicious.

Base Command#

hoxhunt-send-incident-soc-feedback

Input#

Argument NameDescriptionRequired
incident_idThe ID of the incident for which SOC feedback will be sent.Required
custom_messageA custom message to include with the SOC feedback.Required
threat_feedback_reported_at_limitDatetime limit.Required

Context Output#

PathTypeDescription
Hoxhunt.sendIncidentSocFeedbackstringThe reporter will be informed the incident has been resolved and that no further actions are required from them.

hoxhunt-set-incident-sensitive#


Set incident to contain sensitive information.

Base Command#

hoxhunt-set-incident-sensitive

Input#

Argument NameDescriptionRequired
incident_idThe ID of the incident to be marked as sensitive or not sensitive.Required
is_sensitiveTrue or False Boolean. Possible values are: TRUE, FALSE.Required

Context Output#

PathTypeDescription
Hoxhunt.setIncidentSensitivestringIncident sensitivity information.

hoxhunt-set-incident-soc-classification#


Set soc classification for an incident.

Base Command#

hoxhunt-set-incident-soc-classification

Input#

Argument NameDescriptionRequired
incident_idThe ID of the incident to classify.Required
classificationThe SOC classification to apply to the incident. Possible values are: MALICIOUS, SPAM, SAFE.Required

Context Output#

PathTypeDescription
Hoxhunt.setIncidentSocClassificationstringIncident SOC classification information.

hoxhunt-update-incident-state#


Updates Incident state.

Base Command#

hoxhunt-update-incident-state

Input#

Argument NameDescriptionRequired
incident_idThe ID of the incident to update.Required
stateThe new state of the incident. Possible values are: OPEN, RESOLVED.Required

Context Output#

PathTypeDescription
Hoxhunt.updateIncidentStatestringIncident state information.

Incident Mirroring#

You can enable incident mirroring between Cortex XSOAR incidents and Hoxhunt corresponding events (available from Cortex XSOAR version 6.0.0). To set up the mirroring:

  1. Enable Fetching incidents in your instance configuration.

Newly fetched incidents will be mirrored in the chosen direction. However, this selection does not affect existing incidents. Important Note: To ensure the mirroring works as expected, mappers are required, both for incoming and outgoing, to map the expected fields in Cortex XSOAR and Hoxhunt.