Indeni
This Integration is part of the Indeni Pack.#
Overview#
Indeni Integration This integration was integrated and tested with version 7.1.1 of Indeni
Indeni Playbook#
The playbook periodically pulls vulnerability issues for Palo Alto Network devices and converts them to Cortex XSOAR incidents. For every incident that's created, it posts a note back to Indeni to let user know that the issue is been handled by Cortex XSOAR and creates a Jira ticket with all the relevant information pulled from Inden API. One the assigned user marks the Jira ticket as Done, the playbook will automatically acknowledge the issue in Indeni and close the incident.
Use Cases#
- Pull in critical Indeni issues and triage the issues
Configure Indeni on Cortex XSOAR#
- Navigate to Settings > Integrations > Servers & Services.
- Search for Indeni.
- Click Add instance to create and configure a new integration instance.
- Name: a textual name for the integration instance.
- Trust any certificate (not secure)
- API url: for exampe, https://10.11.80.21:9443
- API Key: can be obtained from Indeni UI, Settings -> About page
- Fetch incidents
- Incident type
- Only Pull Palo Alto Network Vulnerability Issues: true if only wants Palo Alto Network vulnerability issues, false will pull all issues
- Use system proxy settings
- Number of issues to pull per fetch: max number of issues that will be ingested as incidents per fetch cycle
- Lowest Issue Severity To Pull: Any issue with higher or equivalent severity will be pulled
- Click Test to validate the URLs, token, and connection.
Fetched Incidents Data#
Commands#
You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
- indeni-get-device-info
- indeni-get-alert-info
- indeni-get-alert-summary
- indeni-post-note
- indeni-archive-issue
- indeni-unarchive-issue
- indeni-get-notes
1. indeni-get-device-info#
get the device information
Base Command#
indeni-get-device-info
Input#
| Argument Name | Description | Required |
|---|---|---|
| device_id | device id string | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Indeni.DeviceInfo.DeviceId | string | device id string |
| Indeni.DeviceInfo.DeviceIP | string | device ip string |
| Indeni.DeviceInfo.DeviceName | string | device hostname |
| Indeni.DeviceInfo.DeviceModel | string | device model |
| Indeni.DeviceInfo.OSVersion | string | device OS version |
| Indeni.DeviceInfo.CriticalAlertStats | number | # of critical alerts on the device |
| Indeni.DeviceInfo.ErrorAlertStats | number | # of error alerts on the device |
| Indeni.DeviceInfo.WarnAlertStats | number | # of warn alerts on the device |
| Indeni.DeviceInfo.InfoAlertStats | number | # of info alerts on the device |
Command Example#
!indeni-get-device-info device_id=01178b51-b8af-4249-aecf-6e5b8da4a04f
Context Example#
Human Readable Output#
Device Info#
| CriticalAlertStats | DeviceIP | DeviceId | DeviceModel | DeviceName | ErrorAlertStats | InfoAlertStats | OSVersion | WarnAlertStats |
|---|---|---|---|---|---|---|---|---|
| 3 | 172.16.20.80 | 01178b51-b8af-4249-aecf-6e5b8da4a04f | PA-200 | kdlab-pa200 | 9 | 1 | 7.0.9 | 7 |
2. indeni-get-alert-info#
get detailed alert info
Base Command#
indeni-get-alert-info
Input#
| Argument Name | Description | Required |
|---|---|---|
| alert_id | the id of the alert | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Indeni.AlertInfo.AlertId | string | id of the alert |
| Indeni.AlertInfo.Headline | string | headline of the alert |
| Indeni.AlertInfo.DeviceId | string | device id |
| Indeni.AlertInfo.AlertType | string | the alert type unique identifier |
Command Example#
!indeni-get-alert-info alert_id=7f0a5ded-571a-4ba0-835d-ba2f76469226
Context Example#
Human Readable Output#
Alert ID 7f0a5ded-571a-4ba0-835d-ba2f76469226#
| acknowledged | alert_blocks | alert_id | alert_type | configuration_set_id | create_at | device_id | evidence | headline | id | notes | resolved | revalidated_at | severity | unique_identifier | updated_at |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| false | A Remote Code Execution vulnerability exists in the PAN-OS DNS Proxy. This issue affects customers who have DNS Proxy enabled in PAN-OS. This issue affects both the Data and Management planes of the firewall. When DNS Proxy processes a specially crafted fully qualified domain names (FQDN), it is possible to execute code on the firewall. (Ref # PAN-77516 / CVE-2017-8390). Vendor Severity Rating: Critical Palo Alto Networks recommends disabling DNS Proxy for those customers who are affected and are unable to apply the update. For more information please review: https://securityadvisories.paloaltonetworks.com/Home/Detail/91 | 49517 | UNAUTOREMEDIATABLE_ISSUE | 3409 | 2019-10-07T19:55:41.344Z | 01178b51-b8af-4249-aecf-6e5b8da4a04f | ts: snapshot: | Vulnerability in the PAN-OS DNS Proxy PAN-SA-2017-0021 | 7f0a5ded-571a-4ba0-835d-ba2f76469226 | Demisto Demisto Issue has been marked as unacknowledged. Issue has been marked as acknowledged. Demisto Issue has been marked as unacknowledged. Issue has been marked as acknowledged. Demisto Issue has been marked as unacknowledged. Jira ticket created ["IKP-3864"] This issue is currently been handled by Demisto Issue has been marked as acknowledged. Jira ticket is resolved. Jira ticket created ["IKP-3849"] This issue is currently been handled by Demisto This issue is currently been handled by Demisto Issue created. | false | 2020-02-14T08:40:45.891Z | level: 0 description: CRITICAL | panos_vulnerability_pansa_20170021_rule | 2020-02-13T08:38:23.445Z |
3. indeni-get-alert-summary#
gets summary of given alert type for all devices
Base Command#
indeni-get-alert-summary
Input#
| Argument Name | Description | Required |
|---|---|---|
| alert_type_identifier | identifier for alert type | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Indeni.AffectedDevices.AlertType | String | Alert type that's affecting the devices |
| Indeni.AffectedDevices.Device.DeviceName | String | Name of the affected device |
| Indeni.AffectedDevices.Device.DeviceId | String | Id of the affected device |
Command Example#
!indeni-get-alert-summary alert_type_identifier=panos_vulnerability_pansa_20170021_rule
Context Example#
Human Readable Output#
Devices Experiencing Alert panos_vulnerability_pansa_20170021_rule#
| DeviceId | DeviceName |
|---|---|
| 01178b51-b8af-4249-aecf-6e5b8da4a04f | kdlab-pa200 |
4. indeni-post-note#
Post a note to a given issue id
Base Command#
indeni-post-note
Input#
| Argument Name | Description | Required |
|---|---|---|
| alert_id | the id of the alert | Required |
| note | the content of the note | Required |
Context Output#
There is no context output for this command.
Command Example#
!indeni-post-note alert_id=7f0a5ded-571a-4ba0-835d-ba2f76469226 note=Demisto
Human Readable Output#
Done
5. indeni-archive-issue#
Archive an issue for the given alert id
Base Command#
indeni-archive-issue
Input#
| Argument Name | Description | Required |
|---|---|---|
| alert_id | the alert id of the issue | Required |
Context Output#
There is no context output for this command.
Command Example#
!indeni-archive-issue alert_id=7f0a5ded-571a-4ba0-835d-ba2f76469226
Human Readable Output#
Done
6. indeni-unarchive-issue#
Unarchive an existing issue
Base Command#
indeni-unarchive-issue
Input#
| Argument Name | Description | Required |
|---|---|---|
| alert_id | the alert id of the issue | Required |
Context Output#
There is no context output for this command.
Command Example#
!indeni-unarchive-issue alert_id=7f0a5ded-571a-4ba0-835d-ba2f76469226
Human Readable Output#
Done
7. indeni-get-notes#
Gets the notes from issue
Base Command#
indeni-get-notes
Input#
| Argument Name | Description | Required |
|---|---|---|
| alert_id | The id of the alert | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Indeni.AlertInfo.Note | Unknown | Notes for the given issue |
Command Example#
!indeni-get-notes alert_id=7f0a5ded-571a-4ba0-835d-ba2f76469226
Context Example#
Human Readable Output#
Issue Notes#
| note | timestamp |
|---|---|
| Issue has been marked as unacknowledged. | 2020-02-14T08:41:21.000Z |
| Issue has been marked as acknowledged. | 2020-02-14T08:41:20.000Z |
| Demisto | 2020-02-14T08:41:19.000Z |
| Demisto | 2020-02-14T08:31:29.000Z |
| Demisto | 2020-02-14T08:27:59.000Z |
| Issue has been marked as unacknowledged. | 2020-02-13T08:38:23.000Z |
| Issue has been marked as acknowledged. | 2020-02-13T08:37:51.000Z |
| Demisto | 2020-02-13T08:35:33.000Z |
| Issue has been marked as unacknowledged. | 2020-02-10T21:39:47.000Z |
| Issue has been marked as acknowledged. | 2020-02-10T21:39:46.000Z |
| Demisto | 2020-02-10T21:39:45.000Z |
| Issue has been marked as unacknowledged. | 2020-02-10T21:37:58.000Z |
| Jira ticket created ["IKP-3864"] | 2020-02-10T21:25:33.000Z |
| This issue is currently been handled by Demisto | 2020-02-10T21:25:28.000Z |
| Issue has been marked as acknowledged. | 2020-02-04T21:25:03.000Z |
| Jira ticket is resolved. | 2020-02-04T21:25:01.000Z |
| Jira ticket created ["IKP-3849"] | 2020-02-04T21:14:03.000Z |
| This issue is currently been handled by Demisto | 2020-02-04T21:13:59.000Z |
| This issue is currently been handled by Demisto | 2020-01-31T20:16:49.000Z |
| Issue created. | 2019-10-07T19:55:41.000Z |