Indeni
Indeni Pack.#
This Integration is part of the#
OverviewIndeni Integration This integration was integrated and tested with version 7.1.1 of Indeni
#
Indeni PlaybookThe playbook periodically pulls vulnerability issues for Palo Alto Network devices and converts them to Cortex XSOAR incidents. For every incident that's created, it posts a note back to Indeni to let user know that the issue is been handled by Cortex XSOAR and creates a Jira ticket with all the relevant information pulled from Inden API. One the assigned user marks the Jira ticket as Done, the playbook will automatically acknowledge the issue in Indeni and close the incident.
#
Use Cases- Pull in critical Indeni issues and triage the issues
#
Configure Indeni on Cortex XSOAR- Navigate to Settings > Integrations > Servers & Services.
- Search for Indeni.
- Click Add instance to create and configure a new integration instance.
- Name: a textual name for the integration instance.
- Trust any certificate (not secure)
- API url: for exampe, https://10.11.80.21:9443
- API Key: can be obtained from Indeni UI, Settings -> About page
- Fetch incidents
- Incident type
- Only Pull Palo Alto Network Vulnerability Issues: true if only wants Palo Alto Network vulnerability issues, false will pull all issues
- Use system proxy settings
- Number of issues to pull per fetch: max number of issues that will be ingested as incidents per fetch cycle
- Lowest Issue Severity To Pull: Any issue with higher or equivalent severity will be pulled
- Click Test to validate the URLs, token, and connection.
#
Fetched Incidents Data#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
- indeni-get-device-info
- indeni-get-alert-info
- indeni-get-alert-summary
- indeni-post-note
- indeni-archive-issue
- indeni-unarchive-issue
- indeni-get-notes
#
1. indeni-get-device-infoget the device information
#
Base Commandindeni-get-device-info
#
InputArgument Name | Description | Required |
---|---|---|
device_id | device id string | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Indeni.DeviceInfo.DeviceId | string | device id string |
Indeni.DeviceInfo.DeviceIP | string | device ip string |
Indeni.DeviceInfo.DeviceName | string | device hostname |
Indeni.DeviceInfo.DeviceModel | string | device model |
Indeni.DeviceInfo.OSVersion | string | device OS version |
Indeni.DeviceInfo.CriticalAlertStats | number | # of critical alerts on the device |
Indeni.DeviceInfo.ErrorAlertStats | number | # of error alerts on the device |
Indeni.DeviceInfo.WarnAlertStats | number | # of warn alerts on the device |
Indeni.DeviceInfo.InfoAlertStats | number | # of info alerts on the device |
#
Command Example!indeni-get-device-info device_id=01178b51-b8af-4249-aecf-6e5b8da4a04f
#
Context Example#
Human Readable Output#
Device InfoCriticalAlertStats | DeviceIP | DeviceId | DeviceModel | DeviceName | ErrorAlertStats | InfoAlertStats | OSVersion | WarnAlertStats |
---|---|---|---|---|---|---|---|---|
3 | 172.16.20.80 | 01178b51-b8af-4249-aecf-6e5b8da4a04f | PA-200 | kdlab-pa200 | 9 | 1 | 7.0.9 | 7 |
#
2. indeni-get-alert-infoget detailed alert info
#
Base Commandindeni-get-alert-info
#
InputArgument Name | Description | Required |
---|---|---|
alert_id | the id of the alert | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Indeni.AlertInfo.AlertId | string | id of the alert |
Indeni.AlertInfo.Headline | string | headline of the alert |
Indeni.AlertInfo.DeviceId | string | device id |
Indeni.AlertInfo.AlertType | string | the alert type unique identifier |
#
Command Example!indeni-get-alert-info alert_id=7f0a5ded-571a-4ba0-835d-ba2f76469226
#
Context Example#
Human Readable Output#
Alert ID 7f0a5ded-571a-4ba0-835d-ba2f76469226acknowledged | alert_blocks | alert_id | alert_type | configuration_set_id | create_at | device_id | evidence | headline | id | notes | resolved | revalidated_at | severity | unique_identifier | updated_at |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
false | A Remote Code Execution vulnerability exists in the PAN-OS DNS Proxy. This issue affects customers who have DNS Proxy enabled in PAN-OS. This issue affects both the Data and Management planes of the firewall. When DNS Proxy processes a specially crafted fully qualified domain names (FQDN), it is possible to execute code on the firewall. (Ref # PAN-77516 / CVE-2017-8390). Vendor Severity Rating: Critical Palo Alto Networks recommends disabling DNS Proxy for those customers who are affected and are unable to apply the update. For more information please review: https://securityadvisories.paloaltonetworks.com/Home/Detail/91 | 49517 | UNAUTOREMEDIATABLE_ISSUE | 3409 | 2019-10-07T19:55:41.344Z | 01178b51-b8af-4249-aecf-6e5b8da4a04f | ts: snapshot: | Vulnerability in the PAN-OS DNS Proxy PAN-SA-2017-0021 | 7f0a5ded-571a-4ba0-835d-ba2f76469226 | Demisto Demisto Issue has been marked as unacknowledged. Issue has been marked as acknowledged. Demisto Issue has been marked as unacknowledged. Issue has been marked as acknowledged. Demisto Issue has been marked as unacknowledged. Jira ticket created ["IKP-3864"] This issue is currently been handled by Demisto Issue has been marked as acknowledged. Jira ticket is resolved. Jira ticket created ["IKP-3849"] This issue is currently been handled by Demisto This issue is currently been handled by Demisto Issue created. | false | 2020-02-14T08:40:45.891Z | level: 0 description: CRITICAL | panos_vulnerability_pansa_20170021_rule | 2020-02-13T08:38:23.445Z |
#
3. indeni-get-alert-summarygets summary of given alert type for all devices
#
Base Commandindeni-get-alert-summary
#
InputArgument Name | Description | Required |
---|---|---|
alert_type_identifier | identifier for alert type | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Indeni.AffectedDevices.AlertType | String | Alert type that's affecting the devices |
Indeni.AffectedDevices.Device.DeviceName | String | Name of the affected device |
Indeni.AffectedDevices.Device.DeviceId | String | Id of the affected device |
#
Command Example!indeni-get-alert-summary alert_type_identifier=panos_vulnerability_pansa_20170021_rule
#
Context Example#
Human Readable Output#
Devices Experiencing Alert panos_vulnerability_pansa_20170021_ruleDeviceId | DeviceName |
---|---|
01178b51-b8af-4249-aecf-6e5b8da4a04f | kdlab-pa200 |
#
4. indeni-post-notePost a note to a given issue id
#
Base Commandindeni-post-note
#
InputArgument Name | Description | Required |
---|---|---|
alert_id | the id of the alert | Required |
note | the content of the note | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!indeni-post-note alert_id=7f0a5ded-571a-4ba0-835d-ba2f76469226 note=Demisto
#
Human Readable OutputDone
#
5. indeni-archive-issueArchive an issue for the given alert id
#
Base Commandindeni-archive-issue
#
InputArgument Name | Description | Required |
---|---|---|
alert_id | the alert id of the issue | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!indeni-archive-issue alert_id=7f0a5ded-571a-4ba0-835d-ba2f76469226
#
Human Readable OutputDone
#
6. indeni-unarchive-issueUnarchive an existing issue
#
Base Commandindeni-unarchive-issue
#
InputArgument Name | Description | Required |
---|---|---|
alert_id | the alert id of the issue | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!indeni-unarchive-issue alert_id=7f0a5ded-571a-4ba0-835d-ba2f76469226
#
Human Readable OutputDone
#
7. indeni-get-notesGets the notes from issue
#
Base Commandindeni-get-notes
#
InputArgument Name | Description | Required |
---|---|---|
alert_id | The id of the alert | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Indeni.AlertInfo.Note | Unknown | Notes for the given issue |
#
Command Example!indeni-get-notes alert_id=7f0a5ded-571a-4ba0-835d-ba2f76469226
#
Context Example#
Human Readable Output#
Issue Notesnote | timestamp |
---|---|
Issue has been marked as unacknowledged. | 2020-02-14T08:41:21.000Z |
Issue has been marked as acknowledged. | 2020-02-14T08:41:20.000Z |
Demisto | 2020-02-14T08:41:19.000Z |
Demisto | 2020-02-14T08:31:29.000Z |
Demisto | 2020-02-14T08:27:59.000Z |
Issue has been marked as unacknowledged. | 2020-02-13T08:38:23.000Z |
Issue has been marked as acknowledged. | 2020-02-13T08:37:51.000Z |
Demisto | 2020-02-13T08:35:33.000Z |
Issue has been marked as unacknowledged. | 2020-02-10T21:39:47.000Z |
Issue has been marked as acknowledged. | 2020-02-10T21:39:46.000Z |
Demisto | 2020-02-10T21:39:45.000Z |
Issue has been marked as unacknowledged. | 2020-02-10T21:37:58.000Z |
Jira ticket created ["IKP-3864"] | 2020-02-10T21:25:33.000Z |
This issue is currently been handled by Demisto | 2020-02-10T21:25:28.000Z |
Issue has been marked as acknowledged. | 2020-02-04T21:25:03.000Z |
Jira ticket is resolved. | 2020-02-04T21:25:01.000Z |
Jira ticket created ["IKP-3849"] | 2020-02-04T21:14:03.000Z |
This issue is currently been handled by Demisto | 2020-02-04T21:13:59.000Z |
This issue is currently been handled by Demisto | 2020-01-31T20:16:49.000Z |
Issue created. | 2019-10-07T19:55:41.000Z |