OPSWAT-Metadefender v2
OPSWAT-Metadefender Pack.#
This Integration is part of themulti-scanning engine uses 30+ anti-malware engines to scan files for threats, significantly increasing malware detection. This integration was integrated and tested with version 5.0.0 of OPSWAT-Metadefender V2.
#
Configure OPSWAT-Metadefender v2 on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for OPSWAT-Metadefender v2.
Click Add instance to create and configure a new integration instance.
Parameter Required Server URL (e.g. http://localhost:8008/metascan_rest/) True API Key - Needed in cloud based solutions False API Key - Needed in cloud based solutions False Cloud based False Trust any certificate (not secure) False Use system proxy settings False The high threshold False The low threshold False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
opswat-scan-fileScan file in OPSWAT
#
Base Commandopswat-scan-file fileId=1191@302
#
InputArgument Name | Description | Required |
---|---|---|
fileId | Entry id of a file in XSOAR. | Required |
scanRule | Name of the Rule to use for scanning (Optional). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
OPSWAT.FileName | string | OPSWAT file name to scan |
OPSWAT.ScanId | string | OPSWAT scan id of the scan |
#
opswat-hashCheck file hash on OPSWAT
#
Base Commandopswat-hash hash=cc273fe9d442850fa18c31c88c823e07
#
InputArgument Name | Description | Required |
---|---|---|
hash | File hash (Can be any hash type). | Required |
#
Context OutputThere is no context output for this command.
#
opswat-scan-resultGet OPSWAT result
#
Base Commandopswat-scan-result id=123
#
InputArgument Name | Description | Required |
---|---|---|
id | OPSWAT scan id. | Required |
#
Context OutputThere is no context output for this command.
#
opswat-sanitization-resultGet OPSWAT sanitization result (Requires CDR feature). In order to have sanitized versions of the file, the DeepCDR feature needs to be enabled in the Workflow rule used for scanning the file.
#
Base Commandopswat-sanitization-result
#
InputArgument Name | Description | Required |
---|---|---|
id | OPSWAT scan id. | Required |
#
Context OutputThere is no context output for this command.