Skip to main content

Orca

This Integration is part of the Orca Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

Agentless, Workload-Deep, Context-Aware Security and Compliance for AWS, Azure, and GCP. This integration was integrated and tested with Orca

Configure Orca on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for Orca. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    apitokenAPI TokenTrue
    api_hostAPI Host without schema. Default: api.orcasecurity.ioFalse
    first_fetchFirst fetch timestamp (<number> <time unit>, e.g., 12 hours, 7 days)False
    incidentTypeIncident typeFalse
    isFetchFetch incidentsFalse
    max_fetchMax fetchFalse
    insecureTrust any certificate (not secure)False
    proxyUse system proxy settingsFalse
  3. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

orca-get-alerts#


Get the alerts on cloud assets

Base Command#

orca-get-alerts

Input#

Argument NameDescriptionRequired
alert_typeType of alert to get.Optional
asset_unique_idGet alerts of asset_unique_id.Optional

Context Output#

PathTypeDescription
Orca.Manager.AlertsStringAll alerts

Command Example#

orca-get-asset#


Get Description of An asset

Base Command#

orca-get-asset

Input#

Argument NameDescriptionRequired
asset_unique_idAsset unique id.Required

Context Output#

PathTypeDescription
Orca.Manager.AssetStringAsset description

Command Example#

Base Command#

orca-set-alert-severity

Input#

Argument NameDescriptionRequired
alert_idId of the alert.Required
scoreNew score value. From 0 to 10.Required

Context Output#

PathTypeDescription
Orca.AlertStringAlert description

Command Example#

!orca-set-alert-severity alert_id=orca1 score=5

orca-get-alert-event-log

Input#

Argument NameDescriptionRequired
alert_idId of the alert.Required
limitLimit of the event logsOptional
start_at_indexStart at indexOptional
typeType of the event logsOptional

Context Output#

PathTypeDescription
Orca.Manager.EventLogStringEvent log

Command Example#

!orca-get-alert-event-log alert_id=orca1 limit=10

orca-set-alert-status

Input#

Argument NameDescriptionRequired
alert_idId of the alert.Required
statusNew alert statusRequired

Context Output#

PathTypeDescription
Orca.SetAlertStatusStringOperation result

Command Example#

!orca-set-alert-status alert_id=orca1 status=open

orca-verify-alert

Input#

Argument NameDescriptionRequired
alert_idId of the alert.Required

Context Output#

PathTypeDescription
Orca.VerifyAlertStringOperation result

Command Example#

!orca-verify-alert alert_id=orca1

orca-download-malicious-file

Input#

Argument NameDescriptionRequired
alert_idId of the alert.Required

Context Output#

PathTypeDescription
Orca.FileunknownMalicious File

Command Example#

!orca-download-malicious-file alert_id=orca1