Skyhigh Security
Skyhigh Security SSE Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.5.0 and later.
#
Additional informationSkyhigh Security is a cloud-based, multi-tenant service that enables Cloud Discovery and Risk Monitoring, Cloud Usage Analytics, Cloud Access and Control. This integration was integrated and tested with version 1 of Skyhigh Security.
#
API limitationsDo to API limitations, keep in mind that over time the integration can start to work more slowly. The solution is to restart the last-run.
#
Configure Skyhigh Security on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for Skyhigh Security.
Click Add instance to create and configure a new integration instance.
Parameter Description Required Base URL (e.g., https://www.myshn.net) True Password The username and password to use for the connection True Maximum number of incidents to fetch every time. Default is 50. Maximum is 500. False First fetch in timestamp format (<number> <time unit>, e.g., 12 hours, 7 days). Default is 3 days. False Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
skyhigh-security-incident-queryRetrieves a list of incidents in ascending time modified order.
#
Base Commandskyhigh-security-incident-query
#
InputArgument Name | Description | Required |
---|---|---|
limit | Maximum number of items that will be returned within a single response. Maximum is 500. If the limit value exceeds the 500 maximum, it will not be flagged as an error but will also not increase results. Default is 50. | Optional |
page | Pagination support for use with a large “limit” value. | Optional |
page_size | Pagination support for use with a large “limit” value. The maximum is 500. | Optional |
start_time | For time arguments use the ISO-8601 standard - '%Y-%m-%dT%H:%M:%SZ' or relative time (last X days). Default is 3 days. | Optional |
end_time | For time arguments use the ISO-8601 standard - '%Y-%m-%dT%H:%M:%SZ' or relative time (last X days). | Optional |
actor_ids | The actor IDs of the incidents to retrieve. | Optional |
service_names | The service names of the incidents to retrieve. | Optional |
incident_types | The type of the incidents to retrieve. Possible values are: Alert, Threat. | Optional |
categories | The categories of the incidents to retrieve. When defining the categories argument the incident_types argument is ignored. Possible values are: Access, Admin, Audit, CompromisedAccount, Data, InsiderThreat, Policy, PrivilegeAccess, Vulnerability. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
SkyhighSecurity.Incident | Unknown | The incident's metadata. |
#
Command example!skyhigh-security-incident-query limit="3" start_time="3 days"
#
Context Example#
Human Readable Output#
Skyhigh Security Incidents
Alert Severity Incident ID Service Name Status Time (UTC) User Name high CAP-111111 Microsoft Office 365 and OneDrive new 2022-07-01T19:13:53.075Z NOT AVAILABLE low CAP-555555 SAP - SuccessFactors HXM Suite new 2022-07-02T02:38:16.706Z NOT AVAILABLE low CAP-999999 SAP - SuccessFactors HXM Suite new 2022-07-02T02:38:16.888Z NOT AVAILABLE
#
skyhigh-security-incident-status-updateUpdate status of single/multiple incidents.
Note! For multiple IDs, a single status will be applied for all IDs e.g., 123, 456, 789 >> change status to >> closed.
#
Base Commandskyhigh-security-incident-status-update
#
InputArgument Name | Description | Required |
---|---|---|
incident_ids | The incidents IDs that should be updated. | Required |
status | The new status of the incidents. Possible values are: new, opened, false positive, resolved, suppressed, archived. | Required |
#
Context OutputThere is no context output for this command.
#
Command example!skyhigh-security-incident-status-update incident_ids=CAP-114044 status=archived
#
Human Readable OutputStatus updated for user
#
skyhigh-security-anomaly-activity-listFetches activities for a given anomaly ID.
#
Base Commandskyhigh-security-anomaly-activity-list
#
InputArgument Name | Description | Required |
---|---|---|
anomaly_id | The anomaly ID from where to retrieve the activities. Only for incidents of type anomaly (ANO-123). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
SkyhighSecurity.AnomalyActivity.timeStamp | String | The timestamp of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.actionName | String | The action name. |
SkyhighSecurity.AnomalyActivity.asnName | String | The ASN name of an activity. |
SkyhighSecurity.AnomalyActivity.city | String | The city where the anomaly activity occurred. |
SkyhighSecurity.AnomalyActivity.collabGroup | String | The collaboration group for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.count | Number | The number of anomalies detected. |
SkyhighSecurity.AnomalyActivity.country | String | The country of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.deviceManaged | Boolean | Whether the anomaly activity is managed by the device or not. |
SkyhighSecurity.AnomalyActivity.directory | String | The directory of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.downloadBytes | Number | The number of bytes downloaded by the anomaly activity. |
SkyhighSecurity.AnomalyActivity.eventCount | Number | The number of anomalies detected. |
SkyhighSecurity.AnomalyActivity.fileFolderPath | String | The file folder path for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.fileName | String | The file name of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.fileSharingEnabled | Boolean | Whether the CASB file sharing is enabled or not. |
SkyhighSecurity.AnomalyActivity.fileSize | Number | The file size of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.fileType | String | The file type of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.geoOrgNameV1 | String | The geo organization name. |
SkyhighSecurity.AnomalyActivity.httpMethod | String | The HTTP method used by the anomaly activity. |
SkyhighSecurity.AnomalyActivity.instanceId | String | The instance ID for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.isSourceTrusted | Boolean | Whether the anomaly activity source is trusted or not. |
SkyhighSecurity.AnomalyActivity.networkType | String | The network type for the anomaly. |
SkyhighSecurity.AnomalyActivity.objectType | String | The object type for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.operation | String | The operation type. |
SkyhighSecurity.AnomalyActivity.proxyDescription | String | The proxy description for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.proxyType | String | The proxy type for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.region | String | The region where the anomaly activity occurred. |
SkyhighSecurity.AnomalyActivity.serviceName | String | The name of the service. |
SkyhighSecurity.AnomalyActivity.siteUrl | String | The URL of the CASB's site. |
SkyhighSecurity.AnomalyActivity.sourceIP | IP | The IP address of the source IP. |
SkyhighSecurity.AnomalyActivity.sourceIdentifier | String | The source identifier for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.targetId | String | The target ID for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.targetType | String | The anomaly activity type. |
SkyhighSecurity.AnomalyActivity.tenantId | Number | The tenant ID for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.threatCategory | String | The threat category for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.trustEntity | String | The trust entity for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.trustReason | String | The trust reason of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.uploadBytes | Number | The number of bytes uploaded. |
SkyhighSecurity.AnomalyActivity.url | String | The URL of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.user | String | The user who triggered the anomaly. |
#
skyhigh-security-policy-dictionary-listList existing policy dictionaries.
#
Base Commandskyhigh-security-policy-dictionary-list
#
InputArgument Name | Description | Required |
---|---|---|
limit | Maximum number of policies that will be returned within a single response. Default is 50. | Optional |
page | Pagination support for use with a large “limit” value. | Optional |
page_size | Pagination support for use with a large “limit” value. | Optional |
name | The name of the policies to retrieve. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
SkyhighSecurity.Dictionaries.ID | Number | The ID for the dictionary. |
SkyhighSecurity.Dictionaries.LastModified | String | The date the dictionary was last modified. |
SkyhighSecurity.Dictionaries.Name | String | The name of the dictionary. |
#
Command example!skyhigh-security-policy-dictionary-list limit="3"
#
Context Example#
Human Readable Output#
List of Skyhigh Security Policies
ID Last Modified Name 121212 2022-07-04T14:02:03.000+0000 (Default) Internal Domains 131313 2020-04-15T13:08:09.000+0000 Access Whitelist Users 141414 2021-07-14T12:22:37.000+0000 Allowed Geo
#
skyhigh-security-policy-dictionary-updateAdds new content to an existing policy dictionary.
#
Base Commandskyhigh-security-policy-dictionary-update
#
InputArgument Name | Description | Required |
---|---|---|
dictionary_id | The dictionary where to set the policy. | Required |
name | A name for the new key-value which will be added in the dictionary. | Required |
content | The value to be set in the dictionary for the given key-name. Multiple values can be separated by commas. | Required |
#
Context OutputThere is no context output for this command.
#
Command example!skyhigh-security-policy-dictionary-update dictionary_id="121212" name="(Default) Internal Domains" content="gmail.com, outlook.com"
#
Human Readable OutputDictionary id: 121212 was updated.