Skyhigh Security
Skyhigh Security SSE Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.5.0 and later.
#
Additional informationSkyhigh Security is a cloud-based, multi-tenant service that enables Cloud Discovery and Risk Monitoring, Cloud Usage Analytics, Cloud Access and Control. This integration was integrated and tested with version 1 of Skyhigh Security.
#
API limitationsDo to API limitations, keep in mind that over time the integration can start to work more slowly. The solution is to restart the last-run.
#
Configure Skyhigh Security in CortexParameter | Description | Required |
---|---|---|
Base URL (e.g., https://www.myshn.net) | True | |
Password | The username and password to use for the connection | True |
Maximum number of incidents to fetch every time. Default is 50. Maximum is 500. | False | |
First fetch in timestamp format (<number> <time unit>, e.g., 12 hours, 7 days). Default is 3 days. | False | |
Trust any certificate (not secure) | False | |
Use system proxy settings | False |
#
CommandsYou can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
skyhigh-security-incident-queryRetrieves a list of incidents in ascending time modified order.
#
Base Commandskyhigh-security-incident-query
#
InputArgument Name | Description | Required |
---|---|---|
limit | Maximum number of items that will be returned within a single response. Maximum is 500. If the limit value exceeds the 500 maximum, it will not be flagged as an error but will also not increase results. Default is 50. | Optional |
page | Pagination support for use with a large “limit” value. | Optional |
page_size | Pagination support for use with a large “limit” value. The maximum is 500. | Optional |
start_time | For time arguments use the ISO-8601 standard - '%Y-%m-%dT%H:%M:%SZ' or relative time (last X days). Default is 3 days. | Optional |
end_time | For time arguments use the ISO-8601 standard - '%Y-%m-%dT%H:%M:%SZ' or relative time (last X days). | Optional |
actor_ids | The actor IDs of the incidents to retrieve. | Optional |
service_names | The service names of the incidents to retrieve. | Optional |
incident_types | The type of the incidents to retrieve. Possible values are: Alert, Threat. | Optional |
categories | The categories of the incidents to retrieve. When defining the categories argument the incident_types argument is ignored. Possible values are: Access, Admin, Audit, CompromisedAccount, Data, InsiderThreat, Policy, PrivilegeAccess, Vulnerability. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
SkyhighSecurity.Incident | Unknown | The incident's metadata. |
#
Command example!skyhigh-security-incident-query limit="3" start_time="3 days"
#
Context Example#
Human Readable Output#
Skyhigh Security Incidents
Alert Severity Incident ID Service Name Status Time (UTC) User Name high CAP-111111 Microsoft Office 365 and OneDrive new 2022-07-01T19:13:53.075Z NOT AVAILABLE low CAP-555555 SAP - SuccessFactors HXM Suite new 2022-07-02T02:38:16.706Z NOT AVAILABLE low CAP-999999 SAP - SuccessFactors HXM Suite new 2022-07-02T02:38:16.888Z NOT AVAILABLE
#
skyhigh-security-incident-status-updateUpdate status of single/multiple incidents.
Note! For multiple IDs, a single status will be applied for all IDs e.g., 123, 456, 789 >> change status to >> closed.
#
Base Commandskyhigh-security-incident-status-update
#
InputArgument Name | Description | Required |
---|---|---|
incident_ids | The incidents IDs that should be updated. | Required |
status | The new status of the incidents. Possible values are: new, opened, false positive, resolved, suppressed, archived. | Required |
#
Context OutputThere is no context output for this command.
#
Command example!skyhigh-security-incident-status-update incident_ids=CAP-114044 status=archived
#
Human Readable OutputStatus updated for user
#
skyhigh-security-anomaly-activity-listFetches activities for a given anomaly ID.
#
Base Commandskyhigh-security-anomaly-activity-list
#
InputArgument Name | Description | Required |
---|---|---|
anomaly_id | The anomaly ID from where to retrieve the activities. Only for incidents of type anomaly (ANO-123). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
SkyhighSecurity.AnomalyActivity.timeStamp | String | The timestamp of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.actionName | String | The action name. |
SkyhighSecurity.AnomalyActivity.asnName | String | The ASN name of an activity. |
SkyhighSecurity.AnomalyActivity.city | String | The city where the anomaly activity occurred. |
SkyhighSecurity.AnomalyActivity.collabGroup | String | The collaboration group for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.count | Number | The number of anomalies detected. |
SkyhighSecurity.AnomalyActivity.country | String | The country of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.deviceManaged | Boolean | Whether the anomaly activity is managed by the device or not. |
SkyhighSecurity.AnomalyActivity.directory | String | The directory of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.downloadBytes | Number | The number of bytes downloaded by the anomaly activity. |
SkyhighSecurity.AnomalyActivity.eventCount | Number | The number of anomalies detected. |
SkyhighSecurity.AnomalyActivity.fileFolderPath | String | The file folder path for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.fileName | String | The file name of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.fileSharingEnabled | Boolean | Whether the CASB file sharing is enabled or not. |
SkyhighSecurity.AnomalyActivity.fileSize | Number | The file size of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.fileType | String | The file type of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.geoOrgNameV1 | String | The geo organization name. |
SkyhighSecurity.AnomalyActivity.httpMethod | String | The HTTP method used by the anomaly activity. |
SkyhighSecurity.AnomalyActivity.instanceId | String | The instance ID for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.isSourceTrusted | Boolean | Whether the anomaly activity source is trusted or not. |
SkyhighSecurity.AnomalyActivity.networkType | String | The network type for the anomaly. |
SkyhighSecurity.AnomalyActivity.objectType | String | The object type for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.operation | String | The operation type. |
SkyhighSecurity.AnomalyActivity.proxyDescription | String | The proxy description for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.proxyType | String | The proxy type for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.region | String | The region where the anomaly activity occurred. |
SkyhighSecurity.AnomalyActivity.serviceName | String | The name of the service. |
SkyhighSecurity.AnomalyActivity.siteUrl | String | The URL of the CASB's site. |
SkyhighSecurity.AnomalyActivity.sourceIP | IP | The IP address of the source IP. |
SkyhighSecurity.AnomalyActivity.sourceIdentifier | String | The source identifier for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.targetId | String | The target ID for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.targetType | String | The anomaly activity type. |
SkyhighSecurity.AnomalyActivity.tenantId | Number | The tenant ID for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.threatCategory | String | The threat category for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.trustEntity | String | The trust entity for the anomaly activity. |
SkyhighSecurity.AnomalyActivity.trustReason | String | The trust reason of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.uploadBytes | Number | The number of bytes uploaded. |
SkyhighSecurity.AnomalyActivity.url | String | The URL of the anomaly activity. |
SkyhighSecurity.AnomalyActivity.user | String | The user who triggered the anomaly. |
#
skyhigh-security-policy-dictionary-listList existing policy dictionaries.
#
Base Commandskyhigh-security-policy-dictionary-list
#
InputArgument Name | Description | Required |
---|---|---|
limit | Maximum number of policies that will be returned within a single response. Default is 50. | Optional |
page | Pagination support for use with a large “limit” value. | Optional |
page_size | Pagination support for use with a large “limit” value. | Optional |
name | The name of the policies to retrieve. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
SkyhighSecurity.Dictionaries.ID | Number | The ID for the dictionary. |
SkyhighSecurity.Dictionaries.LastModified | String | The date the dictionary was last modified. |
SkyhighSecurity.Dictionaries.Name | String | The name of the dictionary. |
#
Command example!skyhigh-security-policy-dictionary-list limit="3"
#
Context Example#
Human Readable Output#
List of Skyhigh Security Policies
ID Last Modified Name 121212 2022-07-04T14:02:03.000+0000 (Default) Internal Domains 131313 2020-04-15T13:08:09.000+0000 Access Whitelist Users 141414 2021-07-14T12:22:37.000+0000 Allowed Geo
#
skyhigh-security-policy-dictionary-updateAdds new content to an existing policy dictionary.
#
Base Commandskyhigh-security-policy-dictionary-update
#
InputArgument Name | Description | Required |
---|---|---|
dictionary_id | The dictionary where to set the policy. | Required |
name | A name for the new key-value which will be added in the dictionary. | Required |
content | The value to be set in the dictionary for the given key-name. Multiple values can be separated by commas. | Required |
#
Context OutputThere is no context output for this command.
#
Command example!skyhigh-security-policy-dictionary-update dictionary_id="121212" name="(Default) Internal Domains" content="gmail.com, outlook.com"
#
Human Readable OutputDictionary id: 121212 was updated.