Symantec CloudSOC Event Collector
#
This Integration is part of the SymantecCloudSOC Pack.Supported versions
Supported Cortex XSOAR versions: 6.8.0 and later.
Gets Events from Symantec CloudSOC. This integration was integrated and tested with version 3.157 of Symantec CloudSOC.
#
Configure Symantec Cloud SOC Event Collector in CortexParameter | Required |
---|---|
Server URL (e.g., https://api.elastica.net/casb/) | True |
Key ID | True |
Key Secret | True |
First fetch time | False |
Maximum number of incidents per fetch | False |
Symantec CloudSOC Event Collector collects the following event types:
- Investigate logs
- Detect incidents logs
#
API LimitationsYou cannot retrieve investigate logs that are older than 180 days. Therefore, if setting a first fetch that is more than 180 days, for investigate logs it will be a maximum of 180 days.
#
CommandsYou can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
symantec-cloudsoc-get-eventsGets events from Symantec CloudSOC.
#
Base Commandsymantec-cloudsoc-get-events
#
InputArgument Name | Description | Required |
---|---|---|
should_push_events | If true, the command will create events, otherwise it will only display them. Possible values are: true, false. Default is false. | Required |
limit | Maximum number of results to return. Default is 1000. | Optional |
#
Context OutputThere is no context output for this command.