Skip to main content

Symantec Email Security Cloud

This Integration is part of the SymantecEmailSecurity Pack.#

Symantec Email Security.cloud is a hosted service that filters email messages and helps protect organizations from malware (including targeted attacks and phishing), spam, and unwanted bulk email. The service offers encryption and data protection options to help control sensitive information sent by email and supports multiple mailbox types from various vendors. This integration was integrated and tested with version 10.6.6 of Symantec Email Security Cloud.

Use cases#

  1. IOC Management: Manage IOCs for email threats across domains: list, add, update, delete, or renew IOCs.
  2. Data Feeds: Retrieve threat data (e.g., malware, spam, clicks) for insights into email security events.
  3. Email Queue Monitoring: View queue statistics per domain to monitor email processing and delays.
  4. Quarantine Actions: List, preview, release, or delete quarantined emails to manage potentially harmful content.
  5. Allow and Block Lists: Maintain lists for permitted or restricted senders/domains: retrieve, add/update, or delete items.
  6. Fetch Incidents: Auto-fetch incidents and quarantine-specific threats to streamline response and compliance.

Configure Symantec Email Security Cloud on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for Symantec Email Security Cloud.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    Server URL - IOC
    Server URL - Data Feeds
    Server URL - Email Queue
    Server URL - QuarantineThe Quarantine API is available for the United States (us) and European Union (eu).
    UsernameRelevant to: Server URL - IOC, Server URL - Email Queue, Server URL - QuarantineFalse
    PasswordFalse
    Quarantine UsernameRelevant to: Server URL - QuarantineFalse
    PasswordFalse
    Use system proxy settings
    Trust any certificate (not secure)
    Fetch incidents
    Incident type
    Maximum number of incidents per fetchMaximum number of incidents per fetch. Default is 50. The maximum is 200.
    First Fetch Time
    Fetch TypeThe API to fetch incidents from: Data Feeds, Quarantine or both.
    Severity - Email Data FeedFilter the incidents by their severity. When left empty will fetch all.
    Type - Email Data Feed
    Include Delivery - Email Data FeedOnly relevant to `all` feed. Contains metadata that describes both inbound and outbound email delivery to provide visibility into email tracing, TLS compliance, and routing.
    Query - Email QuarantineA search criterion that can be used to filter emails that match only certain conditions based on email metadata.
    Type - Email QuarantineA string used to filter emails based on the quarantine type.
    Admin Domain - mail QuarantineReturns the emails quarantined for users in a particular domain. If this parameter is present and has a valid domain name, then items from only that domain are returned. If it has a value of `ALL`, then all domains administered by the user are searched and emails quarantined for users in those domains are returned. Note: Can only be used by an administrator user.
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

symantec-email-security-ioc-list#


List the IOCs that apply to a specific domain or to all domains.

Base Command#

symantec-email-security-ioc-list

Input#

Argument NameDescriptionRequired
domainRun the command for a specific domain, for all domains use 'global'. Run symantec-email-security-email-queue-list to get a list of available domains. Default is global.Optional
limitThe maximum number of records to return. Default is 50.Optional
all_resultsWhether to retrieve all the results by overriding the default limit. Possible values are: true, false.Optional

Context Output#

PathTypeDescription
SymantecEmailSecurity.IOC.iocBlackListIdStringID of the IOC.
SymantecEmailSecurity.IOC.iocTypeStringType of the IOC value.
SymantecEmailSecurity.IOC.iocValueStringValue of the IOC.
SymantecEmailSecurity.IOC.statusStringWhether the IOC is active.
SymantecEmailSecurity.IOC.descriptionStringDescription of the IOC.
SymantecEmailSecurity.IOC.emailDirectionStringEmail direction. Can be one of: I=Inbound, O=Outbound or B=Both.
SymantecEmailSecurity.IOC.remediationActionStringRemediation Action. Can be one of: B=Block and delete, Q=Quarantine, M=Redirect, T=Tag subject or H=Append header.
SymantecEmailSecurity.IOC.expiryDateStringRetention period for an IOC until it is removed from the system.

Command example#

!symantec-email-security-ioc-list

Context Example#

{
"SymantecEmailSecurity": {
"IOC": {
"description": "url to block",
"emailDirection": "O",
"expiryDate": "2024-01-01 00:00:00.0",
"iocBlackListId": "00000000-0000-0000-0000-000000000000",
"iocType": "url",
"iocValue": "https://www.example.com",
"remediationAction": "H",
"status": "Active"
}
}
}

Human Readable Output#

IOC(s)#

IDTypeValueStatusDescriptionEmail DirectionRemediation ActionExpiry Date
00000000-0000-0000-0000-000000000000subjectTestActiveTestinboundquarantine2024-01-01 00:00:00.0
00000000-0000-0000-0000-000000000000urlhttps://www.example.comActiveurl to blockoutboundappend header2024-01-01 00:00:00.0

symantec-email-security-ioc-action#


Add, update, delete, and renew multiple IOCs through the entry_id or a single IOC through the rest of the parameters.

Base Command#

symantec-email-security-ioc-action

Input#

Argument NameDescriptionRequired
domainRun the command for a specific domain, for all domains use 'global'. Run symantec-email-security-email-queue-list to get a list of available domains. Default is global.Optional
actionDefines the action for IOCs: 'merge' to merge or update IOCs in the database by their type and value without inputting ioc_id; 'replace' to delete and replace all IOCs in the database without inputting upload_ioc_json; 'ioc' to add, update, delete, or renew multiple IOCs each with their own action, use this only when entering an entry_id; 'add' to add an IOC without inputting ioc_id. Possible values are: merge, replace, upload_ioc_json, add, update, delete, renew.Required
entry_idEntry ID of a JSON file to pass multiple IOCs. Only accepts action=merge/replace/ioc. Example value: [{"APIRowAction": "U", "IocBlacklistId": xxxx, "IocType": "url", "IocValue": "https://www.example.com", "Description": "Hello World!"}]. More about IOCs can be found in: https://techdocs.broadcom.com/content/dam/broadcom/techdocs/us/en/dita/symantec-security-software/email-security/email-security-cloud/content/Indicators-of-Compromise-(IOC)-Blacklist-API-Guide.pdf.Optional
ioc_idID of the IOC. Can't be used with action=merge\replace`add`.Optional
ioc_typeType of the IOC. Possible values are: attachmentname, md5attachment, sha2attachment, bodysenderdomain, bodysenderemail, bodysendertopleveldomain, envelopesenderdomain, envelopesenderemail, envelopesendertopleveldomain, senderipaddress, senderiprange, recipientdomain, recipientemail, subject, url.Optional
ioc_valueValue of the IOC.Optional
descriptionDescription of the IOC.Optional
email_directionEmail direction to filter IOCs. Possible values are: inbound, outbound, both.Optional
remediation_actionRemediation action to be done on an IOC. Possible values are: block_and_delete, quarantine, redirect, tag_subject, append_header.Optional

Context Output#

There is no context output for this command.

Command example#

!symantec-email-security-ioc-action action=add ioc_type=subject ioc_value=Test123 description=test email_direction=inbound remediation_action=block_and_delete

Human Readable Output#

All IOC(s) were uploaded successfully.#

symantec-email-security-ioc-renew#


Renew all IOCs previously uploaded and still in the database, whether active or inactive, for a specific domain or all domains. The default retention period for IOCs is 7 days and the maximum is 30 days. After 30 days IOCs are retained in an inactive state for another 14 days. If an organization receives new email containing previously block listed IOCs, then the IOCs can renewed in the block list within this grace period. Thereafter, IOCs are removed from the system and must be uploaded again to remain in the block list.

Base Command#

symantec-email-security-ioc-renew

Input#

Argument NameDescriptionRequired
domainRun the command for a specific domain, for all domains use 'global'. Run symantec-email-security-email-queue-list to get a list of available domains. Default is global.Optional

Context Output#

There is no context output for this command.

Command example#

!symantec-email-security-ioc-renew

Human Readable Output#

All IOC(s) were renewed.#

symantec-email-security-data-list#


Retrieves data feeds from Symantec Email Security.cloud. Available feeds: 'all' (metadata for all scanned email), 'malware' (malware-containing email data), 'threat-isolation' (events from URL and Attachment Isolation), 'clicktime' (metadata from end-user clicks on rewritten URLs), 'anti-spam' (spam detection metadata), and 'ec-reports' (contextual information about emails blocked by Anti-Malware service).

Base Command#

symantec-email-security-data-list

Input#

Argument NameDescriptionRequired
feed_typeThe type of the email data feed to retrieve. Possible values are: all, malware, threat-isolation, clicktime, anti-spam, ec-reports. Default is all.Optional
start_fromStart time for reading metadata. Accepted formats: any substring of yyyy-mm-ddThh:mm:ssZ, epoch 1720617001, relative 1 day 2h 3 minute. Max start time is 1095 days before current date. Default is 3 days.Optional
include_deliveryOnly relevant to all feed. Contains metadata that describes both inbound and outbound email delivery to provide visibility into email tracing, TLS compliance, and routing. Possible values are: false, true.Optional
fetch_only_incidentsWhether to fetch only incident fields. Possible values are: true, false.Optional
limitThe maximum number of records to return. Default is 50.Optional
all_resultsWhether to retrieve all the results by overriding the default limit. Possible values are: true, false.Optional

Context Output#

PathTypeDescription
SymantecEmailSecurity.Data.emailInfo.xMsgRefStringUnique message reference identifier.
SymantecEmailSecurity.Data.emailInfo.longMsgRefStringDetailed message reference path.
SymantecEmailSecurity.Data.emailInfo.messageIdStringEmail's unique message identifier.
SymantecEmailSecurity.Data.emailInfo.isOutboundNumberIndicates if the email is outbound.
SymantecEmailSecurity.Data.emailInfo.messageSizeNumberSize of the email message in bytes.
SymantecEmailSecurity.Data.emailInfo.mailProcessingStartTimeNumberStart time of email processing.
SymantecEmailSecurity.Data.emailInfo.subjectStringSubject line of the email.
SymantecEmailSecurity.Data.emailInfo.envFromStringEnvelope sender of the email.
SymantecEmailSecurity.Data.emailInfo.envToStringEnvelope receiver of the email.
SymantecEmailSecurity.Data.emailInfo.headerFromStringHeader sender of the email.
SymantecEmailSecurity.Data.emailInfo.rawHeaderFromStringRaw header sender information.
SymantecEmailSecurity.Data.emailInfo.headerReplyToStringReply-to address in email header.
SymantecEmailSecurity.Data.emailInfo.senderIpStringIP address of the email sender.
SymantecEmailSecurity.Data.emailInfo.senderMailserverStringMail server of the email sender.
SymantecEmailSecurity.Data.emailInfo.countryStringCountry of the email sender.
SymantecEmailSecurity.Data.emailInfo.HELOStringStringHELO string from the mail server.
SymantecEmailSecurity.Data.emailInfo.avQuarantinePenIdStringQuarantine pen ID for antivirus.
SymantecEmailSecurity.Data.emailInfo.authResultsUnknownAuthentication results of the email.
SymantecEmailSecurity.Data.emailInfo.filesAndLinks.nodeTypeStringType of node for files and links.
SymantecEmailSecurity.Data.emailInfo.filesAndLinks.fileNameOrURLStringFile name or URL in the email.
SymantecEmailSecurity.Data.emailInfo.filesAndLinks.fileSizeNumberSize of the file in the email.
SymantecEmailSecurity.Data.emailInfo.filesAndLinks.fileTypeStringType of the file in the email.
SymantecEmailSecurity.Data.emailInfo.filesAndLinks.md5StringMD5 hash of the file.
SymantecEmailSecurity.Data.emailInfo.filesAndLinks.sha256StringSHA-256 hash of the file.
SymantecEmailSecurity.Data.emailInfo.filesAndLinks.urlCategoriesUnknownCategories of URLs in the email.
SymantecEmailSecurity.Data.emailInfo.filesAndLinks.urlRiskScoreUnknownRisk score of URLs in the email.
SymantecEmailSecurity.Data.emailInfo.filesAndLinks.indexNumberIndex of the file/link in email.
SymantecEmailSecurity.Data.emailInfo.filesAndLinks.parentIndexNumberParent index of the file/link in email.
SymantecEmailSecurity.Data.emailInfo.filesAndLinks.linkSourceStringSource of the link in the email.
SymantecEmailSecurity.Data.emailInfo.tlsInfo.tlsAdvertisedNumberIndicates if TLS was advertised.
SymantecEmailSecurity.Data.emailInfo.tlsInfo.tlsUsedNumberIndicates if TLS was used.
SymantecEmailSecurity.Data.emailInfo.tlsInfo.tlsPolicyStringPolicy for using TLS.
SymantecEmailSecurity.Data.emailInfo.tlsInfo.tlsProtocolStringProtocol used for TLS.
SymantecEmailSecurity.Data.emailInfo.tlsInfo.tlsCipherStringCipher used for TLS.
SymantecEmailSecurity.Data.emailInfo.tlsInfo.tlsKeyLengthNumberKey length used for TLS.
SymantecEmailSecurity.Data.emailInfo.tlsInfo.tlsFallbackReasonStringReason for TLS fallback.
SymantecEmailSecurity.Data.emailInfo.tlsInfo.tlsForwardSecrecyNumberIndicates if forward secrecy was used.
SymantecEmailSecurity.Data.emailInfo.tlsInfo.tlsNegotiationFailedNumberIndicates if TLS negotiation failed.
SymantecEmailSecurity.Data.emailInfo.newDomainAgeUnknownAge of the new domain.
SymantecEmailSecurity.Data.emailInfo.timeInCynicSandboxMsNumberTime spent in Cynic sandbox in ms.
SymantecEmailSecurity.Data.incidentsUnknownAssociated incidents.
SymantecEmailSecurity.Data.clicktimeInfo.xMsgRefStringUnique click message reference.
SymantecEmailSecurity.Data.clicktimeInfo.squrlClickerIpStringIP address of the URL clicker.
SymantecEmailSecurity.Data.clicktimeInfo.squrlRecipientStringRecipient of the clicked URL.
SymantecEmailSecurity.Data.clicktimeInfo.urlStringClicked URL.
SymantecEmailSecurity.Data.clicktimeInfo.dateUrlAccessNumberTimestamp of URL access.
SymantecEmailSecurity.Data.clicktimeInfo.riskNumberRisk level of the URL.
SymantecEmailSecurity.Data.incidentUnknownAssociated incident details.
SymantecEmailSecurity.Data.fireglass_log.timestampDateTimestamp of the event.
SymantecEmailSecurity.Data.fireglass_log.eventStringType of event logged.
SymantecEmailSecurity.Data.fireglass_log.source_ipStringSource IP address of the event.
SymantecEmailSecurity.Data.fireglass_log.urlStringURL involved in the event.
SymantecEmailSecurity.Data.fireglass_log.referer_urlStringReferer URL of the event.
SymantecEmailSecurity.Data.fireglass_log.request_methodStringHTTP request method used.
SymantecEmailSecurity.Data.fireglass_log.user_agentStringUser agent string of the request.
SymantecEmailSecurity.Data.fireglass_log.destination_ipStringDestination IP address of the event.
SymantecEmailSecurity.Data.fireglass_log.actionStringAction taken for the event.
SymantecEmailSecurity.Data.fireglass_log.action_reasonStringReason for the action taken.
SymantecEmailSecurity.Data.fireglass_log.textStringText description of the event.
SymantecEmailSecurity.Data.fireglass_log.rule_idNumberID of the rule applied.
SymantecEmailSecurity.Data.fireglass_log.rule_nameStringName of the rule applied.
SymantecEmailSecurity.Data.fireglass_log.serviceStringService involved in the event.
SymantecEmailSecurity.Data.fireglass_log.mime_typeStringMIME type of the event.
SymantecEmailSecurity.Data.fireglass_log.password_suppliedStringIndicates if a password was supplied.
SymantecEmailSecurity.Data.fireglass_log.file_typeStringType of file involved.
SymantecEmailSecurity.Data.fireglass_log.content_typeStringContent type of the event.
SymantecEmailSecurity.Data.fireglass_log.hostStringHost involved in the event.
SymantecEmailSecurity.Data.fireglass_log.geoip_country_nameStringCountry name from GeoIP lookup.
SymantecEmailSecurity.Data.fireglass_log.top_level_urlStringTop-level URL involved.
SymantecEmailSecurity.Data.fireglass_log.response_status_codeNumberHTTP response status code.
SymantecEmailSecurity.Data.fireglass_log.resource_typeStringType of resource involved.
SymantecEmailSecurity.Data.fireglass_log.total_bytesNumberTotal bytes transferred.
SymantecEmailSecurity.Data.fireglass_log.total_bytes_sentNumberTotal bytes sent.
SymantecEmailSecurity.Data.fireglass_log.md5StringMD5 hash of the content.
SymantecEmailSecurity.Data.fireglass_log.sha256StringSHA-256 hash of the content.
SymantecEmailSecurity.Data.fireglass_log.file_pathStringFile path of the content.
SymantecEmailSecurity.Data.fireglass_log.file_nameStringFile name of the content.
SymantecEmailSecurity.Data.fireglass_log.detailsStringDetails of the event.
SymantecEmailSecurity.Data.fireglass_log.url_riskNumberRisk score of the URL.
SymantecEmailSecurity.Data.fireglass_log.tenant_idStringTenant ID associated with the event.
SymantecEmailSecurity.Data.fireglass_log.xMsgRefStringUnique Fireglass message reference.
SymantecEmailSecurity.Data.emailInfo.authResults.raw_headerStringRaw authentication results header.
SymantecEmailSecurity.Data.emailInfo.authResults.dkimStringDKIM verification result.
SymantecEmailSecurity.Data.emailInfo.authResults.dkim_signing_domainStringDomain used for DKIM signing.
SymantecEmailSecurity.Data.emailInfo.authResults.spfStringSPF verification result.
SymantecEmailSecurity.Data.emailInfo.authResults.dmarcStringDMARC verification result.
SymantecEmailSecurity.Data.emailInfo.authResults.dmarc_policyStringDMARC policy applied.
SymantecEmailSecurity.Data.emailInfo.authResults.dmarc_override_actionStringAction overridden by DMARC policy.
SymantecEmailSecurity.Data.incidents.xMsgRefStringUnique incident message reference.
SymantecEmailSecurity.Data.incidents.addressContexts.nameStringName in incident address context.
SymantecEmailSecurity.Data.incidents.addressContexts.domainStringDomain in incident address context.
SymantecEmailSecurity.Data.incidents.addressContexts.isSenderNumberIndicates if address is sender.
SymantecEmailSecurity.Data.incidents.severityStringSeverity level of the incident.
SymantecEmailSecurity.Data.incidents.securityServiceStringSecurity service involved.
SymantecEmailSecurity.Data.incidents.detectionMethodStringMethod used for detection.
SymantecEmailSecurity.Data.incidents.verdictStringVerdict of the incident.
SymantecEmailSecurity.Data.incidents.actionStringAction taken for the incident.
SymantecEmailSecurity.Data.incidents.reasonStringReason for the action.
SymantecEmailSecurity.Data.incidents.filesAndLinks.nodeTypeStringType of node in incident.
SymantecEmailSecurity.Data.incidents.filesAndLinks.fileNameOrURLStringFile name or URL in incident.
SymantecEmailSecurity.Data.incidents.filesAndLinks.fileSizeNumberSize of the file in incident.
SymantecEmailSecurity.Data.incidents.filesAndLinks.fileTypeStringType of file in incident.
SymantecEmailSecurity.Data.incidents.filesAndLinks.md5StringMD5 hash of the file.
SymantecEmailSecurity.Data.incidents.filesAndLinks.sha256StringSHA-256 hash of the file.
SymantecEmailSecurity.Data.incidents.filesAndLinks.malwareNameStringName of the detected malware.
SymantecEmailSecurity.Data.incidents.filesAndLinks.malwareCategoryStringCategory of the detected malware.
SymantecEmailSecurity.Data.incidents.filesAndLinks.urlCategoriesUnknownCategories of URLs in the incident.
SymantecEmailSecurity.Data.incidents.filesAndLinks.urlRiskScoreUnknownRisk score of URLs in the incident.
SymantecEmailSecurity.Data.incidents.filesAndLinks.indexNumberIndex of the file/link in incident.
SymantecEmailSecurity.Data.incidents.filesAndLinks.parentIndexNumberParent index of the file/link in incident.
SymantecEmailSecurity.Data.incidents.filesAndLinks.xMsgRefStringUnique incident file message reference.
SymantecEmailSecurity.Data.incidents.filesAndLinks.linkSourceStringSource of the link in incident.
SymantecEmailSecurity.Data.incidents.dmasDeliveredUnknownIndicates if DMAS was delivered.
SymantecEmailSecurity.Data.incidents.dmasInfoUnknownDMAS information related to the incident.
SymantecEmailSecurity.Data.attacks.affectedUsers.keyStringAffected user email address.
SymantecEmailSecurity.Data.attacks.affectedUsers.valueNumberNumber of affected users.
SymantecEmailSecurity.Data.attacks.affectedUsers.typeStringType of affected users.
SymantecEmailSecurity.Data.attacks.affectedUsersByDomain.keyStringDomain of affected users.
SymantecEmailSecurity.Data.attacks.affectedUsersByDomain.valueNumberNumber of affected users by domain.
SymantecEmailSecurity.Data.attacks.affectedUsersByDomain.typeStringType of affected users by domain.
SymantecEmailSecurity.Data.attacks.geoIpSources.keyStringGeoIP source country code.
SymantecEmailSecurity.Data.attacks.geoIpSources.valueNumberPercentage of attacks from GeoIP source.
SymantecEmailSecurity.Data.attacks.geoIpSources.typeStringType of GeoIP source data.
SymantecEmailSecurity.Data.attacks.globalTimeline.keyDateDate in global attack timeline.
SymantecEmailSecurity.Data.attacks.globalTimeline.valueNumberNumber of global attacks on date.
SymantecEmailSecurity.Data.attacks.globalTimeline.typeStringType of global timeline data.
SymantecEmailSecurity.Data.attacks.ipSources.keyStringIP address of attack source.
SymantecEmailSecurity.Data.attacks.ipSources.valueNumberPercentage of attacks from IP source.
SymantecEmailSecurity.Data.attacks.ipSources.typeStringType of IP source data.
SymantecEmailSecurity.Data.attacks.localTimeline.keyDateDate in local attack timeline.
SymantecEmailSecurity.Data.attacks.localTimeline.valueNumberNumber of local attacks on date.
SymantecEmailSecurity.Data.attacks.localTimeline.typeStringType of local timeline data.
SymantecEmailSecurity.Data.attacks.threatNames.keyStringName of the detected threat.
SymantecEmailSecurity.Data.attacks.threatNames.valueNumberPercentage of attacks with this threat.
SymantecEmailSecurity.Data.attacks.threatNames.typeStringType of threat data.
SymantecEmailSecurity.Data.attacks.traitImportance.iocStringIndicator of compromise.
SymantecEmailSecurity.Data.attacks.traitImportance.valueStringValue of the trait.
SymantecEmailSecurity.Data.attacks.traitImportance.weightNumberWeight of the trait.
SymantecEmailSecurity.Data.attacks.traitImportance.typeStringType of trait data.
SymantecEmailSecurity.Data.attacks.avgMailboxesGlobalNumberAverage global mailboxes affected.
SymantecEmailSecurity.Data.attacks.attackVolumeGlobalNumberGlobal volume of attacks.
SymantecEmailSecurity.Data.attacks.attackVolumeLocalNumberLocal volume of attacks.
SymantecEmailSecurity.Data.attacks.attackedMailboxesGlobalNumberNumber of globally attacked mailboxes.
SymantecEmailSecurity.Data.attacks.attackedMailboxesLocalNumberNumber of locally attacked mailboxes.
SymantecEmailSecurity.Data.attacks.attackedOrgsGlobalNumberNumber of globally attacked organizations.
SymantecEmailSecurity.Data.attacks.attackDescriptionStringDescription of the attack.
SymantecEmailSecurity.Data.attacks.attackTypeStringType of attack.
SymantecEmailSecurity.Data.attacks.clusterStringCluster identifier for the attack.
SymantecEmailSecurity.Data.topAttacked.keyStringEmail address of top attacked user.
SymantecEmailSecurity.Data.topAttacked.valueNumberNumber of attacks on top user.
SymantecEmailSecurity.Data.topAttacked.typeStringType of attack count data.
SymantecEmailSecurity.Data.reportWindowStartTimeNumberStart time of the report window.
SymantecEmailSecurity.Data.reportWindowEndTimeNumberEnd time of the report window.

Command example#

!symantec-email-security-data-list

Context Example#

{
"SymantecEmailSecurity": {
"Data": [
{
"emailInfo": {
"HELOString": "inbound.000.example",
"authResults": null,
"avQuarantinePenId": "",
"country": "",
"envFrom": "bounce-newaccount-verp-00000000000000000000@eu.quarantine.symantec.com",
"envTo": [
"hello@world"
],
"filesAndLinks": [
{
"fileNameOrURL": "Unknown00000000.data",
"fileSize": 1000,
"fileType": "text/html",
"index": 2,
"linkSource": "BASIC_EMAIL_INFO",
"md5": "00000000000000000000000000000000",
"nodeType": "FILE_INCLUDED",
"parentIndex": 1,
"sha256": "0000000000000000000000000000000000000000000000000000000000000000",
"urlCategories": null,
"urlRiskScore": null
},
{
"fileNameOrURL": "https://www.example.com",
"fileSize": 0,
"fileType": "",
"index": 3,
"linkSource": "BASIC_EMAIL_INFO",
"md5": null,
"nodeType": "LINK_INCLUDED",
"parentIndex": 2,
"sha256": null,
"urlCategories": [
"Technology/Internet"
],
"urlRiskScore": 1
}
],
"headerFrom": "quarantine@eu.quarantine.symantec.com",
"headerReplyTo": "",
"headerTo": [
"hello@world"
],
"isOutbound": false,
"longMsgRef": "server-0.tower-0.messagelabs.com!000!000!0",
"mailProcessingStartTime": 1000000000,
"messageId": "000.000@quarantine.messagelabs.com",
"messageSize": 10000,
"newDomainAge": null,
"rawHeaderFrom": " <bounce-newaccount-verp-00000000000000000000@eu.quarantine.symantec.com>",
"senderIp": "0.0.0.0",
"senderMailserver": "0.0.0.0.googleusercontent.com",
"subject": "New Email Quarantine Account",
"timeInCynicSandboxMs": -1,
"tlsInfo": {
"tlsAdvertised": true,
"tlsCipher": "ECDHE-RSA-AES256-GCM-SHA384",
"tlsFallbackReason": "",
"tlsForwardSecrecy": true,
"tlsKeyLength": 256,
"tlsNegotiationFailed": false,
"tlsPolicy": "OPPORTUNISTIC",
"tlsProtocol": "TLSv1.2",
"tlsUsed": true
},
"xMsgRef": "000"
},
"incidents": [
{
"action": "Block",
"addressContexts": [
{
"domain": "lior.sb",
"isSender": false,
"name": "lior"
}
],
"detectionMethod": "Skeptic Heuristics",
"dmasDelivered": false,
"dmasInfo": [],
"filesAndLinks": [
{
"fileNameOrURL": "message.txt",
"fileSize": 1197,
"fileType": "",
"index": 23,
"linkSource": "INCIDENT",
"malwareCategory": "trojan",
"malwareName": "Test/Eicar",
"md5": "00000000000000000000000000000000",
"nodeType": "FILE_INCLUDED",
"parentIndex": 22,
"sha256": "0000000000000000000000000000000000000000000000000000000000000000",
"urlCategories": null,
"urlRiskScore": null,
"xMsgRef": "000"
},
{
"fileNameOrURL": "message.txt",
"fileSize": 1197,
"fileType": "",
"index": 22,
"linkSource": "INCIDENT",
"malwareCategory": "uncategorized",
"malwareName": "unknown",
"md5": "00000000000000000000000000000000",
"nodeType": "FILE_INCLUDED",
"parentIndex": 0,
"sha256": "0000000000000000000000000000000000000000000000000000000000000000",
"urlCategories": null,
"urlRiskScore": null,
"xMsgRef": "000"
}
],
"reason": "unknown",
"securityService": "Anti-Malware",
"severity": "LOW",
"verdict": "Malware",
"xMsgRef": "000"
}
]
}
]
}
}

Human Readable Output#

Email Data Feed(s)#

Message SizeSubjectEnvelope FromEnvelope ToSender IPSender Mail ServerFile/URLs With RiskIncidents
10000New Email Quarantine Accountbounce-newaccount-verp-00000000000000000000@eu.quarantine.symantec.comhello@world0.0.0.00.0.0.0.googleusercontent.comUnknown00000000.data-None,
https://www.example.com-1
{'Severity': 'LOW', 'Security Service': 'Anti-Malware', 'Detection Method': 'Skeptic Heuristics', 'Verdict': 'Malware', 'Action': 'Block'}

symantec-email-security-email-queue-list#


Returns a list of domains owned by the customer, with queue statistics for each domain.

Base Command#

symantec-email-security-email-queue-list

Input#

Argument NameDescriptionRequired
domainsComma-separated list of domains to retrieve. Leave empty to retrieve all domains.Optional
limitThe maximum number of records to return. Default is 50.Optional
all_resultsWhether to retrieve all the results by overriding the default limit. Possible values are: true, false.Optional

Context Output#

PathTypeDescription
SymantecEmailSecurity.EmailQueue.TotalMessagesInboundNumberTotal number of inbound messages in the queue, for all domains.
SymantecEmailSecurity.EmailQueue.TotalMessagesOutboundNumberTotal number of outbound messages in the queue, for all domains.
SymantecEmailSecurity.EmailQueue.MeanTimeInQueueInboundNumberAverage (mean) queue wait for inbound messages, for all domains. Measured in seconds.
SymantecEmailSecurity.EmailQueue.MeanTimeInQueueOutboundNumberAverage (mean) queue wait for outbound messages, for all domains. Measured in seconds.
SymantecEmailSecurity.EmailQueue.LongestTimeInInboundNumberHow long the oldest message in the inbound queue has been queued, across all domains. Measured in seconds.
SymantecEmailSecurity.EmailQueue.LongestTimeInOutboundNumberHow long the oldest message in the outbound queue has been queued, across all domains. Measured in seconds.
SymantecEmailSecurity.EmailQueue.Domains.NameStringName of the domain.
SymantecEmailSecurity.EmailQueue.Domains.ReceiveQueueCountInboundNumberNumber of inbound messages waiting to be processed.
SymantecEmailSecurity.EmailQueue.Domains.ReceiveQueueCountOutboundNumberNumber of outbound messages waiting to be processed.
SymantecEmailSecurity.EmailQueue.Domains.DeliveryQueueCountInboundNumberNumber of inbound messages that have been processed and are waiting to be delivered.
SymantecEmailSecurity.EmailQueue.Domains.DeliveryQueueCountOutboundNumberNumber of outbound messages that have been processed and are waiting to be delivered.
SymantecEmailSecurity.EmailQueue.Domains.LongestTimeInReceiveQueueInboundNumberOldest inbound message in the queue waiting to be processed. Measured in seconds.
SymantecEmailSecurity.EmailQueue.Domains.LongestTimeInReceiveQueueOutboundNumberOldest outbound message in the queue waiting to be processed. Measured in seconds.
SymantecEmailSecurity.EmailQueue.Domains.LongestTimeInDeliveryQueueInboundNumberOldest inbound message waiting to be delivered after processing. Measured in seconds.
SymantecEmailSecurity.EmailQueue.Domains.LongestTimeInDeliveryQueueOutboundNumberOldest outbound message waiting to be delivered after processing. Measured in seconds.
SymantecEmailSecurity.EmailQueue.Domains.MeanTimeInReceiveQueueInboundNumberAverage (mean) wait time for inbound messages waiting to be processed. Measured in seconds.
SymantecEmailSecurity.EmailQueue.Domains.MeanTimeInReceiveQueueOutboundNumberAverage (mean) wait time for outbound messages waiting to be processed. Measured in seconds.
SymantecEmailSecurity.EmailQueue.Domains.MeanTimeInDeliveryQueueInboundNumberAverage (mean) wait time for inbound messages waiting to be delivered after processing. Measured in seconds.
SymantecEmailSecurity.EmailQueue.Domains.MeanTimeInDeliveryQueueOutboundNumberAverage (mean) wait time for outbound messages waiting to be delivered after processing. Measured in seconds.

Command example#

!symantec-email-security-email-queue-list

Context Example#

{
"SymantecEmailSecurity": {
"EmailQueue": {
"Domains": [
{
"DeliveryQueueCountInbound": 0,
"DeliveryQueueCountOutbound": 0,
"LongestTimeInDeliveryQueueInbound": 0,
"LongestTimeInDeliveryQueueOutbound": 0,
"LongestTimeInReceiveQueueInbound": 0,
"LongestTimeInReceiveQueueOutbound": 0,
"MeanTimeInDeliveryQueueInbound": 0,
"MeanTimeInDeliveryQueueOutbound": 0,
"MeanTimeInReceiveQueueInbound": 0,
"MeanTimeInReceiveQueueOutbound": 0,
"Name": "lior.sb",
"ReceiveQueueCountInbound": 0,
"ReceiveQueueCountOutbound": 0
}
],
"LongestTimeInInbound": 0,
"LongestTimeInOutbound": 0,
"MeanTimeInQueueInbound": 0,
"MeanTimeInQueueOutbound": 0,
"TotalMessagesInbound": 0,
"TotalMessagesOutbound": 0
}
}
}

Human Readable Output#

Email Queue Statistic(s)#

TotalmessagesinboundTotalmessagesoutboundMeantimeinqueueinboundMeantimeinqueueoutboundLongesttimeininboundLongesttimeinoutbound
000000

Domain Statistic(s)#

NameReceivequeuecountinboundReceivequeuecountoutboundDeliveryqueuecountinboundDeliveryqueuecountoutbound
lior.sb0000

symantec-email-security-quarantine-email-list#


Retrieves the metadata for quarantined emails belonging to the authenticated user. If the user is an administrator, the API provides options to retrieve the metadata for emails quarantined for another user under his administration.

Base Command#

symantec-email-security-quarantine-email-list

Input#

Argument NameDescriptionRequired
qA search criterion that can be used to filter emails that match only certain conditions based on email metadata. The search syntax is built by a field name and search value enclosed by parenthesis and the operators: 'OR', 'AND' to combine multiple search criteria's or values, example: (email_subject:test). Acceptable field names are: 'dlp_message_id', 'email_envelope_sender', 'email_envelope_sender.raw', 'email_sender', 'email_envelope_recipient', 'email_envelope_recipient.raw', 'email_subject', 'email_subject.raw'. See the section called “Search String Syntax” on page 16 in: https://techdocs.broadcom.com/content/dam/broadcom/techdocs/us/en/dita/symantec-security-software/email-security/email-security-cloud/content/EmailQuarantineAPIGuide.pdf.Optional
sort_columnSpecifies the column to use for sorting. Defaults to email_date_received.Optional
sort_orderSpecifies the order in which to sort. Possible values are: desc, asc. Default is desc.Optional
afterA time stamp value used to select only SUDULS items that were created after this time. Accepted formats: any substring of yyyy-mm-ddThh:mm:ssZ, epoch 1720617001, relative 1 day 2h 3 minute.Optional
beforeA time stamp value used to select only SUDULS items that were created before this time. Accepted formats: any substring of yyyy-mm-ddThh:mm:ssZ, epoch 1720617001, relative 1 day 2h 3 minute.Optional
filter_typeA string used to filter emails based on the quarantine type. By default includes the emails quarantined for all types. COMPLIANCE: Includes Content control, DLP and Image control emails. DLP: Includes only DLP emails. Possible values are: SPAM, NEWSLETTER, CI, CO, II, IO, COMPLIANCE, DLP.Optional
include_deletedSpecifies whether to include items marked as deleted in the search results. Possible values are: true, false.Optional
user_emailReturn only the quarantined emails of the user whose email address is specified. Note: Can only be used by an administrator user.Optional
admin_domainReturns the emails quarantined for users in a particular domain. If this parameter is present and has a valid domain name, then items from only that domain are returned. If it has a value of ALL, then all domains administered by the user are searched and emails quarantined for users in those domains are returned. Note: Can only be used by an administrator user.Optional
limitThe maximum number of records to return. Default is 50.Optional
pageThe page number to retrieve records from.Optional
page_sizeThe maximum number of records to return per page. Default is 50. Max is 10,000.Optional

Context Output#

PathTypeDescription
SymantecEmailSecurity.QuarantineEmail.idStringID of the item.
SymantecEmailSecurity.QuarantineEmail.metadata.email_date_receivedDateDate the email was received.
SymantecEmailSecurity.QuarantineEmail.metadata.quarantine_info.directionStringDirection of the email.
SymantecEmailSecurity.QuarantineEmail.metadata.quarantine_info.quarantine_typeStringQuarantine type of the email, can be one of: SPAM, NEWSLETTER, CI, CO, II, IO, COMPLIANCE, DLP.
SymantecEmailSecurity.QuarantineEmail.metadata.email_is_viewedBoolWhether the email was viewed.
SymantecEmailSecurity.QuarantineEmail.metadata.email_is_releasedBoolWhether the email was released.
SymantecEmailSecurity.QuarantineEmail.metadata.quarantine_reasonStringReason why the email was quarantined.
SymantecEmailSecurity.QuarantineEmail.metadata.email_senderStringSender of the email.
SymantecEmailSecurity.QuarantineEmail.metadata.service_typeStringService type used for the email.
SymantecEmailSecurity.QuarantineEmail.metadata.master_recipientStringRecipient of the email.
SymantecEmailSecurity.QuarantineEmail.metadata.user_idNumberID of the user.
SymantecEmailSecurity.QuarantineEmail.metadata.email_envelope_senderStringAddress to respond to in case of bounce messages or errors.
SymantecEmailSecurity.QuarantineEmail.metadata.email_subjectStringSubject of the email.
SymantecEmailSecurity.QuarantineEmail.metadata.email_sizeNumberSize of the email.
SymantecEmailSecurity.QuarantineEmail.metadata.email_envelope_recipientStringThe RCPT TO address.
SymantecEmailSecurity.QuarantineEmail.actions.view_subjectBoolWhether the subject can be viewed.
SymantecEmailSecurity.QuarantineEmail.actions.delete_messageBoolWhether the email can be deleted.
SymantecEmailSecurity.QuarantineEmail.actions.preview_messageBoolWhether the email can be previewed.
SymantecEmailSecurity.QuarantineEmail.actions.release_messageBoolWhether the email can be released.

Command example#

!symantec-email-security-quarantine-email-list

Context Example#

{
"SymantecEmailSecurity": {
"QuarantineEmail": [
{
"actions": {
"delete_message": true,
"preview_message": true,
"release_message": true,
"view_subject": true
},
"id": "000",
"metadata": {
"email_date_received": 1728206441148,
"email_envelope_recipient": "example@example.com",
"email_envelope_sender": "example@example.com",
"email_is_released": true,
"email_is_viewed": true,
"email_released_to": "recipient",
"email_sender": "Example (example@example.com)",
"email_size": 0,
"email_subject": "a",
"master_recipient": "example@example.com",
"quarantine_info": {
"direction": "inbound",
"quarantine_type": "CI",
"rules": [
"test"
]
},
"quarantine_reason": "CC",
"service_type": "ess",
"user_id": 0
}
},
{
"actions": {
"delete_message": true,
"preview_message": true,
"release_message": true,
"view_subject": true
},
"id": "001",
"metadata": {
"email_date_received": 1728221871295,
"email_envelope_recipient": "example@example.com",
"email_envelope_sender": "example@example.com",
"email_is_released": false,
"email_is_viewed": true,
"email_sender": "Example (example@example.com)",
"email_size": 0,
"email_subject": "a",
"master_recipient": "example@example.com",
"quarantine_info": {
"direction": "inbound",
"quarantine_type": "CI",
"rules": [
"test"
]
},
"quarantine_reason": "CC",
"service_type": "ess",
"user_id": 1
}
},
{
"actions": {
"delete_message": true,
"preview_message": true,
"release_message": true,
"view_subject": true
},
"id": "002",
"metadata": {
"email_date_received": 1728221875373,
"email_envelope_recipient": "example@example.com",
"email_envelope_sender": "example@example.com",
"email_is_released": false,
"email_is_viewed": false,
"email_sender": "Example (example@example.com)",
"email_size": 0,
"email_subject": "a",
"master_recipient": "example@example.com",
"quarantine_info": {
"direction": "inbound",
"quarantine_type": "CI",
"rules": [
"test"
]
},
"quarantine_reason": "CC",
"service_type": "ess",
"user_id": 2
}
},
{
"actions": {
"delete_message": true,
"preview_message": true,
"release_message": true,
"view_subject": true
},
"id": "003",
"metadata": {
"email_date_received": 1728221880677,
"email_envelope_recipient": "example@example.com",
"email_envelope_sender": "example@example.com",
"email_is_released": true,
"email_is_viewed": false,
"email_released_to": "recipient",
"email_sender": "Example (example@example.com)",
"email_size": 0,
"email_subject": "a",
"master_recipient": "example@example.com",
"quarantine_info": {
"direction": "inbound",
"quarantine_type": "CI",
"rules": [
"test"
]
},
"quarantine_reason": "CC",
"service_type": "ess",
"user_id": 3
}
},
{
"actions": {
"delete_message": true,
"preview_message": true,
"release_message": true,
"view_subject": true
},
"id": "004",
"metadata": {
"email_date_received": 1728222011087,
"email_envelope_recipient": "example@example.com",
"email_envelope_sender": "example@example.com",
"email_is_released": false,
"email_is_viewed": false,
"email_sender": "Example (example@example.com)",
"email_size": 0,
"email_subject": "a",
"master_recipient": "example@example.com",
"quarantine_info": {
"direction": "inbound",
"quarantine_type": "CI",
"rules": [
"test"
]
},
"quarantine_reason": "CC",
"service_type": "ess",
"user_id": 4
}
}
]
}
}

Human Readable Output#

Quarantine Email(s)#

IDDate ReceivedDirectionQuarantine TypeIs ReleasedQuarantine ReasonSenderMaster RecipientSubject
0002024-10-06 09:20:41.148000+00:00inboundCItrueCCExample (example@example.com)example@example.coma
0012024-10-06 13:37:51.295000+00:00inboundCIfalseCCExample (example@example.com)example@example.coma
0022024-10-06 13:37:55.373000+00:00inboundCIfalseCCExample (example@example.com)example@example.coma
0032024-10-06 13:38:00.677000+00:00inboundCItrueCCExample (example@example.com)example@example.coma
0042024-10-06 13:40:11.087000+00:00inboundCIfalseCCExample (example@example.com)example@example.coma

symantec-email-security-quarantine-email-preview#


Retrieves the contents of the email specified in the request. To preview an email the compliance policy must allow it.

Base Command#

symantec-email-security-quarantine-email-preview

Input#

Argument NameDescriptionRequired
message_idThe message ID of the email to preview. Run symantec-email-security-email-queue-list to get a list of message IDs.Required

Context Output#

PathTypeDescription
SymantecEmailSecurity.QuarantineEmailPreview.message_idStringID of the message.
SymantecEmailSecurity.QuarantineEmailPreview.headers.authentication-resultsStringAuthentication status of the email.
SymantecEmailSecurity.QuarantineEmailPreview.headers.content-typeStringThe MIME type of the email content, defining how the content is structured.
SymantecEmailSecurity.QuarantineEmailPreview.headers.dateDateThe date and time when the email was sent.
SymantecEmailSecurity.QuarantineEmailPreview.headers.dkim-signatureStringThe DKIM signature used to verify the authenticity of the email.
SymantecEmailSecurity.QuarantineEmailPreview.headers.feedback-idStringA unique identifier used for tracking feedback and reporting issues related to the email.
SymantecEmailSecurity.QuarantineEmailPreview.headers.fromStringThe sender's email address and name.
SymantecEmailSecurity.QuarantineEmailPreview.headers.mailfromStringThe envelope sender email address.
SymantecEmailSecurity.QuarantineEmailPreview.headers.message-idStringUnique identifier for the email message.
SymantecEmailSecurity.QuarantineEmailPreview.headers.mime-versionStringThe MIME version used for the email.
SymantecEmailSecurity.QuarantineEmailPreview.headers.receivedStringInformation about the servers the email passed through.
SymantecEmailSecurity.QuarantineEmailPreview.headers.reply-toStringThe email address where replies to the message should be sent.
SymantecEmailSecurity.QuarantineEmailPreview.headers.subjectStringThe subject line of the email.
SymantecEmailSecurity.QuarantineEmailPreview.headers.toStringThe recipient's email address.
SymantecEmailSecurity.QuarantineEmailPreview.headers.x-brightmail-trackerStringTracking data for Brightmail filtering.
SymantecEmailSecurity.QuarantineEmailPreview.headers.x-originating-ipStringIP address of the original sender.
SymantecEmailSecurity.QuarantineEmailPreview.attachments.nameStringThe name of the file attached to the email.
SymantecEmailSecurity.QuarantineEmailPreview.attachments.typeStringThe type of the file attached to the email.
SymantecEmailSecurity.QuarantineEmailPreview.bodypart.typeStringThe type of the email's body part.
SymantecEmailSecurity.QuarantineEmailPreview.bodypart.contentStringThe content of the email's body part.

Command example#

!symantec-email-security-quarantine-email-preview message_id=000

Context Example#

{
"SymantecEmailSecurity": {
"QuarantineEmailPreview": {
"attachments": [
{
"name": "hello",
"type": "world"
}
],
"bodypart": [
{
"content": "xxx",
"type": "text/plain; charset=\"UTF-8\""
},
{
"content": "xxx",
"type": "text/html; charset=\"UTF-8\""
}
],
"headers": {
"authentication-results": "xxx",
"content-type": "multipart/alternative;",
"date": "Wed, 02 Oct 2024 04:37:01 +0000",
"dkim-signature": "v=1; a=rsa-sha256;",
"feedback-id": "xxx",
"from": "xxx",
"mailfrom": "example@example.com",
"message-id": "123",
"mime-version": "1.0",
"received": "xxx",
"reply-to": "xxx",
"subject": "xxx",
"to": "xxx",
"x-atlassian-mail-message-id": "xxx",
"x-atlassian-mail-transaction-id": "xxx",
"x-brightmail-tracker": "xxx",
"x-msfbl": "xxx",
"x-originating-ip": "[0.0.0.0]",
"x-spamquarantineinfo": "spam detected heuristically",
"x-spamquarantinereason": "Yes, hits=1.2 required=7.0 tests=newsletters: , newsletters: Newsletter detected: 5.12 >"
},
"message_id": "000"
}
}
}

Human Readable Output#

Quarantine Email Preview#

DateFromToSubject
Wed, 02 Oct 2024 04:37:01 +0000xxxxxxxxx

Attachments#

NameType
helloworld

Body Parts#

Content
xxx
xxx

symantec-email-security-quarantine-email-release#


Releases the set of quarantined emails specified in the request.

Base Command#

symantec-email-security-quarantine-email-release

Input#

Argument NameDescriptionRequired
message_idsComma-separated list of emails message IDs to release. Run symantec-email-security-quarantine-email-list to get a list of message IDs.Required
recipientAn email address to which the mails have to be released instead of the recipient user's address.Optional
headersComma-separated list of x-headers that will be added to the message on release.Optional
encryptIf true adds an 'x-encrypted-quarantine-release: true' to the released email. Customers have to configure a corresponding DP rule that triggers encryption. Possible values are: true, false.Optional

Context Output#

There is no context output for this command.

Command example#

!symantec-email-security-quarantine-email-release message_ids=000

Human Readable Output#

Successfully released all messages.#

symantec-email-security-quarantine-email-delete#


Deletes the set of quarantined emails specified in the request. The items are marked as deleted in the backend data store, but are not physically deleted.

Base Command#

symantec-email-security-quarantine-email-delete

Input#

Argument NameDescriptionRequired
message_idsComma-separated list of quarantined emails message IDs to delete. Run symantec-email-security-quarantine-email-list to get a list of message IDs.Required

Context Output#

There is no context output for this command.

Command example#

!symantec-email-security-quarantine-email-delete message_ids=000

Human Readable Output#

Successfully deleted all messages.#

symantec-email-security-item-allow-list#


Retrieve the allow list items.

Base Command#

symantec-email-security-item-allow-list

Input#

Argument NameDescriptionRequired
qA string that at least some part of the allow list item must contain.Optional
sort_columnSpecifies the column to use for sorting. Possible values are: date, type, description. Default is date.Optional
sort_orderSpecifies the order in which to sort. Possible values are: desc, asc. Default is desc.Optional
afterA time stamp value used to select only SUDULS items that were created after this time. Accepted formats: any substring of yyyy-mm-ddThh:mm:ssZ, epoch 1720617001, relative 1 day 2h 3 minute.Optional
beforeA time stamp value used to select only SUDULS items that were created before this time. Accepted formats: any substring of yyyy-mm-ddThh:mm:ssZ, epoch 1720617001, relative 1 day 2h 3 minute.Optional
limitThe maximum number of records to return. Default is 50.Optional
pageThe page number to retrieve records from.Optional
page_sizeThe maximum number of records to return per page. Default is 50.Optional

Context Output#

PathTypeDescription
SymantecEmailSecurity.AllowList.idStringID of the item.
SymantecEmailSecurity.AllowList.valueStringAn email address or a domain name.
SymantecEmailSecurity.AllowList.descriptionStringDescription of the item.
SymantecEmailSecurity.AllowList.typeStringEmail or domain.
SymantecEmailSecurity.AllowList.date_createdDateDate at which the item was created.
SymantecEmailSecurity.AllowList.date_amendedDateDate at which the item was amended.

Command example#

!symantec-email-security-item-allow-list

Context Example#

{
"SymantecEmailSecurity": {
"Allow": [
{
"description": "Test",
"emailDirection": "I",
"expiryDate": "2024-01-01 00:00:00.0",
"iocBlackListId": "00000000-0000-0000-0000-000000000000",
"iocType": "subject",
"iocValue": "Test",
"remediationAction": "Q",
"status": "Active"
},
{
"description": "url to block",
"emailDirection": "O",
"expiryDate": "2024-01-01 00:00:00.0",
"iocBlackListId": "00000000-0000-0000-0000-000000000000",
"iocType": "url",
"iocValue": "https://www.example.com",
"remediationAction": "H",
"status": "Active"
}
]
}
}

Human Readable Output#

Allow List Item(s)#

Description
Test
url to block

symantec-email-security-item-allow-list-update#


Allows a SUDULS (allow quarantine users to maintain their own lists of email addresses or domains) user to add or update an item to the allow list.

Base Command#

symantec-email-security-item-allow-list-update

Input#

Argument NameDescriptionRequired
suduls_userEmail address of the user for whom the entry should be added in the allow list.Required
item_idID of SUDULS item to be added/updated. Only required when updating an existing item. Run symantec-email-security-item-allow-list to get a list of items.Optional
email_or_domainEmail address or domain to be added in the allow list.Required
descriptionDescription of the item to be added to the allow list.Required

Context Output#

There is no context output for this command.

Command example#

!symantec-email-security-item-allow-list-update suduls_user=lior description=sb email_or_domain=lior.sb item_id=000

Human Readable Output#

The items were successfully merged.#

symantec-email-security-item-allow-list-delete#


Allows a SUDULS (allow quarantine users to maintain their own lists of email addresses or domains) user to delete an item from the allow list.

Base Command#

symantec-email-security-item-allow-list-delete

Input#

Argument NameDescriptionRequired
item_idID of SUDULS item to be deleted. Run symantec-email-security-item-allow-list to get a list of items.Required

Context Output#

There is no context output for this command.

Command example#

!symantec-email-security-item-allow-list-delete item_id=000

Human Readable Output#

The items were successfully deleted.#

symantec-email-security-item-block-list#


Retrieve the block list items.

Base Command#

symantec-email-security-item-block-list

Input#

Argument NameDescriptionRequired
qA string that at least some part of the block list item must contain.Optional
sort_columnSpecifies the column to use for sorting. Default is date.Optional
sort_orderSpecifies the order in which to sort. Default is desc.Optional
afterA time stamp value used to select only SUDULS items that were created after this time. Accepted formats: any substring of yyyy-mm-ddThh:mm:ssZ, epoch 1720617001, relative 1 day 2h 3 minute.Optional
beforeA time stamp value used to select only SUDULS items that were created before this time. Accepted formats: any substring of yyyy-mm-ddThh:mm:ssZ, epoch 1720617001, relative 1 day 2h 3 minute.Optional
limitThe maximum number of records to return. Default is 50.Optional
pageThe page number to retrieve records from.Optional
page_sizeThe maximum number of records to return per page. Default is 50.Optional

Context Output#

PathTypeDescription
SymantecEmailSecurity.BlockList.idStringID of the item.
SymantecEmailSecurity.BlockList.valueStringAn email address or a domain name.
SymantecEmailSecurity.BlockList.descriptionStringDescription of the item.
SymantecEmailSecurity.BlockList.typeStringEmail or domain.
SymantecEmailSecurity.BlockList.date_createdDateDate at which the item was created.
SymantecEmailSecurity.BlockList.date_amendedDateDate at which the item was amended.

Command example#

!symantec-email-security-item-block-list

Context Example#

{
"SymantecEmailSecurity": {
"Block": [
{
"description": "Test",
"emailDirection": "I",
"expiryDate": "2024-01-01 00:00:00.0",
"iocBlackListId": "00000000-0000-0000-0000-000000000000",
"iocType": "subject",
"iocValue": "Test",
"remediationAction": "Q",
"status": "Active"
},
{
"description": "url to block",
"emailDirection": "O",
"expiryDate": "2024-01-01 00:00:00.0",
"iocBlackListId": "00000000-0000-0000-0000-000000000000",
"iocType": "url",
"iocValue": "https://www.example.com",
"remediationAction": "H",
"status": "Active"
}
]
}
}

Human Readable Output#

Block List Item(s)#

Description
Test
url to block

symantec-email-security-item-block-list-update#


Allows a SUDULS (allow quarantine users to maintain their own lists of email addresses or domains) user to add or update an item to the block list.

Base Command#

symantec-email-security-item-block-list-update

Input#

Argument NameDescriptionRequired
suduls_userEmail address of the user for whom the entry should be added in the block list.Required
item_idID of SUDULS item to be added/updated. Only required when updating an existing item. Run symantec-email-security-item-block-list to get a list of items.Optional
email_or_domainEmail address or domain to be added to the block list.Required
descriptionDescription of the item to be added to the block list.Required

Context Output#

There is no context output for this command.

Command example#

!symantec-email-security-item-block-list-update suduls_user=lior description=sb email_or_domain=lior.sb item_id=000

Human Readable Output#

The items were successfully merged.#

symantec-email-security-item-block-list-delete#


Allows a SUDULS (allow quarantine users to maintain their own lists of email addresses or domains) user to delete an item from the block list.

Base Command#

symantec-email-security-item-block-list-delete

Input#

Argument NameDescriptionRequired
item_idID of SUDULS item to be deleted. Run symantec-email-security-item-block-list to get a list of items.Required

Context Output#

There is no context output for this command.

Command example#

!symantec-email-security-item-block-list-delete item_id=000

Human Readable Output#

The items were successfully deleted.#