Use Case Builder Pack.#This Playbook is part of the
Supported Cortex XSOAR versions: 6.9.0 and later.
Enrich entities using one or more integrations.
This playbook uses the following sub-playbooks, integrations, and scripts.
- Email Address Enrichment - Generic v2.1
- IP Enrichment - Generic v2
- Endpoint Enrichment - Generic v2.1
- CVE Enrichment - Generic v2
- Account Enrichment - Generic v2.1
- File Enrichment - Generic v2
- Domain Enrichment - Generic v2
- URL Enrichment - Generic v2
This playbook does not use any integrations.
This playbook does not use any scripts.
This playbook does not use any commands.
|The IP addresses to enrich
|A list of internal IP ranges to check IP addresses against. The list should be provided in CIDR notation, separated by commas. An example of a list of ranges would be: "172.16.0.0/12,10.0.0.0/8,192.168.0.0/16" (without quotes). If a list is not provided, will use default list provided in the IsIPInRanges script (the known IPv4 private address ranges).
|File MD5 to enrich
|File SHA256 to enrich
|File SHA1 to enrich
|URL to enrich
|The email addresses to enrich
|The hostname to enrich
|The username to enrich
|The domain name to enrich
|Determines whether the IP Enrichment - Generic playbook should convert IP addresses to hostnames using a DNS query. True - Resolves the IP addresses to hostnames. False - Does not resolve the IP addresses to hostnames.
|A CSV list of internal domains. The list will be used to determine whether an email address is internal or external.
|CVE ID to enrich.
|Should the system take safe screenshots of input URLs?
|Should the system perform SSL certificate verification on the URLs?
|Define if you would like to use the !file, !ip, !domain, !endpoint commands. If you want to set only specific commands run reputation, please leave this as False and edit the values inside entity enrichment playbook
Note: This input should be used whenever there is no auto-extract enabled in the investigation flow.
Possible values: True / False.
|The IP object.
|The endpoint object.
|The hostname that was enriched.
|The endpoint's operating system.
|A list of endpoint IP addresses.
|A list of endpoint MAC addresses.
|The endpoint domain name.
|The DBotScore object.
|The indicator that was tested.
|The indicator type.
|Vendor used to calculate the score.
|The actual score.
|The file object.
|SHA1 hash of the file.
|SHA256 hash of the file.
|MD5 hash of the file.
|Whether the file is malicious.
|For malicious files, the vendor that made the decision.
|The URL object.
|The enriched URL.
|Whether the detected URL was malicious.
|Vendor that labeled the URL as malicious.
|Additional information for the URL.
|The domain object.
|The account object.
|The email of the account.
|The email account NetworkType (Internal/External).
|The object that contains the distance between the email domain and the compared domain.
|The compared domain.
|The distance between the email domain and the compared domain.
|An object containing information about the user from Active Directory.
|The user's samAccountName.
|The user's account control flag.
|The user's email address.
|Groups the user is a member of.
|The device information about the hostname that was enriched using Cylance Protect v2.