quarantine-file
Aggregated Scripts Pack.#
This Script is part of theSupported versions
Supported Cortex XSOAR versions: 6.10.0 and later.
This script executes the 'quarantine-file' command on a specified file via the appropriate agent. This script is used to isolate files identified as suspicious.
#
Script DataName | Description |
---|---|
Script Type | python3 |
Cortex XSOAR Version | 6.10.0 |
#
InputsArgument Name | Description |
---|---|
endpoint_id | List of endpoint IDs. |
file_hash | The hash of the file to quarantine. Supported types are: SHA256. |
file_path | The path of the file to quarantine. |
timeout | The polling timeout in seconds for the quarantine commands. The default is 300. |
brands | Brands for which to execute the 'quarantine-file' command. If not specified, all available instances will run. |
verbose | Whether to retrieve a human-readable entry for every command. When set to false, human-readable will only summarize the final result. |
#
OutputsPath | Description | Type |
---|---|---|
QuarantineFile.FilePath | The path of the quarantined file. | String |
QuarantineFile.FileHash | The hash of the quarantined file. | String |
QuarantineFile.Status | Whether the command execution was successful or not. | String |
QuarantineFile.Message | A success message if the command runs successfully, otherwise a message that contains the error. | String |
QuarantineFile.Brand | The integration that executed the command. | String |
QuarantineFile.EndpointID | The endpoint_id which the command was executed on. | String |