Skip to main content

TransformIndicatorToMSDefenderIOC

This Script is part of the Microsoft Defender for Endpoint Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

Transform a XSOAR indicator into a Microsoft Defender for Endpoint IOC. The output (at TransformIndicatorToMSDefenderIOC.JsonOutput) is a json representation of the indicators in MSDE format. This json can be the input for the microsoft-atp-indicator-batch-update command.

Script Data#


NameDescription
Script Typepython3
Tags
Cortex XSOAR Version6.0.0

Inputs#


Argument NameDescriptionRequired
queryThe indicators query.Required
actionThe action that will be taken if the indicator will be discovered in the organization.Required
limitThe maximum number of indicators to fetch.Optional
offsetThe results offset page. Only change when the number of the results exceed the limit.Optional

Outputs#


PathDescriptionType
TransformIndicatorToMSDefenderIOC.JsonOutputJson output of the indicators. Should be the input for the *microsoft-atp-indicator-batch-update*.String
TransformIndicatorToMSDefenderIOC.Indicators.indicatorValueThe value of the Indicator.String
TransformIndicatorToMSDefenderIOC.Indicators.indicatorTypeType of the indicator. Possible values are: FileSha1, FileSha256, FileMd5, CertificateThumbprint, IpAddress, DomainName, UrlString
TransformIndicatorToMSDefenderIOC.Indicators.lastUpdateTimeThe last time the indicator was updated.String
TransformIndicatorToMSDefenderIOC.Indicators.lastUpdatedByIdentity of the user/application that last updated the indicator.String
TransformIndicatorToMSDefenderIOC.Indicators.actionThe action that will be taken if the indicator will be discovered in the organization. Possible values are: "Warn", "Block", "Audit", "Alert", "AlertAndBlock", "BlockAndRemediate" and "Allowed".String
TransformIndicatorToMSDefenderIOC.Indicators.titleIndicator title.String
TransformIndicatorToMSDefenderIOC.Indicators.expirationTimeThe expiration time of the indicator.String
TransformIndicatorToMSDefenderIOC.Indicators.descriptionDescription of the indicator.String
TransformIndicatorToMSDefenderIOC.Indicators.creationTimeDateTimeUtcThe date and time when the indicator was created.String
TransformIndicatorToMSDefenderIOC.Indicators.SeverityThe severity of the indicator. possible values are: Informational, Low, Medium and High.String
TransformIndicatorToMSDefenderIOC.Indicators.applicationThe application associated with the indicator.String
TransformIndicatorToMSDefenderIOC.Indicators.externalIDId the customer can submit in the request for custom correlation.String
TransformIndicatorToMSDefenderIOC.Indicators.sourceTypeUser in case the Indicator created by a user. "AadApp" in case it submitted using automated application via the API.String
TransformIndicatorToMSDefenderIOC.Indicators.createdBySourceThe name of the user or application that submitted the indicator.String
TransformIndicatorToMSDefenderIOC.Indicators.createdByUnique identity of the user or application that submitted the indicator.String
TransformIndicatorToMSDefenderIOC.Indicators.recommendedActionsRecommended actions for the indicator.String
TransformIndicatorToMSDefenderIOC.Indicators.rbacGroupNamesRBAC device group names where the indicator is exposed and active. Empty list in case it exposed to all devices.Unknown
TransformIndicatorToMSDefenderIOC.Indicators.rbacGroupIdsRBAC device group ID's where the indicator is exposed and active. Empty list in case it exposed to all devices.Unknown
TransformIndicatorToMSDefenderIOC.Indicators.generateAlertTrue if alert generation is required, False if this indicator should not generate an alert.String

More info#


  1. Please read about MSDE Indicator resource type here.
  2. Please read about limitations for creating and updating batch of indicators here.
  3. Please read about the required permissions for creating and updating batch of indicators here.