8000 Tags · ktwombley/content · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Tags: ktwombley/content

Tags

20.8.1

Toggle 20.8.1's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Fixed context outputs - FailedInstances Script (demisto#8503)

* Fixed context outputs

* Added rn and updated README

* Updated test with new outputs

* Added comment in rn and change type in context

* Update script-FailedInstances.yml

Reviewed and updated.

* Update 1_2_32.md

Reviewed and updated

Co-authored-by: Richard Bluestone <53567272+richardbluestone@users.noreply.github.com>

20.8.0

Toggle 20.8.0's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Update config.yml

20.7.2

Toggle 20.7.2's commit message
cherry-pick b681691

20.7.1

Toggle 20.7.1's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Pcap extractor playbook (demisto#8077)

* Added new playbook

* Added test playbook.

* Added test playbook.

* Conf json.

* Improved descriptions.

* Improved descriptions.

* Improved descriptions.

* Update playbook-PCAP_File_Carving.yml

* Update playbook-PCAP_File_Carving.yml

Co-authored-by: dbaumstein <dbaumstein@paloaltonetwork.com>
Co-authored-by: yaron-libman <43783884+yaron-libman@users.noreply.github.com>

20.7.0

Toggle 20.7.0's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
[risksense-835] Contrib/crestdatasys risksense enhancement (demisto#7853

)

* [risksense-835] Contrib/crestdatasys risksense enhancement (demisto#7272)

* [risksense-835] RiskSense enhanced integration

### New Features
 - 3 new playbooks
  - Ransomware exposure
  - BlueKeep CVE exposure
  - DHS-CISA-FBI Top 10 CVE exposure
 - Helper script for ransomware exposure
 - risksense-apply-tag command

### Enhancement
 - new RiskSense branding logo
 - minor argument name change
 - minor context data change

* [risksense-835] RiskSense enhanced integration

 - secret words added in .secrets-ignore

* [risksense-835] RiskSense enhanced integration

### Removed duplicate condition.

* [risksense-835] RiskSense enhanced integration

### Minor fix
 - README.md validation fix

### Docker image updated

* [risksense-835] RiskSense enhanced integration

### New Features
 - 3 new playbooks
  - Ransomware exposure
  - BlueKeep CVE exposure
  - DHS-CISA-FBI Top 10 CVE exposure
 - Helper script for ransomware exposure
 - risksense-apply-tag command

### Enhancement
 - new RiskSense branding logo
 - minor argument name change
 - minor context data change

* [risksense-835] RiskSense enhanced integration

updated release notes

* [risksense-835] RiskSense enhanced integration

updated release notes

* Update Packs/RiskSense/Integrations/RiskSense/RiskSense.py

Co-authored-by: Anar Azadaliyev <aazadaliyev@paloaltonetworks.com>

* CHANGELOG.md updated

* [risksense-835] RiskSense enhanced integration changes

- change in automation script, added generic script that displays bar chart for CVEs and trending CVEs.
- merged BlueKeep_CVE_Exposure_-_RiskSense.yml and DHS-CISA-FBI_Top_10_CVE_Exposure_-_RiskSense.yml playbook into one.
- exclusivity changed to exclude.
- minor fixes.

* [risksense-835] RiskSense enhanced integration changes

 - excluded few items

* Removed default value from playbook input.

* Removed default value from playbook-CVE_Exposure_-_RiskSense_README.md

* Update playbook-CVE_Exposure_-_RiskSense.yml

* Update playbook-CVE_Exposure_-_RiskSense_README.md

* Update playbook-Ransomware_Exposure_-_RiskSense.yml

* Update playbook-Ransomware_Exposure_-_RiskSense_README.md

* Update README.md

Co-authored-by: crestdatasystems <60967033+crestdatasystems@users.noreply.github.com>
Co-authored-by: Anar Azadaliyev <aazadaliyev@paloaltonetworks.com>
Co-authored-by: yaron-libman <43783884+yaron-libman@users.noreply.github.com>

* update version

* update version

Co-authored-by: santosh.giri <61006659+crestsantoshgiri@users.noreply.github.com>
Co-authored-by: crestdatasystems <60967033+crestdatasystems@users.noreply.github.com>
Co-authored-by: Anar Azadaliyev <aazadaliyev@paloaltonetworks.com>
Co-authored-by: yaron-libman <43783884+yaron-libman@users.noreply.github.com>

20.6.1

Toggle 20.6.1's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Added a change that allows phishing incidents to display email header…

…s if the original email was retrieved. (demisto#7679)

20.6.0

Toggle 20.6.0's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Updated Cortex XDR IOCs pack names - 20.6.0 (demisto#7437)

* updated pack name, integration name, and command names of "Cortex XDR - IOC"

* fixed bug

* update tests

* update pack & integration description

* update pack & integration description

* updated descriptions

* update integration format

* fixup! update integration format

* adding ioc triger to push command

* update README

* fix CR

* fixup! fix CR

* Update Packs/XDR_iocs/Integrations/XDR_iocs/XDR_iocs.yml

Co-authored-by: Shai Yaakovi <30797606+yaakovi@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Guy Lichtman <1395797+glicht@users.noreply.github.com>

* update readme with a better description

* updated descriptions and display name in yml

* Update Packs/XDR_iocs/Integrations/XDR_iocs/XDR_iocs.yml

* Update Packs/XDR_iocs/Integrations/XDR_iocs/XDR_iocs.yml

* Apply suggestions from technical writer review

* fix

* fixup! fix

* fixinig

* last fix

* add sleep time

* add sleep time

Co-authored-by: eli sharf <esharf@paloaltonetworks.com>
Co-authored-by: esharf <esahrf@paloaltonetworks.com>
Co-authored-by: Guy Lichtman <1395797+glicht@users.noreply.github.com>

20.5.3

Toggle 20.5.3's commit message
ArcSight ESM v2 - fix as-get-security-events output parsing (demisto#…

…7248)

* fix as-get-security-events output parsing

* bump pack version and add rn

* reverted return_outputs call to be in the cmd func

20.5.2

Toggle 20.5.2's commit message
Fixed Compliance Pack.

Removed relreasenote folder and changed currentVersion in the pack metadata
0