Skip to content

Update README.md #28

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 1 commit into from
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 6 additions & 6 deletions Packs/Code42/Integrations/Code42/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ Use the Code42 integration to identify potential data exfiltration from insider

| **Parameter** | **Description** | **Required** |
| --- | --- | --- |
| console_url | Code42 Console URL for the pod your Code42 instance is running in | True |
| console_url | Code42 Console URL for your Code42 environment | True |
| credentials | Username | True |
| isFetch | Fetch incidents | False |
| incidentType | Incident type | False |
Expand All @@ -18,11 +18,11 @@ Use the Code42 integration to identify potential data exfiltration from insider

4. Click **Test** to validate the URLs, token, and connection.
## Commands
You can execute these commands from the Demisto CLI, as part of an automation, or in a playbook.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Even though this is correct, this part particularly is not really controlled by us

You can execute these commands from the XSOAR CLI, as part of an automation, or in a playbook.
After you successfully execute a command, a DBot message appears in the War Room with the command details.
### code42-securitydata-search
***
Searches for a file in Security Data by JSON query, hash, username, device hostname, exfiltration type, or a combination of parameters. At least one argument must be passed in the command. If a JSON argument is passed, it will be used to the exclusion of other parameters, otherwise parameters will be combined with an AND clause.
Searches for file events by JSON query, hash, username, device hostname, exfiltration type, or a combination of parameters. At least one argument must be passed in the command. If a JSON argument is passed, it will be used to the exclusion of other parameters, otherwise parameters will be combined with an AND clause.


#### Base Command
Expand Down Expand Up @@ -877,8 +877,8 @@ Removes a Code42 user from a legal hold matter.

| **Argument Name** | **Description** | **Required** |
| --- | --- | --- |
| username | The username of the user to remove from the given legal hold matter. | Required |
| mattername | The name of the legal hold matter from which to which the user will be removed. | Required |
| username | The username of the user to release from the given legal hold matter. | Required |
| mattername | The name of the legal hold matter from which the user will be released. | Required |


#### Context Output
Expand Down Expand Up @@ -917,7 +917,7 @@ Removes a Code42 user from a legal hold matter.

### code42-download-file
***
Downloads a file from Code42 servers.
Downloads a file from Code42.

#### Base Command

Expand Down