Skip to content

Commit 3a343dc

Browse files
maimoragRotemAmitShacharKidoreepstainShirleyDenkberg
authored andcommitted
Change all paths in Readme and Description file-part6 (#38099)
* fix * Fix Pylint errors in AWS (#38042) * aws pylint * apimodule * aws secret manager * apimodule_test * fix unit test * pylint fix * response * update dynamo test playbook * fromversion: 5.0.0 * Fix Pylint errors in C packs (#38048) * c packs pylint * fix rn * pack version * Fix Pylint errors in S part 1 packs (#38082) * pylint S1 packs * rn * docker image update * Fix Pylint errors in S part 2 packs (#38084) * pylint S2 packs * docker image update * AlibabaActionTrail Event Collector - Fixed a parsing error related to the First fetch time interval parameter (#38074) * Fixed the first fetch param parsing error * pre-commit fixes * Ignored the specific my py error * Updated the docker image tag to the latest * Updated the RN file * XSUP 45126 Cyberark Identity Update (#38071) * Updated ModelingRules ParsingRules * Updated pack_metadata * Updated README * Updated README * Updated README * Update Packs/CyberArkIdentity/README.md Co-authored-by: ShirleyDenkberg <[email protected]> * Update pack_metadata.json * Updated ReleaseNotes * Updated ReleaseNotes --------- Co-authored-by: ShirleyDenkberg <[email protected]> * Nozomi make result per run configurble (#37531) (#38057) * NNPANXSOAR-6 * use record_created_at to paginate * fix tests * NNPANXSOAR-6 * use requests as http client to fix verify SSL issues * make code more stable * NNPANXSOAR-6 * updated documentation * NNPANXSOAR-6 * make linter happy * * add form Incidents per run * add logic to return every run the incidents size passed * * add form Incidents per run * add logic to return every run the incidents size passed * * add release notes * bump version * * add release notes * bump version * * update release notes * make linter happy * * make linter happy again * * make linter happy again * * use bearer token to auth every http call * add sign_in * fallback to basic auth * * fix default error response * * make app more robust * add more case * * fix proxy issue * add tests * * bumpversion * update readme * update release notes * * wip new pagination * * refactoring * make linter happy * remove dev logs * * refactoring * make linter happy * remove dev logs * * fix yml * * fix yml * * remove secrets * * remove secrets * * executed demisto-sdk split command on yml * fix linter issues * * fix release notes format * * bump docker image version Co-authored-by: Nicolò <[email protected]> * part 7 - fixing relative files (#38083) * part 7 - fixing relative files * fix * Fix Pylint errors in O packs (#38067) * remove o * skip CRTX-116483 * [EWS v2] Fix issue with files not opening (#37963) * [EWS v2] Fix issue with files not opening * Fix in fetch_attachments_for_message * CRTX-146122-ProofPoint-Email-Security (#37954) * added support for audit log type * added release notes * added release notes * added release notes * fix * fix * fix * fix * fix * added parsing * fix yml * fix notes * added tags * New Playbook - Suspicious Local Administrator Login (#37933) * new playbook * added trigger and RN * c * added error to pack ignore * trigger fixed * namefix * fix * fix for the trigger * Bump pack from version CortexResponseAndRemediation to 1.0.2. * fix RN * fix * fixx * fix for disable command * Update Packs/CortexResponseAndRemediation/Playbooks/playbook-Suspicious_Local_Administrator_Login.yml Co-authored-by: ShirleyDenkberg <[email protected]> * Update Packs/CortexResponseAndRemediation/Playbooks/playbook-Suspicious_Local_Administrator_Login.yml Co-authored-by: ShirleyDenkberg <[email protected]> * Update Packs/CortexResponseAndRemediation/Playbooks/playbook-Suspicious_Local_Administrator_Login_README.md Co-authored-by: ShirleyDenkberg <[email protected]> * Update Packs/CortexResponseAndRemediation/ReleaseNotes/1_0_2.md Co-authored-by: ShirleyDenkberg <[email protected]> * Update Packs/CortexResponseAndRemediation/Playbooks/playbook-Suspicious_Local_Administrator_Login_README.md Co-authored-by: ShirleyDenkberg <[email protected]> * Update Packs/CortexResponseAndRemediation/ReleaseNotes/1_0_2.md Co-authored-by: ShirleyDenkberg <[email protected]> * fix for read me * fix * fix for command * new image * Adi's review changes * Bump pack from version CortexResponseAndRemediation to 1.0.3. * fixes * Bump pack from version CortexResponseAndRemediation to 1.0.4. * fix * last version * added description * white image of the playbook * read me fix --------- Co-authored-by: Content Bot <[email protected]> Co-authored-by: ShirleyDenkberg <[email protected]> * remove native (#38098) * fix * fix * fix * fix * Bump pack from version ThreatIntelReports to 1.0.21. * Bump pack from version Whois to 1.5.21. * cr * cr --------- Co-authored-by: RotemAmit <[email protected]> Co-authored-by: Shachar Kidor <[email protected]> Co-authored-by: eepstain <[email protected]> Co-authored-by: ShirleyDenkberg <[email protected]> Co-authored-by: content-bot <[email protected]> Co-authored-by: Nicolò <[email protected]> Co-authored-by: Menachem Weinfeld <[email protected]> Co-authored-by: sdaniel6 <[email protected]> Co-authored-by: Karina Fishman <[email protected]> Co-authored-by: Content Bot <[email protected]>
1 parent 3bf7337 commit 3a343dc

29 files changed

+63
-56
lines changed

Packs/BitDam/Playbooks/playbook-BitDam_Scan_File_README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,4 +43,4 @@ This playbook does not use any integrations.
4343

4444
## Playbook Image
4545
---
46-
![Detonate_File_-_BitDam](https://raw.githubusercontent.com/demisto/content/1bdd5229392bd86f0cc58265a24df23ee3f7e662/docs/images/playbooks/Detonate_File_-_BitDam.png)
46+
![Detonate_File_-_BitDam](../doc_files/BitDam_Scan_File.png)
93.1 KB
Loading

Packs/BreachNotification-US/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,4 @@ As part of this pack, you will also get out-of-the-box US breach notification in
1515

1616
_For more information, visit our [Cortex XSOAR Developer Docs](https://xsoar.pan.dev/docs/reference/playbooks/us---breach-notification)_
1717

18-
![US-BreachNotification](https://raw.githubusercontent.com/demisto/content/master/Packs/BreachNotification-US/doc_files/US_-_Breach_Notification.png)
18+
![US-BreachNotification](doc_files/US_-_Breach_Notification.png)

Packs/BruteForce/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,4 @@ As part of this pack, you will also get out-of-the-box Brute Force incident type
1919

2020
_For more information, visit our [Cortex XSOAR Developer Docs](https://xsoar.pan.dev/docs/reference/playbooks/brute-force-investigation---generic)_
2121

22-
![Brute Force Investigation - Generic](https://raw.githubusercontent.com/demisto/content/7255df3f657fa784586367a9552141b3916a263d/Packs/BruteForce/doc_files/Brute_Force_Investigation_-_Generic.png)
22+
![Brute Force Investigation - Generic](doc_files/Brute_Force_Investigation_-_Generic.png)

Packs/CVE_2021_44228/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ More information about the vulnerability:
2323

2424
Note: This is a beta playbook, which lets you implement and test pre-release software. Since the playbook is beta, it might contain bugs. Updates to the pack during the beta phase might include non-backward compatible features. We appreciate your feedback on the quality and usability of the pack to help us identify issues, fix them, and continually improve.
2525

26-
![CVE-2021-44228 - Log4j RCE](https://raw.githubusercontent.com/demisto/content/f28245475f1e121bad9c8b64bbb1a11694ca04f1/Packs/CVE_2021_44228/doc_files/CVE-2021-44228_-_Log4j_RCE.png)
26+
![CVE-2021-44228 - Log4j RCE](doc_files/CVE-2021-44228_-_Log4j_RCE.png)

Packs/CVE_2022_26134/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,4 +25,4 @@ This playbook includes the following tasks:
2525
**Note:** This is a beta playbook, which lets you implement and test pre-release software. Since the playbook is beta, it might contain bugs. Updates to the pack during the beta phase might include non-backward compatible features. We appreciate your feedback on the quality and usability of the pack to help us identify issues, fix them, and continually improve.
2626

2727

28-
![CVE-2022-26134 - Confluence RCE](https://raw.githubusercontent.com/demisto/content/d6d448f2cf2d12de2d7d84e3c67369fa273a4289/Packs/CVE_2022_26134/doc_files/CVE-2022-26134_-_Confluence_RCE.png)
28+
![CVE-2022-26134 - Confluence RCE](doc_files/CVE-2022-26134_-_Confluence_RCE.png)

Packs/Campaign/README.md

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,28 @@
1-
When a suspicious email is detected, you can use this pack to determine whether the email is part of a bigger phishing campaign, and to understand its scale and potential risks.
2-
3-
## What does this pack do?
4-
5-
The pack includes the **FindEmailCampaign** script which enables you to:
6-
- Filter past email incidents according to multiple search criteria such as incident types, email body and/or subject, email sender and more.
7-
- Define criteria for a collection of related email incidents to be considered a campaign: minimum number of incidents, minimum number of unique recipients and machine-learning driven similarity threshold between emails.
8-
9-
The script output indicates whether a campaign was identified. When a campaign is identified, more information about the campaign is provided: number of incidents involved in the campaign, indicators involved in the campaign and more.
10-
This allows the user to take additional steps on the campaign findings, like blocking the email of the campaign sender or notifying the email recipients about the campaign.
11-
12-
13-
## How does this pack work?
14-
15-
- You can use the FindEmailCampaign script from this pack on any existing email incident to search through past incidents of the same type and identify campaigns.
16-
- You can use the data gathered from the FindEmailCampaign script to close existing incidents as duplicates and to let the recipients know about the detected campaign.
17-
- You can use the data gathered from the FindEmailCampaign script to identify malicious indicators used in the campaign and block them.
18-
- The pack expects you to have pre-existing email incidents created from a mail listener such as EWS v2.
19-
- The Phishing content pack is required because the **FindEmailCampaign** script uses the **FindDuplicateEmailIncidents** script from that pack.
20-
21-
_For more information, visit our [Cortex XSOAR Developer Docs](https://xsoar.pan.dev/docs/reference/packs/phishing-campaign)._
22-
23-
![image](https://raw.githubusercontent.com/demisto/content/master/Images/campaign-overview.png)
24-
25-
![image](https://raw.githubusercontent.com/demisto/content/master/Images/campaign-canvas.png)
26-
27-
28-
1+
When a suspicious email is detected, you can use this pack to determine whether the email is part of a bigger phishing campaign, and to understand its scale and potential risks.
2+
3+
## What does this pack do?
4+
5+
The pack includes the **FindEmailCampaign** script which enables you to:
6+
- Filter past email incidents according to multiple search criteria such as incident types, email body and/or subject, email sender and more.
7+
- Define criteria for a collection of related email incidents to be considered a campaign: minimum number of incidents, minimum number of unique recipients and machine-learning driven similarity threshold between emails.
8+
9+
The script output indicates whether a campaign was identified. When a campaign is identified, more information about the campaign is provided: number of incidents involved in the campaign, indicators involved in the campaign and more.
10+
This allows the user to take additional steps on the campaign findings, like blocking the email of the campaign sender or notifying the email recipients about the campaign.
11+
12+
13+
## How does this pack work?
14+
15+
- You can use the FindEmailCampaign script from this pack on any existing email incident to search through past incidents of the same type and identify campaigns.
16+
- You can use the data gathered from the FindEmailCampaign script to close existing incidents as duplicates and to let the recipients know about the detected campaign.
17+
- You can use the data gathered from the FindEmailCampaign script to identify malicious indicators used in the campaign and block them.
18+
- The pack expects you to have pre-existing email incidents created from a mail listener such as EWS v2.
19+
- The Phishing content pack is required because the **FindEmailCampaign** script uses the **FindDuplicateEmailIncidents** script from that pack.
20+
21+
_For more information, visit our [Cortex XSOAR Developer Docs](https://xsoar.pan.dev/docs/reference/packs/phishing-campaign)._
22+
23+
![image](doc_files/campaign-overview.png)
24+
25+
![image](doc_files/campaign-canvas.png)
26+
27+
28+
123 KB
Loading

Packs/CarbonBlackProtect/Playbooks/playbook-Carbon_black_Protection_Rapid_IOC_Hunting_README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@ There are no outputs for this playbook.
2727

2828
## Playbook Image
2929
---
30-
![Carbon_black_Protection_Rapid_IOC_Hunting](https://raw.githubusercontent.com/demisto/content/1bdd5229392bd86f0cc58265a24df23ee3f7e662/docs/images/playbooks/Carbon_black_Protection_Rapid_IOC_Hunting.png)
30+
![Carbon_black_Protection_Rapid_IOC_Hunting](../doc_files/Carbon_black_Protection_Rapid_IOC_Hunting.png)

Packs/CarbonBlackProtect/Playbooks/playbook-Search_Endpoints_By_Hash_-_Carbon_Black_Protection_README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,4 +35,4 @@ This playbook does not use any sub-playbooks.
3535

3636
## Playbook Image
3737
---
38-
![Search_Endpoints_By_Hash_Carbon_Black_Protection](https://raw.githubusercontent.com/demisto/content/f975de39b05cd3560b782f54d37637741d87ff65/docs/images/playbooks/Search_Endpoints_By_Hash_Carbon_Black_Protection.png)
38+
![Search_Endpoints_By_Hash_Carbon_Black_Protection](../doc_files/Search_Endpoints_By_Hash_-_Carbon_Black_Protection.png)

0 commit comments

Comments
 (0)