Skip to content

Commit aced022

Browse files
darkushinxsoar-bot
authored andcommitted
Private upload mode docs #6 (demisto#28740)
* Updated Docs * added RNs * Added description to DomainTools
1 parent 4b962b8 commit aced022

File tree

17 files changed

+69
-5
lines changed

17 files changed

+69
-5
lines changed

Packs/APIVoid/Integrations/APIVoid/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,8 @@ Returns the reputation of the domain.
143143
***
144144
Returns the reputation of the URL.
145145

146+
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
147+
146148

147149
#### Base Command
148150

@@ -335,6 +337,8 @@ Returns the reputation of the domain.
335337
***
336338
Returns the reputation of the URL.
337339

340+
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
341+
338342

339343
#### Base Command
340344

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,9 @@
11
Cisco Investigate is part of the Cisco Umbrella package. When you log into the CIsco Umbrella portal you will need to
2-
obtain the API Token for the Cisco Investigate Feature.
2+
obtain the API Token for the Cisco Investigate Feature.
3+
4+
Notice: Submitting indicators using the following commands of this integration might make the indicator data publicly available.
5+
- ***domain***
6+
- ***umbrella-domain-search***
7+
- ***umbrella-domain-co-occurrences***
8+
- ***umbrella-domain-categorization***
9+
See the vendor’s documentation for more details.

Packs/Cisco-umbrella/Integrations/Cisco-umbrella-investigate/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@
5353
<h3 id="h_95271207136361539669137295">1. Get a domain category</h3>
5454
<hr>
5555
<p>Returns the category of a domain, e.g., <code>domain=amazon.com</code> returns <code>Ecommerce/Shopping</code>.</p>
56+
<p>Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.</p>
5657
<h5>Base Command</h5>
5758
<p><code>umbrella-domain-categorization</code></p>
5859
<h5>Input</h5>
@@ -114,6 +115,7 @@
114115
<h3 id="h_12059469238361539669280611">2. Get co-occurences for a domain</h3>
115116
<hr>
116117
<p>Gets a list of related domains and returns a list of co-occurences for the specified domain. A co-occurrence is when two or more domains are being accessed by the same users within a short time frame. Co-occurrence are not necessarily negative. Legitimate sites co-occur with each other as a part of normal web activity. However, unusual or suspicious co-occurence can provide additional information regarding attacks.</p>
118+
<p>Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.</p>
117119
<h5>Base Command</h5>
118120
<p><code>umbrella-domain-co-occurrences</code></p>
119121
<h5>Input</h5>
@@ -651,6 +653,7 @@
651653
<h3 id="h_89573474650151539674030486">8. Get a list of domains that match a regular expression (regex)</h3>
652654
<hr>
653655
<p>Returns a list of domains that match a a regular expression. You can use this for domain squatting. The pattern search functionality in Investigate uses regular expressions (regex) to search against the Investigate database. For more information on regex, see online tools, such as <a href="http://regexr.com/" rel="nofollow">http://regexr.com</a>.</p>
656+
<p>Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.</p>
654657
<h5>Base Command</h5>
655658
<p><code>umbrella-domain-search</code></p>
656659
<h5>Input</h5>
@@ -713,6 +716,7 @@
713716
<h3 id="h_51225163252081539674588524">9. Get the reputation for a domain</h3>
714717
<hr>
715718
<p>Get Domain Reputation info using Cisco Umbrella Investigate.</p>
719+
<p>Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.</p>
716720
<h5>Base Command</h5>
717721
<p><code>domain</code></p>
718722
<h5>Input</h5>
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
2+
#### Integrations
3+
4+
##### Cisco Umbrella Investigate
5+
6+
Documentation and metadata improvements.

Packs/Cisco-umbrella/pack_metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "Cisco Umbrella Investigate",
33
"description": "Cisco Umbrella Investigate",
44
"support": "xsoar",
5-
"currentVersion": "1.0.17",
5+
"currentVersion": "1.0.18",
66
"author": "Cortex XSOAR",
77
"url": "https://www.paloaltonetworks.com/cortex",
88
"email": "",

Packs/CrowdStrikeIntel/Integrations/CrowdStrikeFalconIntel_v2/CrowdStrikeFalconIntel_v2_description.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,3 +2,7 @@
22
To create a Client ID and Client Secret (the password for the integration), see [CrowdStrike Falcon API Client and keys](https://falcon.crowdstrike.com/support/api-clients-and-keys).
33
For Cortex XSOAR versions < 6.0 the password parameter is the Client Secret.
44

5+
Notice: Submitting indicators using the following commands of this integration might make the indicator data publicly available.
6+
- ***url***
7+
- ***domain***
8+
See the vendor’s documentation for more details.

Packs/CrowdStrikeIntel/Integrations/CrowdStrikeFalconIntel_v2/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,8 @@ Check file reputation.
164164
***
165165
Check the given URL reputation.
166166

167+
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
168+
167169

168170
#### Base Command
169171

@@ -300,6 +302,8 @@ Check the given URL reputation.
300302
***
301303
Check the given URL reputation.
302304

305+
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
306+
303307

304308
#### Base Command
305309

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
2+
#### Integrations
3+
4+
##### CrowdStrike Falcon Intel v2
5+
6+
Documentation and metadata improvements.

Packs/CrowdStrikeIntel/pack_metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "CrowdStrike Falcon Intel",
33
"description": "Threat intelligence service by CrowdStrike focused on delivering a technical feed to help organizations better defend themselves against adversary activity.",
44
"support": "xsoar",
5-
"currentVersion": "2.0.31",
5+
"currentVersion": "2.0.32",
66
"author": "Cortex XSOAR",
77
"url": "https://www.paloaltonetworks.com/cortex",
88
"email": "",
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
Notice: Submitting indicators using the following commands of this integration might make the indicator data publicly available.
2+
- ***domain***
3+
- ***domainSearch***
4+
See the vendor’s documentation for more details.

0 commit comments

Comments
 (0)