The maximum number of indicators to retrieve. Names of the collections that intended to be retrieved indicators from. Socradar-get-indicators Input # Argument Name Retrieves SOCRadar Recommended Threat Intelligences Collections.
#Fortigate vm kubernetes how to
Various API endpoints that SOCRadar provides.įor the information about the SOCRadar API keys and how to obtain them, please see SOCRadar API documentation. How to obtain SOCRadar Threat Feeds/IOC API key? #Įvery company has a unique API key in SOCRadar platform. You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook.Īfter you successfully execute a command, a DBot message appears in the War Room with the command details. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system.Ĭlick Test to validate API key and connection to SOCRadar Threat Feeds/IOC API. When selected, the exclusion list is ignored for indicators from this feed. Reliability of the source providing the intelligence data. The Traffic Light Protocol (TLP) designation to apply to indicators fetched from the feed. Indicators from this integration instance will be marked with this reputation. Whether to use XSOAR’s system proxy settings to connect to the API. The API Key to use for connection to SOCRadar ThreatFusion API. Navigate to Settings > Integrations > Servers & Services.Ĭlick Add instance to create and configure a new integration instance. Configure SOCRadar Threat Feed on Cortex XSOAR # This integration was integrated and tested with v21.11 of SOCRadar. Retrieve indicators provided by collections via SOCRadar Threat Intelligence Feeds.
![fortigate vm kubernetes fortigate vm kubernetes](https://www.avesta.co.th/wp-content/uploads/2020/02/FortiGate-40F.png)
![fortigate vm kubernetes fortigate vm kubernetes](https://secured-aks-reference-architecture.readthedocs.io/en/latest/images/Logsantivirus.png)
Supported Cortex XSOAR versions: 6.0.0 and later.