diff --git a/Packs/AHA/Integrations/AHA/AHA.yml b/Packs/AHA/Integrations/AHA/AHA.yml index 155a68ccc1eb..dbd0f0d41334 100644 --- a/Packs/AHA/Integrations/AHA/AHA.yml +++ b/Packs/AHA/Integrations/AHA/AHA.yml @@ -171,7 +171,7 @@ script: script: "-" type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.5.0 tests: - No tests (auto formatted) diff --git a/Packs/AHA/ReleaseNotes/1_0_28.md b/Packs/AHA/ReleaseNotes/1_0_28.md new file mode 100644 index 000000000000..d596c0d83b2f --- /dev/null +++ b/Packs/AHA/ReleaseNotes/1_0_28.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Aha +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AHA/pack_metadata.json b/Packs/AHA/pack_metadata.json index 4402bda9441e..c2df22ac5a79 100644 --- a/Packs/AHA/pack_metadata.json +++ b/Packs/AHA/pack_metadata.json @@ -2,7 +2,7 @@ "name": "AHA", "description": "Use the Aha! integration to edit name/title description and status of features in Aha! according to their status in Jira", "support": "xsoar", - "currentVersion": "1.0.27", + "currentVersion": "1.0.28", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AMP/Integrations/AMPv2/AMPv2.yml b/Packs/AMP/Integrations/AMPv2/AMPv2.yml index f1f5d813b62f..d09702095ef1 100644 --- a/Packs/AMP/Integrations/AMPv2/AMPv2.yml +++ b/Packs/AMP/Integrations/AMPv2/AMPv2.yml @@ -1753,7 +1753,7 @@ script: - contextPath: DBotScore.Score description: The actual score. type: Number - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/AMP/Integrations/CiscoAMPEventCollector/CiscoAMPEventCollector.yml b/Packs/AMP/Integrations/CiscoAMPEventCollector/CiscoAMPEventCollector.yml index 02a08484c5e6..fdc3cb7bec2d 100644 --- a/Packs/AMP/Integrations/CiscoAMPEventCollector/CiscoAMPEventCollector.yml +++ b/Packs/AMP/Integrations/CiscoAMPEventCollector/CiscoAMPEventCollector.yml @@ -65,7 +65,7 @@ script: description: Gets events from Cisco AMP. execution: false name: cisco-amp-get-events - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 isfetchevents: true runonce: false script: '-' diff --git a/Packs/AMP/ReleaseNotes/2_1_4.md b/Packs/AMP/ReleaseNotes/2_1_4.md new file mode 100644 index 000000000000..a8ce32d683f7 --- /dev/null +++ b/Packs/AMP/ReleaseNotes/2_1_4.md @@ -0,0 +1,13 @@ + +#### Integrations + +##### Cisco AMP v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### Cisco AMP Event Collector +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AMP/pack_metadata.json b/Packs/AMP/pack_metadata.json index be21f34b192f..273cbad89850 100644 --- a/Packs/AMP/pack_metadata.json +++ b/Packs/AMP/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cisco AMP", "description": "Uses CISCO AMP Endpoint", "support": "xsoar", - "currentVersion": "2.1.3", + "currentVersion": "2.1.4", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", @@ -12,7 +12,11 @@ ], "tags": [], "useCases": [], - "keywords": ["Cisco", "AMP", "Secure Endpoint"], + "keywords": [ + "Cisco", + "AMP", + "Secure Endpoint" + ], "marketplaces": [ "xsoar", "marketplacev2" diff --git a/Packs/ANYRUN/Integrations/ANYRUN/ANYRUN.yml b/Packs/ANYRUN/Integrations/ANYRUN/ANYRUN.yml index f55dfab5f148..b1cbfc559b8b 100644 --- a/Packs/ANYRUN/Integrations/ANYRUN/ANYRUN.yml +++ b/Packs/ANYRUN/Integrations/ANYRUN/ANYRUN.yml @@ -375,7 +375,7 @@ script: - contextPath: ANYRUN.Task.ID description: ID of the task created to analyze the submission. type: String - dockerimage: demisto/python3:3.10.13.83255 + dockerimage: demisto/python3:3.11.10.115186 subtype: python3 runonce: false script: '-' diff --git a/Packs/ANYRUN/ReleaseNotes/1_0_22.md b/Packs/ANYRUN/ReleaseNotes/1_0_22.md new file mode 100644 index 000000000000..3f06b7b500f8 --- /dev/null +++ b/Packs/ANYRUN/ReleaseNotes/1_0_22.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### ANY.RUN +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/ANYRUN/pack_metadata.json b/Packs/ANYRUN/pack_metadata.json index dd97bf55f129..6681c70169b9 100644 --- a/Packs/ANYRUN/pack_metadata.json +++ b/Packs/ANYRUN/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ANY.RUN", "description": "ANY.RUN is a cloud-based sandbox with interactive access.", "support": "xsoar", - "currentVersion": "1.0.21", + "currentVersion": "1.0.22", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AWS-EC2/ReleaseNotes/1_4_16.md b/Packs/AWS-EC2/ReleaseNotes/1_4_16.md new file mode 100644 index 000000000000..d7315e37e5c5 --- /dev/null +++ b/Packs/AWS-EC2/ReleaseNotes/1_4_16.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### AwsEC2GetPublicSGRules +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AWS-EC2/Scripts/AwsEC2GetPublicSGRules/AwsEC2GetPublicSGRules.yml b/Packs/AWS-EC2/Scripts/AwsEC2GetPublicSGRules/AwsEC2GetPublicSGRules.yml index 11313a898db3..102f5516e146 100644 --- a/Packs/AWS-EC2/Scripts/AwsEC2GetPublicSGRules/AwsEC2GetPublicSGRules.yml +++ b/Packs/AWS-EC2/Scripts/AwsEC2GetPublicSGRules/AwsEC2GetPublicSGRules.yml @@ -62,6 +62,6 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 diff --git a/Packs/AWS-EC2/pack_metadata.json b/Packs/AWS-EC2/pack_metadata.json index b61bb3d6621d..0bc14bb40c2c 100644 --- a/Packs/AWS-EC2/pack_metadata.json +++ b/Packs/AWS-EC2/pack_metadata.json @@ -2,7 +2,7 @@ "name": "AWS - EC2", "description": "Amazon Web Services Elastic Compute Cloud (EC2)", "support": "xsoar", - "currentVersion": "1.4.15", + "currentVersion": "1.4.16", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AWS-Enrichment-Remediation/ReleaseNotes/1_1_21.md b/Packs/AWS-Enrichment-Remediation/ReleaseNotes/1_1_21.md new file mode 100644 index 000000000000..5b8880d9ccae --- /dev/null +++ b/Packs/AWS-Enrichment-Remediation/ReleaseNotes/1_1_21.md @@ -0,0 +1,13 @@ + +#### Scripts + +##### AWSRecreateSG +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### AWSAccountHierarchy +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AWS-Enrichment-Remediation/Scripts/AWSAccountHierarchy/AWSAccountHierarchy.yml b/Packs/AWS-Enrichment-Remediation/Scripts/AWSAccountHierarchy/AWSAccountHierarchy.yml index 42ccddaeb6f5..babea7a709dc 100644 --- a/Packs/AWS-Enrichment-Remediation/Scripts/AWSAccountHierarchy/AWSAccountHierarchy.yml +++ b/Packs/AWS-Enrichment-Remediation/Scripts/AWSAccountHierarchy/AWSAccountHierarchy.yml @@ -6,7 +6,7 @@ comment: Determine AWS account hierarchy by looking up parent objects until the commonfields: id: AWSAccountHierarchy version: -1 -dockerimage: demisto/python3:3.10.13.84405 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: AWSAccountHierarchy diff --git a/Packs/AWS-Enrichment-Remediation/Scripts/AWSRecreateSG/AWSRecreateSG.yml b/Packs/AWS-Enrichment-Remediation/Scripts/AWSRecreateSG/AWSRecreateSG.yml index ccdd5f9f5934..9fe7b2ffed57 100644 --- a/Packs/AWS-Enrichment-Remediation/Scripts/AWSRecreateSG/AWSRecreateSG.yml +++ b/Packs/AWS-Enrichment-Remediation/Scripts/AWSRecreateSG/AWSRecreateSG.yml @@ -51,7 +51,7 @@ dependson: - AWS - EC2|||aws-ec2-authorize-security-group-egress-rule - AWS - EC2|||aws-ec2-revoke-security-group-ingress-rule - AWS - EC2|||aws-ec2-revoke-security-group-egress-rule -dockerimage: demisto/python3:3.11.9.107421 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: AWSRecreateSG runas: DBotWeakRole diff --git a/Packs/AWS-Enrichment-Remediation/pack_metadata.json b/Packs/AWS-Enrichment-Remediation/pack_metadata.json index 76818fdeefb0..25ce1f7047a4 100644 --- a/Packs/AWS-Enrichment-Remediation/pack_metadata.json +++ b/Packs/AWS-Enrichment-Remediation/pack_metadata.json @@ -2,7 +2,7 @@ "name": "AWS Enrichment and Remediation", "description": "Playbooks using multiple AWS content packs for enrichment and remediation purposes", "support": "xsoar", - "currentVersion": "1.1.20", + "currentVersion": "1.1.21", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AWS-ILM/Integrations/AWSILM/AWSILM.yml b/Packs/AWS-ILM/Integrations/AWSILM/AWSILM.yml index cd9586f2075d..32fa40157eeb 100644 --- a/Packs/AWS-ILM/Integrations/AWSILM/AWSILM.yml +++ b/Packs/AWS-ILM/Integrations/AWSILM/AWSILM.yml @@ -347,7 +347,7 @@ script: type: Unknown description: Permanently removes a group. execution: true - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/AWS-ILM/ReleaseNotes/1_0_26.md b/Packs/AWS-ILM/ReleaseNotes/1_0_26.md new file mode 100644 index 000000000000..0f70fa38c18d --- /dev/null +++ b/Packs/AWS-ILM/ReleaseNotes/1_0_26.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### AWS - IAM (user lifecycle management) +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AWS-ILM/pack_metadata.json b/Packs/AWS-ILM/pack_metadata.json index f7f27337d1bc..3e78ce7d11dd 100644 --- a/Packs/AWS-ILM/pack_metadata.json +++ b/Packs/AWS-ILM/pack_metadata.json @@ -2,7 +2,7 @@ "name": "AWS-ILM", "description": "IAM Integration for AWS-ILM. This pack handles user account auto-provisioning", "support": "xsoar", - "currentVersion": "1.0.25", + "currentVersion": "1.0.26", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AWS_SystemManager/ReleaseNotes/1_0_7.md b/Packs/AWS_SystemManager/ReleaseNotes/1_0_7.md new file mode 100644 index 000000000000..0feeaf9cb478 --- /dev/null +++ b/Packs/AWS_SystemManager/ReleaseNotes/1_0_7.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### AWSPackageUpgrade +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AWS_SystemManager/Scripts/AWSPackageUpgrade/AWSPackageUpgrade.yml b/Packs/AWS_SystemManager/Scripts/AWSPackageUpgrade/AWSPackageUpgrade.yml index 4d13390c5c2b..90e121ed7804 100644 --- a/Packs/AWS_SystemManager/Scripts/AWSPackageUpgrade/AWSPackageUpgrade.yml +++ b/Packs/AWS_SystemManager/Scripts/AWSPackageUpgrade/AWSPackageUpgrade.yml @@ -36,7 +36,7 @@ comment: This is an AWS script that upgrades a package on the AWS EC2 instance u commonfields: id: AWSPackageUpgrade version: -1 -dockerimage: demisto/python3:3.11.9.103842 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: AWSPackageUpgrade diff --git a/Packs/AWS_SystemManager/pack_metadata.json b/Packs/AWS_SystemManager/pack_metadata.json index f6042082b319..4fe2d1e0109f 100644 --- a/Packs/AWS_SystemManager/pack_metadata.json +++ b/Packs/AWS_SystemManager/pack_metadata.json @@ -2,7 +2,7 @@ "name": "AWS Systems Manager", "description": "AWS Systems Manager is the operations hub for your AWS applications and resources and a secure end-to-end management solution for hybrid cloud environments that enables safe and secure operations at scale.", "support": "xsoar", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Absolute/Integrations/Absolute/Absolute.yml b/Packs/Absolute/Integrations/Absolute/Absolute.yml index 26b450aca92d..61f985d5512b 100644 --- a/Packs/Absolute/Integrations/Absolute/Absolute.yml +++ b/Packs/Absolute/Integrations/Absolute/Absolute.yml @@ -710,7 +710,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - Absolute_TestPlaybook diff --git a/Packs/Absolute/ReleaseNotes/1_0_24.md b/Packs/Absolute/ReleaseNotes/1_0_24.md new file mode 100644 index 000000000000..9f20e5be3b84 --- /dev/null +++ b/Packs/Absolute/ReleaseNotes/1_0_24.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Absolute +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Absolute/pack_metadata.json b/Packs/Absolute/pack_metadata.json index 81b73d3b9443..dffb0335bc04 100644 --- a/Packs/Absolute/pack_metadata.json +++ b/Packs/Absolute/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Absolute", "description": "Absolute is an adaptive endpoint security solution that delivers device security, data security and asset management of endpoints", "support": "xsoar", - "currentVersion": "1.0.23", + "currentVersion": "1.0.24", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Algosec/ReleaseNotes/1_0_15.md b/Packs/Algosec/ReleaseNotes/1_0_15.md new file mode 100644 index 000000000000..e631ab04aa97 --- /dev/null +++ b/Packs/Algosec/ReleaseNotes/1_0_15.md @@ -0,0 +1,28 @@ + +#### Scripts + +##### AlgosecCreateTicket +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### AlgosecGetApplications +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### AlgosecGetTicket +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### AlgosecGetNetworkObject +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### AlgosecQuery +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Algosec/Scripts/AlgosecCreateTicket/AlgosecCreateTicket.yml b/Packs/Algosec/Scripts/AlgosecCreateTicket/AlgosecCreateTicket.yml index e0fb3deb3869..ec9593efc367 100644 --- a/Packs/Algosec/Scripts/AlgosecCreateTicket/AlgosecCreateTicket.yml +++ b/Packs/Algosec/Scripts/AlgosecCreateTicket/AlgosecCreateTicket.yml @@ -48,6 +48,6 @@ dependson: must: - algosec-create-ticket fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/Algosec/Scripts/AlgosecGetApplications/AlgosecGetApplications.yml b/Packs/Algosec/Scripts/AlgosecGetApplications/AlgosecGetApplications.yml index 13cc8a9f656f..cbcbc8f4432b 100644 --- a/Packs/Algosec/Scripts/AlgosecGetApplications/AlgosecGetApplications.yml +++ b/Packs/Algosec/Scripts/AlgosecGetApplications/AlgosecGetApplications.yml @@ -28,6 +28,6 @@ dependson: must: - algosec-get-applications fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/Algosec/Scripts/AlgosecGetNetworkObject/AlgosecGetNetworkObject.yml b/Packs/Algosec/Scripts/AlgosecGetNetworkObject/AlgosecGetNetworkObject.yml index c286f9e34292..82ab04b7b54c 100644 --- a/Packs/Algosec/Scripts/AlgosecGetNetworkObject/AlgosecGetNetworkObject.yml +++ b/Packs/Algosec/Scripts/AlgosecGetNetworkObject/AlgosecGetNetworkObject.yml @@ -28,6 +28,6 @@ dependson: must: - algosec-get-network-object fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/Algosec/Scripts/AlgosecGetTicket/AlgosecGetTicket.yml b/Packs/Algosec/Scripts/AlgosecGetTicket/AlgosecGetTicket.yml index 83006209423a..15aadefee5df 100644 --- a/Packs/Algosec/Scripts/AlgosecGetTicket/AlgosecGetTicket.yml +++ b/Packs/Algosec/Scripts/AlgosecGetTicket/AlgosecGetTicket.yml @@ -20,6 +20,6 @@ dependson: must: - algosec-get-ticket fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/Algosec/Scripts/AlgosecQuery/AlgosecQuery.yml b/Packs/Algosec/Scripts/AlgosecQuery/AlgosecQuery.yml index 9588bfa1ba3f..7841cbeb19df 100644 --- a/Packs/Algosec/Scripts/AlgosecQuery/AlgosecQuery.yml +++ b/Packs/Algosec/Scripts/AlgosecQuery/AlgosecQuery.yml @@ -30,6 +30,6 @@ dependson: must: - algosec-query fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/Algosec/pack_metadata.json b/Packs/Algosec/pack_metadata.json index 821d96fb5139..79a468d8df64 100644 --- a/Packs/Algosec/pack_metadata.json +++ b/Packs/Algosec/pack_metadata.json @@ -2,7 +2,7 @@ "name": "AlgoSec", "description": "Algosec AppViz, Firewall Analyzer (AFA) and FireFlow(AFF).", "support": "xsoar", - "currentVersion": "1.0.14", + "currentVersion": "1.0.15", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AlienVault_USM_Anywhere/Integrations/AlienVault_USM_Anywhere/AlienVault_USM_Anywhere.yml b/Packs/AlienVault_USM_Anywhere/Integrations/AlienVault_USM_Anywhere/AlienVault_USM_Anywhere.yml index 03e75e57ead5..a40e1c662f45 100644 --- a/Packs/AlienVault_USM_Anywhere/Integrations/AlienVault_USM_Anywhere/AlienVault_USM_Anywhere.yml +++ b/Packs/AlienVault_USM_Anywhere/Integrations/AlienVault_USM_Anywhere/AlienVault_USM_Anywhere.yml @@ -340,7 +340,7 @@ script: - contextPath: AlienVault.Event.Subcategory description: The event subcategory. type: String - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/AlienVault_USM_Anywhere/ReleaseNotes/1_0_23.md b/Packs/AlienVault_USM_Anywhere/ReleaseNotes/1_0_23.md new file mode 100644 index 000000000000..bc5cafb8ff47 --- /dev/null +++ b/Packs/AlienVault_USM_Anywhere/ReleaseNotes/1_0_23.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### AlienVault USM Anywhere +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AlienVault_USM_Anywhere/pack_metadata.json b/Packs/AlienVault_USM_Anywhere/pack_metadata.json index ea1f86012048..2d461d51eb37 100644 --- a/Packs/AlienVault_USM_Anywhere/pack_metadata.json +++ b/Packs/AlienVault_USM_Anywhere/pack_metadata.json @@ -2,7 +2,7 @@ "name": "AlienVault USM Anywhere", "description": "Searches for and monitors alarms and events from AlienVault USM Anywhere.", "support": "xsoar", - "currentVersion": "1.0.22", + "currentVersion": "1.0.23", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Anomali_Enterprise/Integrations/Anomali_Enterprise/Anomali_Enterprise.yml b/Packs/Anomali_Enterprise/Integrations/Anomali_Enterprise/Anomali_Enterprise.yml index eded83c5d3e4..fc2ff5f71fed 100644 --- a/Packs/Anomali_Enterprise/Integrations/Anomali_Enterprise/Anomali_Enterprise.yml +++ b/Packs/Anomali_Enterprise/Integrations/Anomali_Enterprise/Anomali_Enterprise.yml @@ -173,7 +173,7 @@ script: - contextPath: Domain.Malicious.Description description: A description of the malicious domain. type: String - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Anomali_Enterprise/ReleaseNotes/1_0_34.md b/Packs/Anomali_Enterprise/ReleaseNotes/1_0_34.md new file mode 100644 index 000000000000..315ea0271bdf --- /dev/null +++ b/Packs/Anomali_Enterprise/ReleaseNotes/1_0_34.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Anomali Match +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Anomali_Enterprise/pack_metadata.json b/Packs/Anomali_Enterprise/pack_metadata.json index b1a652430dbb..33005eaa908e 100644 --- a/Packs/Anomali_Enterprise/pack_metadata.json +++ b/Packs/Anomali_Enterprise/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Anomali Enterprise", "description": "Use Anomali Match to query IOCs and conduct forensic searches.", "support": "xsoar", - "currentVersion": "1.0.33", + "currentVersion": "1.0.34", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Anomali_ThreatStream/ReleaseNotes/2_2_25.md b/Packs/Anomali_ThreatStream/ReleaseNotes/2_2_25.md new file mode 100644 index 000000000000..903ed1f49ac1 --- /dev/null +++ b/Packs/Anomali_ThreatStream/ReleaseNotes/2_2_25.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### ThreatstreamBuildIocImportJson +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Anomali_ThreatStream/Scripts/ThreatstreamBuildIocImportJson/ThreatstreamBuildIocImportJson.yml b/Packs/Anomali_ThreatStream/Scripts/ThreatstreamBuildIocImportJson/ThreatstreamBuildIocImportJson.yml index 1148bc9f4f7a..b20e3966c2e8 100644 --- a/Packs/Anomali_ThreatStream/Scripts/ThreatstreamBuildIocImportJson/ThreatstreamBuildIocImportJson.yml +++ b/Packs/Anomali_ThreatStream/Scripts/ThreatstreamBuildIocImportJson/ThreatstreamBuildIocImportJson.yml @@ -41,7 +41,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.14.90585 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.8.0 tests: - No tests (auto formatted) diff --git a/Packs/Anomali_ThreatStream/pack_metadata.json b/Packs/Anomali_ThreatStream/pack_metadata.json index 7df23f64f720..1cd74392129e 100644 --- a/Packs/Anomali_ThreatStream/pack_metadata.json +++ b/Packs/Anomali_ThreatStream/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Anomali ThreatStream", "description": "Use Anomali ThreatStream to query and submit threats.", "support": "xsoar", - "currentVersion": "2.2.24", + "currentVersion": "2.2.25", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AnsibleTower/Integrations/AnsibleTower/AnsibleTower.yml b/Packs/AnsibleTower/Integrations/AnsibleTower/AnsibleTower.yml index 078fee30e748..37852c768c8e 100644 --- a/Packs/AnsibleTower/Integrations/AnsibleTower/AnsibleTower.yml +++ b/Packs/AnsibleTower/Integrations/AnsibleTower/AnsibleTower.yml @@ -1328,7 +1328,7 @@ script: - contextPath: AnsibleAWX.JobEvents.event_data description: Job's raw event data type: String - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/AnsibleTower/ReleaseNotes/1_1_2.md b/Packs/AnsibleTower/ReleaseNotes/1_1_2.md new file mode 100644 index 000000000000..ddbb4c2addbc --- /dev/null +++ b/Packs/AnsibleTower/ReleaseNotes/1_1_2.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Ansible Automation Platform +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AnsibleTower/pack_metadata.json b/Packs/AnsibleTower/pack_metadata.json index fea82fe99ea7..0ce9cac483dd 100644 --- a/Packs/AnsibleTower/pack_metadata.json +++ b/Packs/AnsibleTower/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Ansible Automation Platform", "description": "Scale IT automation, manage complex deployments and speed productivity.", "support": "xsoar", - "currentVersion": "1.1.1", + "currentVersion": "1.1.2", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AquatoneDiscover/ReleaseNotes/1_0_2.md b/Packs/AquatoneDiscover/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..49d1fe95f7ba --- /dev/null +++ b/Packs/AquatoneDiscover/ReleaseNotes/1_0_2.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### AquatoneDiscover + +- Added deprecation description. diff --git a/Packs/AquatoneDiscover/Scripts/script-AquatoneDiscover.yml b/Packs/AquatoneDiscover/Scripts/script-AquatoneDiscover.yml index 2003406d687d..519a347fdec6 100644 --- a/Packs/AquatoneDiscover/Scripts/script-AquatoneDiscover.yml +++ b/Packs/AquatoneDiscover/Scripts/script-AquatoneDiscover.yml @@ -60,6 +60,6 @@ scripttarget: 0 timeout: 1h0m0s runonce: true dockerimage: demisto/aquatone -comment: 'aquatone-discover will find the targets nameservers and shuffle DNS lookups between them. Should a lookup fail on the target domains nameservers, aquatone-discover will fall back to using Google public DNS servers to maximize discovery.' +comment: 'Deprecated. Use AquatoneDiscoverV2 from the CommonScripts pack instead.' fromversion: 5.0.0 deprecated: true diff --git a/Packs/AquatoneDiscover/pack_metadata.json b/Packs/AquatoneDiscover/pack_metadata.json index ef4d5ddb0234..90f929f9e7e7 100644 --- a/Packs/AquatoneDiscover/pack_metadata.json +++ b/Packs/AquatoneDiscover/pack_metadata.json @@ -2,7 +2,7 @@ "name": "AquatoneDiscover (Deprecated)", "description": "Deprecated. Use ***AquatoneDiscover*** script from ***Common Scripts** pack instead.\n. aquatone-discover will find the targets nameservers and shuffle DNS lookups between them. Should a lookup fail on the target domains nameservers, aquatone-discover will fall back to using Google public DNS servers to maximize discovery.", "support": "xsoar", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/ArcSightESM/Integrations/ArcSightESMv2/ArcSightESMv2.yml b/Packs/ArcSightESM/Integrations/ArcSightESMv2/ArcSightESMv2.yml index 2eff94623e7d..7577843e7d68 100644 --- a/Packs/ArcSightESM/Integrations/ArcSightESMv2/ArcSightESMv2.yml +++ b/Packs/ArcSightESM/Integrations/ArcSightESMv2/ArcSightESMv2.yml @@ -380,7 +380,7 @@ script: runonce: false script: '-' subtype: python3 - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 type: python tests: - ArcSight ESM v2 Test diff --git a/Packs/ArcSightESM/ReleaseNotes/1_2_4.md b/Packs/ArcSightESM/ReleaseNotes/1_2_4.md new file mode 100644 index 000000000000..ae6465fdc90f --- /dev/null +++ b/Packs/ArcSightESM/ReleaseNotes/1_2_4.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### ArcSight ESM v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/ArcSightESM/pack_metadata.json b/Packs/ArcSightESM/pack_metadata.json index 9517b8752de9..b9abd7b9aaf2 100644 --- a/Packs/ArcSightESM/pack_metadata.json +++ b/Packs/ArcSightESM/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ArcSight ESM", "description": "ArcSight ESM SIEM by Micro Focus (Formerly HPE Software).", "support": "xsoar", - "currentVersion": "1.2.3", + "currentVersion": "1.2.4", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/ArcherRSA/ReleaseNotes/1_2_20.md b/Packs/ArcherRSA/ReleaseNotes/1_2_20.md new file mode 100644 index 000000000000..f1cc96071a9a --- /dev/null +++ b/Packs/ArcherRSA/ReleaseNotes/1_2_20.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### ArcherCreateIncidentExample +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/ArcherRSA/Scripts/ArcherCreateIncidentExample/ArcherCreateIncidentExample.yml b/Packs/ArcherRSA/Scripts/ArcherCreateIncidentExample/ArcherCreateIncidentExample.yml index 116a97870887..b9dc4fc22b71 100644 --- a/Packs/ArcherRSA/Scripts/ArcherCreateIncidentExample/ArcherCreateIncidentExample.yml +++ b/Packs/ArcherRSA/Scripts/ArcherCreateIncidentExample/ArcherCreateIncidentExample.yml @@ -33,7 +33,7 @@ script: '-' subtype: python3 timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 skipprepare: diff --git a/Packs/ArcherRSA/pack_metadata.json b/Packs/ArcherRSA/pack_metadata.json index 11e002082b3c..085cb25ed976 100644 --- a/Packs/ArcherRSA/pack_metadata.json +++ b/Packs/ArcherRSA/pack_metadata.json @@ -2,7 +2,7 @@ "name": "RSA Archer", "description": "The RSA Archer GRC Platform provides a common foundation for managing policies, controls, risks, assessments and deficiencies across lines of business.", "support": "xsoar", - "currentVersion": "1.2.19", + "currentVersion": "1.2.20", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Arkime/Integrations/Arkime/Arkime.yml b/Packs/Arkime/Integrations/Arkime/Arkime.yml index 3c1f13a84252..dc3ec0063044 100644 --- a/Packs/Arkime/Integrations/Arkime/Arkime.yml +++ b/Packs/Arkime/Integrations/Arkime/Arkime.yml @@ -29,7 +29,7 @@ script: script: '' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 commands: - name: arkime-connection-list description: Gets a list of nodes and links and returns them to the client. diff --git a/Packs/Arkime/ReleaseNotes/1_0_22.md b/Packs/Arkime/ReleaseNotes/1_0_22.md new file mode 100644 index 000000000000..308272ba3d69 --- /dev/null +++ b/Packs/Arkime/ReleaseNotes/1_0_22.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Arkime +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Arkime/pack_metadata.json b/Packs/Arkime/pack_metadata.json index f7468d891a8d..6524bde5d9fa 100644 --- a/Packs/Arkime/pack_metadata.json +++ b/Packs/Arkime/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Arkime", "description": "Arkime (formerly Moloch) is a large scale, open source, indexed packet capture and search tool.", "support": "xsoar", - "currentVersion": "1.0.21", + "currentVersion": "1.0.22", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AtlassianConfluenceCloud/Integrations/AtlassianConfluenceCloud/AtlassianConfluenceCloud.yml b/Packs/AtlassianConfluenceCloud/Integrations/AtlassianConfluenceCloud/AtlassianConfluenceCloud.yml index 7264c8530714..ce82a1f4c047 100644 --- a/Packs/AtlassianConfluenceCloud/Integrations/AtlassianConfluenceCloud/AtlassianConfluenceCloud.yml +++ b/Packs/AtlassianConfluenceCloud/Integrations/AtlassianConfluenceCloud/AtlassianConfluenceCloud.yml @@ -2040,7 +2040,7 @@ script: - contextPath: ConfluenceCloud.Event.associatedObjects.objectType description: Type of the associated object. type: String - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 isfetchevents: true isfetchevents:xsoar: false runonce: false diff --git a/Packs/AtlassianConfluenceCloud/ReleaseNotes/1_1_1.md b/Packs/AtlassianConfluenceCloud/ReleaseNotes/1_1_1.md new file mode 100644 index 000000000000..f2b468184bb2 --- /dev/null +++ b/Packs/AtlassianConfluenceCloud/ReleaseNotes/1_1_1.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Atlassian Confluence Cloud +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AtlassianConfluenceCloud/pack_metadata.json b/Packs/AtlassianConfluenceCloud/pack_metadata.json index d022a352cefc..9b7814ee2ad6 100644 --- a/Packs/AtlassianConfluenceCloud/pack_metadata.json +++ b/Packs/AtlassianConfluenceCloud/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Atlassian Confluence Cloud", "description": "Atlassian Confluence Cloud allows users to interact with confluence entities like content, space, users and groups. Users can also manage the space permissions.", "support": "xsoar", - "currentVersion": "1.1.0", + "currentVersion": "1.1.1", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AtlassianJiraServiceManagement/Integrations/AtlassianJiraServiceManagement/AtlassianJiraServiceManagement.yml b/Packs/AtlassianJiraServiceManagement/Integrations/AtlassianJiraServiceManagement/AtlassianJiraServiceManagement.yml index 7886992ac36f..a6f298d2657c 100644 --- a/Packs/AtlassianJiraServiceManagement/Integrations/AtlassianJiraServiceManagement/AtlassianJiraServiceManagement.yml +++ b/Packs/AtlassianJiraServiceManagement/Integrations/AtlassianJiraServiceManagement/AtlassianJiraServiceManagement.yml @@ -675,7 +675,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.10.0 tests: - No tests (auto formatted) diff --git a/Packs/AtlassianJiraServiceManagement/ReleaseNotes/1_0_1.md b/Packs/AtlassianJiraServiceManagement/ReleaseNotes/1_0_1.md new file mode 100644 index 000000000000..509d854a2228 --- /dev/null +++ b/Packs/AtlassianJiraServiceManagement/ReleaseNotes/1_0_1.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Atlassian Jira Service Management +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AtlassianJiraServiceManagement/pack_metadata.json b/Packs/AtlassianJiraServiceManagement/pack_metadata.json index 51d1bdf3699e..9f35f615b248 100644 --- a/Packs/AtlassianJiraServiceManagement/pack_metadata.json +++ b/Packs/AtlassianJiraServiceManagement/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Atlassian Jira Service Management", "description": "Use this pack to manage Jira objects and attach files to Jira objects from XSOAR", "support": "xsoar", - "currentVersion": "1.0.0", + "currentVersion": "1.0.1", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", @@ -15,7 +15,12 @@ "Network Security", "Vulnerability Management" ], - "keywords": ["Jira", "Atlassian", "Jira Service Management", "Jira Assets"], + "keywords": [ + "Jira", + "Atlassian", + "Jira Service Management", + "Jira Assets" + ], "marketplaces": [ "xsoar", "marketplacev2" diff --git a/Packs/Attlasian/Integrations/Attlasian_IAM/Attlasian_IAM.yml b/Packs/Attlasian/Integrations/Attlasian_IAM/Attlasian_IAM.yml index f2ab47579153..b4eed4a2418b 100644 --- a/Packs/Attlasian/Integrations/Attlasian_IAM/Attlasian_IAM.yml +++ b/Packs/Attlasian/Integrations/Attlasian_IAM/Attlasian_IAM.yml @@ -238,7 +238,7 @@ script: type: String - description: Retrieves a User Profile schema, which holds all of the user fields within the application. Used for outgoing-mapping through the Get Schema option. name: get-mapping-fields - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 ismappable: true isremotesyncout: true script: '-' diff --git a/Packs/Attlasian/ReleaseNotes/1_1_16.md b/Packs/Attlasian/ReleaseNotes/1_1_16.md new file mode 100644 index 000000000000..6cce2ab03bf5 --- /dev/null +++ b/Packs/Attlasian/ReleaseNotes/1_1_16.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Atlassian IAM +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Attlasian/pack_metadata.json b/Packs/Attlasian/pack_metadata.json index 0651a566d49e..27da295eac80 100644 --- a/Packs/Attlasian/pack_metadata.json +++ b/Packs/Attlasian/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Atlassian IAM", "description": "Atlassian IAM Integration allows the customers to do the generic ILM management operations such as create, update, delete, etc.", "support": "xsoar", - "currentVersion": "1.1.15", + "currentVersion": "1.1.16", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Azure-Enrichment-Remediation/ReleaseNotes/1_1_21.md b/Packs/Azure-Enrichment-Remediation/ReleaseNotes/1_1_21.md new file mode 100644 index 000000000000..2e81be282581 --- /dev/null +++ b/Packs/Azure-Enrichment-Remediation/ReleaseNotes/1_1_21.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### AzureFindAvailableNSGPriorities +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Azure-Enrichment-Remediation/Scripts/AzureFindAvailableNSGPriorities/AzureFindAvailableNSGPriorities.yml b/Packs/Azure-Enrichment-Remediation/Scripts/AzureFindAvailableNSGPriorities/AzureFindAvailableNSGPriorities.yml index 7109adaf1d71..e899e65b4d47 100644 --- a/Packs/Azure-Enrichment-Remediation/Scripts/AzureFindAvailableNSGPriorities/AzureFindAvailableNSGPriorities.yml +++ b/Packs/Azure-Enrichment-Remediation/Scripts/AzureFindAvailableNSGPriorities/AzureFindAvailableNSGPriorities.yml @@ -13,7 +13,7 @@ comment: This script takes in a list of numbers that represent Azure priorities commonfields: id: AzureFindAvailableNSGPriorities version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: AzureFindAvailableNSGPriorities outputs: diff --git a/Packs/Azure-Enrichment-Remediation/pack_metadata.json b/Packs/Azure-Enrichment-Remediation/pack_metadata.json index 49a1a151c28e..dcacdf3f101f 100644 --- a/Packs/Azure-Enrichment-Remediation/pack_metadata.json +++ b/Packs/Azure-Enrichment-Remediation/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Enrichment and Remediation", "description": "Playbooks using multiple Azure content packs for enrichment and remediation purposes", "support": "xsoar", - "currentVersion": "1.1.20", + "currentVersion": "1.1.21", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureCompute/Integrations/AzureCompute_v2/AzureCompute_v2.yml b/Packs/AzureCompute/Integrations/AzureCompute_v2/AzureCompute_v2.yml index ca36138aa417..8f0d873a0f8a 100644 --- a/Packs/AzureCompute/Integrations/AzureCompute_v2/AzureCompute_v2.yml +++ b/Packs/AzureCompute/Integrations/AzureCompute_v2/AzureCompute_v2.yml @@ -648,7 +648,7 @@ script: description: Run this command if for some reason you need to rerun the authentication process. execution: false name: azure-vm-auth-reset - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/AzureCompute/ReleaseNotes/1_2_32.md b/Packs/AzureCompute/ReleaseNotes/1_2_32.md new file mode 100644 index 000000000000..e141d2bd9256 --- /dev/null +++ b/Packs/AzureCompute/ReleaseNotes/1_2_32.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Compute v2 +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureCompute/pack_metadata.json b/Packs/AzureCompute/pack_metadata.json index 75cead2ebcbc..7654d3ee38ae 100644 --- a/Packs/AzureCompute/pack_metadata.json +++ b/Packs/AzureCompute/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Compute", "description": "Create and Manage Azure Virtual Machines", "support": "xsoar", - "currentVersion": "1.2.31", + "currentVersion": "1.2.32", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureDevOps/Integrations/AzureDevOps/AzureDevOps.yml b/Packs/AzureDevOps/Integrations/AzureDevOps/AzureDevOps.yml index 9d24712e2fe1..e468fd8d60c8 100644 --- a/Packs/AzureDevOps/Integrations/AzureDevOps/AzureDevOps.yml +++ b/Packs/AzureDevOps/Integrations/AzureDevOps/AzureDevOps.yml @@ -2987,7 +2987,7 @@ script: - description: Generate the login url used for Authorization code flow. name: azure-devops-generate-login-url arguments: [] - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 isremotesyncout: true ismappable: true isfetch: true diff --git a/Packs/AzureDevOps/ReleaseNotes/1_4_5.md b/Packs/AzureDevOps/ReleaseNotes/1_4_5.md new file mode 100644 index 000000000000..d654a5342c7f --- /dev/null +++ b/Packs/AzureDevOps/ReleaseNotes/1_4_5.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### AzureDevOps +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureDevOps/pack_metadata.json b/Packs/AzureDevOps/pack_metadata.json index f9feb30b48f3..59b7e1df520d 100644 --- a/Packs/AzureDevOps/pack_metadata.json +++ b/Packs/AzureDevOps/pack_metadata.json @@ -2,7 +2,7 @@ "name": "AzureDevOps", "description": "Create and manage Git repositories in Azure DevOps Services.", "support": "xsoar", - "currentVersion": "1.4.4", + "currentVersion": "1.4.5", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureFirewall/Integrations/AzureFirewall/AzureFirewall.yml b/Packs/AzureFirewall/Integrations/AzureFirewall/AzureFirewall.yml index 56cd30ee880c..12b08ce530c2 100644 --- a/Packs/AzureFirewall/Integrations/AzureFirewall/AzureFirewall.yml +++ b/Packs/AzureFirewall/Integrations/AzureFirewall/AzureFirewall.yml @@ -1089,7 +1089,7 @@ script: - contextPath: AzureFirewall.ResourceGroup.type description: The type of the resource group. type: String - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/AzureFirewall/ReleaseNotes/1_1_45.md b/Packs/AzureFirewall/ReleaseNotes/1_1_45.md new file mode 100644 index 000000000000..09dbf5313a55 --- /dev/null +++ b/Packs/AzureFirewall/ReleaseNotes/1_1_45.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Firewall +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureFirewall/pack_metadata.json b/Packs/AzureFirewall/pack_metadata.json index ef4557980709..3333cf9768e4 100644 --- a/Packs/AzureFirewall/pack_metadata.json +++ b/Packs/AzureFirewall/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Firewall", "description": "Azure Firewall is a cloud-native and intelligent network firewall security service that provides breed threat protection for cloud workloads running in Azure.It's a fully stateful, firewall as a service with built-in high availability and unrestricted cloud scalability.", "support": "xsoar", - "currentVersion": "1.1.44", + "currentVersion": "1.1.45", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureKeyVault/Integrations/AzureKeyVault/AzureKeyVault.yml b/Packs/AzureKeyVault/Integrations/AzureKeyVault/AzureKeyVault.yml index 98837746935e..7fd265be6211 100644 --- a/Packs/AzureKeyVault/Integrations/AzureKeyVault/AzureKeyVault.yml +++ b/Packs/AzureKeyVault/Integrations/AzureKeyVault/AzureKeyVault.yml @@ -964,7 +964,7 @@ script: description: Run this command if for some reason you need to rerun the authentication process. execution: false name: azure-key-vault-auth-reset - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/AzureKeyVault/ReleaseNotes/1_1_49.md b/Packs/AzureKeyVault/ReleaseNotes/1_1_49.md new file mode 100644 index 000000000000..01c26909b2f0 --- /dev/null +++ b/Packs/AzureKeyVault/ReleaseNotes/1_1_49.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Key Vault +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureKeyVault/pack_metadata.json b/Packs/AzureKeyVault/pack_metadata.json index 7686b4aec645..f7e890024f5c 100644 --- a/Packs/AzureKeyVault/pack_metadata.json +++ b/Packs/AzureKeyVault/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Key Vault", "description": "Use Key Vault to safeguard and manage cryptographic keys and secrets used by cloud applications and services.", "support": "xsoar", - "currentVersion": "1.1.48", + "currentVersion": "1.1.49", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureKubernetesServices/Integrations/AzureKubernetesServices/AzureKubernetesServices.yml b/Packs/AzureKubernetesServices/Integrations/AzureKubernetesServices/AzureKubernetesServices.yml index aacc77225e4e..39c7d97ede7f 100644 --- a/Packs/AzureKubernetesServices/Integrations/AzureKubernetesServices/AzureKubernetesServices.yml +++ b/Packs/AzureKubernetesServices/Integrations/AzureKubernetesServices/AzureKubernetesServices.yml @@ -394,7 +394,7 @@ script: - contextPath: AzureKS.ResourceGroup.tags.type description: 'The type tag associated with the Azure Kubernetes resource group.' type: String - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/AzureKubernetesServices/ReleaseNotes/1_2_4.md b/Packs/AzureKubernetesServices/ReleaseNotes/1_2_4.md new file mode 100644 index 000000000000..4748714e3482 --- /dev/null +++ b/Packs/AzureKubernetesServices/ReleaseNotes/1_2_4.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Kubernetes Services +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureKubernetesServices/pack_metadata.json b/Packs/AzureKubernetesServices/pack_metadata.json index f2de4c16ec29..05e13be2f011 100644 --- a/Packs/AzureKubernetesServices/pack_metadata.json +++ b/Packs/AzureKubernetesServices/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Kubernetes Services", "description": "Deploy and manage containerized applications with a fully managed Kubernetes service.", "support": "xsoar", - "currentVersion": "1.2.3", + "currentVersion": "1.2.4", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureLogAnalytics/Integrations/AzureLogAnalytics/AzureLogAnalytics.yml b/Packs/AzureLogAnalytics/Integrations/AzureLogAnalytics/AzureLogAnalytics.yml index 2173e3855302..66b78be4f12d 100644 --- a/Packs/AzureLogAnalytics/Integrations/AzureLogAnalytics/AzureLogAnalytics.yml +++ b/Packs/AzureLogAnalytics/Integrations/AzureLogAnalytics/AzureLogAnalytics.yml @@ -707,7 +707,7 @@ script: name: workspace_name description: Delete a Log Analytics workspace table. We recommend you delete the search job when you're done querying the table. This reduces workspace clutter and extra charges for data retention. name: azure-log-analytics-delete-search-job - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/AzureLogAnalytics/ReleaseNotes/1_1_41.md b/Packs/AzureLogAnalytics/ReleaseNotes/1_1_41.md new file mode 100644 index 000000000000..a5dcd657203b --- /dev/null +++ b/Packs/AzureLogAnalytics/ReleaseNotes/1_1_41.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Log Analytics +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureLogAnalytics/pack_metadata.json b/Packs/AzureLogAnalytics/pack_metadata.json index 5002ff47de82..a1fcdfa10645 100644 --- a/Packs/AzureLogAnalytics/pack_metadata.json +++ b/Packs/AzureLogAnalytics/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Log Analytics", "description": "Log Analytics is a service that helps you collect and analyze data generated by resources in your cloud and on-premises environments.", "support": "xsoar", - "currentVersion": "1.1.40", + "currentVersion": "1.1.41", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureNetworkSecurityGroups/Integrations/AzureNetworkSecurityGroups/AzureNetworkSecurityGroups.yml b/Packs/AzureNetworkSecurityGroups/Integrations/AzureNetworkSecurityGroups/AzureNetworkSecurityGroups.yml index 07c484078590..4c2af94bde50 100644 --- a/Packs/AzureNetworkSecurityGroups/Integrations/AzureNetworkSecurityGroups/AzureNetworkSecurityGroups.yml +++ b/Packs/AzureNetworkSecurityGroups/Integrations/AzureNetworkSecurityGroups/AzureNetworkSecurityGroups.yml @@ -613,7 +613,7 @@ script: - contextPath: AzureNSG.ResourceGroup.tags.type description: 'The type tag associated with the Azure Network Security Groups resource group.' type: String - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/AzureNetworkSecurityGroups/ReleaseNotes/1_2_36.md b/Packs/AzureNetworkSecurityGroups/ReleaseNotes/1_2_36.md new file mode 100644 index 000000000000..e24f6a2f0d51 --- /dev/null +++ b/Packs/AzureNetworkSecurityGroups/ReleaseNotes/1_2_36.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Network Security Groups +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureNetworkSecurityGroups/pack_metadata.json b/Packs/AzureNetworkSecurityGroups/pack_metadata.json index 73c7e9b816ba..0f0e741c4a47 100644 --- a/Packs/AzureNetworkSecurityGroups/pack_metadata.json +++ b/Packs/AzureNetworkSecurityGroups/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Network Security Groups", "description": "Azure Network Security Groups are used to filter network traffic to and from Azure resources in an Azure virtual network", "support": "xsoar", - "currentVersion": "1.2.35", + "currentVersion": "1.2.36", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureResourceGraph/Integrations/AzureResourceGraph/AzureResourceGraph.yml b/Packs/AzureResourceGraph/Integrations/AzureResourceGraph/AzureResourceGraph.yml index 9f3069a5a81d..175d9f0d5830 100644 --- a/Packs/AzureResourceGraph/Integrations/AzureResourceGraph/AzureResourceGraph.yml +++ b/Packs/AzureResourceGraph/Integrations/AzureResourceGraph/AzureResourceGraph.yml @@ -101,7 +101,7 @@ script: description: Data returned from query. type: String description: 'Executes a given Azure Resource Graph Query. (Ex: query="Resources | project name, type | limit 5 | order by name asc").' - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '' subtype: python3 diff --git a/Packs/AzureResourceGraph/ReleaseNotes/1_0_5.md b/Packs/AzureResourceGraph/ReleaseNotes/1_0_5.md new file mode 100644 index 000000000000..e7bdc31b7f46 --- /dev/null +++ b/Packs/AzureResourceGraph/ReleaseNotes/1_0_5.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Resource Graph +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureResourceGraph/pack_metadata.json b/Packs/AzureResourceGraph/pack_metadata.json index 7d848ef8215c..534e88e18d8f 100644 --- a/Packs/AzureResourceGraph/pack_metadata.json +++ b/Packs/AzureResourceGraph/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Resource Graph", "description": "Azure Resource Graph is an Azure service designed to extend Azure Resource Management by providing efficient and performant resource exploration with the ability to query at scale across a given set of resources. This pack is primarily used to allow for executing Azure Resource Graph queries.", "support": "xsoar", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureRiskyUsers/Integrations/AzureRiskyUsers/AzureRiskyUsers.yml b/Packs/AzureRiskyUsers/Integrations/AzureRiskyUsers/AzureRiskyUsers.yml index 4a7a1e77a4b2..214140ac25ab 100644 --- a/Packs/AzureRiskyUsers/Integrations/AzureRiskyUsers/AzureRiskyUsers.yml +++ b/Packs/AzureRiskyUsers/Integrations/AzureRiskyUsers/AzureRiskyUsers.yml @@ -326,7 +326,7 @@ script: - contextPath: AzureRiskyUsers.RiskDetection.tokenIssuerType description: 'Indicates the type of token issuer for the detected sign-in risk. Possible values are: AzureAD, ADFederationServices, UnknownFutureValue.' type: String - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/AzureRiskyUsers/ReleaseNotes/1_1_41.md b/Packs/AzureRiskyUsers/ReleaseNotes/1_1_41.md new file mode 100644 index 000000000000..99e4d2fbbe9e --- /dev/null +++ b/Packs/AzureRiskyUsers/ReleaseNotes/1_1_41.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Risky Users +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureRiskyUsers/pack_metadata.json b/Packs/AzureRiskyUsers/pack_metadata.json index 63b6643e9850..4f9ba08751cf 100644 --- a/Packs/AzureRiskyUsers/pack_metadata.json +++ b/Packs/AzureRiskyUsers/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Risky Users", "description": "Azure Risky Users provides access to all at-risk users and risk detections in Azure AD environment.", "support": "xsoar", - "currentVersion": "1.1.40", + "currentVersion": "1.1.41", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureSQLManagement/Integrations/AzureSQLManagement/AzureSQLManagement.yml b/Packs/AzureSQLManagement/Integrations/AzureSQLManagement/AzureSQLManagement.yml index ba7d9bd0a787..7095d30df8f9 100644 --- a/Packs/AzureSQLManagement/Integrations/AzureSQLManagement/AzureSQLManagement.yml +++ b/Packs/AzureSQLManagement/Integrations/AzureSQLManagement/AzureSQLManagement.yml @@ -652,7 +652,7 @@ script: - contextPath: AzureSQL.ResourceGroup.tags description: The tags attached to the resource group. type: String - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/AzureSQLManagement/ReleaseNotes/1_2_4.md b/Packs/AzureSQLManagement/ReleaseNotes/1_2_4.md new file mode 100644 index 000000000000..9e0f874b905d --- /dev/null +++ b/Packs/AzureSQLManagement/ReleaseNotes/1_2_4.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure SQL Management +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureSQLManagement/pack_metadata.json b/Packs/AzureSQLManagement/pack_metadata.json index 0bb1ba90e234..8d17ed9d6e6a 100644 --- a/Packs/AzureSQLManagement/pack_metadata.json +++ b/Packs/AzureSQLManagement/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure SQL Management", "description": "Microsoft Azure SQL Database is a managed cloud database provided as part of Microsoft Azure", "support": "xsoar", - "currentVersion": "1.2.3", + "currentVersion": "1.2.4", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureSecurityCenter/Integrations/AzureSecurityCenter_v2/AzureSecurityCenter_v2.yml b/Packs/AzureSecurityCenter/Integrations/AzureSecurityCenter_v2/AzureSecurityCenter_v2.yml index b2ad97ff3dc1..4c83c2e356e6 100644 --- a/Packs/AzureSecurityCenter/Integrations/AzureSecurityCenter_v2/AzureSecurityCenter_v2.yml +++ b/Packs/AzureSecurityCenter/Integrations/AzureSecurityCenter_v2/AzureSecurityCenter_v2.yml @@ -466,7 +466,7 @@ script: type: Unknown - contextPath: Azure.ResourceGroupName.properties.provisioningState description: Resource group provisioning state. - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' type: python diff --git a/Packs/AzureSecurityCenter/Integrations/MicrosoftDefenderForCloudEventCollector/MicrosoftDefenderForCloudEventCollector.yml b/Packs/AzureSecurityCenter/Integrations/MicrosoftDefenderForCloudEventCollector/MicrosoftDefenderForCloudEventCollector.yml index 71891038c885..a17bc0773359 100644 --- a/Packs/AzureSecurityCenter/Integrations/MicrosoftDefenderForCloudEventCollector/MicrosoftDefenderForCloudEventCollector.yml +++ b/Packs/AzureSecurityCenter/Integrations/MicrosoftDefenderForCloudEventCollector/MicrosoftDefenderForCloudEventCollector.yml @@ -103,7 +103,7 @@ script: - description: Run this command if for some reason you need to rerun the authentication process. name: ms-defender-for-cloud-auth-reset arguments: [] - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 isfetchevents: true script: '-' subtype: python3 diff --git a/Packs/AzureSecurityCenter/ReleaseNotes/2_0_35.md b/Packs/AzureSecurityCenter/ReleaseNotes/2_0_35.md new file mode 100644 index 000000000000..51588fbf0e66 --- /dev/null +++ b/Packs/AzureSecurityCenter/ReleaseNotes/2_0_35.md @@ -0,0 +1,19 @@ + +#### Integrations + +##### Microsoft Defender for Cloud Event Collector +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + +##### Microsoft Defender for Cloud +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureSecurityCenter/pack_metadata.json b/Packs/AzureSecurityCenter/pack_metadata.json index a7f20bd6b8cb..dbe9509cdc0a 100644 --- a/Packs/AzureSecurityCenter/pack_metadata.json +++ b/Packs/AzureSecurityCenter/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Defender for Cloud", "description": "Unified security management and advanced threat protection across hybrid cloud workloads.", "support": "xsoar", - "currentVersion": "2.0.34", + "currentVersion": "2.0.35", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureSentinel/Integrations/AzureSentinel/AzureSentinel.yml b/Packs/AzureSentinel/Integrations/AzureSentinel/AzureSentinel.yml index 3a543e4874de..f6a828913778 100644 --- a/Packs/AzureSentinel/Integrations/AzureSentinel/AzureSentinel.yml +++ b/Packs/AzureSentinel/Integrations/AzureSentinel/AzureSentinel.yml @@ -2381,7 +2381,7 @@ script: execution: false name: azure-sentinel-auth-reset arguments: [] - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 isfetch: true runonce: false script: '-' diff --git a/Packs/AzureSentinel/ReleaseNotes/1_5_53.md b/Packs/AzureSentinel/ReleaseNotes/1_5_53.md new file mode 100644 index 000000000000..19ca59f9718f --- /dev/null +++ b/Packs/AzureSentinel/ReleaseNotes/1_5_53.md @@ -0,0 +1,10 @@ + +#### Integrations + +##### Microsoft Sentinel +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + diff --git a/Packs/AzureSentinel/ReleaseNotes/1_5_54.md b/Packs/AzureSentinel/ReleaseNotes/1_5_54.md new file mode 100644 index 000000000000..7c347df2baba --- /dev/null +++ b/Packs/AzureSentinel/ReleaseNotes/1_5_54.md @@ -0,0 +1,18 @@ + +#### Scripts + +##### MicrosoftSentinelConvertRelationsToTable +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### MicrosoftSentinelConvertEntitiesToTable +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### MicrosoftSentinelConvertAlertsToTable +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AzureSentinel/Scripts/MicrosoftSentinelConvertAlertsToTable/MicrosoftSentinelConvertAlertsToTable.yml b/Packs/AzureSentinel/Scripts/MicrosoftSentinelConvertAlertsToTable/MicrosoftSentinelConvertAlertsToTable.yml index 1e39c70703ea..84d76beb9a26 100644 --- a/Packs/AzureSentinel/Scripts/MicrosoftSentinelConvertAlertsToTable/MicrosoftSentinelConvertAlertsToTable.yml +++ b/Packs/AzureSentinel/Scripts/MicrosoftSentinelConvertAlertsToTable/MicrosoftSentinelConvertAlertsToTable.yml @@ -10,5 +10,5 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.5.0 diff --git a/Packs/AzureSentinel/Scripts/MicrosoftSentinelConvertEntitiesToTable/MicrosoftSentinelConvertEntitiesToTable.yml b/Packs/AzureSentinel/Scripts/MicrosoftSentinelConvertEntitiesToTable/MicrosoftSentinelConvertEntitiesToTable.yml index b5aaadfbd959..154b7c2f31bf 100644 --- a/Packs/AzureSentinel/Scripts/MicrosoftSentinelConvertEntitiesToTable/MicrosoftSentinelConvertEntitiesToTable.yml +++ b/Packs/AzureSentinel/Scripts/MicrosoftSentinelConvertEntitiesToTable/MicrosoftSentinelConvertEntitiesToTable.yml @@ -10,5 +10,5 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.5.0 diff --git a/Packs/AzureSentinel/Scripts/MicrosoftSentinelConvertRelationsToTable/MicrosoftSentinelConvertRelationsToTable.yml b/Packs/AzureSentinel/Scripts/MicrosoftSentinelConvertRelationsToTable/MicrosoftSentinelConvertRelationsToTable.yml index 009ff70b8731..807afdf030b1 100644 --- a/Packs/AzureSentinel/Scripts/MicrosoftSentinelConvertRelationsToTable/MicrosoftSentinelConvertRelationsToTable.yml +++ b/Packs/AzureSentinel/Scripts/MicrosoftSentinelConvertRelationsToTable/MicrosoftSentinelConvertRelationsToTable.yml @@ -10,5 +10,5 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.5.0 diff --git a/Packs/AzureSentinel/pack_metadata.json b/Packs/AzureSentinel/pack_metadata.json index 1448d8732dd7..1e1d5d7c1c38 100644 --- a/Packs/AzureSentinel/pack_metadata.json +++ b/Packs/AzureSentinel/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Sentinel", "description": "Microsoft Sentinel is a cloud-native security information and event manager (SIEM) platform that uses built-in AI to help analyze large volumes of data across an enterprise.", "support": "xsoar", - "currentVersion": "1.5.52", + "currentVersion": "1.5.54", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureStorage/Integrations/AzureStorage/AzureStorage.yml b/Packs/AzureStorage/Integrations/AzureStorage/AzureStorage.yml index 0dbfdb95f440..16fc16fed68a 100644 --- a/Packs/AzureStorage/Integrations/AzureStorage/AzureStorage.yml +++ b/Packs/AzureStorage/Integrations/AzureStorage/AzureStorage.yml @@ -1013,7 +1013,7 @@ script: - description: Generate the login url used for Authorization code flow. name: azure-storage-generate-login-url arguments: [] - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/AzureStorage/ReleaseNotes/1_2_31.md b/Packs/AzureStorage/ReleaseNotes/1_2_31.md new file mode 100644 index 000000000000..c93928751ca3 --- /dev/null +++ b/Packs/AzureStorage/ReleaseNotes/1_2_31.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Storage Management +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureStorage/pack_metadata.json b/Packs/AzureStorage/pack_metadata.json index cada6dc4bde2..422abe802b5b 100644 --- a/Packs/AzureStorage/pack_metadata.json +++ b/Packs/AzureStorage/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Storage Management", "description": "Deploy and manage storage accounts and blob service properties.", "support": "xsoar", - "currentVersion": "1.2.30", + "currentVersion": "1.2.31", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureStorageContainer/Integrations/AzureStorageContainer/AzureStorageContainer.yml b/Packs/AzureStorageContainer/Integrations/AzureStorageContainer/AzureStorageContainer.yml index f02437f0ffb8..79896697b24f 100644 --- a/Packs/AzureStorageContainer/Integrations/AzureStorageContainer/AzureStorageContainer.yml +++ b/Packs/AzureStorageContainer/Integrations/AzureStorageContainer/AzureStorageContainer.yml @@ -331,7 +331,7 @@ script: name: account_key description: create SAS token for container. name: azure-storage-container-sas-create - dockerimage: demisto/python3:3.10.14.100715 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/AzureStorageContainer/ReleaseNotes/1_0_24.md b/Packs/AzureStorageContainer/ReleaseNotes/1_0_24.md new file mode 100644 index 000000000000..ae470804ae47 --- /dev/null +++ b/Packs/AzureStorageContainer/ReleaseNotes/1_0_24.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Azure Storage Container +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AzureStorageContainer/pack_metadata.json b/Packs/AzureStorageContainer/pack_metadata.json index 20cebdc820d7..104f50870505 100644 --- a/Packs/AzureStorageContainer/pack_metadata.json +++ b/Packs/AzureStorageContainer/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Storage Container", "description": "Create and Manage Azure Storage Container services.", "support": "xsoar", - "currentVersion": "1.0.23", + "currentVersion": "1.0.24", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureStorageFileShare/Integrations/AzureStorageFileShare/AzureStorageFileShare.yml b/Packs/AzureStorageFileShare/Integrations/AzureStorageFileShare/AzureStorageFileShare.yml index 5f516193d38f..4eb039c85941 100644 --- a/Packs/AzureStorageFileShare/Integrations/AzureStorageFileShare/AzureStorageFileShare.yml +++ b/Packs/AzureStorageFileShare/Integrations/AzureStorageFileShare/AzureStorageFileShare.yml @@ -210,7 +210,7 @@ script: description: Delete file from Share. execution: true name: azure-storage-fileshare-file-delete - dockerimage: demisto/python3:3.10.14.100715 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/AzureStorageFileShare/ReleaseNotes/1_0_29.md b/Packs/AzureStorageFileShare/ReleaseNotes/1_0_29.md new file mode 100644 index 000000000000..933fb98bf445 --- /dev/null +++ b/Packs/AzureStorageFileShare/ReleaseNotes/1_0_29.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Azure Storage FileShare +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AzureStorageFileShare/pack_metadata.json b/Packs/AzureStorageFileShare/pack_metadata.json index b0a67e5a4d28..639fc38b8d63 100644 --- a/Packs/AzureStorageFileShare/pack_metadata.json +++ b/Packs/AzureStorageFileShare/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Storage FileShare", "description": "Create and Manage Azure FileShare Files and Directories.", "support": "xsoar", - "currentVersion": "1.0.28", + "currentVersion": "1.0.29", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureStorageQueue/Integrations/AzureStorageQueue/AzureStorageQueue.yml b/Packs/AzureStorageQueue/Integrations/AzureStorageQueue/AzureStorageQueue.yml index 8f60681c14d5..960042300585 100644 --- a/Packs/AzureStorageQueue/Integrations/AzureStorageQueue/AzureStorageQueue.yml +++ b/Packs/AzureStorageQueue/Integrations/AzureStorageQueue/AzureStorageQueue.yml @@ -242,7 +242,7 @@ script: description: Delete all messages from the specified Queue. execution: true name: azure-storage-queue-message-clear - dockerimage: demisto/python3:3.10.14.100715 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/AzureStorageQueue/ReleaseNotes/1_0_21.md b/Packs/AzureStorageQueue/ReleaseNotes/1_0_21.md new file mode 100644 index 000000000000..476aad6b1711 --- /dev/null +++ b/Packs/AzureStorageQueue/ReleaseNotes/1_0_21.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Azure Storage Queue +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AzureStorageQueue/pack_metadata.json b/Packs/AzureStorageQueue/pack_metadata.json index 92f1cd0689b0..f1fb8ad6a48c 100644 --- a/Packs/AzureStorageQueue/pack_metadata.json +++ b/Packs/AzureStorageQueue/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Storage Queue", "description": "Create and Manage Azure Storage Queues and Messages.", "support": "xsoar", - "currentVersion": "1.0.20", + "currentVersion": "1.0.21", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureStorageTable/Integrations/AzureStorageTable/AzureStorageTable.yml b/Packs/AzureStorageTable/Integrations/AzureStorageTable/AzureStorageTable.yml index b382566c99cf..d9869cf4fa7d 100644 --- a/Packs/AzureStorageTable/Integrations/AzureStorageTable/AzureStorageTable.yml +++ b/Packs/AzureStorageTable/Integrations/AzureStorageTable/AzureStorageTable.yml @@ -167,7 +167,7 @@ script: description: Delete an existing entity in a table. execution: true name: azure-storage-table-entity-delete - dockerimage: demisto/python3:3.10.14.100715 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/AzureStorageTable/ReleaseNotes/1_0_23.md b/Packs/AzureStorageTable/ReleaseNotes/1_0_23.md new file mode 100644 index 000000000000..00af3502f742 --- /dev/null +++ b/Packs/AzureStorageTable/ReleaseNotes/1_0_23.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Azure Storage Table +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/AzureStorageTable/pack_metadata.json b/Packs/AzureStorageTable/pack_metadata.json index bb99c490992a..ed18b33451a9 100644 --- a/Packs/AzureStorageTable/pack_metadata.json +++ b/Packs/AzureStorageTable/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Storage Table", "description": "Create and Manage Azure Storage Tables and Entities.", "support": "xsoar", - "currentVersion": "1.0.22", + "currentVersion": "1.0.23", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureWAF/Integrations/AzureWAF/AzureWAF.yml b/Packs/AzureWAF/Integrations/AzureWAF/AzureWAF.yml index a859f4831f41..583b91f51637 100644 --- a/Packs/AzureWAF/Integrations/AzureWAF/AzureWAF.yml +++ b/Packs/AzureWAF/Integrations/AzureWAF/AzureWAF.yml @@ -515,7 +515,7 @@ script: - contextPath: AzureWAF.ResourceGroup.tags description: Resource group tags. type: String - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/AzureWAF/ReleaseNotes/1_2_4.md b/Packs/AzureWAF/ReleaseNotes/1_2_4.md new file mode 100644 index 000000000000..a860e78c9753 --- /dev/null +++ b/Packs/AzureWAF/ReleaseNotes/1_2_4.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Web Application Firewall +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/AzureWAF/pack_metadata.json b/Packs/AzureWAF/pack_metadata.json index b2dd866aee88..7d5d8ab489e3 100644 --- a/Packs/AzureWAF/pack_metadata.json +++ b/Packs/AzureWAF/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure WAF", "description": "Azure Web Application Firewall is used to detect web related attacks targeting your web servers hosted in azure and allow quick respond to threats", "support": "xsoar", - "currentVersion": "1.2.3", + "currentVersion": "1.2.4", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/BigFix/Integrations/BigFix/BigFix.yml b/Packs/BigFix/Integrations/BigFix/BigFix.yml index 2dbc7cfe77df..907c90b61cac 100644 --- a/Packs/BigFix/Integrations/BigFix/BigFix.yml +++ b/Packs/BigFix/Integrations/BigFix/BigFix.yml @@ -478,7 +478,7 @@ script: script: '-' subtype: python3 type: python - dockerimage: demisto/python3:3.11.9.101916 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.0.0 tests: - No tests (auto formatted) diff --git a/Packs/BigFix/ReleaseNotes/1_0_17.md b/Packs/BigFix/ReleaseNotes/1_0_17.md new file mode 100644 index 000000000000..24c50d9d3998 --- /dev/null +++ b/Packs/BigFix/ReleaseNotes/1_0_17.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### BigFix +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/BigFix/pack_metadata.json b/Packs/BigFix/pack_metadata.json index b429c38a31a5..834ceba620c8 100644 --- a/Packs/BigFix/pack_metadata.json +++ b/Packs/BigFix/pack_metadata.json @@ -2,7 +2,7 @@ "name": "HCL BigFix", "description": "HCL BigFix Patch provides an automated, simplified patching process that is administered from a single console.", "support": "xsoar", - "currentVersion": "1.0.16", + "currentVersion": "1.0.17", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Bitbucket/Integrations/Bitbucket/Bitbucket.yml b/Packs/Bitbucket/Integrations/Bitbucket/Bitbucket.yml index 2e470913afdd..dd787d6d8f68 100644 --- a/Packs/Bitbucket/Integrations/Bitbucket/Bitbucket.yml +++ b/Packs/Bitbucket/Integrations/Bitbucket/Bitbucket.yml @@ -2329,6 +2329,6 @@ script: script: "-" type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 tests: - Test_Bitbucket diff --git a/Packs/Bitbucket/ReleaseNotes/1_0_13.md b/Packs/Bitbucket/ReleaseNotes/1_0_13.md new file mode 100644 index 000000000000..cf197feca0a4 --- /dev/null +++ b/Packs/Bitbucket/ReleaseNotes/1_0_13.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Bitbucket +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Bitbucket/pack_metadata.json b/Packs/Bitbucket/pack_metadata.json index 114371e95754..23d902c6c51a 100644 --- a/Packs/Bitbucket/pack_metadata.json +++ b/Packs/Bitbucket/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Bitbucket", "description": "Bitbucket Cloud is a Git-based code and CI/CD tool optimized for teams using Jira", "support": "xsoar", - "currentVersion": "1.0.12", + "currentVersion": "1.0.13", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/BluecatAddressManager/Integrations/BluecatAddressManager/BluecatAddressManager.yml b/Packs/BluecatAddressManager/Integrations/BluecatAddressManager/BluecatAddressManager.yml index 60ca23d554eb..cba21e620925 100644 --- a/Packs/BluecatAddressManager/Integrations/BluecatAddressManager/BluecatAddressManager.yml +++ b/Packs/BluecatAddressManager/Integrations/BluecatAddressManager/BluecatAddressManager.yml @@ -162,7 +162,7 @@ script: - contextPath: BlueCat.AddressManager.Range.Parents.CIDR description: Classless Inter-Domain Routing. type: String - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/BluecatAddressManager/ReleaseNotes/1_1_15.md b/Packs/BluecatAddressManager/ReleaseNotes/1_1_15.md new file mode 100644 index 000000000000..5e7d2e789c53 --- /dev/null +++ b/Packs/BluecatAddressManager/ReleaseNotes/1_1_15.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Bluecat Address Manager +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/BluecatAddressManager/pack_metadata.json b/Packs/BluecatAddressManager/pack_metadata.json index 9a5301ef7468..eb65d8700ff9 100644 --- a/Packs/BluecatAddressManager/pack_metadata.json +++ b/Packs/BluecatAddressManager/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Bluecat Address Manager", "description": "Use the BlueCat Address Manager integration to enrich IP addresses and manage response policies.", "support": "xsoar", - "currentVersion": "1.1.14", + "currentVersion": "1.1.15", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/BmcHelixRemedyForce/Integrations/BmcHelixRemedyForce/BmcHelixRemedyForce.yml b/Packs/BmcHelixRemedyForce/Integrations/BmcHelixRemedyForce/BmcHelixRemedyForce.yml index 9e62a04cc052..f0286487b08d 100644 --- a/Packs/BmcHelixRemedyForce/Integrations/BmcHelixRemedyForce/BmcHelixRemedyForce.yml +++ b/Packs/BmcHelixRemedyForce/Integrations/BmcHelixRemedyForce/BmcHelixRemedyForce.yml @@ -797,7 +797,7 @@ script: - contextPath: BmcRemedyforce.ServiceRequest.Type description: The type of the service request. type: String - dockerimage: demisto/python3:3.10.13.88772 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/BmcHelixRemedyForce/ReleaseNotes/1_0_42.md b/Packs/BmcHelixRemedyForce/ReleaseNotes/1_0_42.md new file mode 100644 index 000000000000..fa61dd73783b --- /dev/null +++ b/Packs/BmcHelixRemedyForce/ReleaseNotes/1_0_42.md @@ -0,0 +1,21 @@ + +#### Integrations + +##### BMC Helix Remedyforce +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + + +#### Scripts + +##### BMCHelixRemedyforceCreateIncident +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### BMCHelixRemedyforceCreateServiceRequest +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/BmcHelixRemedyForce/Scripts/BMCHelixRemedyforceCreateIncident/BMCHelixRemedyforceCreateIncident.yml b/Packs/BmcHelixRemedyForce/Scripts/BMCHelixRemedyforceCreateIncident/BMCHelixRemedyforceCreateIncident.yml index 774c898f2c05..d85856e13bb1 100644 --- a/Packs/BmcHelixRemedyForce/Scripts/BMCHelixRemedyforceCreateIncident/BMCHelixRemedyforceCreateIncident.yml +++ b/Packs/BmcHelixRemedyForce/Scripts/BMCHelixRemedyforceCreateIncident/BMCHelixRemedyforceCreateIncident.yml @@ -93,7 +93,7 @@ dependson: - '|||bmc-remedy-asset-details-get' - '|||bmc-remedy-incident-create' fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) skipprepare: diff --git a/Packs/BmcHelixRemedyForce/Scripts/BMCHelixRemedyforceCreateServiceRequest/BMCHelixRemedyforceCreateServiceRequest.yml b/Packs/BmcHelixRemedyForce/Scripts/BMCHelixRemedyforceCreateServiceRequest/BMCHelixRemedyforceCreateServiceRequest.yml index a33f88ad7e55..d2c8990326d3 100644 --- a/Packs/BmcHelixRemedyForce/Scripts/BMCHelixRemedyforceCreateServiceRequest/BMCHelixRemedyforceCreateServiceRequest.yml +++ b/Packs/BmcHelixRemedyForce/Scripts/BMCHelixRemedyforceCreateServiceRequest/BMCHelixRemedyforceCreateServiceRequest.yml @@ -71,6 +71,6 @@ dependson: - '|||bmc-remedy-account-details-get' - '|||bmc-remedy-service-request-create' fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/BmcHelixRemedyForce/pack_metadata.json b/Packs/BmcHelixRemedyForce/pack_metadata.json index 3d70b9a3216c..efcbd13820d5 100644 --- a/Packs/BmcHelixRemedyForce/pack_metadata.json +++ b/Packs/BmcHelixRemedyForce/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Bmc Helix Remedyforce", "description": "Integration of BMC Helix Remedyforce with Cortex XSOAR. BMC Helix Remedyforce integration allows customers to create/update service requests and incidents. It also allows to update status, resolve service requests and incidents with customer notes. This integration exposes standard ticketing capabilities that can be utilized as part of automation & orchestration.", "support": "xsoar", - "currentVersion": "1.0.41", + "currentVersion": "1.0.42", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/BmcITSM/Integrations/BmcITSM/BmcITSM.yml b/Packs/BmcITSM/Integrations/BmcITSM/BmcITSM.yml index 9cae1604303b..2eccdff78597 100644 --- a/Packs/BmcITSM/Integrations/BmcITSM/BmcITSM.yml +++ b/Packs/BmcITSM/Integrations/BmcITSM/BmcITSM.yml @@ -169,7 +169,7 @@ script: script: "" type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.100715 + dockerimage: demisto/python3:3.11.10.115186 commands: - name: bmc-itsm-user-list description: Retrieves a list of user profiles from BMC Helix ITSM. The records are retrieved by the query argument or by the filtering arguments. When using filtering arguments, each one defines a 'LIKE' operation and an 'AND' operator is used between them. To see the entire JSON then you can use the raw_response=true at the end of the command. diff --git a/Packs/BmcITSM/ReleaseNotes/1_0_29.md b/Packs/BmcITSM/ReleaseNotes/1_0_29.md new file mode 100644 index 000000000000..43755cd17834 --- /dev/null +++ b/Packs/BmcITSM/ReleaseNotes/1_0_29.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### BMC Helix ITSM +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/BmcITSM/pack_metadata.json b/Packs/BmcITSM/pack_metadata.json index 9ddbcbfb2b44..7fd7b920739a 100644 --- a/Packs/BmcITSM/pack_metadata.json +++ b/Packs/BmcITSM/pack_metadata.json @@ -2,7 +2,7 @@ "name": "BMC Helix ITSM", "description": "BMC Helix ITSM allows customers to manage service request, incident, change request, task, problem investigation, known error and work order tickets.", "support": "xsoar", - "currentVersion": "1.0.28", + "currentVersion": "1.0.29", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/C2sec/Integrations/C2sec/C2sec.yml b/Packs/C2sec/Integrations/C2sec/C2sec.yml index fa6c5eee2f75..61a1af0be64f 100644 --- a/Packs/C2sec/Integrations/C2sec/C2sec.yml +++ b/Packs/C2sec/Integrations/C2sec/C2sec.yml @@ -199,6 +199,6 @@ script: type: string description: Query Data for specific component for companies in the portfolio runonce: false - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/C2sec/ReleaseNotes/1_0_12.md b/Packs/C2sec/ReleaseNotes/1_0_12.md new file mode 100644 index 000000000000..7fdc9ca07633 --- /dev/null +++ b/Packs/C2sec/ReleaseNotes/1_0_12.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### C2sec irisk +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/C2sec/pack_metadata.json b/Packs/C2sec/pack_metadata.json index 4696f06328fa..97d25b90ead7 100644 --- a/Packs/C2sec/pack_metadata.json +++ b/Packs/C2sec/pack_metadata.json @@ -2,7 +2,7 @@ "name": "C2sec irisk", "description": "Understand Your Cyber Exposure as Easy as a Google Search", "support": "xsoar", - "currentVersion": "1.0.11", + "currentVersion": "1.0.12", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CIRCL/Integrations/CIRCL/CIRCL.yml b/Packs/CIRCL/Integrations/CIRCL/CIRCL.yml index ebd81ed8fcbe..9fa2bcd0c714 100644 --- a/Packs/CIRCL/Integrations/CIRCL/CIRCL.yml +++ b/Packs/CIRCL/Integrations/CIRCL/CIRCL.yml @@ -116,7 +116,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 tests: - CirclIntegrationTest fromversion: 5.0.0 diff --git a/Packs/CIRCL/Integrations/CirclCVESearch/CirclCVESearch.yml b/Packs/CIRCL/Integrations/CirclCVESearch/CirclCVESearch.yml index 786b1fa198e6..3a317d3b8d32 100644 --- a/Packs/CIRCL/Integrations/CirclCVESearch/CirclCVESearch.yml +++ b/Packs/CIRCL/Integrations/CirclCVESearch/CirclCVESearch.yml @@ -122,7 +122,7 @@ script: - contextPath: DBotScore.Vendor description: The vendor used to calculate the score. type: String - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/CIRCL/ReleaseNotes/1_0_24.md b/Packs/CIRCL/ReleaseNotes/1_0_24.md new file mode 100644 index 000000000000..4bfa03bb8b9a --- /dev/null +++ b/Packs/CIRCL/ReleaseNotes/1_0_24.md @@ -0,0 +1,13 @@ + +#### Integrations + +##### CIRCL +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CIRCL CVE Search +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CIRCL/pack_metadata.json b/Packs/CIRCL/pack_metadata.json index 83f45f765fa9..57b4b8ec2206 100644 --- a/Packs/CIRCL/pack_metadata.json +++ b/Packs/CIRCL/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CIRCL", "description": "The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to provide a systematic response facility to computer security threats and incidents.\nThis pack includes:\n# CIRCL Passive DNS which is a database storing historical DNS records from various resources.\n# CIRCL Passive SSL is a database storing historical X.509 certificates seen per IP address. The Passive SSL historical data is indexed per IP address.\n# CIRCL CVE Search, interface to search publicly known information from security vulnerabilities in software and hardware along with their corresponding exposures.", "support": "xsoar", - "currentVersion": "1.0.23", + "currentVersion": "1.0.24", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CTF02/ReleaseNotes/1_0_5.md b/Packs/CTF02/ReleaseNotes/1_0_5.md new file mode 100644 index 000000000000..9841e091685f --- /dev/null +++ b/Packs/CTF02/ReleaseNotes/1_0_5.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### CTF_2_BF +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CTF02/Scripts/CTF2BF/CTF2BF.yml b/Packs/CTF02/Scripts/CTF2BF/CTF2BF.yml index 1376ab272056..6179eda28b46 100644 --- a/Packs/CTF02/Scripts/CTF2BF/CTF2BF.yml +++ b/Packs/CTF02/Scripts/CTF2BF/CTF2BF.yml @@ -26,7 +26,7 @@ args: scripttarget: 0 subtype: python3 runonce: false -dockerimage: demisto/python3:3.10.14.99865 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole engineinfo: {} fromversion: 8.2.0 diff --git a/Packs/CTF02/pack_metadata.json b/Packs/CTF02/pack_metadata.json index c1f3c6ea9567..48d7057810eb 100644 --- a/Packs/CTF02/pack_metadata.json +++ b/Packs/CTF02/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Capture The Flag - 02", "description": "XSOAR's Capture the flag (CTF)", "support": "xsoar", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CarbonBlackDefense/Integrations/CarbonBlackEndpointStandard/CarbonBlackEndpointStandard.yml b/Packs/CarbonBlackDefense/Integrations/CarbonBlackEndpointStandard/CarbonBlackEndpointStandard.yml index aebc248ac9df..b8559ecfbf4a 100644 --- a/Packs/CarbonBlackDefense/Integrations/CarbonBlackEndpointStandard/CarbonBlackEndpointStandard.yml +++ b/Packs/CarbonBlackDefense/Integrations/CarbonBlackEndpointStandard/CarbonBlackEndpointStandard.yml @@ -1567,7 +1567,7 @@ script: - contextPath: CarbonBlackDefense.Alert.policy_applied description: Whether a policy was applied. (APPLIED, NOT_APPLIED). type: String - dockerimage: demisto/python3:3.10.13.83255 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/CarbonBlackDefense/Integrations/CarbonBlackEndpointStandardEventCollector/CarbonBlackEndpointStandardEventCollector.yml b/Packs/CarbonBlackDefense/Integrations/CarbonBlackEndpointStandardEventCollector/CarbonBlackEndpointStandardEventCollector.yml index 832a6af7c17f..a9897e0c3138 100644 --- a/Packs/CarbonBlackDefense/Integrations/CarbonBlackEndpointStandardEventCollector/CarbonBlackEndpointStandardEventCollector.yml +++ b/Packs/CarbonBlackDefense/Integrations/CarbonBlackEndpointStandardEventCollector/CarbonBlackEndpointStandardEventCollector.yml @@ -77,7 +77,7 @@ script: defaultValue: 2500 description: 'Fetch alerts and audit logs from Carbon Black Endpoint Standard.' name: carbonblack-endpoint-standard-get-events - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/CarbonBlackDefense/ReleaseNotes/4_0_6.md b/Packs/CarbonBlackDefense/ReleaseNotes/4_0_6.md new file mode 100644 index 000000000000..54089f6e1008 --- /dev/null +++ b/Packs/CarbonBlackDefense/ReleaseNotes/4_0_6.md @@ -0,0 +1,13 @@ + +#### Integrations + +##### Carbon Black Endpoint Standard v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### Carbon Black Endpoint Standard Event Collector +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CarbonBlackDefense/pack_metadata.json b/Packs/CarbonBlackDefense/pack_metadata.json index 547136c440bb..432fb48c1c57 100644 --- a/Packs/CarbonBlackDefense/pack_metadata.json +++ b/Packs/CarbonBlackDefense/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Carbon Black Endpoint Standard", "description": "Next-generation antivirus + EDR in one cloud-delivered platform that stops commodity malware, advanced malware, non-malware attacks and ransomware.", "support": "xsoar", - "currentVersion": "4.0.5", + "currentVersion": "4.0.6", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CarbonBlackEnterpriseEDR/Integrations/CarbonBlackEnterpriseEDR/CarbonBlackEnterpriseEDR.yml b/Packs/CarbonBlackEnterpriseEDR/Integrations/CarbonBlackEnterpriseEDR/CarbonBlackEnterpriseEDR.yml index 9fda40e6380f..e545585e3f4a 100644 --- a/Packs/CarbonBlackEnterpriseEDR/Integrations/CarbonBlackEnterpriseEDR/CarbonBlackEnterpriseEDR.yml +++ b/Packs/CarbonBlackEnterpriseEDR/Integrations/CarbonBlackEnterpriseEDR/CarbonBlackEnterpriseEDR.yml @@ -1477,7 +1477,7 @@ script: description: Threat ID. - contextPath: CarbonBlackEEDR.Threat.Tags description: Threat tags. - dockerimage: demisto/python3:3.11.9.105369 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '' diff --git a/Packs/CarbonBlackEnterpriseEDR/ReleaseNotes/1_1_39.md b/Packs/CarbonBlackEnterpriseEDR/ReleaseNotes/1_1_39.md new file mode 100644 index 000000000000..27f626ec07c2 --- /dev/null +++ b/Packs/CarbonBlackEnterpriseEDR/ReleaseNotes/1_1_39.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Carbon Black Enterprise EDR +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CarbonBlackEnterpriseEDR/pack_metadata.json b/Packs/CarbonBlackEnterpriseEDR/pack_metadata.json index c88b581d2674..bd3df90739c3 100644 --- a/Packs/CarbonBlackEnterpriseEDR/pack_metadata.json +++ b/Packs/CarbonBlackEnterpriseEDR/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Carbon Black Cloud Enterprise EDR", "description": "Advanced threat hunting and incident response solution.", "support": "xsoar", - "currentVersion": "1.1.38", + "currentVersion": "1.1.39", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CarbonBlackProtect/Integrations/CarbonBlackProtect/CarbonBlackProtect.yml b/Packs/CarbonBlackProtect/Integrations/CarbonBlackProtect/CarbonBlackProtect.yml index 3c911c2aa45e..7a7f205b16e1 100644 --- a/Packs/CarbonBlackProtect/Integrations/CarbonBlackProtect/CarbonBlackProtect.yml +++ b/Packs/CarbonBlackProtect/Integrations/CarbonBlackProtect/CarbonBlackProtect.yml @@ -1475,7 +1475,7 @@ script: - contextPath: CBP.FileRule.ReportOnly description: Is this rule "reporting only" or is it also "enforcing". type: String - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 subtype: python3 isfetch: true script: '' diff --git a/Packs/CarbonBlackProtect/ReleaseNotes/1_0_43.md b/Packs/CarbonBlackProtect/ReleaseNotes/1_0_43.md new file mode 100644 index 000000000000..9f1c3dbbcaae --- /dev/null +++ b/Packs/CarbonBlackProtect/ReleaseNotes/1_0_43.md @@ -0,0 +1,26 @@ + +#### Integrations + +##### VMware Carbon Black App Control v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + + +#### Scripts + +##### CBPCatalogFindHash +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CBPFindComputer +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CBPFindRule +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CarbonBlackProtect/Scripts/CBPCatalogFindHash/CBPCatalogFindHash.yml b/Packs/CarbonBlackProtect/Scripts/CBPCatalogFindHash/CBPCatalogFindHash.yml index b14a10369c14..90912c9b55fd 100644 --- a/Packs/CarbonBlackProtect/Scripts/CBPCatalogFindHash/CBPCatalogFindHash.yml +++ b/Packs/CarbonBlackProtect/Scripts/CBPCatalogFindHash/CBPCatalogFindHash.yml @@ -22,6 +22,6 @@ dependson: - cbp-fileCatalog-search timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No test diff --git a/Packs/CarbonBlackProtect/Scripts/CBPFindComputer/CBPFindComputer.yml b/Packs/CarbonBlackProtect/Scripts/CBPFindComputer/CBPFindComputer.yml index 8c0a3a121a39..33f443897779 100644 --- a/Packs/CarbonBlackProtect/Scripts/CBPFindComputer/CBPFindComputer.yml +++ b/Packs/CarbonBlackProtect/Scripts/CBPFindComputer/CBPFindComputer.yml @@ -20,6 +20,6 @@ dependson: - cbp-computer-search timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No test diff --git a/Packs/CarbonBlackProtect/Scripts/CBPFindRule/CBPFindRule.yml b/Packs/CarbonBlackProtect/Scripts/CBPFindRule/CBPFindRule.yml index 61db9999480c..83a43790151d 100644 --- a/Packs/CarbonBlackProtect/Scripts/CBPFindRule/CBPFindRule.yml +++ b/Packs/CarbonBlackProtect/Scripts/CBPFindRule/CBPFindRule.yml @@ -22,6 +22,6 @@ dependson: - cbp-fileRule-search timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No test diff --git a/Packs/CarbonBlackProtect/pack_metadata.json b/Packs/CarbonBlackProtect/pack_metadata.json index 9a304530470f..9bc0c3b7c2fc 100644 --- a/Packs/CarbonBlackProtect/pack_metadata.json +++ b/Packs/CarbonBlackProtect/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Carbon Black Enterprise Protection", "description": "Carbon Black Enterprise Protection is a next-generation endpoint threat prevention solution to deliver a portfolio of protection policies, real-time visibility across environments, and comprehensive compliance rule sets in a single platform.", "support": "xsoar", - "currentVersion": "1.0.42", + "currentVersion": "1.0.43", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Carbon_Black_Enterprise_Response/Integrations/CarbonBlackResponseV2/CarbonBlackResponseV2.yml b/Packs/Carbon_Black_Enterprise_Response/Integrations/CarbonBlackResponseV2/CarbonBlackResponseV2.yml index 3898ca0da2cf..dd79304f5d9c 100644 --- a/Packs/Carbon_Black_Enterprise_Response/Integrations/CarbonBlackResponseV2/CarbonBlackResponseV2.yml +++ b/Packs/Carbon_Black_Enterprise_Response/Integrations/CarbonBlackResponseV2/CarbonBlackResponseV2.yml @@ -1728,7 +1728,7 @@ script: - contextPath: Endpoint.Processor description: The model of the processor. type: String - dockerimage: demisto/python3:3.11.9.107902 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/Carbon_Black_Enterprise_Response/ReleaseNotes/2_1_49.md b/Packs/Carbon_Black_Enterprise_Response/ReleaseNotes/2_1_49.md new file mode 100644 index 000000000000..637ff5862fa6 --- /dev/null +++ b/Packs/Carbon_Black_Enterprise_Response/ReleaseNotes/2_1_49.md @@ -0,0 +1,31 @@ + +#### Integrations + +##### VMware Carbon Black EDR v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + + +#### Scripts + +##### CBAlerts +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CBLiveGetFile_V2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CBWatchlists +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CBFindIP +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Carbon_Black_Enterprise_Response/Scripts/CBAlerts/CBAlerts.yml b/Packs/Carbon_Black_Enterprise_Response/Scripts/CBAlerts/CBAlerts.yml index 40386cc249f1..66dd3083ce82 100644 --- a/Packs/Carbon_Black_Enterprise_Response/Scripts/CBAlerts/CBAlerts.yml +++ b/Packs/Carbon_Black_Enterprise_Response/Scripts/CBAlerts/CBAlerts.yml @@ -15,7 +15,7 @@ dependson: - cb-alert timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.84405 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/Carbon_Black_Enterprise_Response/Scripts/CBFindIP/CBFindIP.yml b/Packs/Carbon_Black_Enterprise_Response/Scripts/CBFindIP/CBFindIP.yml index 23af799d071a..7fcf31aabd30 100644 --- a/Packs/Carbon_Black_Enterprise_Response/Scripts/CBFindIP/CBFindIP.yml +++ b/Packs/Carbon_Black_Enterprise_Response/Scripts/CBFindIP/CBFindIP.yml @@ -48,4 +48,4 @@ tests: dependson: must: [] fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 diff --git a/Packs/Carbon_Black_Enterprise_Response/Scripts/CBLiveGetFile_V2/CBLiveGetFile_V2.yml b/Packs/Carbon_Black_Enterprise_Response/Scripts/CBLiveGetFile_V2/CBLiveGetFile_V2.yml index ee4e8b7308bb..bfbb6dfba8ed 100644 --- a/Packs/Carbon_Black_Enterprise_Response/Scripts/CBLiveGetFile_V2/CBLiveGetFile_V2.yml +++ b/Packs/Carbon_Black_Enterprise_Response/Scripts/CBLiveGetFile_V2/CBLiveGetFile_V2.yml @@ -105,7 +105,7 @@ tags: - endpoint timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 tests: - No Test dependson: diff --git a/Packs/Carbon_Black_Enterprise_Response/Scripts/CBWatchlists/CBWatchlists.yml b/Packs/Carbon_Black_Enterprise_Response/Scripts/CBWatchlists/CBWatchlists.yml index 4622aa64d069..89fca5e2393b 100644 --- a/Packs/Carbon_Black_Enterprise_Response/Scripts/CBWatchlists/CBWatchlists.yml +++ b/Packs/Carbon_Black_Enterprise_Response/Scripts/CBWatchlists/CBWatchlists.yml @@ -19,6 +19,6 @@ dependson: - cb-edr-watchlists-list timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.84405 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/Carbon_Black_Enterprise_Response/pack_metadata.json b/Packs/Carbon_Black_Enterprise_Response/pack_metadata.json index 1c169233e26d..aa36999056a3 100644 --- a/Packs/Carbon_Black_Enterprise_Response/pack_metadata.json +++ b/Packs/Carbon_Black_Enterprise_Response/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Carbon Black Enterprise Response", "description": "Query and respond with Carbon Black endpoint detection and response.", "support": "xsoar", - "currentVersion": "2.1.48", + "currentVersion": "2.1.49", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Censys/Integrations/CensysV2/CensysV2.yml b/Packs/Censys/Integrations/CensysV2/CensysV2.yml index 1a0d8e7e6de7..310b65b3cb90 100644 --- a/Packs/Censys/Integrations/CensysV2/CensysV2.yml +++ b/Packs/Censys/Integrations/CensysV2/CensysV2.yml @@ -688,7 +688,7 @@ script: description: The actual score. - contextPath: DBotScore.Vendor description: The vendor used to calculate the score. - dockerimage: demisto/python3:3.10.14.92207 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Censys/ReleaseNotes/2_0_31.md b/Packs/Censys/ReleaseNotes/2_0_31.md new file mode 100644 index 000000000000..faabffa19308 --- /dev/null +++ b/Packs/Censys/ReleaseNotes/2_0_31.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Censys v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Censys/pack_metadata.json b/Packs/Censys/pack_metadata.json index 36093ec01b28..0eba3778b2d4 100644 --- a/Packs/Censys/pack_metadata.json +++ b/Packs/Censys/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Censys", "description": "Censys is a search engine that allows computer scientists to ask questions about the devices and networks that compose the Internet. Driven by Internet-wide scanning, Censys lets researchers find specific hosts and create aggregate reports on how devices, websites, and certificates are configured and deployed.", "support": "xsoar", - "currentVersion": "2.0.30", + "currentVersion": "2.0.31", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Centreon/Integrations/Centreon/Centreon.yml b/Packs/Centreon/Integrations/Centreon/Centreon.yml index 865c5f51534b..c0f040e75b8e 100644 --- a/Packs/Centreon/Integrations/Centreon/Centreon.yml +++ b/Packs/Centreon/Integrations/Centreon/Centreon.yml @@ -145,7 +145,7 @@ script: description: Service state. description: All the monitoring information regarding services. runonce: false - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 tests: - Centreon-Test-Playbook fromversion: 5.0.0 diff --git a/Packs/Centreon/ReleaseNotes/1_0_23.md b/Packs/Centreon/ReleaseNotes/1_0_23.md new file mode 100644 index 000000000000..16b71aa936d2 --- /dev/null +++ b/Packs/Centreon/ReleaseNotes/1_0_23.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Centreon +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Centreon/pack_metadata.json b/Packs/Centreon/pack_metadata.json index 8abaf7687782..71628e463eb8 100644 --- a/Packs/Centreon/pack_metadata.json +++ b/Packs/Centreon/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Centreon", "description": "IT & Network Monitoring", "support": "xsoar", - "currentVersion": "1.0.22", + "currentVersion": "1.0.23", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Change_Management/ReleaseNotes/1_0_5.md b/Packs/Change_Management/ReleaseNotes/1_0_5.md new file mode 100644 index 000000000000..509034d03e86 --- /dev/null +++ b/Packs/Change_Management/ReleaseNotes/1_0_5.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### IncidentState +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Change_Management/Scripts/IncidentState/IncidentState.yml b/Packs/Change_Management/Scripts/IncidentState/IncidentState.yml index 2df66816c8e6..3fd4f5d4917e 100644 --- a/Packs/Change_Management/Scripts/IncidentState/IncidentState.yml +++ b/Packs/Change_Management/Scripts/IncidentState/IncidentState.yml @@ -6,7 +6,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: "" -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentState runas: DBotWeakRole diff --git a/Packs/Change_Management/pack_metadata.json b/Packs/Change_Management/pack_metadata.json index 5c6c4d3a6bae..b85ad72fc446 100644 --- a/Packs/Change_Management/pack_metadata.json +++ b/Packs/Change_Management/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Change Management", "description": "If you use Pan-Os or Panorama as your enterprise firewall and Jira or ServiceNow as your enterprise ticketing system, this pack will assist you to perform a well coordinated and documented process.", "support": "xsoar", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CheckPhish/Integrations/CheckPhish/CheckPhish.yml b/Packs/CheckPhish/Integrations/CheckPhish/CheckPhish.yml index 5afddf6d3c92..0fbc2e809351 100644 --- a/Packs/CheckPhish/Integrations/CheckPhish/CheckPhish.yml +++ b/Packs/CheckPhish/Integrations/CheckPhish/CheckPhish.yml @@ -204,5 +204,5 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.0.0 diff --git a/Packs/CheckPhish/ReleaseNotes/1_0_21.md b/Packs/CheckPhish/ReleaseNotes/1_0_21.md new file mode 100644 index 000000000000..e459634da7ac --- /dev/null +++ b/Packs/CheckPhish/ReleaseNotes/1_0_21.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### CheckPhish +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CheckPhish/pack_metadata.json b/Packs/CheckPhish/pack_metadata.json index 7705757d474f..fdff1e9d7062 100644 --- a/Packs/CheckPhish/pack_metadata.json +++ b/Packs/CheckPhish/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CheckPhish", "description": "Check any URL to detect suspicious behavior.", "support": "xsoar", - "currentVersion": "1.0.20", + "currentVersion": "1.0.21", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CheckPointDome9/Integrations/CheckPointDome9/CheckPointDome9.yml b/Packs/CheckPointDome9/Integrations/CheckPointDome9/CheckPointDome9.yml index c1d66b9d9160..2acb69c39e64 100644 --- a/Packs/CheckPointDome9/Integrations/CheckPointDome9/CheckPointDome9.yml +++ b/Packs/CheckPointDome9/Integrations/CheckPointDome9/CheckPointDome9.yml @@ -1363,7 +1363,7 @@ script: - contextPath: CheckPointDome9.FindingsBundle.region description: The CloudTrail account ID. type: String - dockerimage: demisto/python3:3.11.9.105369 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/CheckPointDome9/ReleaseNotes/1_0_18.md b/Packs/CheckPointDome9/ReleaseNotes/1_0_18.md new file mode 100644 index 000000000000..4cd9ad6ed4f8 --- /dev/null +++ b/Packs/CheckPointDome9/ReleaseNotes/1_0_18.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Check Point Dome9 (CloudGuard) +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CheckPointDome9/pack_metadata.json b/Packs/CheckPointDome9/pack_metadata.json index 100324dafc6e..ae21171c1c06 100644 --- a/Packs/CheckPointDome9/pack_metadata.json +++ b/Packs/CheckPointDome9/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Check Point Dome9 (CloudGuard)", "description": "Dome9 integration allows to easily manage the security and compliance of the public cloud.", "support": "xsoar", - "currentVersion": "1.0.17", + "currentVersion": "1.0.18", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CheckPointHarmonyEndpoint/Integrations/CheckPointHarmonyEndpoint/CheckPointHarmonyEndpoint.yml b/Packs/CheckPointHarmonyEndpoint/Integrations/CheckPointHarmonyEndpoint/CheckPointHarmonyEndpoint.yml index 8d840cfe6ced..c2d994763620 100644 --- a/Packs/CheckPointHarmonyEndpoint/Integrations/CheckPointHarmonyEndpoint/CheckPointHarmonyEndpoint.yml +++ b/Packs/CheckPointHarmonyEndpoint/Integrations/CheckPointHarmonyEndpoint/CheckPointHarmonyEndpoint.yml @@ -3207,7 +3207,7 @@ script: type: String type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 isfetch: false script: '' fromversion: 6.10.0 diff --git a/Packs/CheckPointHarmonyEndpoint/ReleaseNotes/1_0_2.md b/Packs/CheckPointHarmonyEndpoint/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..38f72c740e8c --- /dev/null +++ b/Packs/CheckPointHarmonyEndpoint/ReleaseNotes/1_0_2.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Check Point Harmony Endpoint +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CheckPointHarmonyEndpoint/pack_metadata.json b/Packs/CheckPointHarmonyEndpoint/pack_metadata.json index 5fe52e9606cd..290cdec9731f 100644 --- a/Packs/CheckPointHarmonyEndpoint/pack_metadata.json +++ b/Packs/CheckPointHarmonyEndpoint/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Check Point Harmony Endpoint", "description": "Check Point Harmony Endpoint provides a complete endpoint security solution built to protect organizations and the remote workforce from today's complex threat landscape.", "support": "xsoar", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", @@ -19,4 +19,4 @@ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file diff --git a/Packs/CheckPointSandBlast/Integrations/CheckPointSandBlast/CheckPointSandBlast.yml b/Packs/CheckPointSandBlast/Integrations/CheckPointSandBlast/CheckPointSandBlast.yml index 4668321ee83f..396a74f418a0 100644 --- a/Packs/CheckPointSandBlast/Integrations/CheckPointSandBlast/CheckPointSandBlast.yml +++ b/Packs/CheckPointSandBlast/Integrations/CheckPointSandBlast/CheckPointSandBlast.yml @@ -557,7 +557,7 @@ script: - contextPath: SandBlast.Quota.Action description: The quota action. type: String - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/CheckPointSandBlast/ReleaseNotes/1_0_12.md b/Packs/CheckPointSandBlast/ReleaseNotes/1_0_12.md new file mode 100644 index 000000000000..f98b0751d38b --- /dev/null +++ b/Packs/CheckPointSandBlast/ReleaseNotes/1_0_12.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Check Point Threat Emulation (SandBlast) +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CheckPointSandBlast/pack_metadata.json b/Packs/CheckPointSandBlast/pack_metadata.json index 60b374e9c9a6..6267ee02c793 100644 --- a/Packs/CheckPointSandBlast/pack_metadata.json +++ b/Packs/CheckPointSandBlast/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Check Point Threat Emulation (SandBlast)", "description": "Upload files using polling, the service supports Microsoft Office files, as well as PDF, SWF, archives and executables. Active content will be cleaned from any documents that you upload (Microsoft Office and PDF files only). Query on existing IOCs, file status, analysis, reports. Download files from the database. Supports both appliance and cloud. Supported Threat Emulation versions are any R80x.", "support": "xsoar", - "currentVersion": "1.0.11", + "currentVersion": "1.0.12", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CheckpointFirewall/Integrations/CheckPointFirewallV2/CheckPointFirewallV2.yml b/Packs/CheckpointFirewall/Integrations/CheckPointFirewallV2/CheckPointFirewallV2.yml index 35491ecb1d9f..0853b2d449a4 100644 --- a/Packs/CheckpointFirewall/Integrations/CheckPointFirewallV2/CheckPointFirewallV2.yml +++ b/Packs/CheckpointFirewall/Integrations/CheckPointFirewallV2/CheckPointFirewallV2.yml @@ -1832,7 +1832,7 @@ script: outputs: - contextPath: CheckPoint.DeletedThreatProtections description: '' - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/CheckpointFirewall/ReleaseNotes/2_3_23.md b/Packs/CheckpointFirewall/ReleaseNotes/2_3_23.md new file mode 100644 index 000000000000..7a279807b105 --- /dev/null +++ b/Packs/CheckpointFirewall/ReleaseNotes/2_3_23.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### CheckPoint Firewall v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CheckpointFirewall/pack_metadata.json b/Packs/CheckpointFirewall/pack_metadata.json index 045e226b1d50..cbab12f18369 100644 --- a/Packs/CheckpointFirewall/pack_metadata.json +++ b/Packs/CheckpointFirewall/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Check Point Firewall", "description": "Manage Check Point firewall via API", "support": "xsoar", - "currentVersion": "2.3.22", + "currentVersion": "2.3.23", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Cherwell/Integrations/Cherwell/Cherwell.yml b/Packs/Cherwell/Integrations/Cherwell/Cherwell.yml index 5e732c37bc72..693d8252ada5 100644 --- a/Packs/Cherwell/Integrations/Cherwell/Cherwell.yml +++ b/Packs/Cherwell/Integrations/Cherwell/Cherwell.yml @@ -414,7 +414,7 @@ script: description: Run a One-Step Action using a OneStepActionRequest. This request is used to start a One-Step Action run with additional information, such as prompt values. name: cherwell-run-one-step-action-on-business-object outputs: [] - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true script: '-' type: python diff --git a/Packs/Cherwell/ReleaseNotes/1_0_20.md b/Packs/Cherwell/ReleaseNotes/1_0_20.md new file mode 100644 index 000000000000..a76093a8830d --- /dev/null +++ b/Packs/Cherwell/ReleaseNotes/1_0_20.md @@ -0,0 +1,41 @@ + +#### Integrations + +##### Cherwell +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + + +#### Scripts + +##### CherwellIncidentUnlinkTask +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CherwellQueryIncidents +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CherwellUpdateIncident +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CherwellCreateIncident +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CherwellIncidentOwnTask +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CherwellGetIncident +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Cherwell/Scripts/CherwellCreateIncident/CherwellCreateIncident.yml b/Packs/Cherwell/Scripts/CherwellCreateIncident/CherwellCreateIncident.yml index 916fd07fdf9b..afdf588c1101 100644 --- a/Packs/Cherwell/Scripts/CherwellCreateIncident/CherwellCreateIncident.yml +++ b/Packs/Cherwell/Scripts/CherwellCreateIncident/CherwellCreateIncident.yml @@ -39,7 +39,7 @@ type: python dependson: must: - Cherwell|||cherwell-create-business-object -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 subtype: python3 tests: - Cherwell Example Scripts - test diff --git a/Packs/Cherwell/Scripts/CherwellGetIncident/CherwellGetIncident.yml b/Packs/Cherwell/Scripts/CherwellGetIncident/CherwellGetIncident.yml index b0620a66019c..fae4ed00eda2 100644 --- a/Packs/Cherwell/Scripts/CherwellGetIncident/CherwellGetIncident.yml +++ b/Packs/Cherwell/Scripts/CherwellGetIncident/CherwellGetIncident.yml @@ -49,7 +49,7 @@ tags: [Cherwell] dependson: must: - Cherwell|||cherwell-get-business-object -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 subtype: python3 tests: - Cherwell Example Scripts - test diff --git a/Packs/Cherwell/Scripts/CherwellIncidentOwnTask/CherwellIncidentOwnTask.yml b/Packs/Cherwell/Scripts/CherwellIncidentOwnTask/CherwellIncidentOwnTask.yml index 1a3823fb7c3b..34871d5bbe85 100644 --- a/Packs/Cherwell/Scripts/CherwellIncidentOwnTask/CherwellIncidentOwnTask.yml +++ b/Packs/Cherwell/Scripts/CherwellIncidentOwnTask/CherwellIncidentOwnTask.yml @@ -10,7 +10,7 @@ commonfields: id: CherwellIncidentOwnTask version: -1 name: CherwellIncidentOwnTask -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 subtype: python3 script: '-' timeout: '0' diff --git a/Packs/Cherwell/Scripts/CherwellIncidentUnlinkTask/CherwellIncidentUnlinkTask.yml b/Packs/Cherwell/Scripts/CherwellIncidentUnlinkTask/CherwellIncidentUnlinkTask.yml index 38d01554af2e..7c4d756fe846 100644 --- a/Packs/Cherwell/Scripts/CherwellIncidentUnlinkTask/CherwellIncidentUnlinkTask.yml +++ b/Packs/Cherwell/Scripts/CherwellIncidentUnlinkTask/CherwellIncidentUnlinkTask.yml @@ -13,7 +13,7 @@ name: CherwellIncidentUnlinkTask script: '-' timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 subtype: python3 tags: [Cherwell] dependson: diff --git a/Packs/Cherwell/Scripts/CherwellQueryIncidents/CherwellQueryIncidents.yml b/Packs/Cherwell/Scripts/CherwellQueryIncidents/CherwellQueryIncidents.yml index da8b76a71abd..beff7330d499 100644 --- a/Packs/Cherwell/Scripts/CherwellQueryIncidents/CherwellQueryIncidents.yml +++ b/Packs/Cherwell/Scripts/CherwellQueryIncidents/CherwellQueryIncidents.yml @@ -42,7 +42,7 @@ outputs: script: '-' timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 subtype: python3 tests: - Cherwell Example Scripts - test diff --git a/Packs/Cherwell/Scripts/CherwellUpdateIncident/CherwellUpdateIncident.yml b/Packs/Cherwell/Scripts/CherwellUpdateIncident/CherwellUpdateIncident.yml index aca4fa261e2d..f5062a73ad89 100644 --- a/Packs/Cherwell/Scripts/CherwellUpdateIncident/CherwellUpdateIncident.yml +++ b/Packs/Cherwell/Scripts/CherwellUpdateIncident/CherwellUpdateIncident.yml @@ -44,7 +44,7 @@ outputs: script: '-' timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 subtype: python3 tests: - Cherwell Example Scripts - test diff --git a/Packs/Cherwell/pack_metadata.json b/Packs/Cherwell/pack_metadata.json index e8f3c92977b8..46e1aa848293 100644 --- a/Packs/Cherwell/pack_metadata.json +++ b/Packs/Cherwell/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cherwell", "description": "Cloud-based IT service management solution", "support": "xsoar", - "currentVersion": "1.0.19", + "currentVersion": "1.0.20", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CircleCI/Integrations/CircleCI/CircleCI.yml b/Packs/CircleCI/Integrations/CircleCI/CircleCI.yml index 20f5154f69bc..fcbd9a575792 100644 --- a/Packs/CircleCI/Integrations/CircleCI/CircleCI.yml +++ b/Packs/CircleCI/Integrations/CircleCI/CircleCI.yml @@ -268,7 +268,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.5.0 tests: - No tests (auto formatted) diff --git a/Packs/CircleCI/ReleaseNotes/1_0_26.md b/Packs/CircleCI/ReleaseNotes/1_0_26.md new file mode 100644 index 000000000000..33a2f0737beb --- /dev/null +++ b/Packs/CircleCI/ReleaseNotes/1_0_26.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### CircleCI +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CircleCI/pack_metadata.json b/Packs/CircleCI/pack_metadata.json index fa52cf7a62c6..36418048a34d 100644 --- a/Packs/CircleCI/pack_metadata.json +++ b/Packs/CircleCI/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CircleCI", "description": "CircleCI is a modern continuous integration and continuous delivery (CI/CD) platform. CircleCI automates the building, testing, and deployment of software.", "support": "xsoar", - "currentVersion": "1.0.25", + "currentVersion": "1.0.26", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Cisco-umbrella-cloud-security/Integrations/CiscoUmbrellaCloudSecurityv2/CiscoUmbrellaCloudSecurityv2.yml b/Packs/Cisco-umbrella-cloud-security/Integrations/CiscoUmbrellaCloudSecurityv2/CiscoUmbrellaCloudSecurityv2.yml index 41c154ea74ad..46c904720c26 100644 --- a/Packs/Cisco-umbrella-cloud-security/Integrations/CiscoUmbrellaCloudSecurityv2/CiscoUmbrellaCloudSecurityv2.yml +++ b/Packs/Cisco-umbrella-cloud-security/Integrations/CiscoUmbrellaCloudSecurityv2/CiscoUmbrellaCloudSecurityv2.yml @@ -450,7 +450,7 @@ script: script: '' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 isfetch: false fromversion: 6.9.0 tests: diff --git a/Packs/Cisco-umbrella-cloud-security/ReleaseNotes/2_0_10.md b/Packs/Cisco-umbrella-cloud-security/ReleaseNotes/2_0_10.md new file mode 100644 index 000000000000..604f1e2a44f0 --- /dev/null +++ b/Packs/Cisco-umbrella-cloud-security/ReleaseNotes/2_0_10.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Cisco Umbrella Cloud Security v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Cisco-umbrella-cloud-security/pack_metadata.json b/Packs/Cisco-umbrella-cloud-security/pack_metadata.json index ed744f5f0bb9..b466d9e0450f 100644 --- a/Packs/Cisco-umbrella-cloud-security/pack_metadata.json +++ b/Packs/Cisco-umbrella-cloud-security/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cisco Umbrella cloud security", "description": "Basic integration with Cisco Umbrella that allows you to add domains to destination lists (e.g. global block / allow)", "support": "xsoar", - "currentVersion": "2.0.9", + "currentVersion": "2.0.10", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", @@ -18,4 +18,4 @@ "marketplacev2" ], "certification": "certified" -} +} \ No newline at end of file diff --git a/Packs/Cisco-umbrella/Integrations/Cisco-umbrella-investigate/Cisco-umbrella-investigate.yml b/Packs/Cisco-umbrella/Integrations/Cisco-umbrella-investigate/Cisco-umbrella-investigate.yml index 94b7fd0c2c55..2034b07e23db 100644 --- a/Packs/Cisco-umbrella/Integrations/Cisco-umbrella-investigate/Cisco-umbrella-investigate.yml +++ b/Packs/Cisco-umbrella/Integrations/Cisco-umbrella-investigate/Cisco-umbrella-investigate.yml @@ -1897,7 +1897,7 @@ script: script: "-" type: python subtype: python3 - dockerimage: demisto/python3:3.11.9.106968 + dockerimage: demisto/python3:3.11.10.115186 feed: false isfetch: false longRunning: false diff --git a/Packs/Cisco-umbrella/ReleaseNotes/2_0_2.md b/Packs/Cisco-umbrella/ReleaseNotes/2_0_2.md new file mode 100644 index 000000000000..9ad50ecea848 --- /dev/null +++ b/Packs/Cisco-umbrella/ReleaseNotes/2_0_2.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Cisco Umbrella Investigate +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Cisco-umbrella/pack_metadata.json b/Packs/Cisco-umbrella/pack_metadata.json index 21fcfbb2baf6..eb8ba6b9da01 100644 --- a/Packs/Cisco-umbrella/pack_metadata.json +++ b/Packs/Cisco-umbrella/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cisco Umbrella Investigate", "description": "Cisco Umbrella Investigate", "support": "xsoar", - "currentVersion": "2.0.1", + "currentVersion": "2.0.2", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", @@ -17,4 +17,4 @@ "xsoar", "marketplacev2" ] -} +} \ No newline at end of file diff --git a/Packs/CiscoASA/Integrations/CiscoASA/CiscoASA.yml b/Packs/CiscoASA/Integrations/CiscoASA/CiscoASA.yml index 7aaa7e8a0cc0..bf5bb71b3ece 100644 --- a/Packs/CiscoASA/Integrations/CiscoASA/CiscoASA.yml +++ b/Packs/CiscoASA/Integrations/CiscoASA/CiscoASA.yml @@ -913,7 +913,7 @@ script: - contextPath: CiscoASA.Interface.Type description: The type of interface. type: String - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' type: python diff --git a/Packs/CiscoASA/ReleaseNotes/1_1_11.md b/Packs/CiscoASA/ReleaseNotes/1_1_11.md new file mode 100644 index 000000000000..d39d4482c0a5 --- /dev/null +++ b/Packs/CiscoASA/ReleaseNotes/1_1_11.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Cisco ASA +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CiscoASA/pack_metadata.json b/Packs/CiscoASA/pack_metadata.json index b6201d6c326f..469520897081 100644 --- a/Packs/CiscoASA/pack_metadata.json +++ b/Packs/CiscoASA/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cisco ASA", "description": "Cisco Adaptive Security Appliance Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices.", "support": "xsoar", - "currentVersion": "1.1.10", + "currentVersion": "1.1.11", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CiscoFirepower/Integrations/CiscoFirepower/CiscoFirepower.yml b/Packs/CiscoFirepower/Integrations/CiscoFirepower/CiscoFirepower.yml index f2575821f2d3..39c1028a204c 100644 --- a/Packs/CiscoFirepower/Integrations/CiscoFirepower/CiscoFirepower.yml +++ b/Packs/CiscoFirepower/Integrations/CiscoFirepower/CiscoFirepower.yml @@ -3296,7 +3296,7 @@ script: - contextPath: CiscoFP.URLGroups.Overridable description: Whether objects can be overridden. type: string - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/CiscoFirepower/ReleaseNotes/1_2_5.md b/Packs/CiscoFirepower/ReleaseNotes/1_2_5.md new file mode 100644 index 000000000000..976b440f8360 --- /dev/null +++ b/Packs/CiscoFirepower/ReleaseNotes/1_2_5.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Cisco Firepower +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CiscoFirepower/pack_metadata.json b/Packs/CiscoFirepower/pack_metadata.json index 1e2cb03e2cba..111a2f906496 100644 --- a/Packs/CiscoFirepower/pack_metadata.json +++ b/Packs/CiscoFirepower/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cisco Firepower", "description": "Use the CiscoFirepower integration for unified management of firewalls, application control", "support": "xsoar", - "currentVersion": "1.2.4", + "currentVersion": "1.2.5", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CiscoSMA/Integrations/CiscoSMA/CiscoSMA.yml b/Packs/CiscoSMA/Integrations/CiscoSMA/CiscoSMA.yml index 4f91fdd0410d..78f34374437e 100644 --- a/Packs/CiscoSMA/Integrations/CiscoSMA/CiscoSMA.yml +++ b/Packs/CiscoSMA/Integrations/CiscoSMA/CiscoSMA.yml @@ -100,7 +100,7 @@ script: script: '' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true commands: - name: cisco-sma-spam-quarantine-message-search diff --git a/Packs/CiscoSMA/ReleaseNotes/1_1_31.md b/Packs/CiscoSMA/ReleaseNotes/1_1_31.md new file mode 100644 index 000000000000..e9327ee7c867 --- /dev/null +++ b/Packs/CiscoSMA/ReleaseNotes/1_1_31.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Cisco Security Management Appliance +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CiscoSMA/pack_metadata.json b/Packs/CiscoSMA/pack_metadata.json index fb013d1a9c85..8f3bba556773 100644 --- a/Packs/CiscoSMA/pack_metadata.json +++ b/Packs/CiscoSMA/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CiscoSMA", "description": "The Security Management Appliance (SMA) is used to centralize services from Email Security Appliances (ESAs) and Web Security Appliances (WSAs).", "support": "xsoar", - "currentVersion": "1.1.30", + "currentVersion": "1.1.31", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CiscoStealthwatch/Integrations/CiscoStealthwatch/CiscoStealthwatch.yml b/Packs/CiscoStealthwatch/Integrations/CiscoStealthwatch/CiscoStealthwatch.yml index aa9beaebef29..58b2080e5795 100644 --- a/Packs/CiscoStealthwatch/Integrations/CiscoStealthwatch/CiscoStealthwatch.yml +++ b/Packs/CiscoStealthwatch/Integrations/CiscoStealthwatch/CiscoStealthwatch.yml @@ -283,7 +283,7 @@ script: - contextPath: CiscoStealthwatch.SecurityEventResults.hitCount description: The hit count of the security event. type: str - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/CiscoStealthwatch/ReleaseNotes/1_0_33.md b/Packs/CiscoStealthwatch/ReleaseNotes/1_0_33.md new file mode 100644 index 000000000000..3573358ad6ee --- /dev/null +++ b/Packs/CiscoStealthwatch/ReleaseNotes/1_0_33.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Cisco Secure Network Analytics (Stealthwatch) +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CiscoStealthwatch/pack_metadata.json b/Packs/CiscoStealthwatch/pack_metadata.json index f22627223ab7..4f1a6d1d985e 100644 --- a/Packs/CiscoStealthwatch/pack_metadata.json +++ b/Packs/CiscoStealthwatch/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cisco Secure Network Analytics (Stealthwatch)", "description": "Cisco Secure Network Analytics (Stealthwatch) provides scalable visibility and security analytics.", "support": "xsoar", - "currentVersion": "1.0.32", + "currentVersion": "1.0.33", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CiscoWSA/Integrations/CiscoWSAV2/CiscoWSAV2.yml b/Packs/CiscoWSA/Integrations/CiscoWSAV2/CiscoWSAV2.yml index 5a5df572a7d3..cd19b992f25f 100644 --- a/Packs/CiscoWSA/Integrations/CiscoWSAV2/CiscoWSAV2.yml +++ b/Packs/CiscoWSA/Integrations/CiscoWSAV2/CiscoWSAV2.yml @@ -31,7 +31,7 @@ script: type: python subtype: python3 script: '-' - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 commands: - name: cisco-wsa-access-policy-list description: |- diff --git a/Packs/CiscoWSA/ReleaseNotes/2_0_14.md b/Packs/CiscoWSA/ReleaseNotes/2_0_14.md new file mode 100644 index 000000000000..d4ab868b30ce --- /dev/null +++ b/Packs/CiscoWSA/ReleaseNotes/2_0_14.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Cisco WSA v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CiscoWSA/pack_metadata.json b/Packs/CiscoWSA/pack_metadata.json index 1529dbdc706c..8b528ffa2823 100644 --- a/Packs/CiscoWSA/pack_metadata.json +++ b/Packs/CiscoWSA/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cisco WSA", "description": "Cisco Secure Web Appliance protects your organization by automatically blocking risky sites and testing unknown sites before allowing users to click on them.", "support": "xsoar", - "currentVersion": "2.0.13", + "currentVersion": "2.0.14", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Clarizen/Integrations/ClarizenIAM/ClarizenIAM.yml b/Packs/Clarizen/Integrations/ClarizenIAM/ClarizenIAM.yml index 4daf087bcc3d..52bf144003ad 100644 --- a/Packs/Clarizen/Integrations/ClarizenIAM/ClarizenIAM.yml +++ b/Packs/Clarizen/Integrations/ClarizenIAM/ClarizenIAM.yml @@ -226,7 +226,7 @@ script: type: String - description: Retrieves a User Profile schema, which holds all of the user fields within the application. Used for outgoing-mapping through the Get Schema option. name: get-mapping-fields - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Clarizen/ReleaseNotes/1_0_10.md b/Packs/Clarizen/ReleaseNotes/1_0_10.md new file mode 100644 index 000000000000..fc3a567f9845 --- /dev/null +++ b/Packs/Clarizen/ReleaseNotes/1_0_10.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Clarizen IAM +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Clarizen/pack_metadata.json b/Packs/Clarizen/pack_metadata.json index f256856bf599..b2f785cd2645 100644 --- a/Packs/Clarizen/pack_metadata.json +++ b/Packs/Clarizen/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Clarizen IAM", "description": "IAM Integration for Clarizen. This pack handles user account auto-provisioning", "support": "xsoar", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CloudConvert/Integrations/CloudConvert/CloudConvert.yml b/Packs/CloudConvert/Integrations/CloudConvert/CloudConvert.yml index a8496e0f8d95..d2b6d99caa3f 100644 --- a/Packs/CloudConvert/Integrations/CloudConvert/CloudConvert.yml +++ b/Packs/CloudConvert/Integrations/CloudConvert/CloudConvert.yml @@ -337,7 +337,7 @@ script: - contextPath: CloudConvert.Task.links description: API link for the task. type: String - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/CloudConvert/ReleaseNotes/1_0_10.md b/Packs/CloudConvert/ReleaseNotes/1_0_10.md new file mode 100644 index 000000000000..a000ec242f3d --- /dev/null +++ b/Packs/CloudConvert/ReleaseNotes/1_0_10.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### CloudConvert +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CloudConvert/pack_metadata.json b/Packs/CloudConvert/pack_metadata.json index e6ca12b52394..0e0ca445c95e 100644 --- a/Packs/CloudConvert/pack_metadata.json +++ b/Packs/CloudConvert/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cloud Convert", "description": "Use this integration to convert files using CloudConvert API", "support": "xsoar", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CloudIncidentResponse/ReleaseNotes/1_0_20.md b/Packs/CloudIncidentResponse/ReleaseNotes/1_0_20.md new file mode 100644 index 000000000000..56db631fcb5b --- /dev/null +++ b/Packs/CloudIncidentResponse/ReleaseNotes/1_0_20.md @@ -0,0 +1,38 @@ + +#### Scripts + +##### EntryWidgetRegionNameXCLOUD +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### XCloudAdditionalAlertInformationWidget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### XCloudProviderWidget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### EntryWidgetResourceTypeXCLOUD +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### XCloudRelatedAlertsWidget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### XCloudIdentitiesWidget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### displayCloudIndicators +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CloudIncidentResponse/Scripts/EntryWidgetRegionNameXCLOUD/EntryWidgetRegionNameXCLOUD.yml b/Packs/CloudIncidentResponse/Scripts/EntryWidgetRegionNameXCLOUD/EntryWidgetRegionNameXCLOUD.yml index 802c83b26f60..99dfa29eab0a 100644 --- a/Packs/CloudIncidentResponse/Scripts/EntryWidgetRegionNameXCLOUD/EntryWidgetRegionNameXCLOUD.yml +++ b/Packs/CloudIncidentResponse/Scripts/EntryWidgetRegionNameXCLOUD/EntryWidgetRegionNameXCLOUD.yml @@ -10,7 +10,7 @@ comment: Entry widget that returns the region involved in the alert. enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.8.0 tests: diff --git a/Packs/CloudIncidentResponse/Scripts/EntryWidgetResourceTypeXCLOUD/EntryWidgetResourceTypeXCLOUD.yml b/Packs/CloudIncidentResponse/Scripts/EntryWidgetResourceTypeXCLOUD/EntryWidgetResourceTypeXCLOUD.yml index 410a09f4c4f9..3c426887b6f6 100644 --- a/Packs/CloudIncidentResponse/Scripts/EntryWidgetResourceTypeXCLOUD/EntryWidgetResourceTypeXCLOUD.yml +++ b/Packs/CloudIncidentResponse/Scripts/EntryWidgetResourceTypeXCLOUD/EntryWidgetResourceTypeXCLOUD.yml @@ -10,7 +10,7 @@ comment: Entry widget that returns the resource type involved in the alert. enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.8.0 tests: diff --git a/Packs/CloudIncidentResponse/Scripts/XCloudAdditionalAlertInformationWidget/XCloudAdditionalAlertInformationWidget.yml b/Packs/CloudIncidentResponse/Scripts/XCloudAdditionalAlertInformationWidget/XCloudAdditionalAlertInformationWidget.yml index 1756f7738de6..78a20366c118 100644 --- a/Packs/CloudIncidentResponse/Scripts/XCloudAdditionalAlertInformationWidget/XCloudAdditionalAlertInformationWidget.yml +++ b/Packs/CloudIncidentResponse/Scripts/XCloudAdditionalAlertInformationWidget/XCloudAdditionalAlertInformationWidget.yml @@ -11,7 +11,7 @@ enabled: true scripttarget: 0 subtype: python3 runonce: false -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole engineinfo: {} fromversion: 6.10.0 diff --git a/Packs/CloudIncidentResponse/Scripts/XCloudIdentitiesWidget/XCloudIdentitiesWidget.yml b/Packs/CloudIncidentResponse/Scripts/XCloudIdentitiesWidget/XCloudIdentitiesWidget.yml index 5f43d9804974..82f7ed1c1a37 100644 --- a/Packs/CloudIncidentResponse/Scripts/XCloudIdentitiesWidget/XCloudIdentitiesWidget.yml +++ b/Packs/CloudIncidentResponse/Scripts/XCloudIdentitiesWidget/XCloudIdentitiesWidget.yml @@ -10,7 +10,7 @@ comment: This script retrieves the identity fields from the incident context. enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.8.0 tests: diff --git a/Packs/CloudIncidentResponse/Scripts/XCloudProviderWidget/XCloudProviderWidget.yml b/Packs/CloudIncidentResponse/Scripts/XCloudProviderWidget/XCloudProviderWidget.yml index 7c690d8a7bdd..8e6c0238554f 100644 --- a/Packs/CloudIncidentResponse/Scripts/XCloudProviderWidget/XCloudProviderWidget.yml +++ b/Packs/CloudIncidentResponse/Scripts/XCloudProviderWidget/XCloudProviderWidget.yml @@ -10,7 +10,7 @@ comment: 'This script returns an HTML result of the cloud providers in the incid enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.8.0 tests: diff --git a/Packs/CloudIncidentResponse/Scripts/XCloudRelatedAlertsWidget/XCloudRelatedAlertsWidget.yml b/Packs/CloudIncidentResponse/Scripts/XCloudRelatedAlertsWidget/XCloudRelatedAlertsWidget.yml index 5017af5a7f06..74f40b636566 100644 --- a/Packs/CloudIncidentResponse/Scripts/XCloudRelatedAlertsWidget/XCloudRelatedAlertsWidget.yml +++ b/Packs/CloudIncidentResponse/Scripts/XCloudRelatedAlertsWidget/XCloudRelatedAlertsWidget.yml @@ -10,7 +10,7 @@ comment: This script retrieves additional original alert information from the co enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.8.0 tests: diff --git a/Packs/CloudIncidentResponse/Scripts/displayCloudIndicators/displayCloudIndicators.yml b/Packs/CloudIncidentResponse/Scripts/displayCloudIndicators/displayCloudIndicators.yml index 2e513f4e2344..a5857fd255b4 100644 --- a/Packs/CloudIncidentResponse/Scripts/displayCloudIndicators/displayCloudIndicators.yml +++ b/Packs/CloudIncidentResponse/Scripts/displayCloudIndicators/displayCloudIndicators.yml @@ -10,7 +10,7 @@ comment: Display the Cloud indicators found in a dynamic-section enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.8.0 tests: diff --git a/Packs/CloudIncidentResponse/pack_metadata.json b/Packs/CloudIncidentResponse/pack_metadata.json index c005ac96601a..a639bb0e54fe 100644 --- a/Packs/CloudIncidentResponse/pack_metadata.json +++ b/Packs/CloudIncidentResponse/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cloud Incident Response", "description": "This content Pack helps you automate collection, investigation, and remediation of incidents related to cloud infrastructure activities in AWS, Azure, and GCP.", "support": "xsoar", - "currentVersion": "1.0.19", + "currentVersion": "1.0.20", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CloudflareWAF/Integrations/CloudflareWAF/CloudflareWAF.yml b/Packs/CloudflareWAF/Integrations/CloudflareWAF/CloudflareWAF.yml index 27443c91df2d..cc65f267b889 100644 --- a/Packs/CloudflareWAF/Integrations/CloudflareWAF/CloudflareWAF.yml +++ b/Packs/CloudflareWAF/Integrations/CloudflareWAF/CloudflareWAF.yml @@ -645,7 +645,7 @@ script: - contextPath: CloudflareWAF.IpListItem.list_id description: The list ID. type: String - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/CloudflareWAF/ReleaseNotes/1_0_26.md b/Packs/CloudflareWAF/ReleaseNotes/1_0_26.md new file mode 100644 index 000000000000..95263cccabeb --- /dev/null +++ b/Packs/CloudflareWAF/ReleaseNotes/1_0_26.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Cloudflare WAF +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CloudflareWAF/pack_metadata.json b/Packs/CloudflareWAF/pack_metadata.json index 59221b4000ef..0b40d3528cf6 100644 --- a/Packs/CloudflareWAF/pack_metadata.json +++ b/Packs/CloudflareWAF/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cloudflare WAF", "description": "Use Cloudflare WAF to manage firewall rules, filters, and IP-lists.", "support": "xsoar", - "currentVersion": "1.0.25", + "currentVersion": "1.0.26", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CommonDashboards/ReleaseNotes/1_7_7.md b/Packs/CommonDashboards/ReleaseNotes/1_7_7.md new file mode 100644 index 000000000000..78e8bdb911a8 --- /dev/null +++ b/Packs/CommonDashboards/ReleaseNotes/1_7_7.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### AdoptionMetrics +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CommonDashboards/Scripts/AdoptionMetrics/AdoptionMetrics.yml b/Packs/CommonDashboards/Scripts/AdoptionMetrics/AdoptionMetrics.yml index 265f1c3dbcd4..1e037cda5f52 100644 --- a/Packs/CommonDashboards/Scripts/AdoptionMetrics/AdoptionMetrics.yml +++ b/Packs/CommonDashboards/Scripts/AdoptionMetrics/AdoptionMetrics.yml @@ -14,7 +14,7 @@ runas: DBotWeakRole runonce: false scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.97374 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.10.0 tests: - No tests (auto formatted) diff --git a/Packs/CommonDashboards/pack_metadata.json b/Packs/CommonDashboards/pack_metadata.json index c77b80933448..d95f30f59603 100644 --- a/Packs/CommonDashboards/pack_metadata.json +++ b/Packs/CommonDashboards/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Common Dashboards", "description": "Frequently used dashboards pack.", "support": "xsoar", - "currentVersion": "1.7.6", + "currentVersion": "1.7.7", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CommonScripts/ReleaseNotes/1_15_93.md b/Packs/CommonScripts/ReleaseNotes/1_15_93.md new file mode 100644 index 000000000000..a8dc010300d5 --- /dev/null +++ b/Packs/CommonScripts/ReleaseNotes/1_15_93.md @@ -0,0 +1,18 @@ + +#### Scripts + +##### ExtractHyperlinksFromOfficeFiles + +- Updated the Docker image to: *demisto/office-utils:2.0.0.117112*. +##### ParseWordDoc + +- Updated the Docker image to: *demisto/office-utils:2.0.0.117112*. +##### ExtractIndicatorsFromWordFile + +- Updated the Docker image to: *demisto/office-utils:2.0.0.117112*. +##### ExtractHTMLTables + +- Updated the Docker image to: *demisto/bs4-py3:1.0.0.117152*. +##### ConvertFile + +- Updated the Docker image to: *demisto/office-utils:2.0.0.117112*. diff --git a/Packs/CommonScripts/ReleaseNotes/1_15_94.md b/Packs/CommonScripts/ReleaseNotes/1_15_94.md new file mode 100644 index 000000000000..8cbb7f0b4962 --- /dev/null +++ b/Packs/CommonScripts/ReleaseNotes/1_15_94.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### CertificateExtract +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + diff --git a/Packs/CommonScripts/Scripts/CertificateExtract/CertificateExtract.yml b/Packs/CommonScripts/Scripts/CertificateExtract/CertificateExtract.yml index 9ebf471873fc..a41e5b1f1aa1 100644 --- a/Packs/CommonScripts/Scripts/CertificateExtract/CertificateExtract.yml +++ b/Packs/CommonScripts/Scripts/CertificateExtract/CertificateExtract.yml @@ -126,7 +126,7 @@ tags: [] timeout: '0' type: python subtype: python3 -dockerimage: demisto/crypto:1.0.0.111961 +dockerimage: demisto/crypto:1.0.0.114611 fromversion: 6.0.0 tests: - X509Certificate Test Playbook diff --git a/Packs/CommonScripts/Scripts/ConvertFile/ConvertFile.yml b/Packs/CommonScripts/Scripts/ConvertFile/ConvertFile.yml index fff151536977..cfb93f6b1c81 100644 --- a/Packs/CommonScripts/Scripts/ConvertFile/ConvertFile.yml +++ b/Packs/CommonScripts/Scripts/ConvertFile/ConvertFile.yml @@ -42,7 +42,7 @@ outputs: description: The file type. type: String scripttarget: 0 -dockerimage: demisto/office-utils:2.0.0.107687 +dockerimage: demisto/office-utils:2.0.0.117112 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/CommonScripts/Scripts/ExtractHTMLTables/ExtractHTMLTables.yml b/Packs/CommonScripts/Scripts/ExtractHTMLTables/ExtractHTMLTables.yml index db65572489ed..2e84eeaae438 100644 --- a/Packs/CommonScripts/Scripts/ExtractHTMLTables/ExtractHTMLTables.yml +++ b/Packs/CommonScripts/Scripts/ExtractHTMLTables/ExtractHTMLTables.yml @@ -25,7 +25,7 @@ outputs: - contextPath: HTMLTables description: The extracted HTML tables scripttarget: 0 -dockerimage: demisto/bs4-py3:1.0.0.86348 +dockerimage: demisto/bs4-py3:1.0.0.117152 fromversion: 5.0.0 tests: - TestExtractHTMLTables diff --git a/Packs/CommonScripts/Scripts/ExtractHyperlinksFromOfficeFiles/ExtractHyperlinksFromOfficeFiles.yml b/Packs/CommonScripts/Scripts/ExtractHyperlinksFromOfficeFiles/ExtractHyperlinksFromOfficeFiles.yml index 6e616dcf7771..3cc1c703ca43 100644 --- a/Packs/CommonScripts/Scripts/ExtractHyperlinksFromOfficeFiles/ExtractHyperlinksFromOfficeFiles.yml +++ b/Packs/CommonScripts/Scripts/ExtractHyperlinksFromOfficeFiles/ExtractHyperlinksFromOfficeFiles.yml @@ -18,5 +18,5 @@ script: '-' timeout: '0' type: python subtype: python3 -dockerimage: demisto/office-utils:2.0.0.107687 +dockerimage: demisto/office-utils:2.0.0.117112 fromversion: 5.5.0 diff --git a/Packs/CommonScripts/Scripts/ExtractIndicatorsFromWordFile/ExtractIndicatorsFromWordFile.yml b/Packs/CommonScripts/Scripts/ExtractIndicatorsFromWordFile/ExtractIndicatorsFromWordFile.yml index eb4e9d629dbe..e7a152718e0a 100644 --- a/Packs/CommonScripts/Scripts/ExtractIndicatorsFromWordFile/ExtractIndicatorsFromWordFile.yml +++ b/Packs/CommonScripts/Scripts/ExtractIndicatorsFromWordFile/ExtractIndicatorsFromWordFile.yml @@ -28,7 +28,7 @@ timeout: '0' type: python subtype: python3 runas: DBotRole -dockerimage: demisto/office-utils:2.0.0.107687 +dockerimage: demisto/office-utils:2.0.0.117112 fromversion: 5.0.0 tests: - Extract Indicators From File - Generic v2 - Test diff --git a/Packs/CommonScripts/Scripts/ParseWordDoc/ParseWordDoc.yml b/Packs/CommonScripts/Scripts/ParseWordDoc/ParseWordDoc.yml index 677375629e28..b8221cf2475d 100644 --- a/Packs/CommonScripts/Scripts/ParseWordDoc/ParseWordDoc.yml +++ b/Packs/CommonScripts/Scripts/ParseWordDoc/ParseWordDoc.yml @@ -18,7 +18,7 @@ args: default: true description: Docx file to parse. scripttarget: 0 -dockerimage: demisto/office-utils:2.0.0.107687 +dockerimage: demisto/office-utils:2.0.0.117112 fromversion: 5.0.0 tests: - ParseWordDoc-Test diff --git a/Packs/CommonScripts/pack_metadata.json b/Packs/CommonScripts/pack_metadata.json index f390aad6ac4b..c4e2c911a2f5 100644 --- a/Packs/CommonScripts/pack_metadata.json +++ b/Packs/CommonScripts/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Common Scripts", "description": "Frequently used scripts pack.", "support": "xsoar", - "currentVersion": "1.15.92", + "currentVersion": "1.15.94", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CommonWidgets/ReleaseNotes/1_2_53.md b/Packs/CommonWidgets/ReleaseNotes/1_2_53.md new file mode 100644 index 000000000000..ed6404cca1c8 --- /dev/null +++ b/Packs/CommonWidgets/ReleaseNotes/1_2_53.md @@ -0,0 +1,13 @@ + +#### Scripts + +##### FeedIntegrationErrorWidget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### MyToDoTasksWidget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CommonWidgets/Scripts/FeedIntegrationErrorWidget/FeedIntegrationErrorWidget.yml b/Packs/CommonWidgets/Scripts/FeedIntegrationErrorWidget/FeedIntegrationErrorWidget.yml index 8affcdd40835..9ff5fbf0f88d 100644 --- a/Packs/CommonWidgets/Scripts/FeedIntegrationErrorWidget/FeedIntegrationErrorWidget.yml +++ b/Packs/CommonWidgets/Scripts/FeedIntegrationErrorWidget/FeedIntegrationErrorWidget.yml @@ -9,7 +9,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.1.0 tests: - No test diff --git a/Packs/CommonWidgets/Scripts/MyToDoTasksWidget/MyToDoTasksWidget.yml b/Packs/CommonWidgets/Scripts/MyToDoTasksWidget/MyToDoTasksWidget.yml index 3c0fcc694ef5..aa5ba4b3df25 100644 --- a/Packs/CommonWidgets/Scripts/MyToDoTasksWidget/MyToDoTasksWidget.yml +++ b/Packs/CommonWidgets/Scripts/MyToDoTasksWidget/MyToDoTasksWidget.yml @@ -9,7 +9,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.14.97100 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.1.0 tests: - No test diff --git a/Packs/CommonWidgets/pack_metadata.json b/Packs/CommonWidgets/pack_metadata.json index 3bc9eca4c3c5..29e8b56af868 100644 --- a/Packs/CommonWidgets/pack_metadata.json +++ b/Packs/CommonWidgets/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Common Widgets", "description": "Frequently used widgets pack.", "support": "xsoar", - "currentVersion": "1.2.52", + "currentVersion": "1.2.53", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Confluence/Integrations/Confluence/Confluence.yml b/Packs/Confluence/Integrations/Confluence/Confluence.yml index 1028e80bbeb5..20d677dc90e8 100644 --- a/Packs/Confluence/Integrations/Confluence/Confluence.yml +++ b/Packs/Confluence/Integrations/Confluence/Confluence.yml @@ -220,7 +220,7 @@ script: description: Content version. type: String description: 'Fetches a list of content using the Confluence Query Language (CQL). For more information about CQL syntax, see https://developer.atlassian.com/server/confluence/advanced-searching-using-cql/' - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 tests: - No test - the test requires personal credentials to the confluence account fromversion: 5.0.0 diff --git a/Packs/Confluence/ReleaseNotes/1_0_22.md b/Packs/Confluence/ReleaseNotes/1_0_22.md new file mode 100644 index 000000000000..c5cda4a07d07 --- /dev/null +++ b/Packs/Confluence/ReleaseNotes/1_0_22.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Atlassian Confluence Server +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Confluence/pack_metadata.json b/Packs/Confluence/pack_metadata.json index 2d21589ca6f4..8af6e945d74f 100644 --- a/Packs/Confluence/pack_metadata.json +++ b/Packs/Confluence/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Atlassian Confluence Server", "description": "Atlassian Confluence Server API", "support": "xsoar", - "currentVersion": "1.0.21", + "currentVersion": "1.0.22", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/ContentManagement/ReleaseNotes/1_2_25.md b/Packs/ContentManagement/ReleaseNotes/1_2_25.md new file mode 100644 index 000000000000..192167350c77 --- /dev/null +++ b/Packs/ContentManagement/ReleaseNotes/1_2_25.md @@ -0,0 +1,18 @@ + +#### Scripts + +##### GetPrBranches +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### SuggestBranchName +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### DeleteContent +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/ContentManagement/Scripts/DeleteContent/DeleteContent.yml b/Packs/ContentManagement/Scripts/DeleteContent/DeleteContent.yml index 8c6136e6f440..134350ba83a6 100644 --- a/Packs/ContentManagement/Scripts/DeleteContent/DeleteContent.yml +++ b/Packs/ContentManagement/Scripts/DeleteContent/DeleteContent.yml @@ -48,7 +48,7 @@ tags: timeout: 3600 type: python subtype: python3 -dockerimage: demisto/python3:3.11.9.105369 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) fromversion: 6.0.0 diff --git a/Packs/ContentManagement/Scripts/GetPrBranches/GetPrBranches.yml b/Packs/ContentManagement/Scripts/GetPrBranches/GetPrBranches.yml index 41eee1484574..be2a0933543b 100644 --- a/Packs/ContentManagement/Scripts/GetPrBranches/GetPrBranches.yml +++ b/Packs/ContentManagement/Scripts/GetPrBranches/GetPrBranches.yml @@ -5,7 +5,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: GetPrBranches runas: DBotWeakRole diff --git a/Packs/ContentManagement/Scripts/SuggestBranchName/SuggestBranchName.yml b/Packs/ContentManagement/Scripts/SuggestBranchName/SuggestBranchName.yml index 222eb326cdb7..ecede8486f9d 100644 --- a/Packs/ContentManagement/Scripts/SuggestBranchName/SuggestBranchName.yml +++ b/Packs/ContentManagement/Scripts/SuggestBranchName/SuggestBranchName.yml @@ -19,7 +19,7 @@ commonfields: contentitemexportablefields: contentitemfields: fromServerVersion: '' -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: SuggestBranchName outputs: diff --git a/Packs/ContentManagement/pack_metadata.json b/Packs/ContentManagement/pack_metadata.json index 37d72e5baeb4..b963f33a73be 100644 --- a/Packs/ContentManagement/pack_metadata.json +++ b/Packs/ContentManagement/pack_metadata.json @@ -2,7 +2,7 @@ "name": "XSOAR CI/CD", "description": "This pack enables you to orchestrate your XSOAR system configuration.", "support": "xsoar", - "currentVersion": "1.2.24", + "currentVersion": "1.2.25", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Core/Playbooks/playbook-External_Login_Password_Spray.yml b/Packs/Core/Playbooks/playbook-External_Login_Password_Spray.yml index 8455e803796b..16770c0d537b 100644 --- a/Packs/Core/Playbooks/playbook-External_Login_Password_Spray.yml +++ b/Packs/Core/Playbooks/playbook-External_Login_Password_Spray.yml @@ -17,19 +17,19 @@ description: |- Early Containment: - With analyst approval, the playbook will block the malicious external IP address involved in the password spray attack, limiting the attacker's ability to continue their actions. + - With analyst approval, the playbook will block the malicious external IP address involved in the password spray attack, limiting the attacker's ability to continue their actions. Investigation: - The playbook analyzes the timestamps of the login attempts to detect patterns, checks whether any logons were successful, and retrieves the Risk Score for users who successfully logged in as part of the attack. + - The playbook analyzes the timestamps of the login attempts to detect patterns, checks whether any logons were successful, and retrieves the Risk Score for users who successfully logged in as part of the attack. Containment: - Based on the user’s risk level, the playbook will expire the user’s password to prevent further unauthorized access and terminate any active RDP sessions for the affected user. + - Based on the user’s risk level, the playbook will expire the user’s password to prevent further unauthorized access and terminate any active RDP sessions for the affected user. Requirements: - For response actions, the following integrations are required: Active Directory (AD), PAN-OS, Core - IR. + - For response actions, the following integrations are required: Active Directory (AD), PAN-OS, Core - IR. tags: - T1110.003 - Password Spraying - T1110 - Brute Force diff --git a/Packs/Core/ReleaseNotes/3_0_99.md b/Packs/Core/ReleaseNotes/3_0_99.md new file mode 100644 index 000000000000..d8c10cb3633c --- /dev/null +++ b/Packs/Core/ReleaseNotes/3_0_99.md @@ -0,0 +1,6 @@ + +#### Playbooks + +##### External Login Password Spray + +Updated the playbook description. diff --git a/Packs/Core/pack_metadata.json b/Packs/Core/pack_metadata.json index bd083689767d..a861a60c0293 100644 --- a/Packs/Core/pack_metadata.json +++ b/Packs/Core/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Core - Investigation and Response", "description": "Automates incident response", "support": "xsoar", - "currentVersion": "3.0.98", + "currentVersion": "3.0.99", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CortexAttackSurfaceManagement/ReleaseNotes/1_7_59.md b/Packs/CortexAttackSurfaceManagement/ReleaseNotes/1_7_59.md new file mode 100644 index 000000000000..7f8230892914 --- /dev/null +++ b/Packs/CortexAttackSurfaceManagement/ReleaseNotes/1_7_59.md @@ -0,0 +1,15 @@ + +#### Integrations + +##### Cortex Attack Surface Management + + + + +#### Scripts + +##### RCSScan +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CortexAttackSurfaceManagement/Scripts/RCSScan/RCSScan.yml b/Packs/CortexAttackSurfaceManagement/Scripts/RCSScan/RCSScan.yml index 195f6a18f487..ceba54dc0b70 100644 --- a/Packs/CortexAttackSurfaceManagement/Scripts/RCSScan/RCSScan.yml +++ b/Packs/CortexAttackSurfaceManagement/Scripts/RCSScan/RCSScan.yml @@ -12,7 +12,7 @@ comment: This script starts an RCS scan and sets the scan ID in context. commonfields: id: 'RCSScan' version: -1 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 enabled: true engineinfo: {} name: RCSScan diff --git a/Packs/CortexAttackSurfaceManagement/pack_metadata.json b/Packs/CortexAttackSurfaceManagement/pack_metadata.json index 6493e781d42b..3b12a936e219 100644 --- a/Packs/CortexAttackSurfaceManagement/pack_metadata.json +++ b/Packs/CortexAttackSurfaceManagement/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cortex Attack Surface Management", "description": "Content for working with Attack Surface Management (ASM).", "support": "xsoar", - "currentVersion": "1.7.58", + "currentVersion": "1.7.59", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CortexXDR/Integrations/XQLQueryingEngine/XQLQueryingEngine.yml b/Packs/CortexXDR/Integrations/XQLQueryingEngine/XQLQueryingEngine.yml index e9199ebc095d..55b3736c2c36 100644 --- a/Packs/CortexXDR/Integrations/XQLQueryingEngine/XQLQueryingEngine.yml +++ b/Packs/CortexXDR/Integrations/XQLQueryingEngine/XQLQueryingEngine.yml @@ -1565,7 +1565,7 @@ script: - contextPath: PaloAltoNetworksXQL.ProcessCausalityNetworkActivity.results._product description: The result product. type: String - dockerimage: demisto/python3:3.10.14.99144 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/CortexXDR/ReleaseNotes/6_1_93.md b/Packs/CortexXDR/ReleaseNotes/6_1_93.md new file mode 100644 index 000000000000..19fd22413483 --- /dev/null +++ b/Packs/CortexXDR/ReleaseNotes/6_1_93.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Cortex XDR - XQL Query Engine +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CortexXDR/pack_metadata.json b/Packs/CortexXDR/pack_metadata.json index 12e02c4d696a..4b60da1fff00 100644 --- a/Packs/CortexXDR/pack_metadata.json +++ b/Packs/CortexXDR/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cortex XDR by Palo Alto Networks", "description": "Automates Cortex XDR incident response, and includes custom Cortex XDR incident views and layouts to aid analyst investigations.", "support": "xsoar", - "currentVersion": "6.1.92", + "currentVersion": "6.1.93", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CounterTack/Integrations/CounterTack/CounterTack.yml b/Packs/CounterTack/Integrations/CounterTack/CounterTack.yml index 4d93f3613e6d..ef3e182c5639 100644 --- a/Packs/CounterTack/Integrations/CounterTack/CounterTack.yml +++ b/Packs/CounterTack/Integrations/CounterTack/CounterTack.yml @@ -1145,7 +1145,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 tests: - no tests fromversion: 5.0.0 diff --git a/Packs/CounterTack/ReleaseNotes/1_0_10.md b/Packs/CounterTack/ReleaseNotes/1_0_10.md new file mode 100644 index 000000000000..b80c911d35b8 --- /dev/null +++ b/Packs/CounterTack/ReleaseNotes/1_0_10.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### CounterTack +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CounterTack/pack_metadata.json b/Packs/CounterTack/pack_metadata.json index d5e62aa6af2a..bcd3189752d5 100644 --- a/Packs/CounterTack/pack_metadata.json +++ b/Packs/CounterTack/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CounterTack", "description": "CounterTack empowers endpoint security teams to assure endpoint protection for Identifying Cyber Threats. Integrating a predictive endpoint protection platform", "support": "xsoar", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_-_False_Positive_Incident_Handling.yml b/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_-_False_Positive_Incident_Handling.yml index 84479ec22197..293e33002b8d 100644 --- a/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_-_False_Positive_Incident_Handling.yml +++ b/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_-_False_Positive_Incident_Handling.yml @@ -854,3 +854,5 @@ inputs: outputs: [] tests: - No tests +marketplaces: +- xsoar diff --git a/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_-_True_Positive_Incident_Handling.yml b/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_-_True_Positive_Incident_Handling.yml index 2ecb61227741..057e88859ded 100644 --- a/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_-_True_Positive_Incident_Handling.yml +++ b/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_-_True_Positive_Incident_Handling.yml @@ -2010,3 +2010,5 @@ tests: contentitemexportablefields: contentitemfields: {} system: true +marketplaces: +- xsoar diff --git a/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_Malware_-_Incident_Enrichment.yml b/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_Malware_-_Incident_Enrichment.yml index 081583031ad8..9f1f07906ef4 100644 --- a/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_Malware_-_Incident_Enrichment.yml +++ b/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_Malware_-_Incident_Enrichment.yml @@ -1276,4 +1276,6 @@ tests: - No tests (auto formatted) contentitemexportablefields: contentitemfields: {} -system: true \ No newline at end of file +system: true +marketplaces: +- xsoar \ No newline at end of file diff --git a/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_Malware_-_Investigation_and_Response.yml b/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_Malware_-_Investigation_and_Response.yml index 8a85aa39a4f0..dffa22d971d2 100644 --- a/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_Malware_-_Investigation_and_Response.yml +++ b/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_Malware_-_Investigation_and_Response.yml @@ -2215,3 +2215,5 @@ tests: contentitemexportablefields: contentitemfields: {} system: true +marketplaces: +- xsoar diff --git a/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_SIEM_ingestion_-_Get_Incident_Data.yml b/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_SIEM_ingestion_-_Get_Incident_Data.yml index 72aaaeeae0da..1cfd05b4a2ae 100644 --- a/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_SIEM_ingestion_-_Get_Incident_Data.yml +++ b/Packs/CrowdStrikeFalcon/Playbooks/playbook-CrowdStrike_Falcon_SIEM_ingestion_-_Get_Incident_Data.yml @@ -870,3 +870,5 @@ tests: contentitemexportablefields: contentitemfields: {} system: true +marketplaces: +- xsoar \ No newline at end of file diff --git a/Packs/CrowdStrikeFalcon/ReleaseNotes/2_0_26.md b/Packs/CrowdStrikeFalcon/ReleaseNotes/2_0_26.md new file mode 100644 index 000000000000..544107687fff --- /dev/null +++ b/Packs/CrowdStrikeFalcon/ReleaseNotes/2_0_26.md @@ -0,0 +1,22 @@ + +#### Playbooks + +##### CrowdStrike Falcon - False Positive Incident Handling + +- Updated the playbook to be availble only for XSOAR marketplace. + +##### CrowdStrike Falcon Malware - Investigation and Response + +- Updated the playbook to be availble only for XSOAR marketplace. + +##### CrowdStrike Falcon - True Positive Incident Handling + +- Updated the playbook to be availble only for XSOAR marketplace. + +##### CrowdStrike Falcon - SIEM ingestion Get Incident Data + +- Updated the playbook to be availble only for XSOAR marketplace. + +##### CrowdStrike Falcon Malware - Incident Enrichment + +- Updated the playbook to be availble only for XSOAR marketplace. diff --git a/Packs/CrowdStrikeFalcon/pack_metadata.json b/Packs/CrowdStrikeFalcon/pack_metadata.json index f02aeaf2e1bf..96a60ddc4952 100644 --- a/Packs/CrowdStrikeFalcon/pack_metadata.json +++ b/Packs/CrowdStrikeFalcon/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CrowdStrike Falcon", "description": "The CrowdStrike Falcon OAuth 2 API (formerly the Falcon Firehose API), enables fetching and resolving detections, searching devices, getting behaviors by ID, containing hosts, and lifting host containment.", "support": "xsoar", - "currentVersion": "2.0.25", + "currentVersion": "2.0.26", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CrowdStrikeFalconSandbox/Integrations/CrowdStrikeFalconSandboxV2/CrowdStrikeFalconSandboxV2.yml b/Packs/CrowdStrikeFalconSandbox/Integrations/CrowdStrikeFalconSandboxV2/CrowdStrikeFalconSandboxV2.yml index b828cff442cd..fea120b5bdd1 100644 --- a/Packs/CrowdStrikeFalconSandbox/Integrations/CrowdStrikeFalconSandboxV2/CrowdStrikeFalconSandboxV2.yml +++ b/Packs/CrowdStrikeFalconSandbox/Integrations/CrowdStrikeFalconSandboxV2/CrowdStrikeFalconSandboxV2.yml @@ -45,7 +45,7 @@ script: script: "-" subtype: python3 type: python - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 commands: - name: cs-falcon-sandbox-scan polling: true diff --git a/Packs/CrowdStrikeFalconSandbox/ReleaseNotes/2_0_22.md b/Packs/CrowdStrikeFalconSandbox/ReleaseNotes/2_0_22.md new file mode 100644 index 000000000000..d287a19c94d0 --- /dev/null +++ b/Packs/CrowdStrikeFalconSandbox/ReleaseNotes/2_0_22.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### CrowdStrike Falcon Sandbox v2 (Hybrid-Analysis) +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CrowdStrikeFalconSandbox/pack_metadata.json b/Packs/CrowdStrikeFalconSandbox/pack_metadata.json index 0eb63a443ff5..433d56e8c7fb 100644 --- a/Packs/CrowdStrikeFalconSandbox/pack_metadata.json +++ b/Packs/CrowdStrikeFalconSandbox/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CrowdStrike Falcon Sandbox", "description": "Fully automated malware analysis (formerly Payload Security VxStream).", "support": "xsoar", - "currentVersion": "2.0.21", + "currentVersion": "2.0.22", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CrowdStrikeFalconStreamingV2/ReleaseNotes/1_1_13.md b/Packs/CrowdStrikeFalconStreamingV2/ReleaseNotes/1_1_13.md new file mode 100644 index 000000000000..cf7a64c333c0 --- /dev/null +++ b/Packs/CrowdStrikeFalconStreamingV2/ReleaseNotes/1_1_13.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### CrowdStrikeStreamingPreProcessing +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CrowdStrikeFalconStreamingV2/Scripts/CrowdStrikeStreamingPreProcessing/CrowdStrikeStreamingPreProcessing.yml b/Packs/CrowdStrikeFalconStreamingV2/Scripts/CrowdStrikeStreamingPreProcessing/CrowdStrikeStreamingPreProcessing.yml index c69c683becf2..eed2153b31c3 100644 --- a/Packs/CrowdStrikeFalconStreamingV2/Scripts/CrowdStrikeStreamingPreProcessing/CrowdStrikeStreamingPreProcessing.yml +++ b/Packs/CrowdStrikeFalconStreamingV2/Scripts/CrowdStrikeStreamingPreProcessing/CrowdStrikeStreamingPreProcessing.yml @@ -21,4 +21,4 @@ scripttarget: 0 tests: - No test - this is a preprocessing script fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 diff --git a/Packs/CrowdStrikeFalconStreamingV2/pack_metadata.json b/Packs/CrowdStrikeFalconStreamingV2/pack_metadata.json index 3417e8c81a31..b74de63d0358 100644 --- a/Packs/CrowdStrikeFalconStreamingV2/pack_metadata.json +++ b/Packs/CrowdStrikeFalconStreamingV2/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CrowdStrike Falcon Streaming", "description": "Use the CrowdStrike Falcon Stream v2 integration to stream detections and audit security events.", "support": "xsoar", - "currentVersion": "1.1.12", + "currentVersion": "1.1.13", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CrowdStrikeMalquery/Integrations/CrowdStrikeMalquery/CrowdStrikeMalquery.yml b/Packs/CrowdStrikeMalquery/Integrations/CrowdStrikeMalquery/CrowdStrikeMalquery.yml index 9e335cf71535..b484e8ad4133 100644 --- a/Packs/CrowdStrikeMalquery/Integrations/CrowdStrikeMalquery/CrowdStrikeMalquery.yml +++ b/Packs/CrowdStrikeMalquery/Integrations/CrowdStrikeMalquery/CrowdStrikeMalquery.yml @@ -369,7 +369,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.0.0 tests: - CrowdStrikeMalquery-Test diff --git a/Packs/CrowdStrikeMalquery/ReleaseNotes/1_0_28.md b/Packs/CrowdStrikeMalquery/ReleaseNotes/1_0_28.md new file mode 100644 index 000000000000..2a6f6b334968 --- /dev/null +++ b/Packs/CrowdStrikeMalquery/ReleaseNotes/1_0_28.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### CrowdStrike Malquery +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CrowdStrikeMalquery/pack_metadata.json b/Packs/CrowdStrikeMalquery/pack_metadata.json index 39c9512c3bc7..48b0ed1fd5fe 100644 --- a/Packs/CrowdStrikeMalquery/pack_metadata.json +++ b/Packs/CrowdStrikeMalquery/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CrowdStrike Malquery", "description": "Use the MalQuery Pack to query the contents of over a half-billion binary files, both clean and malicious, that are part of Falcon MalQuery's corpus.", "support": "xsoar", - "currentVersion": "1.0.27", + "currentVersion": "1.0.28", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CrowdStrikeOpenAPI/Integrations/CrowdStrikeOpenAPI/CrowdStrikeOpenAPI.yml b/Packs/CrowdStrikeOpenAPI/Integrations/CrowdStrikeOpenAPI/CrowdStrikeOpenAPI.yml index e341e0de6910..3181b9c0bd22 100644 --- a/Packs/CrowdStrikeOpenAPI/Integrations/CrowdStrikeOpenAPI/CrowdStrikeOpenAPI.yml +++ b/Packs/CrowdStrikeOpenAPI/Integrations/CrowdStrikeOpenAPI/CrowdStrikeOpenAPI.yml @@ -25717,7 +25717,7 @@ script: - contextPath: CrowdStrike.deviceNetworkHistory.resources.history.timestamp description: '' type: String - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/CrowdStrikeOpenAPI/ReleaseNotes/1_0_19.md b/Packs/CrowdStrikeOpenAPI/ReleaseNotes/1_0_19.md new file mode 100644 index 000000000000..9df134df6f80 --- /dev/null +++ b/Packs/CrowdStrikeOpenAPI/ReleaseNotes/1_0_19.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### CrowdStrike OpenAPI (Beta) +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CrowdStrikeOpenAPI/pack_metadata.json b/Packs/CrowdStrikeOpenAPI/pack_metadata.json index 8532b718ccb2..79e1cde044e6 100644 --- a/Packs/CrowdStrikeOpenAPI/pack_metadata.json +++ b/Packs/CrowdStrikeOpenAPI/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CrowdStrike OpenAPI", "description": "Use the CrowdStrike OpenAPI integration to interact with CrowdStrike APIs that do not have dedicated integrations in Cortex XSOAR, for example, CrowdStrike FalconX, etc.", "support": "xsoar", - "currentVersion": "1.0.18", + "currentVersion": "1.0.19", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Cryptocurrency/Integrations/Cryptocurrency/Cryptocurrency.yml b/Packs/Cryptocurrency/Integrations/Cryptocurrency/Cryptocurrency.yml index 39b8d381c27a..0a450f8b3435 100644 --- a/Packs/Cryptocurrency/Integrations/Cryptocurrency/Cryptocurrency.yml +++ b/Packs/Cryptocurrency/Integrations/Cryptocurrency/Cryptocurrency.yml @@ -70,7 +70,7 @@ script: description: The cryptocurrency type. e.g. 'bitcoin'. type: string description: Return Cryptocurrency reputation. - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Cryptocurrency/ReleaseNotes/1_1_56.md b/Packs/Cryptocurrency/ReleaseNotes/1_1_56.md new file mode 100644 index 000000000000..c0475e102f3f --- /dev/null +++ b/Packs/Cryptocurrency/ReleaseNotes/1_1_56.md @@ -0,0 +1,16 @@ + +#### Integrations + +##### Cryptocurrency +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + + +#### Scripts + +##### CryptoCurrenciesFormat +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Cryptocurrency/Scripts/CryptoCurrenciesFormat/CryptoCurrenciesFormat.yml b/Packs/Cryptocurrency/Scripts/CryptoCurrenciesFormat/CryptoCurrenciesFormat.yml index 4b8ddffa62d0..fa4d90960498 100644 --- a/Packs/Cryptocurrency/Scripts/CryptoCurrenciesFormat/CryptoCurrenciesFormat.yml +++ b/Packs/Cryptocurrency/Scripts/CryptoCurrenciesFormat/CryptoCurrenciesFormat.yml @@ -15,5 +15,5 @@ tags: - indicator-format timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.0.0 diff --git a/Packs/Cryptocurrency/pack_metadata.json b/Packs/Cryptocurrency/pack_metadata.json index d2284d3ba140..23e835ee0c12 100644 --- a/Packs/Cryptocurrency/pack_metadata.json +++ b/Packs/Cryptocurrency/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cryptocurrency", "description": "This Content Pack enables you to add a reputation for cryptocurrency addresses.", "support": "xsoar", - "currentVersion": "1.1.55", + "currentVersion": "1.1.56", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CuckooSandbox/ReleaseNotes/1_1_6.md b/Packs/CuckooSandbox/ReleaseNotes/1_1_6.md new file mode 100644 index 000000000000..c05d5560a3c4 --- /dev/null +++ b/Packs/CuckooSandbox/ReleaseNotes/1_1_6.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### CuckooDisplayReport +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CuckooSandbox/Scripts/CuckooDisplayReport/CuckooDisplayReport.yml b/Packs/CuckooSandbox/Scripts/CuckooDisplayReport/CuckooDisplayReport.yml index 67c3760b8b8b..178af875fed5 100644 --- a/Packs/CuckooSandbox/Scripts/CuckooDisplayReport/CuckooDisplayReport.yml +++ b/Packs/CuckooSandbox/Scripts/CuckooDisplayReport/CuckooDisplayReport.yml @@ -22,6 +22,6 @@ args: scripttarget: 0 timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/CuckooSandbox/pack_metadata.json b/Packs/CuckooSandbox/pack_metadata.json index bf60908e2232..891bc53d5ff2 100644 --- a/Packs/CuckooSandbox/pack_metadata.json +++ b/Packs/CuckooSandbox/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cuckoo Sandbox", "description": "Malware dynamic analysis sandboxing", "support": "xsoar", - "currentVersion": "1.1.5", + "currentVersion": "1.1.6", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CybelAngel/Integrations/CybelAngelEventCollector/CybelAngelEventCollector.yml b/Packs/CybelAngel/Integrations/CybelAngelEventCollector/CybelAngelEventCollector.yml index b2564d6f7764..a4e4b84abcde 100644 --- a/Packs/CybelAngel/Integrations/CybelAngelEventCollector/CybelAngelEventCollector.yml +++ b/Packs/CybelAngel/Integrations/CybelAngelEventCollector/CybelAngelEventCollector.yml @@ -63,7 +63,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.89009 + dockerimage: demisto/python3:3.11.10.115186 isfetchevents: true fromversion: 8.0.0 marketplaces: diff --git a/Packs/CybelAngel/ReleaseNotes/1_0_2.md b/Packs/CybelAngel/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..fe63e030b9d9 --- /dev/null +++ b/Packs/CybelAngel/ReleaseNotes/1_0_2.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### CybelAngel Event Collector +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CybelAngel/pack_metadata.json b/Packs/CybelAngel/pack_metadata.json index 41bbb6fd026b..b013b73600fd 100644 --- a/Packs/CybelAngel/pack_metadata.json +++ b/Packs/CybelAngel/pack_metadata.json @@ -2,7 +2,7 @@ "name": "CybelAngel", "description": "CybelAngel Event Collector receives reports from the CybelAngel platform, which specializes in external attack surface protection and management.", "support": "xsoar", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/CyberTriage/Integrations/CyberTriage/CyberTriage.yml b/Packs/CyberTriage/Integrations/CyberTriage/CyberTriage.yml index 2f312312edc7..05cbd3117a6c 100644 --- a/Packs/CyberTriage/Integrations/CyberTriage/CyberTriage.yml +++ b/Packs/CyberTriage/Integrations/CyberTriage/CyberTriage.yml @@ -73,7 +73,7 @@ script: description: The endpoint hostname that Cyber Triage investigated. type: string description: initiates a cyber triage collection on an endpoint. - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 tests: - No test - no instance fromversion: 5.0.0 diff --git a/Packs/CyberTriage/ReleaseNotes/1_0_20.md b/Packs/CyberTriage/ReleaseNotes/1_0_20.md new file mode 100644 index 000000000000..7c3620242543 --- /dev/null +++ b/Packs/CyberTriage/ReleaseNotes/1_0_20.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Cyber Triage +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/CyberTriage/pack_metadata.json b/Packs/CyberTriage/pack_metadata.json index 81dcab6c09d2..73b4e9e901de 100644 --- a/Packs/CyberTriage/pack_metadata.json +++ b/Packs/CyberTriage/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cyber Triage", "description": "Allows you to conduct a mini-forensic investigation on an endpoint. It pushes a collection tool to the remote endpoint, collects volatile and file system data, and analyzes the data. ", "support": "xsoar", - "currentVersion": "1.0.19", + "currentVersion": "1.0.20", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/DBotTruthBombs/Integrations/DBotTruthBombs/DBotTruthBombs.yml b/Packs/DBotTruthBombs/Integrations/DBotTruthBombs/DBotTruthBombs.yml index 8207258cef63..1d43ecb48dbc 100644 --- a/Packs/DBotTruthBombs/Integrations/DBotTruthBombs/DBotTruthBombs.yml +++ b/Packs/DBotTruthBombs/Integrations/DBotTruthBombs/DBotTruthBombs.yml @@ -33,7 +33,7 @@ script: - Travel description: Returns a previously undisclosed fact about DBot. name: dbot-truth-bomb - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/DBotTruthBombs/ReleaseNotes/1_0_9.md b/Packs/DBotTruthBombs/ReleaseNotes/1_0_9.md new file mode 100644 index 000000000000..76e7a247df00 --- /dev/null +++ b/Packs/DBotTruthBombs/ReleaseNotes/1_0_9.md @@ -0,0 +1,16 @@ + +#### Integrations + +##### DBot Truth Bombs +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + + +#### Scripts + +##### FactAboutYou +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/DBotTruthBombs/Scripts/FactsAboutYou/FactsAboutYou.yml b/Packs/DBotTruthBombs/Scripts/FactsAboutYou/FactsAboutYou.yml index a1134f372441..4a27d004528f 100644 --- a/Packs/DBotTruthBombs/Scripts/FactsAboutYou/FactsAboutYou.yml +++ b/Packs/DBotTruthBombs/Scripts/FactsAboutYou/FactsAboutYou.yml @@ -16,7 +16,7 @@ comment: Reveal some facts about yourself. commonfields: id: FactAboutYou version: -1 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: FactAboutYou runas: DBotWeakRole diff --git a/Packs/DBotTruthBombs/pack_metadata.json b/Packs/DBotTruthBombs/pack_metadata.json index 0d81f17a4795..53492140eeb7 100644 --- a/Packs/DBotTruthBombs/pack_metadata.json +++ b/Packs/DBotTruthBombs/pack_metadata.json @@ -2,7 +2,7 @@ "name": "DBot Truth Bombs", "description": "Nefarious attackers coming in at you from all fronts. Don't you wish you could just go Texas Ranger on them?", "support": "xsoar", - "currentVersion": "1.0.8", + "currentVersion": "1.0.9", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/DeHashed/Integrations/DeHashed/DeHashed.yml b/Packs/DeHashed/Integrations/DeHashed/DeHashed.yml index c0906311829e..f9eb20c63e1d 100644 --- a/Packs/DeHashed/Integrations/DeHashed/DeHashed.yml +++ b/Packs/DeHashed/Integrations/DeHashed/DeHashed.yml @@ -179,7 +179,7 @@ script: - contextPath: DBotScore.Reliability description: Reliability of the source providing the intelligence data. type: String - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/DeHashed/ReleaseNotes/1_1_26.md b/Packs/DeHashed/ReleaseNotes/1_1_26.md new file mode 100644 index 000000000000..d411792b7bab --- /dev/null +++ b/Packs/DeHashed/ReleaseNotes/1_1_26.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### DeHashed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/DeHashed/pack_metadata.json b/Packs/DeHashed/pack_metadata.json index 9d28344c2d2a..9abe6dbf63d4 100644 --- a/Packs/DeHashed/pack_metadata.json +++ b/Packs/DeHashed/pack_metadata.json @@ -2,7 +2,7 @@ "name": "DeHashed", "description": "This integration allows you to check if your personal information such as your email, username, or password is being compromised.", "support": "xsoar", - "currentVersion": "1.1.25", + "currentVersion": "1.1.26", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/EasyVista/Integrations/EasyVista/EasyVista.yml b/Packs/EasyVista/Integrations/EasyVista/EasyVista.yml index dba4b5529a04..d52a982249a5 100644 --- a/Packs/EasyVista/Integrations/EasyVista/EasyVista.yml +++ b/Packs/EasyVista/Integrations/EasyVista/EasyVista.yml @@ -134,7 +134,7 @@ script: description: Request ID type: string description: This method allows a list of incidents / requests (service, change, investment) to be obtained. - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 tests: - No tests fromversion: 5.0.0 diff --git a/Packs/EasyVista/ReleaseNotes/1_0_11.md b/Packs/EasyVista/ReleaseNotes/1_0_11.md new file mode 100644 index 000000000000..849396ca4d70 --- /dev/null +++ b/Packs/EasyVista/ReleaseNotes/1_0_11.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### EasyVista +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/EasyVista/pack_metadata.json b/Packs/EasyVista/pack_metadata.json index f2c5d24737a2..c097c4d2290e 100644 --- a/Packs/EasyVista/pack_metadata.json +++ b/Packs/EasyVista/pack_metadata.json @@ -2,7 +2,7 @@ "name": "EasyVista", "description": "EasyVista Service Manager manages the entire process of designing, managing and delivering IT services.", "support": "xsoar", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/EmailCommunication/ReleaseNotes/2_0_34.md b/Packs/EmailCommunication/ReleaseNotes/2_0_34.md new file mode 100644 index 000000000000..919ee16cd2d7 --- /dev/null +++ b/Packs/EmailCommunication/ReleaseNotes/2_0_34.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### SendEmailReply + +- Updated the Docker image to: *demisto/bs4-py3:1.0.0.117152*. diff --git a/Packs/EmailCommunication/ReleaseNotes/2_0_35.md b/Packs/EmailCommunication/ReleaseNotes/2_0_35.md new file mode 100644 index 000000000000..2623d2501f60 --- /dev/null +++ b/Packs/EmailCommunication/ReleaseNotes/2_0_35.md @@ -0,0 +1,15 @@ + +#### Scripts + +##### PreprocessEmail +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### SummarizeEmailThreads +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### DisplayEmailHtml +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/EmailCommunication/Scripts/DisplayEmailHtml/DisplayEmailHtml.yml b/Packs/EmailCommunication/Scripts/DisplayEmailHtml/DisplayEmailHtml.yml index e19b0f90a166..ac442c1eb6f2 100644 --- a/Packs/EmailCommunication/Scripts/DisplayEmailHtml/DisplayEmailHtml.yml +++ b/Packs/EmailCommunication/Scripts/DisplayEmailHtml/DisplayEmailHtml.yml @@ -1,7 +1,7 @@ commonfields: id: DisplayEmailHtml version: -1 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: DisplayEmailHtml runas: DBotWeakRole diff --git a/Packs/EmailCommunication/Scripts/PreprocessEmail/PreprocessEmail.yml b/Packs/EmailCommunication/Scripts/PreprocessEmail/PreprocessEmail.yml index fbc1fb248abc..05d7a09ed8cb 100644 --- a/Packs/EmailCommunication/Scripts/PreprocessEmail/PreprocessEmail.yml +++ b/Packs/EmailCommunication/Scripts/PreprocessEmail/PreprocessEmail.yml @@ -33,7 +33,7 @@ tags: - email - preProcessing type: python -dockerimage: demisto/python3:3.10.14.98471 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotRole tests: - No tests (auto formatted) diff --git a/Packs/EmailCommunication/Scripts/SendEmailReply/SendEmailReply.yml b/Packs/EmailCommunication/Scripts/SendEmailReply/SendEmailReply.yml index 0ac7077f6ae2..ed5403945422 100644 --- a/Packs/EmailCommunication/Scripts/SendEmailReply/SendEmailReply.yml +++ b/Packs/EmailCommunication/Scripts/SendEmailReply/SendEmailReply.yml @@ -51,7 +51,7 @@ subtype: python3 system: true type: python fromversion: 5.0.0 -dockerimage: demisto/bs4-py3:1.0.0.111952 +dockerimage: demisto/bs4-py3:1.0.0.117152 tests: - No tests (auto formatted) contentitemexportablefields: diff --git a/Packs/EmailCommunication/Scripts/SummarizeEmailThreads/SummarizeEmailThreads.yml b/Packs/EmailCommunication/Scripts/SummarizeEmailThreads/SummarizeEmailThreads.yml index 29e5053d992e..1bbfe652109b 100644 --- a/Packs/EmailCommunication/Scripts/SummarizeEmailThreads/SummarizeEmailThreads.yml +++ b/Packs/EmailCommunication/Scripts/SummarizeEmailThreads/SummarizeEmailThreads.yml @@ -12,7 +12,7 @@ comment: |- enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/EmailCommunication/pack_metadata.json b/Packs/EmailCommunication/pack_metadata.json index 8f63849c818c..f75e2dd28c59 100644 --- a/Packs/EmailCommunication/pack_metadata.json +++ b/Packs/EmailCommunication/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Email Communication", "description": "Do you have to send multiple emails to end users? This content pack helps you streamline the process and automate updates, notifications and more.\n", "support": "xsoar", - "currentVersion": "2.0.33", + "currentVersion": "2.0.35", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "videos": [ diff --git a/Packs/EmailHippo/Integrations/EmailHippo/EmailHippo.yml b/Packs/EmailHippo/Integrations/EmailHippo/EmailHippo.yml index 8e12de444cb5..89df97d22677 100644 --- a/Packs/EmailHippo/Integrations/EmailHippo/EmailHippo.yml +++ b/Packs/EmailHippo/Integrations/EmailHippo/EmailHippo.yml @@ -192,7 +192,7 @@ script: description: The expiration date of the domain. type: Date description: Returns domain information and reputation. - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 runonce: false subtype: python3 fromversion: 6.9.0 diff --git a/Packs/EmailHippo/ReleaseNotes/1_0_7.md b/Packs/EmailHippo/ReleaseNotes/1_0_7.md new file mode 100644 index 000000000000..800587fa2745 --- /dev/null +++ b/Packs/EmailHippo/ReleaseNotes/1_0_7.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Email Hippo +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/EmailHippo/pack_metadata.json b/Packs/EmailHippo/pack_metadata.json index 573dae3844d0..d0d8fa952711 100644 --- a/Packs/EmailHippo/pack_metadata.json +++ b/Packs/EmailHippo/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Email Hippo", "description": "Use this tool to verify email sources as fake emails that were used as part of phishing attacks.", "support": "xsoar", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/EmailRepIO/Integrations/EmailRepIO/EmailRepIO.yml b/Packs/EmailRepIO/Integrations/EmailRepIO/EmailRepIO.yml index 411e409dced1..c139753e3061 100644 --- a/Packs/EmailRepIO/Integrations/EmailRepIO/EmailRepIO.yml +++ b/Packs/EmailRepIO/Integrations/EmailRepIO/EmailRepIO.yml @@ -271,7 +271,7 @@ script: name: expires description: Reports a malicious email address to EmailRepIO. You tag the type of malicious activity associated with the email address. The date of the malicious activity defaults to the current time unless otherwise specified. name: emailrepio-email-address-report - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/EmailRepIO/ReleaseNotes/1_0_28.md b/Packs/EmailRepIO/ReleaseNotes/1_0_28.md new file mode 100644 index 000000000000..8bedf4b7ffef --- /dev/null +++ b/Packs/EmailRepIO/ReleaseNotes/1_0_28.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### EmailRep.io +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/EmailRepIO/pack_metadata.json b/Packs/EmailRepIO/pack_metadata.json index c0524e9e0b11..8a317dac0cc5 100644 --- a/Packs/EmailRepIO/pack_metadata.json +++ b/Packs/EmailRepIO/pack_metadata.json @@ -2,7 +2,7 @@ "name": "EmailRepIO", "description": "Provide email address reputation and reports from EmailRep.io.", "support": "xsoar", - "currentVersion": "1.0.27", + "currentVersion": "1.0.28", "author": "Cortex XSOAR", "url": "https://emailrep.io", "email": "", diff --git a/Packs/Exabeam/Integrations/Exabeam/Exabeam.yml b/Packs/Exabeam/Integrations/Exabeam/Exabeam.yml index 355b410bc441..7becb9145c8f 100644 --- a/Packs/Exabeam/Integrations/Exabeam/Exabeam.yml +++ b/Packs/Exabeam/Integrations/Exabeam/Exabeam.yml @@ -1740,7 +1740,7 @@ script: - contextPath: Exabeam.incidents.fields.description description: The incident description. type: String - dockerimage: demisto/python3:3.11.9.101916 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/Exabeam/ReleaseNotes/2_4_2.md b/Packs/Exabeam/ReleaseNotes/2_4_2.md new file mode 100644 index 000000000000..162352f955aa --- /dev/null +++ b/Packs/Exabeam/ReleaseNotes/2_4_2.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Exabeam Advanced Analytics +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Exabeam/pack_metadata.json b/Packs/Exabeam/pack_metadata.json index 594769c9fc7b..c5a8bfd8aeda 100644 --- a/Packs/Exabeam/pack_metadata.json +++ b/Packs/Exabeam/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Exabeam Advanced Analytics", "description": "The Exabeam Security Management Platform provides end-to-end detection, User Event Behavioral Analytics, and SOAR.", "support": "xsoar", - "currentVersion": "2.4.1", + "currentVersion": "2.4.2", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/ExabeamDataLake/Integrations/ExabeamDataLake/ExabeamDataLake.yml b/Packs/ExabeamDataLake/Integrations/ExabeamDataLake/ExabeamDataLake.yml index f0b65a0f2736..fe6a537b4fdb 100644 --- a/Packs/ExabeamDataLake/Integrations/ExabeamDataLake/ExabeamDataLake.yml +++ b/Packs/ExabeamDataLake/Integrations/ExabeamDataLake/ExabeamDataLake.yml @@ -70,7 +70,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.10.0 tests: - ExabeamDataLake-test diff --git a/Packs/ExabeamDataLake/ReleaseNotes/1_0_1.md b/Packs/ExabeamDataLake/ReleaseNotes/1_0_1.md new file mode 100644 index 000000000000..bdc955c8f122 --- /dev/null +++ b/Packs/ExabeamDataLake/ReleaseNotes/1_0_1.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Exabeam Data Lake +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/ExabeamDataLake/pack_metadata.json b/Packs/ExabeamDataLake/pack_metadata.json index fa5092a71efb..da733d5decc9 100644 --- a/Packs/ExabeamDataLake/pack_metadata.json +++ b/Packs/ExabeamDataLake/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ExabeamDataLake", "description": "Exabeam Data Lake provides a highly scalable, cost-effective, and searchable log management system. Data Lake is used for log collection, storage, processing, and presentation.", "support": "xsoar", - "currentVersion": "1.0.0", + "currentVersion": "1.0.1", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/ExabeamSecurityOperationsPlatform/Integrations/ExabeamSecOpsPlatform/ExabeamSecOpsPlatform.yml b/Packs/ExabeamSecurityOperationsPlatform/Integrations/ExabeamSecOpsPlatform/ExabeamSecOpsPlatform.yml index 8e5862e95423..c6eba3bd5227 100644 --- a/Packs/ExabeamSecurityOperationsPlatform/Integrations/ExabeamSecOpsPlatform/ExabeamSecOpsPlatform.yml +++ b/Packs/ExabeamSecurityOperationsPlatform/Integrations/ExabeamSecOpsPlatform/ExabeamSecOpsPlatform.yml @@ -515,7 +515,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.11.9.107902 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true fromversion: 6.10.0 tests: diff --git a/Packs/ExabeamSecurityOperationsPlatform/ReleaseNotes/1_1_1.md b/Packs/ExabeamSecurityOperationsPlatform/ReleaseNotes/1_1_1.md new file mode 100644 index 000000000000..2d8ef01c3fc2 --- /dev/null +++ b/Packs/ExabeamSecurityOperationsPlatform/ReleaseNotes/1_1_1.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Exabeam Security Operations Platform +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/ExabeamSecurityOperationsPlatform/pack_metadata.json b/Packs/ExabeamSecurityOperationsPlatform/pack_metadata.json index 46181eb2539f..41708245c7c3 100644 --- a/Packs/ExabeamSecurityOperationsPlatform/pack_metadata.json +++ b/Packs/ExabeamSecurityOperationsPlatform/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Exabeam Security Operations Platform", "description": " Exabeam Security Operations Platform ", "support": "xsoar", - "currentVersion": "1.1.0", + "currentVersion": "1.1.1", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/ExceedLMS/Integrations/IAMExceedLMS/IAMExceedLMS.yml b/Packs/ExceedLMS/Integrations/IAMExceedLMS/IAMExceedLMS.yml index a688d1368436..6202b28213eb 100644 --- a/Packs/ExceedLMS/Integrations/IAMExceedLMS/IAMExceedLMS.yml +++ b/Packs/ExceedLMS/Integrations/IAMExceedLMS/IAMExceedLMS.yml @@ -232,7 +232,7 @@ script: type: String - description: Retrieves a User Profile schema, which holds all of the user fields within the application. Used for outgoing-mapping through the Get Schema option. name: get-mapping-fields - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 ismappable: true isremotesyncout: true runonce: false diff --git a/Packs/ExceedLMS/ReleaseNotes/1_0_10.md b/Packs/ExceedLMS/ReleaseNotes/1_0_10.md new file mode 100644 index 000000000000..273b4ca6eaff --- /dev/null +++ b/Packs/ExceedLMS/ReleaseNotes/1_0_10.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### ExceedLMS IAM +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/ExceedLMS/pack_metadata.json b/Packs/ExceedLMS/pack_metadata.json index 8bc38ac06b51..c4ff651da0a2 100644 --- a/Packs/ExceedLMS/pack_metadata.json +++ b/Packs/ExceedLMS/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Exceed LMS", "description": "A specialized LMS and Phishing Simulator created to manage security awareness content for small, medium and large enterprise organizations.", "support": "xsoar", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/F5/Integrations/F5_ASM/F5_ASM.yml b/Packs/F5/Integrations/F5_ASM/F5_ASM.yml index fff15ae67b02..e4741d5a3f4c 100644 --- a/Packs/F5/Integrations/F5_ASM/F5_ASM.yml +++ b/Packs/F5/Integrations/F5_ASM/F5_ASM.yml @@ -2635,7 +2635,7 @@ script: - contextPath: f5.Policy.md5 description: The MD5 hash of the policy. type: String - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/F5/ReleaseNotes/1_2_23.md b/Packs/F5/ReleaseNotes/1_2_23.md new file mode 100644 index 000000000000..012b709c70b2 --- /dev/null +++ b/Packs/F5/ReleaseNotes/1_2_23.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### F5 Application Security Manager (WAF) +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/F5/pack_metadata.json b/Packs/F5/pack_metadata.json index 0f889509c95c..065f8c23a79e 100644 --- a/Packs/F5/pack_metadata.json +++ b/Packs/F5/pack_metadata.json @@ -2,7 +2,7 @@ "name": "F5 firewall", "description": "Manages F5 firewall rules", "support": "xsoar", - "currentVersion": "1.2.22", + "currentVersion": "1.2.23", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/F5Silverline/Integrations/F5Silverline/F5Silverline.yml b/Packs/F5Silverline/Integrations/F5Silverline/F5Silverline.yml index 4109c0a9491f..808ab9bfcaac 100644 --- a/Packs/F5Silverline/Integrations/F5Silverline/F5Silverline.yml +++ b/Packs/F5Silverline/Integrations/F5Silverline/F5Silverline.yml @@ -138,7 +138,7 @@ script: - proxy-routed description: Delete an existing particular threatening IP address object by its object ID or by its IP address. If both id and ip are given, delete operation will be done by the given object_id. name: f5-silverline-ip-object-delete - dockerimage: demisto/python3:3.10.13.85667 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/F5Silverline/ReleaseNotes/1_0_27.md b/Packs/F5Silverline/ReleaseNotes/1_0_27.md new file mode 100644 index 000000000000..ee3dfd5529e2 --- /dev/null +++ b/Packs/F5Silverline/ReleaseNotes/1_0_27.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### F5 Silverline +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/F5Silverline/pack_metadata.json b/Packs/F5Silverline/pack_metadata.json index aae8ebecda27..587935803255 100644 --- a/Packs/F5Silverline/pack_metadata.json +++ b/Packs/F5Silverline/pack_metadata.json @@ -2,7 +2,7 @@ "name": "F5 Silverline", "description": "An integration with F5 Silverline to retrieve alerts and read/update IP lists.", "support": "xsoar", - "currentVersion": "1.0.26", + "currentVersion": "1.0.27", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedAlienVault/Integrations/FeedAlienVaultReputation/FeedAlienVaultReputation.yml b/Packs/FeedAlienVault/Integrations/FeedAlienVaultReputation/FeedAlienVaultReputation.yml index 2982e6157434..aaf8e8b77251 100644 --- a/Packs/FeedAlienVault/Integrations/FeedAlienVaultReputation/FeedAlienVaultReputation.yml +++ b/Packs/FeedAlienVault/Integrations/FeedAlienVaultReputation/FeedAlienVaultReputation.yml @@ -93,7 +93,7 @@ script: name: indicator_type description: Gets the feed indicators. name: alienvault-get-indicators - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/FeedAlienVault/ReleaseNotes/1_1_35.md b/Packs/FeedAlienVault/ReleaseNotes/1_1_35.md new file mode 100644 index 000000000000..6691c741a15f --- /dev/null +++ b/Packs/FeedAlienVault/ReleaseNotes/1_1_35.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### AlienVault Reputation Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FeedAlienVault/pack_metadata.json b/Packs/FeedAlienVault/pack_metadata.json index acfbd034e46d..1013fce4940b 100644 --- a/Packs/FeedAlienVault/pack_metadata.json +++ b/Packs/FeedAlienVault/pack_metadata.json @@ -2,7 +2,7 @@ "name": "AlienVault Feed", "description": "Indicators feed from AlienVault", "support": "xsoar", - "currentVersion": "1.1.34", + "currentVersion": "1.1.35", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedAzure/Integrations/FeedAzure/FeedAzure.yml b/Packs/FeedAzure/Integrations/FeedAzure/FeedAzure.yml index 34e1303b947c..560e23a6043a 100644 --- a/Packs/FeedAzure/Integrations/FeedAzure/FeedAzure.yml +++ b/Packs/FeedAzure/Integrations/FeedAzure/FeedAzure.yml @@ -255,7 +255,7 @@ script: name: limit description: Gets indicators from the feed. name: azure-get-indicators - dockerimage: demisto/python3:3.11.9.107902 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/FeedAzure/ReleaseNotes/1_0_30.md b/Packs/FeedAzure/ReleaseNotes/1_0_30.md new file mode 100644 index 000000000000..47f57ae49e15 --- /dev/null +++ b/Packs/FeedAzure/ReleaseNotes/1_0_30.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Azure Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FeedAzure/pack_metadata.json b/Packs/FeedAzure/pack_metadata.json index 36e1cfaf4708..a63fc6df44d9 100644 --- a/Packs/FeedAzure/pack_metadata.json +++ b/Packs/FeedAzure/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Feed", "description": "Indicators feed from Azure", "support": "xsoar", - "currentVersion": "1.0.29", + "currentVersion": "1.0.30", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedBlocklist_de/Integrations/FeedBlocklist_de/FeedBlocklist_de.yml b/Packs/FeedBlocklist_de/Integrations/FeedBlocklist_de/FeedBlocklist_de.yml index 7c1799eb5244..353e8bc44dcd 100644 --- a/Packs/FeedBlocklist_de/Integrations/FeedBlocklist_de/FeedBlocklist_de.yml +++ b/Packs/FeedBlocklist_de/Integrations/FeedBlocklist_de/FeedBlocklist_de.yml @@ -113,7 +113,7 @@ script: name: indicator_type description: Gets the feed indicators. name: blocklist_de-get-indicators - dockerimage: demisto/python3:3.11.9.107902 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/FeedBlocklist_de/ReleaseNotes/1_1_31.md b/Packs/FeedBlocklist_de/ReleaseNotes/1_1_31.md new file mode 100644 index 000000000000..63bce68217f3 --- /dev/null +++ b/Packs/FeedBlocklist_de/ReleaseNotes/1_1_31.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Blocklist_de Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FeedBlocklist_de/pack_metadata.json b/Packs/FeedBlocklist_de/pack_metadata.json index 95f871518c7b..3bd297ed8814 100644 --- a/Packs/FeedBlocklist_de/pack_metadata.json +++ b/Packs/FeedBlocklist_de/pack_metadata.json @@ -2,7 +2,7 @@ "name": "BlockList DE Feed", "description": "Indicators feed from BlockList DE", "support": "xsoar", - "currentVersion": "1.1.30", + "currentVersion": "1.1.31", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedCloudflare/Integrations/FeedCloudflare/FeedCloudflare.yml b/Packs/FeedCloudflare/Integrations/FeedCloudflare/FeedCloudflare.yml index 27509eba9cd3..f8a4aaaaa752 100644 --- a/Packs/FeedCloudflare/Integrations/FeedCloudflare/FeedCloudflare.yml +++ b/Packs/FeedCloudflare/Integrations/FeedCloudflare/FeedCloudflare.yml @@ -135,7 +135,7 @@ script: name: limit description: Gets the feed indicators. name: cloudflare-get-indicators - dockerimage: demisto/python3:3.11.9.107902 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/FeedCloudflare/ReleaseNotes/1_1_29.md b/Packs/FeedCloudflare/ReleaseNotes/1_1_29.md new file mode 100644 index 000000000000..6adfebbbf51b --- /dev/null +++ b/Packs/FeedCloudflare/ReleaseNotes/1_1_29.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Cloudflare Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FeedCloudflare/pack_metadata.json b/Packs/FeedCloudflare/pack_metadata.json index d7bc6ddcf7dd..282cc765be96 100644 --- a/Packs/FeedCloudflare/pack_metadata.json +++ b/Packs/FeedCloudflare/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cloudflare Feed", "description": "Indicators feed from Cloudflare", "support": "xsoar", - "currentVersion": "1.1.28", + "currentVersion": "1.1.29", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedCrowdstrikeFalconIntel/Integrations/CrowdStrikeIndicatorFeed/CrowdStrikeIndicatorFeed.yml b/Packs/FeedCrowdstrikeFalconIntel/Integrations/CrowdStrikeIndicatorFeed/CrowdStrikeIndicatorFeed.yml index f81fbc554bfc..8d7287b15825 100644 --- a/Packs/FeedCrowdstrikeFalconIntel/Integrations/CrowdStrikeIndicatorFeed/CrowdStrikeIndicatorFeed.yml +++ b/Packs/FeedCrowdstrikeFalconIntel/Integrations/CrowdStrikeIndicatorFeed/CrowdStrikeIndicatorFeed.yml @@ -228,7 +228,7 @@ script: type: Unknown - description: 'Resets the retrieving start time according to the `First Fetch Time` parameter, WARNING: This command will reset your fetch history.' name: crowdstrike-reset-fetch-indicators - dockerimage: demisto/python3:3.11.9.107902 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/FeedCrowdstrikeFalconIntel/Integrations/FeedCrowdstrikeFalconIntel/FeedCrowdstrikeFalconIntel.yml b/Packs/FeedCrowdstrikeFalconIntel/Integrations/FeedCrowdstrikeFalconIntel/FeedCrowdstrikeFalconIntel.yml index 9bca66c1252b..7fd441ea9afc 100644 --- a/Packs/FeedCrowdstrikeFalconIntel/Integrations/FeedCrowdstrikeFalconIntel/FeedCrowdstrikeFalconIntel.yml +++ b/Packs/FeedCrowdstrikeFalconIntel/Integrations/FeedCrowdstrikeFalconIntel/FeedCrowdstrikeFalconIntel.yml @@ -147,7 +147,7 @@ script: name: custom_filter description: Gets indicators from CrowdStrike Falcon Intel Feed. name: crowdstrike-falcon-intel-get-indicators - dockerimage: demisto/python3:3.11.9.106403 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/FeedCrowdstrikeFalconIntel/ReleaseNotes/2_1_19.md b/Packs/FeedCrowdstrikeFalconIntel/ReleaseNotes/2_1_19.md new file mode 100644 index 000000000000..31006797dc4e --- /dev/null +++ b/Packs/FeedCrowdstrikeFalconIntel/ReleaseNotes/2_1_19.md @@ -0,0 +1,13 @@ + +#### Integrations + +##### CrowdStrike Falcon Intel Feed Actors +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CrowdStrike Indicator Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FeedCrowdstrikeFalconIntel/pack_metadata.json b/Packs/FeedCrowdstrikeFalconIntel/pack_metadata.json index 50a5933145de..49fed6726fa0 100644 --- a/Packs/FeedCrowdstrikeFalconIntel/pack_metadata.json +++ b/Packs/FeedCrowdstrikeFalconIntel/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Crowdstrike Falcon Intel Feed", "description": "Tracks the activities of threat actor groups and advanced persistent threats (APTs) to understand as much as possible about their known aliases, targets, methods, and more.", "support": "xsoar", - "currentVersion": "2.1.18", + "currentVersion": "2.1.19", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedDHS/Integrations/DHSFeedV2/DHSFeedV2.yml b/Packs/FeedDHS/Integrations/DHSFeedV2/DHSFeedV2.yml index f9d9168d4e83..39cb91b8f53b 100644 --- a/Packs/FeedDHS/Integrations/DHSFeedV2/DHSFeedV2.yml +++ b/Packs/FeedDHS/Integrations/DHSFeedV2/DHSFeedV2.yml @@ -209,7 +209,7 @@ script: - contextPath: DHS.Collections.Name description: Collection name. type: String - dockerimage: demisto/taxii2:1.0.0.106354 + dockerimage: demisto/taxii2:1.0.0.117320 feed: true runonce: false script: '-' diff --git a/Packs/FeedDHS/ReleaseNotes/2_0_45.md b/Packs/FeedDHS/ReleaseNotes/2_0_45.md new file mode 100644 index 000000000000..f5c3c2ffd559 --- /dev/null +++ b/Packs/FeedDHS/ReleaseNotes/2_0_45.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### DHS Feed v2 + +- Updated the Docker image to: *demisto/taxii2:1.0.0.117320*. diff --git a/Packs/FeedDHS/pack_metadata.json b/Packs/FeedDHS/pack_metadata.json index 88f5b67926c0..c8681de2b4d5 100644 --- a/Packs/FeedDHS/pack_metadata.json +++ b/Packs/FeedDHS/pack_metadata.json @@ -2,7 +2,7 @@ "name": "DHS Feed", "description": "Provides cyber threat indicators from the Cybersecurity and Infrastructure Security Agency’s (CISA’s) free Automated Indicator Sharing (AIS) by the Department of Homeland Security (DHS).", "support": "xsoar", - "currentVersion": "2.0.44", + "currentVersion": "2.0.45", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedGitHub/Integrations/FeedGitHub/FeedGitHub.yml b/Packs/FeedGitHub/Integrations/FeedGitHub/FeedGitHub.yml index 11381258954e..a592ee4e7cc9 100644 --- a/Packs/FeedGitHub/Integrations/FeedGitHub/FeedGitHub.yml +++ b/Packs/FeedGitHub/Integrations/FeedGitHub/FeedGitHub.yml @@ -191,7 +191,7 @@ script: name: limit description: Gets indicators from the feed within a specified date range and up to a maximum limit.. name: github-get-indicators - dockerimage: demisto/taxii2:1.0.0.112358 + dockerimage: demisto/taxii2:1.0.0.117320 feed: true isfetch: false longRunning: false diff --git a/Packs/FeedGitHub/ReleaseNotes/1_0_11.md b/Packs/FeedGitHub/ReleaseNotes/1_0_11.md new file mode 100644 index 000000000000..723976a8c86e --- /dev/null +++ b/Packs/FeedGitHub/ReleaseNotes/1_0_11.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Github Feed + +- Updated the Docker image to: *demisto/taxii2:1.0.0.117320*. diff --git a/Packs/FeedGitHub/pack_metadata.json b/Packs/FeedGitHub/pack_metadata.json index c2169e576f56..519a75ea64f1 100644 --- a/Packs/FeedGitHub/pack_metadata.json +++ b/Packs/FeedGitHub/pack_metadata.json @@ -2,7 +2,7 @@ "name": "GitHub Feed", "description": "A feed to ingest indicators of compromise from Github repositories. The feed supports general extraction of IOCs, extracting from STIX data format and parsing of YARA Rules out of the box.", "support": "xsoar", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedLOLBAS/Integrations/FeedLOLBAS/FeedLOLBAS.yml b/Packs/FeedLOLBAS/Integrations/FeedLOLBAS/FeedLOLBAS.yml index 86a1f7e58366..7f823f782f6a 100644 --- a/Packs/FeedLOLBAS/Integrations/FeedLOLBAS/FeedLOLBAS.yml +++ b/Packs/FeedLOLBAS/Integrations/FeedLOLBAS/FeedLOLBAS.yml @@ -169,7 +169,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.8.0 tests: - FeedLOLBas_test diff --git a/Packs/FeedLOLBAS/ReleaseNotes/1_0_19.md b/Packs/FeedLOLBAS/ReleaseNotes/1_0_19.md new file mode 100644 index 000000000000..d56287fbb5a9 --- /dev/null +++ b/Packs/FeedLOLBAS/ReleaseNotes/1_0_19.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### LOLBAS Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FeedLOLBAS/pack_metadata.json b/Packs/FeedLOLBAS/pack_metadata.json index d5624d3e44f2..405abded65d2 100644 --- a/Packs/FeedLOLBAS/pack_metadata.json +++ b/Packs/FeedLOLBAS/pack_metadata.json @@ -2,7 +2,7 @@ "name": "LOLBAS Feed", "description": "\"Living off the land binaries\" is a term used to describe malware or hacking techniques that take advantage of legitimate tools.", "support": "xsoar", - "currentVersion": "1.0.18", + "currentVersion": "1.0.19", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedMISP/Integrations/FeedMISP/FeedMISP.py b/Packs/FeedMISP/Integrations/FeedMISP/FeedMISP.py index 056774455ab7..a72f41b19564 100644 --- a/Packs/FeedMISP/Integrations/FeedMISP/FeedMISP.py +++ b/Packs/FeedMISP/Integrations/FeedMISP/FeedMISP.py @@ -2,11 +2,9 @@ from CommonServerPython import * # noqa: F401 import urllib3 - # disable insecure warnings urllib3.disable_warnings() - INDICATOR_TO_GALAXY_RELATION_DICT: Dict[str, Any] = { ThreatIntel.ObjectsNames.ATTACK_PATTERN: { FeedIndicatorType.File: EntityRelationship.Relationships.INDICATOR_OF, @@ -216,7 +214,7 @@ def handle_file_type_fields(raw_type: str, indicator_obj: Dict[str, Any]) -> Non indicator_obj['fields'][raw_type.upper()] = hash_value -def build_params_dict(tags: List[str], attribute_type: List[str], limit: int, page: int, from_timestamp: str | None = None +def build_params_dict(tags: List[str], attribute_type: List[str], limit: int, page: int, from_timestamp: Optional[int] = None ) -> Dict[str, Any]: """ Creates a dictionary in the format required by MISP to be used as a query. @@ -237,11 +235,11 @@ def build_params_dict(tags: List[str], attribute_type: List[str], limit: int, pa 'page': page } if from_timestamp: - params['attribute_timestamp'] = from_timestamp + params['attribute_timestamp'] = str(from_timestamp) return params -def parsing_user_query(query: str, limit: int, page: int = 1, from_timestamp: str | None = None) -> Dict[str, Any]: +def parsing_user_query(query: str, limit: int, page: int = 1, from_timestamp: Optional[int] | None = None) -> Dict[str, Any]: """ Parsing the query string created by the user by adding necessary argument and removing unnecessary arguments Args: @@ -258,7 +256,7 @@ def parsing_user_query(query: str, limit: int, page: int = 1, from_timestamp: st if params.get("timestamp"): params['attribute_timestamp'] = params.pop("timestamp") if from_timestamp: - params['attribute_timestamp'] = from_timestamp + params['attribute_timestamp'] = str(from_timestamp) except Exception as err: demisto.debug(str(err)) raise DemistoException(f'Could not parse user query. \nError massage: {err}') @@ -383,7 +381,7 @@ def create_and_add_relationships(indicator_obj: Dict[str, Any], galaxy_indicator galaxy_indicator_type = galaxy_indicator['type'] indicator_to_galaxy_relation = INDICATOR_TO_GALAXY_RELATION_DICT[galaxy_indicator_type][indicator_obj_type] - galaxy_to_indicator_relation = EntityRelationship.Relationships.\ + galaxy_to_indicator_relation = EntityRelationship.Relationships. \ RELATIONSHIPS_NAMES[indicator_to_galaxy_relation] indicator_relation = EntityRelationship( @@ -514,6 +512,24 @@ def get_attributes_command(client: Client, args: Dict[str, str], params: Dict[st ) +def update_candidate(last_run: dict, last_run_timestamp: Optional[int], latest_indicator_timestamp: Optional[int], + latest_indicator_value: str): + """ + Update the candidate timestamp and value based on the latest and last run values. + + Args: + last_run: a dictionary containing the last run information, including the timestamp, page, and indicator value. + last_run_timestamp: the timestamp of the last run. + latest_indicator_timestamp: the timestamp of the latest indicator. + latest_indicator_value: the value of the latest indicator. + """ + candidate_timestamp = last_run.get('candidate_timestamp') or last_run_timestamp + if (not candidate_timestamp + or (latest_indicator_timestamp and latest_indicator_timestamp > candidate_timestamp)): + last_run['candidate_timestamp'] = latest_indicator_timestamp + last_run['candidate_value'] = latest_indicator_value + + def fetch_attributes_command(client: Client, params: Dict[str, str]): """ Fetching indicators from the feed to the Indicators tab. @@ -529,31 +545,55 @@ def fetch_attributes_command(client: Client, params: Dict[str, str]): feed_tags = argToList(params.get("feedTags", [])) attribute_types = argToList(params.get('attribute_types', '')) fetch_limit = client.max_indicator_to_fetch - + last_run = demisto.getLastRun() + total_fetched_indicators = 0 query = params.get('query', None) - last_run = demisto.getLastRun().get('timestamp') or "" - params_dict = parsing_user_query(query, LIMIT, from_timestamp=last_run) if query else\ - build_params_dict(tags=tags, attribute_type=attribute_types, limit=LIMIT, page=1, from_timestamp=last_run) + last_run_timestamp = arg_to_number(last_run.get('last_indicator_timestamp')) + last_run_page = last_run.get('page') or 1 + last_run_value = last_run.get('last_indicator_value') or "" + params_dict = parsing_user_query(query, LIMIT, from_timestamp=last_run_timestamp) if query else \ + build_params_dict(tags=tags, attribute_type=attribute_types, limit=LIMIT, + page=last_run_page, from_timestamp=last_run_timestamp) + search_query_per_page = client.search_query(params_dict) demisto.debug(f'params_dict: {params_dict}') + while len(search_query_per_page.get("response", {}).get("Attribute", [])): demisto.debug(f'search_query_per_page number of attributes:\ {len(search_query_per_page.get("response", {}).get("Attribute", []))} page: {params_dict["page"]}') + search_query_per_page.get("response", {}).get("Attribute", []).sort(key=lambda x: x['timestamp'], reverse=False) indicators = build_indicators(client, search_query_per_page, attribute_types, tlp_color, params.get('url'), reputation, feed_tags) + + total_fetched_indicators += len(indicators) + latest_indicator = search_query_per_page['response']['Attribute'] + latest_indicator_timestamp = arg_to_number(latest_indicator[-1]['timestamp']) + latest_indicator_value = latest_indicator[-1]['value'] + + if last_run_timestamp == latest_indicator_timestamp and latest_indicator_value == last_run_value: + # No new indicators since last run, no need to fetch again + demisto.debug("No new indicators found since last run") + return + for iter_ in batch(indicators, batch_size=2000): demisto.createIndicators(iter_) params_dict['page'] += 1 - last_run = search_query_per_page['response']['Attribute'][-1]['timestamp'] + update_candidate(last_run, last_run_timestamp, + latest_indicator_timestamp, latest_indicator_value) # Note: The limit is applied after indicators are created, # so the total number of indicators may slightly exceed the limit due to page size constraints. - if fetch_limit and fetch_limit <= len(indicators): - demisto.debug(f"Reached the limit of indicators to fetch. The number of indicators fetched is: {len(indicators)}") - break + if fetch_limit and fetch_limit <= total_fetched_indicators: + demisto.setLastRun(last_run | {"page": params_dict["page"]}) + demisto.debug( + f"Reached the limit of indicators to fetch." + f" The number of indicators fetched is: {total_fetched_indicators}") + return + search_query_per_page = client.search_query(params_dict) if error_message := search_query_per_page.get('Error'): raise DemistoException(f"Error in API call - check the input parameters and the API Key. Error: {error_message}") - demisto.setLastRun({'timestamp': last_run}) + demisto.setLastRun({'last_indicator_timestamp': last_run.get("candidate_timestamp"), + 'last_indicator_value': last_run.get("candidate_value")}) def main(): # pragma: no cover diff --git a/Packs/FeedMISP/Integrations/FeedMISP/FeedMISP.yml b/Packs/FeedMISP/Integrations/FeedMISP/FeedMISP.yml index 9b466e20a990..119aab38a666 100644 --- a/Packs/FeedMISP/Integrations/FeedMISP/FeedMISP.yml +++ b/Packs/FeedMISP/Integrations/FeedMISP/FeedMISP.yml @@ -153,7 +153,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.11.10.111526 + dockerimage: demisto/python3:3.11.10.115887 fromversion: 5.5.0 tests: - MISPfeed Test diff --git a/Packs/FeedMISP/Integrations/FeedMISP/FeedMISP_test.py b/Packs/FeedMISP/Integrations/FeedMISP/FeedMISP_test.py index 1781647e81a4..e306e3a50576 100644 --- a/Packs/FeedMISP/Integrations/FeedMISP/FeedMISP_test.py +++ b/Packs/FeedMISP/Integrations/FeedMISP/FeedMISP_test.py @@ -313,7 +313,8 @@ def test_search_query_indicators_pagination(mocker): 'object_relation': None, 'category': 'Payload delivery', 'type': 'sha256', 'to_ids': True, 'uuid': '5fd0c620', 'timestamp': '1607517728', 'distribution': '5', 'sharing_group_id': '0', - 'comment': 'malspam', 'deleted': False, 'disable_correlation': False, 'first_seen': None, + 'comment': 'malspam', 'deleted': False, 'disable_correlation': False, + 'first_seen': None, 'last_seen': None, 'value': 'val2', 'Event': {}}]}} returned_result_2 = {'response': {'Attribute': []}} mocker.patch.object(Client, '_http_request', side_effect=[returned_result_1, returned_result_2]) @@ -322,6 +323,7 @@ def test_search_query_indicators_pagination(mocker): 'filters': {'category': ['Payload delivery']}, } mocker.patch("FeedMISP.LIMIT", new=2000) + mocker.patch.object(demisto, 'getLastRun', return_value={}) mocker.patch.object(demisto, 'setLastRun') mocker.patch.object(demisto, 'createIndicators') fetch_attributes_command(client, params_dict) @@ -375,3 +377,128 @@ def test_parsing_user_query_timestamp_deprecated(): ' "tags": {"OR": ["tlp:%"]}}') params = parsing_user_query(query_str, limit=2) assert good_query == json.dumps(params) + + +def test_ignore_last_fetched_indicator(mocker): + """ + Given: + - The fetch_attributes_command function is called with a client object and a params_dict. + When: + - The last fetched indicator is returned when already fetched. + Then: + - The fetch_attributes_command function should ignore the last fetched indicator and continue fetching new indicators. + """ + client = Client(base_url="example", + authorization="auth", + verify=False, + proxy=False, + timeout=60, + performance=False, + max_indicator_to_fetch=2000 + ) + mocked_result = {'response': + {'Attribute': [{'id': '1', 'event_id': '1', 'object_id': '0', + 'object_relation': None, 'category': 'Payload delivery', + 'type': 'sha256', 'to_ids': True, 'uuid': '5fd0c620', + 'timestamp': '1607517728', 'distribution': '5', 'sharing_group_id': '0', + 'comment': 'malspam', 'deleted': False, 'disable_correlation': False, + 'first_seen': None, 'last_seen': None, + 'value': 'test', 'Event': {}}]}} + mocker.patch.object(Client, '_http_request', side_effect=[mocked_result]) + params_dict = { + 'type': 'attribute', + 'filters': {'category': ['Payload delivery']}, + } + mocked_last_run = {"last_indicator_timestamp": "1607517728", "last_indicator_value": "test"} + mocker.patch.object(demisto, 'getLastRun', return_value=mocked_last_run) + mocker.patch.object(demisto, 'setLastRun') + mocker.patch.object(demisto, 'createIndicators') + fetch_attributes_command(client, params_dict) + indicators = demisto.createIndicators.call_args + assert not indicators # No indicators should be created since the latest indicator was already fetched + + +def test_fetch_new_indicator_after_last_indicator_been_ignored(mocker): + """ + Given: + - The fetch_attributes_command function is called with a client object and a params_dict. + When: + - The latest retrieved indicators been ignored and new indicator is fetched. + Then: + - The fetch_attributes_command function should fetch the next indicator and set the new last run. + """ + client = Client(base_url="example", + authorization="auth", + verify=False, + proxy=False, + timeout=60, + performance=False, + max_indicator_to_fetch=2000 + ) + mocked_result_1 = {'response': + {'Attribute': [{'id': '1', 'event_id': '1', 'object_id': '0', + 'object_relation': None, 'category': 'Payload delivery', + 'type': 'sha256', 'to_ids': True, 'uuid': '5fd0c620', + 'timestamp': '1607517728', 'distribution': '5', 'sharing_group_id': '0', + 'comment': 'malspam', 'deleted': False, 'disable_correlation': False, + 'first_seen': None, 'last_seen': None, + 'value': 'test1', 'Event': {}}, + {'id': '2', 'event_id': '2', 'object_id': '0', + 'object_relation': None, 'category': 'Payload delivery', + 'type': 'sha256', 'to_ids': True, 'uuid': '5fd0c620', + 'timestamp': '1607517729', 'distribution': '5', 'sharing_group_id': '0', + 'comment': 'malspam', 'deleted': False, 'disable_correlation': False, + 'first_seen': None, + 'last_seen': None, 'value': 'test2', 'Event': {}}]}} + mocked_result_2 = {'response': + {'Attribute': []}} + mocker.patch.object(Client, '_http_request', side_effect=[mocked_result_1, mocked_result_2]) + params_dict = { + 'type': 'attribute', + 'filters': {'category': ['Payload delivery']}, + } + mocked_last_run = {"last_indicator_timestamp": "1607517728", "last_indicator_value": "test1"} + mocker.patch.object(demisto, 'getLastRun', return_value=mocked_last_run) + setLastRun_mocked = mocker.patch.object(demisto, 'setLastRun') + mocker.patch.object(demisto, 'createIndicators') + fetch_attributes_command(client, params_dict) + indicators = demisto.createIndicators.call_args[0][0] + # The last ignored indicator will be re-fetched as we query his timestamp, + # but the new last run will be updated with the new indicator. + assert len(indicators) == 2 + assert setLastRun_mocked.called + + +def test_set_last_run_pagination(mocker): + """ + Given: + - The set_last_run_pagination function is called with a list of indicators, a next_page value, and a last_run dictionary. + When: + - The function is called to set the last run with the appropriate values. + Then: + - Ensure the last run is set correctly with the appropriate values + """ + from FeedMISP import update_candidate + + # Sample indicators + indicators = [ + {'value': 'test1', 'timestamp': '1607517728'}, + {'value': 'test2', 'timestamp': '1607517729'} + ] + + # Test parameters + last_run = {"last_indicator_timestamp": "1607517727", "last_indicator_value": "test0"} + last_run_timestamp = last_run["last_indicator_timestamp"] + last_run_value = last_run["last_indicator_value"] + latest_indicator_timestamp = indicators[-1]["timestamp"] + latest_indicator_value = indicators[-1]["value"] + + # Call the function + update_candidate(last_run, last_run_timestamp, + latest_indicator_timestamp, latest_indicator_value) + + # Assert that setLastRun was called with the correct arguments + expected_last_run = {'last_indicator_timestamp': last_run_timestamp, 'candidate_timestamp': latest_indicator_timestamp, + 'last_indicator_value': last_run_value, + 'candidate_value': latest_indicator_value} + assert last_run == expected_last_run diff --git a/Packs/FeedMISP/Integrations/FeedMISP/README.md b/Packs/FeedMISP/Integrations/FeedMISP/README.md index 9e0bb30d11fa..d850ff052bb5 100644 --- a/Packs/FeedMISP/Integrations/FeedMISP/README.md +++ b/Packs/FeedMISP/Integrations/FeedMISP/README.md @@ -30,6 +30,7 @@ To ingest feeds via a URL, you could use one of the following content packs: | Source Reliability | Reliability of the source providing the intelligence data. | True | | Feed Fetch Interval | | False | | Bypass exclusion list | When selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system. | False | + | Max. indicators per fetch | Limit the number of indicators retrieved in a fetch run. | False | | MISP Attribute Tags | Attributes having one of the tags, or being an attribute of an event having one of the tags, will be returned. You can enter a comma-separated list of tags, for example . The list of MISP tags can be found in your MISP instance under 'Event Actions'>'List Tags' | False | | MISP Attribute Types | Attributes of one of these types will be returned. You can enter a comma-separated list of types, for example . The list of MISP types can be found in your MISP instance then 'Event Actions'>'Search Attributes'>'Type dropdown list' | False | | Query | JSON query to filter MISP attributes. When the query parameter is used, Attribute Types and Attribute Tags parameters are not used. You can check for the correct syntax at https://<Your MISP url>/servers/openapi\#operation/restSearchAttributes | False | diff --git a/Packs/FeedMISP/ReleaseNotes/1_0_38.md b/Packs/FeedMISP/ReleaseNotes/1_0_38.md new file mode 100644 index 000000000000..1e7a3f42e03c --- /dev/null +++ b/Packs/FeedMISP/ReleaseNotes/1_0_38.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### MISP Feed + +- Fixed an issue where the ***fetch-incidcators*** command reached a docker timeout. +- Improved implementation of the ***fetch-incidcators*** command to ensure the feed completes successfully when no new indicators are available and that indicators are pulled only once. +- Updated the Docker image to: *demisto/python3:3.11.10.115887*. diff --git a/Packs/FeedMISP/pack_metadata.json b/Packs/FeedMISP/pack_metadata.json index d221e905e68f..0a7da8668311 100644 --- a/Packs/FeedMISP/pack_metadata.json +++ b/Packs/FeedMISP/pack_metadata.json @@ -2,7 +2,7 @@ "name": "MISP Feed", "description": "Indicators feed from MISP", "support": "xsoar", - "currentVersion": "1.0.37", + "currentVersion": "1.0.38", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedMajesticMillion/Integrations/MajesticMillion/MajesticMillion.yml b/Packs/FeedMajesticMillion/Integrations/MajesticMillion/MajesticMillion.yml index d1dcfee8fcd4..e1a2124ac2df 100644 --- a/Packs/FeedMajesticMillion/Integrations/MajesticMillion/MajesticMillion.yml +++ b/Packs/FeedMajesticMillion/Integrations/MajesticMillion/MajesticMillion.yml @@ -101,7 +101,7 @@ script: name: limit description: Gets the feed indicators. name: majesticmillion-get-indicators - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/FeedMajesticMillion/ReleaseNotes/1_1_17.md b/Packs/FeedMajesticMillion/ReleaseNotes/1_1_17.md new file mode 100644 index 000000000000..6d0ac47882cc --- /dev/null +++ b/Packs/FeedMajesticMillion/ReleaseNotes/1_1_17.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Majestic Million Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FeedMajesticMillion/pack_metadata.json b/Packs/FeedMajesticMillion/pack_metadata.json index fce434925314..a91b8feb1dc5 100644 --- a/Packs/FeedMajesticMillion/pack_metadata.json +++ b/Packs/FeedMajesticMillion/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Majestic Million Feed", "description": "Use the Majestic Million pack to ingest the top known websites as 'good' indicators.", "support": "xsoar", - "currentVersion": "1.1.16", + "currentVersion": "1.1.17", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedMitreAttackv2/Integrations/FeedMitreAttackv2/FeedMitreAttackv2.py b/Packs/FeedMitreAttackv2/Integrations/FeedMitreAttackv2/FeedMitreAttackv2.py index fcd395bd088c..6eddf164b841 100644 --- a/Packs/FeedMitreAttackv2/Integrations/FeedMitreAttackv2/FeedMitreAttackv2.py +++ b/Packs/FeedMitreAttackv2/Integrations/FeedMitreAttackv2/FeedMitreAttackv2.py @@ -643,7 +643,10 @@ def get_mitre_value_from_id(client, args): attack_pattern_name = f'{parent_name}: {attack_pattern_name}' if attack_pattern_name: - attack_values.append({'id': attack_id, 'value': attack_pattern_name}) + if not is_indicator_deprecated_or_revoked(attack_pattern[0]): + attack_values.append({'id': attack_id, 'value': attack_pattern_name}) + else: + attack_values.append({'id': attack_id, 'value': ''}) if attack_values: return CommandResults( diff --git a/Packs/FeedMitreAttackv2/Integrations/FeedMitreAttackv2/FeedMitreAttackv2.yml b/Packs/FeedMitreAttackv2/Integrations/FeedMitreAttackv2/FeedMitreAttackv2.yml index e10c1a237519..2be3e1eeb600 100644 --- a/Packs/FeedMitreAttackv2/Integrations/FeedMitreAttackv2/FeedMitreAttackv2.yml +++ b/Packs/FeedMitreAttackv2/Integrations/FeedMitreAttackv2/FeedMitreAttackv2.yml @@ -170,7 +170,7 @@ script: - contextPath: MITREATTACK.value description: MITRE ATTACK Attack Pattern value. type: String - dockerimage: demisto/taxii2:1.0.0.107875 + dockerimage: demisto/taxii2:1.0.0.117543 feed: true runonce: false script: '-' diff --git a/Packs/FeedMitreAttackv2/ReleaseNotes/1_1_44.md b/Packs/FeedMitreAttackv2/ReleaseNotes/1_1_44.md new file mode 100644 index 000000000000..6bc3469c158a --- /dev/null +++ b/Packs/FeedMitreAttackv2/ReleaseNotes/1_1_44.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### MITRE ATT&CK + +- Updated the Docker image to: *demisto/taxii2:1.0.0.117320*. diff --git a/Packs/FeedMitreAttackv2/ReleaseNotes/1_1_45.md b/Packs/FeedMitreAttackv2/ReleaseNotes/1_1_45.md new file mode 100644 index 000000000000..ed3de4406ac7 --- /dev/null +++ b/Packs/FeedMitreAttackv2/ReleaseNotes/1_1_45.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### MITRE ATT&CK + +- Updated the Docker image to: *demisto/taxii2:1.0.0.117543*. +- Fixed an issue where the "get_mitre_value_from_id" command did not ignore revoked indicators. diff --git a/Packs/FeedMitreAttackv2/pack_metadata.json b/Packs/FeedMitreAttackv2/pack_metadata.json index 9d3e2a608e22..492fdb0f199b 100644 --- a/Packs/FeedMitreAttackv2/pack_metadata.json +++ b/Packs/FeedMitreAttackv2/pack_metadata.json @@ -2,7 +2,7 @@ "name": "MITRE ATT&CK", "description": "Fetches indicators from MITRE ATT&CK.", "support": "xsoar", - "currentVersion": "1.1.43", + "currentVersion": "1.1.45", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedNVDv2/Integrations/FeedNVDv2/FeedNVDv2.yml b/Packs/FeedNVDv2/Integrations/FeedNVDv2/FeedNVDv2.yml index 8b2a6e71ef6f..4be98b0bdbbe 100644 --- a/Packs/FeedNVDv2/Integrations/FeedNVDv2/FeedNVDv2.yml +++ b/Packs/FeedNVDv2/Integrations/FeedNVDv2/FeedNVDv2.yml @@ -154,7 +154,7 @@ script: - contextPath: CVE.Description description: The description of the CVE. type: String - dockerimage: demisto/python3:3.11.9.107902 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '' diff --git a/Packs/FeedNVDv2/ReleaseNotes/1_0_6.md b/Packs/FeedNVDv2/ReleaseNotes/1_0_6.md new file mode 100644 index 000000000000..7d3d40eec9cc --- /dev/null +++ b/Packs/FeedNVDv2/ReleaseNotes/1_0_6.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### National Vulnerability Database Feed v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FeedNVDv2/pack_metadata.json b/Packs/FeedNVDv2/pack_metadata.json index 5904f4d6f3c7..8e8707d9f6a2 100644 --- a/Packs/FeedNVDv2/pack_metadata.json +++ b/Packs/FeedNVDv2/pack_metadata.json @@ -1,7 +1,7 @@ { "name": "NVD Feed 2.0", "support": "xsoar", - "currentVersion": "1.0.5", + "currentVersion": "1.0.6", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedTAXII/Integrations/FeedTAXII2/FeedTAXII2.yml b/Packs/FeedTAXII/Integrations/FeedTAXII2/FeedTAXII2.yml index 855bb56326a3..a2c253d0ca7c 100644 --- a/Packs/FeedTAXII/Integrations/FeedTAXII2/FeedTAXII2.yml +++ b/Packs/FeedTAXII/Integrations/FeedTAXII2/FeedTAXII2.yml @@ -274,7 +274,7 @@ script: - deprecated: true description: 'WARNING: This command will reset your fetch history.' name: taxii2-reset-fetch-indicators - dockerimage: demisto/taxii2:1.0.0.112358 + dockerimage: demisto/taxii2:1.0.0.117320 feed: true runonce: false script: '-' diff --git a/Packs/FeedTAXII/ReleaseNotes/1_2_23.md b/Packs/FeedTAXII/ReleaseNotes/1_2_23.md new file mode 100644 index 000000000000..033380714376 --- /dev/null +++ b/Packs/FeedTAXII/ReleaseNotes/1_2_23.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### TAXII 2 Feed + +- Updated the Docker image to: *demisto/taxii2:1.0.0.117320*. diff --git a/Packs/FeedTAXII/pack_metadata.json b/Packs/FeedTAXII/pack_metadata.json index 7d100046fdbb..b70946f4ba87 100644 --- a/Packs/FeedTAXII/pack_metadata.json +++ b/Packs/FeedTAXII/pack_metadata.json @@ -2,7 +2,7 @@ "name": "TAXII Feed", "description": "Ingest indicator feeds from TAXII 1 and TAXII 2 servers.", "support": "xsoar", - "currentVersion": "1.2.22", + "currentVersion": "1.2.23", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedThreatConnect/Integrations/FeedThreatConnect/FeedThreatConnect.yml b/Packs/FeedThreatConnect/Integrations/FeedThreatConnect/FeedThreatConnect.yml index 48639a49916f..69b75a4c2b88 100644 --- a/Packs/FeedThreatConnect/Integrations/FeedThreatConnect/FeedThreatConnect.yml +++ b/Packs/FeedThreatConnect/Integrations/FeedThreatConnect/FeedThreatConnect.yml @@ -235,7 +235,7 @@ script: name: tc-get-indicators - description: Gets available indicators owners. name: tc-get-owners - dockerimage: demisto/python3:3.10.14.95956 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/FeedThreatConnect/ReleaseNotes/2_1_24.md b/Packs/FeedThreatConnect/ReleaseNotes/2_1_24.md new file mode 100644 index 000000000000..cbd289a8c488 --- /dev/null +++ b/Packs/FeedThreatConnect/ReleaseNotes/2_1_24.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### ThreatConnect Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FeedThreatConnect/pack_metadata.json b/Packs/FeedThreatConnect/pack_metadata.json index 771337283221..c509f5f2da07 100644 --- a/Packs/FeedThreatConnect/pack_metadata.json +++ b/Packs/FeedThreatConnect/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ThreatConnect Feed", "description": "ThreatConnect indicators feed for Cortex XSOAR TIM.", "support": "xsoar", - "currentVersion": "2.1.23", + "currentVersion": "2.1.24", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedThreatFox/Integrations/FeedThreatFox/FeedThreatFox.yml b/Packs/FeedThreatFox/Integrations/FeedThreatFox/FeedThreatFox.yml index 886c06894a36..c307de0917ce 100644 --- a/Packs/FeedThreatFox/Integrations/FeedThreatFox/FeedThreatFox.yml +++ b/Packs/FeedThreatFox/Integrations/FeedThreatFox/FeedThreatFox.yml @@ -158,7 +158,7 @@ script: script: '' type: python subtype: python3 - dockerimage: demisto/python3:3.11.9.107902 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.10.0 tests: - No tests (auto formatted) diff --git a/Packs/FeedThreatFox/ReleaseNotes/1_0_1.md b/Packs/FeedThreatFox/ReleaseNotes/1_0_1.md new file mode 100644 index 000000000000..870fa92d6604 --- /dev/null +++ b/Packs/FeedThreatFox/ReleaseNotes/1_0_1.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### ThreatFox Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FeedThreatFox/pack_metadata.json b/Packs/FeedThreatFox/pack_metadata.json index 10fba108720a..eb70699cf2de 100644 --- a/Packs/FeedThreatFox/pack_metadata.json +++ b/Packs/FeedThreatFox/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ThreatFox Feed", "description": "ThreatFox is a free platform from abuse.ch with the goal of sharing indicators of compromise (IOCs) associated with malware with the infosec community, AV vendors and threat intelligence providers. The ThreatFox Feed allows users to fetch indicators from ThreatFox.", "support": "xsoar", - "currentVersion": "1.0.0", + "currentVersion": "1.0.1", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedTorExitAddresses/Integrations/FeedTorExitAddresses/FeedTorExitAddresses.yml b/Packs/FeedTorExitAddresses/Integrations/FeedTorExitAddresses/FeedTorExitAddresses.yml index 900aaa429f96..ea26672ada00 100644 --- a/Packs/FeedTorExitAddresses/Integrations/FeedTorExitAddresses/FeedTorExitAddresses.yml +++ b/Packs/FeedTorExitAddresses/Integrations/FeedTorExitAddresses/FeedTorExitAddresses.yml @@ -91,7 +91,7 @@ script: name: limit description: Gets the feed indicators. name: tor-get-indicators - dockerimage: demisto/python3:3.10.14.92207 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/FeedTorExitAddresses/ReleaseNotes/1_0_11.md b/Packs/FeedTorExitAddresses/ReleaseNotes/1_0_11.md new file mode 100644 index 000000000000..0d2a68eeb6f6 --- /dev/null +++ b/Packs/FeedTorExitAddresses/ReleaseNotes/1_0_11.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Tor Exit Addresses Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FeedTorExitAddresses/pack_metadata.json b/Packs/FeedTorExitAddresses/pack_metadata.json index 8bb1264f4c84..9055af8f741f 100644 --- a/Packs/FeedTorExitAddresses/pack_metadata.json +++ b/Packs/FeedTorExitAddresses/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Tor Exit Addresses Feed", "description": "Tor is free software and an open network that helps you defend against\n traffic analysis, a form of network surveillance that threatens personal freedom\n and privacy, confidential business activities and relationships, and state security.", "support": "xsoar", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FeedUnit42v2/Integrations/FeedUnit42v2/FeedUnit42v2.yml b/Packs/FeedUnit42v2/Integrations/FeedUnit42v2/FeedUnit42v2.yml index 66ef040c1ed3..88f253e55de0 100644 --- a/Packs/FeedUnit42v2/Integrations/FeedUnit42v2/FeedUnit42v2.yml +++ b/Packs/FeedUnit42v2/Integrations/FeedUnit42v2/FeedUnit42v2.yml @@ -111,7 +111,7 @@ script: - attack-pattern description: Retrieves a limited number of the indicators. name: unit42-get-indicators - dockerimage: demisto/taxii2:1.0.0.107875 + dockerimage: demisto/taxii2:1.0.0.117320 feed: true runonce: false script: '-' diff --git a/Packs/FeedUnit42v2/ReleaseNotes/1_0_59.md b/Packs/FeedUnit42v2/ReleaseNotes/1_0_59.md new file mode 100644 index 000000000000..8f7b0e92e7b2 --- /dev/null +++ b/Packs/FeedUnit42v2/ReleaseNotes/1_0_59.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Unit 42 ATOMs Feed + +- Updated the Docker image to: *demisto/taxii2:1.0.0.117320*. diff --git a/Packs/FeedUnit42v2/pack_metadata.json b/Packs/FeedUnit42v2/pack_metadata.json index 078c6914761b..a8a4b2be2e6c 100644 --- a/Packs/FeedUnit42v2/pack_metadata.json +++ b/Packs/FeedUnit42v2/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Unit 42 ATOMs Feed", "description": "Unit 42 feed of published IOCs which contains malicious indicators.", "support": "xsoar", - "currentVersion": "1.0.58", + "currentVersion": "1.0.59", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Feedsslabusech/Integrations/Feedsslabusech/Feedsslabusech.yml b/Packs/Feedsslabusech/Integrations/Feedsslabusech/Feedsslabusech.yml index abc476c5cd4e..b88bbc8ddcf8 100644 --- a/Packs/Feedsslabusech/Integrations/Feedsslabusech/Feedsslabusech.yml +++ b/Packs/Feedsslabusech/Integrations/Feedsslabusech/Feedsslabusech.yml @@ -107,7 +107,7 @@ script: name: indicator_type description: Gets the feed indicators. name: sslbl-get-indicators - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 feed: true runonce: false script: '-' diff --git a/Packs/Feedsslabusech/ReleaseNotes/1_1_29.md b/Packs/Feedsslabusech/ReleaseNotes/1_1_29.md new file mode 100644 index 000000000000..a75fef8e4129 --- /dev/null +++ b/Packs/Feedsslabusech/ReleaseNotes/1_1_29.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### abuse.ch SSL Blacklist Feed +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Feedsslabusech/pack_metadata.json b/Packs/Feedsslabusech/pack_metadata.json index 972c592723de..67ac467ad3b2 100644 --- a/Packs/Feedsslabusech/pack_metadata.json +++ b/Packs/Feedsslabusech/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Abuse.ch SSL Blacklist Feed", "description": "The SSL IP Blacklist contains all hosts (IP addresses) that SSLBL has seen in the past 30 days and\n identified as being associated with a malicious SSL certificate.", "support": "xsoar", - "currentVersion": "1.1.28", + "currentVersion": "1.1.29", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FidelisElevateNetwork/Integrations/FidelisElevateNetwork/FidelisElevateNetwork.yml b/Packs/FidelisElevateNetwork/Integrations/FidelisElevateNetwork/FidelisElevateNetwork.yml index 156ba47a89f7..eb429c5b82aa 100644 --- a/Packs/FidelisElevateNetwork/Integrations/FidelisElevateNetwork/FidelisElevateNetwork.yml +++ b/Packs/FidelisElevateNetwork/Integrations/FidelisElevateNetwork/FidelisElevateNetwork.yml @@ -898,7 +898,7 @@ script: runonce: false script: '-' subtype: python3 - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 type: python tests: - Fidelis-Test diff --git a/Packs/FidelisElevateNetwork/ReleaseNotes/1_0_10.md b/Packs/FidelisElevateNetwork/ReleaseNotes/1_0_10.md new file mode 100644 index 000000000000..a61c4cdcf9d5 --- /dev/null +++ b/Packs/FidelisElevateNetwork/ReleaseNotes/1_0_10.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Fidelis Elevate Network +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FidelisElevateNetwork/pack_metadata.json b/Packs/FidelisElevateNetwork/pack_metadata.json index 10012f14038a..eb33c79122dd 100644 --- a/Packs/FidelisElevateNetwork/pack_metadata.json +++ b/Packs/FidelisElevateNetwork/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Fidelis Elevate Network", "description": "Automate Detection and Response to Network Threats and data leakage in your organization with Fidelis Elevate Network Integration.", "support": "xsoar", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FidelisEndpoint/Integrations/FidelisEndpoint/FidelisEndpoint.yml b/Packs/FidelisEndpoint/Integrations/FidelisEndpoint/FidelisEndpoint.yml index 459499870939..625000cfd279 100644 --- a/Packs/FidelisEndpoint/Integrations/FidelisEndpoint/FidelisEndpoint.yml +++ b/Packs/FidelisEndpoint/Integrations/FidelisEndpoint/FidelisEndpoint.yml @@ -1243,7 +1243,7 @@ script: - contextPath: FidelisEndpoint.Query.EntityType description: Entity type. type: Number - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/FidelisEndpoint/ReleaseNotes/1_0_7.md b/Packs/FidelisEndpoint/ReleaseNotes/1_0_7.md new file mode 100644 index 000000000000..addc17687b62 --- /dev/null +++ b/Packs/FidelisEndpoint/ReleaseNotes/1_0_7.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Fidelis EDR +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/FidelisEndpoint/pack_metadata.json b/Packs/FidelisEndpoint/pack_metadata.json index 6c0b74b0046a..4052cbaea360 100644 --- a/Packs/FidelisEndpoint/pack_metadata.json +++ b/Packs/FidelisEndpoint/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Fidelis Endpoint", "description": "Fidelis Endpoint", "support": "xsoar", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/FiltersAndTransformers/ReleaseNotes/1_2_84.md b/Packs/FiltersAndTransformers/ReleaseNotes/1_2_84.md new file mode 100644 index 000000000000..522300e31dd9 --- /dev/null +++ b/Packs/FiltersAndTransformers/ReleaseNotes/1_2_84.md @@ -0,0 +1,6 @@ + +#### Scripts + +##### ParseHTMLTables + +- Updated the Docker image to: *demisto/bs4-py3:1.0.0.117152*. \ No newline at end of file diff --git a/Packs/FiltersAndTransformers/ReleaseNotes/1_2_85.md b/Packs/FiltersAndTransformers/ReleaseNotes/1_2_85.md new file mode 100644 index 000000000000..142dd8e93c56 --- /dev/null +++ b/Packs/FiltersAndTransformers/ReleaseNotes/1_2_85.md @@ -0,0 +1,175 @@ + +#### Scripts + +##### URLDecode +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### RegexExpand +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### LowerCidrNumAddresses +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### ProductJoin +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### GreaterCidrNumAddresses +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### EmailDomainBlacklist +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### JoinIfSingleElementOnly +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### StringToArray +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### CIDRBiggerThanPrefix +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### ExtractEmailTransformer +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### EmailDomainWhitelist +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### RegexReplace +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### SortBy +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### MapRangeValues +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### BetweenDates +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### InRange +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### ConvertToSingleElementArray +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### BetweenHours +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### PadZeros +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### DedupBy +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### ModifyDateTime +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### MapValuesTransformer +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### If-Elif +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### AnyMatch +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### FormatTemplate +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### ConcatFormat +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### AfterRelativeDate +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### RegexExtractAll +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### Base64Decode +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### ConvertAllExcept +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### IgnoreFieldsFromJson +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### URLEncode +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### ExtractInbetween +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### DT +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### JsonToTable +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### ReverseList +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### RemoveMatches +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### StripChars +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### GetRange +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### SumList +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### GetValuesOfMultipleFields +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### MakePair +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + +##### MapPattern +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + diff --git a/Packs/FiltersAndTransformers/Scripts/AfterRelativeDate/AfterRelativeDate.yml b/Packs/FiltersAndTransformers/Scripts/AfterRelativeDate/AfterRelativeDate.yml index f1d6c3aed308..6cb827357689 100644 --- a/Packs/FiltersAndTransformers/Scripts/AfterRelativeDate/AfterRelativeDate.yml +++ b/Packs/FiltersAndTransformers/Scripts/AfterRelativeDate/AfterRelativeDate.yml @@ -19,7 +19,7 @@ tags: - Condition timeout: '0' type: python -dockerimage: demisto/python3:3.11.9.107902 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/FiltersAndTransformers/Scripts/AnyMatch/AnyMatch.yml b/Packs/FiltersAndTransformers/Scripts/AnyMatch/AnyMatch.yml index cc2e31a48be1..65503d25c8eb 100644 --- a/Packs/FiltersAndTransformers/Scripts/AnyMatch/AnyMatch.yml +++ b/Packs/FiltersAndTransformers/Scripts/AnyMatch/AnyMatch.yml @@ -24,4 +24,4 @@ scripttarget: 0 fromversion: 6.9.0 tests: - AnyMatch_Test -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 diff --git a/Packs/FiltersAndTransformers/Scripts/Base64Decode/Base64Decode.yml b/Packs/FiltersAndTransformers/Scripts/Base64Decode/Base64Decode.yml index 803c16d87d42..3d4beaccdca2 100644 --- a/Packs/FiltersAndTransformers/Scripts/Base64Decode/Base64Decode.yml +++ b/Packs/FiltersAndTransformers/Scripts/Base64Decode/Base64Decode.yml @@ -27,6 +27,6 @@ scripttarget: 0 subtype: python3 runas: DBotWeakRole fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - Base64Decode - Test diff --git a/Packs/FiltersAndTransformers/Scripts/BetweenDates/BetweenDates.yml b/Packs/FiltersAndTransformers/Scripts/BetweenDates/BetweenDates.yml index 60ae7eddba66..42aaf61d2c71 100644 --- a/Packs/FiltersAndTransformers/Scripts/BetweenDates/BetweenDates.yml +++ b/Packs/FiltersAndTransformers/Scripts/BetweenDates/BetweenDates.yml @@ -35,7 +35,7 @@ outputs: type: string scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole tests: - No test diff --git a/Packs/FiltersAndTransformers/Scripts/BetweenHours/BetweenHours.yml b/Packs/FiltersAndTransformers/Scripts/BetweenHours/BetweenHours.yml index d5f97af24bdd..309016278fb4 100644 --- a/Packs/FiltersAndTransformers/Scripts/BetweenHours/BetweenHours.yml +++ b/Packs/FiltersAndTransformers/Scripts/BetweenHours/BetweenHours.yml @@ -35,7 +35,7 @@ outputs: type: string scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole tests: - No test diff --git a/Packs/FiltersAndTransformers/Scripts/CIDRBiggerThanPrefix/CIDRBiggerThanPrefix.yml b/Packs/FiltersAndTransformers/Scripts/CIDRBiggerThanPrefix/CIDRBiggerThanPrefix.yml index 9b718aecd52f..b81d574a6eca 100644 --- a/Packs/FiltersAndTransformers/Scripts/CIDRBiggerThanPrefix/CIDRBiggerThanPrefix.yml +++ b/Packs/FiltersAndTransformers/Scripts/CIDRBiggerThanPrefix/CIDRBiggerThanPrefix.yml @@ -18,7 +18,7 @@ args: comment: Checks whether a given CIDR prefix is bigger than the defined maximum prefix. scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.0.0 tests: diff --git a/Packs/FiltersAndTransformers/Scripts/ConcatFormat/ConcatFormat.yml b/Packs/FiltersAndTransformers/Scripts/ConcatFormat/ConcatFormat.yml index 9aa7ac71fa67..e6cca8b5d4d0 100644 --- a/Packs/FiltersAndTransformers/Scripts/ConcatFormat/ConcatFormat.yml +++ b/Packs/FiltersAndTransformers/Scripts/ConcatFormat/ConcatFormat.yml @@ -35,7 +35,7 @@ args: defaultValue: "false" scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.5.0 tests: diff --git a/Packs/FiltersAndTransformers/Scripts/ConvertAllExcept/ConvertAllExcept.yml b/Packs/FiltersAndTransformers/Scripts/ConvertAllExcept/ConvertAllExcept.yml index 9d0a63b50576..7e8b7fd1351b 100644 --- a/Packs/FiltersAndTransformers/Scripts/ConvertAllExcept/ConvertAllExcept.yml +++ b/Packs/FiltersAndTransformers/Scripts/ConvertAllExcept/ConvertAllExcept.yml @@ -21,7 +21,7 @@ args: isArray: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole tests: - No test - used in Prisma Cloud classifier. diff --git a/Packs/FiltersAndTransformers/Scripts/ConvertToSingleElementArray/ConvertToSingleElementArray.yml b/Packs/FiltersAndTransformers/Scripts/ConvertToSingleElementArray/ConvertToSingleElementArray.yml index 23249e982212..fa1f6a5bc362 100644 --- a/Packs/FiltersAndTransformers/Scripts/ConvertToSingleElementArray/ConvertToSingleElementArray.yml +++ b/Packs/FiltersAndTransformers/Scripts/ConvertToSingleElementArray/ConvertToSingleElementArray.yml @@ -20,4 +20,4 @@ runas: DBotWeakRole fromversion: 5.0.0 tests: - No tests (auto formatted) -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 diff --git a/Packs/FiltersAndTransformers/Scripts/DT/DT.yml b/Packs/FiltersAndTransformers/Scripts/DT/DT.yml index 26185d1ec414..e41a151bc5c0 100644 --- a/Packs/FiltersAndTransformers/Scripts/DT/DT.yml +++ b/Packs/FiltersAndTransformers/Scripts/DT/DT.yml @@ -21,4 +21,4 @@ scripttarget: 0 tests: - No tests - script used for testing fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 diff --git a/Packs/FiltersAndTransformers/Scripts/DedupBy/DedupBy.yml b/Packs/FiltersAndTransformers/Scripts/DedupBy/DedupBy.yml index 808801400791..973f5b29f443 100644 --- a/Packs/FiltersAndTransformers/Scripts/DedupBy/DedupBy.yml +++ b/Packs/FiltersAndTransformers/Scripts/DedupBy/DedupBy.yml @@ -18,7 +18,7 @@ args: isArray: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.8.0 tests: diff --git a/Packs/FiltersAndTransformers/Scripts/EmailDomainBlacklist/EmailDomainBlacklist.yml b/Packs/FiltersAndTransformers/Scripts/EmailDomainBlacklist/EmailDomainBlacklist.yml index 5c8ff1da1564..f0cb2962a384 100644 --- a/Packs/FiltersAndTransformers/Scripts/EmailDomainBlacklist/EmailDomainBlacklist.yml +++ b/Packs/FiltersAndTransformers/Scripts/EmailDomainBlacklist/EmailDomainBlacklist.yml @@ -21,7 +21,7 @@ args: description: An array of domains to block list. isArray: true scripttarget: 0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole tests: - No test - unit test diff --git a/Packs/FiltersAndTransformers/Scripts/EmailDomainWhitelist/EmailDomainWhitelist.yml b/Packs/FiltersAndTransformers/Scripts/EmailDomainWhitelist/EmailDomainWhitelist.yml index 9b3278609d1f..4ad9e9dba22f 100644 --- a/Packs/FiltersAndTransformers/Scripts/EmailDomainWhitelist/EmailDomainWhitelist.yml +++ b/Packs/FiltersAndTransformers/Scripts/EmailDomainWhitelist/EmailDomainWhitelist.yml @@ -21,7 +21,7 @@ args: description: An array of domains to allow list. isArray: true scripttarget: 0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole tests: - No test - unit test diff --git a/Packs/FiltersAndTransformers/Scripts/ExtractEmailTransformer_6_10/ExtractEmailTransformer_6_10.yml b/Packs/FiltersAndTransformers/Scripts/ExtractEmailTransformer_6_10/ExtractEmailTransformer_6_10.yml index 35715de9c76c..5b3f0340ae6a 100644 --- a/Packs/FiltersAndTransformers/Scripts/ExtractEmailTransformer_6_10/ExtractEmailTransformer_6_10.yml +++ b/Packs/FiltersAndTransformers/Scripts/ExtractEmailTransformer_6_10/ExtractEmailTransformer_6_10.yml @@ -14,7 +14,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.1.0 toversion: 6.10.9 tests: diff --git a/Packs/FiltersAndTransformers/Scripts/ExtractInbetween/ExtractInbetween.yml b/Packs/FiltersAndTransformers/Scripts/ExtractInbetween/ExtractInbetween.yml index 5c4657433a9a..edfa11fa9e82 100644 --- a/Packs/FiltersAndTransformers/Scripts/ExtractInbetween/ExtractInbetween.yml +++ b/Packs/FiltersAndTransformers/Scripts/ExtractInbetween/ExtractInbetween.yml @@ -22,7 +22,7 @@ args: required: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.5.0 tests: diff --git a/Packs/FiltersAndTransformers/Scripts/FormatTemplate/FormatTemplate.yml b/Packs/FiltersAndTransformers/Scripts/FormatTemplate/FormatTemplate.yml index cc5469168d8b..ad114598a74a 100644 --- a/Packs/FiltersAndTransformers/Scripts/FormatTemplate/FormatTemplate.yml +++ b/Packs/FiltersAndTransformers/Scripts/FormatTemplate/FormatTemplate.yml @@ -39,7 +39,7 @@ args: defaultValue: "false" scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.5.0 tests: diff --git a/Packs/FiltersAndTransformers/Scripts/GetRange/GetRange.yml b/Packs/FiltersAndTransformers/Scripts/GetRange/GetRange.yml index 6d7bc7d50186..7e4437ce2e2e 100644 --- a/Packs/FiltersAndTransformers/Scripts/GetRange/GetRange.yml +++ b/Packs/FiltersAndTransformers/Scripts/GetRange/GetRange.yml @@ -23,7 +23,7 @@ tags: - entirelist timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.5.0 tests: - No tests (auto formatted) diff --git a/Packs/FiltersAndTransformers/Scripts/GetValuesOfMultipleFIelds/GetValuesOfMultipleFIelds.yml b/Packs/FiltersAndTransformers/Scripts/GetValuesOfMultipleFIelds/GetValuesOfMultipleFIelds.yml index ad217a264452..6b41018cb4e0 100644 --- a/Packs/FiltersAndTransformers/Scripts/GetValuesOfMultipleFIelds/GetValuesOfMultipleFIelds.yml +++ b/Packs/FiltersAndTransformers/Scripts/GetValuesOfMultipleFIelds/GetValuesOfMultipleFIelds.yml @@ -14,7 +14,7 @@ commonfields: name: GetValuesOfMultipleFields scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole script: '-' tags: diff --git a/Packs/FiltersAndTransformers/Scripts/GreaterCidrNumAddresses/GreaterCidrNumAddresses.yml b/Packs/FiltersAndTransformers/Scripts/GreaterCidrNumAddresses/GreaterCidrNumAddresses.yml index 6a007de30ed0..a4308babd3ee 100644 --- a/Packs/FiltersAndTransformers/Scripts/GreaterCidrNumAddresses/GreaterCidrNumAddresses.yml +++ b/Packs/FiltersAndTransformers/Scripts/GreaterCidrNumAddresses/GreaterCidrNumAddresses.yml @@ -17,7 +17,7 @@ tags: - filter timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.0.0 tests: - No tests (auto formatted) diff --git a/Packs/FiltersAndTransformers/Scripts/IfElif/IfElif.yml b/Packs/FiltersAndTransformers/Scripts/IfElif/IfElif.yml index 72162b1b876d..2a9e4386ff73 100644 --- a/Packs/FiltersAndTransformers/Scripts/IfElif/IfElif.yml +++ b/Packs/FiltersAndTransformers/Scripts/IfElif/IfElif.yml @@ -33,7 +33,7 @@ args: scripttarget: 0 subtype: python3 runonce: false -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.9.0 tests: diff --git a/Packs/FiltersAndTransformers/Scripts/IgnoreFieldsFromJson/IgnoreFieldsFromJson.yml b/Packs/FiltersAndTransformers/Scripts/IgnoreFieldsFromJson/IgnoreFieldsFromJson.yml index 3b859e6d9f18..320cc3b72d59 100644 --- a/Packs/FiltersAndTransformers/Scripts/IgnoreFieldsFromJson/IgnoreFieldsFromJson.yml +++ b/Packs/FiltersAndTransformers/Scripts/IgnoreFieldsFromJson/IgnoreFieldsFromJson.yml @@ -9,7 +9,7 @@ comment: Removed selected fields from the JSON object. commonfields: id: IgnoreFieldsFromJson version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IgnoreFieldsFromJson runas: DBotWeakRole diff --git a/Packs/FiltersAndTransformers/Scripts/InRange/InRange.yml b/Packs/FiltersAndTransformers/Scripts/InRange/InRange.yml index 7ae8986b0825..b0117e0b66ba 100644 --- a/Packs/FiltersAndTransformers/Scripts/InRange/InRange.yml +++ b/Packs/FiltersAndTransformers/Scripts/InRange/InRange.yml @@ -23,4 +23,4 @@ scripttarget: 0 fromversion: 5.0.0 tests: - No tests (auto formatted) -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 diff --git a/Packs/FiltersAndTransformers/Scripts/JoinIfSingleElementOnly/JoinIfSingleElementOnly.yml b/Packs/FiltersAndTransformers/Scripts/JoinIfSingleElementOnly/JoinIfSingleElementOnly.yml index b6f6814dc33b..49e562f8acfe 100644 --- a/Packs/FiltersAndTransformers/Scripts/JoinIfSingleElementOnly/JoinIfSingleElementOnly.yml +++ b/Packs/FiltersAndTransformers/Scripts/JoinIfSingleElementOnly/JoinIfSingleElementOnly.yml @@ -19,6 +19,6 @@ args: isArray: true scripttarget: 0 fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/FiltersAndTransformers/Scripts/JsonToTable/JsonToTable.yml b/Packs/FiltersAndTransformers/Scripts/JsonToTable/JsonToTable.yml index 16f3b2e9a2df..3a78aaf4bfee 100644 --- a/Packs/FiltersAndTransformers/Scripts/JsonToTable/JsonToTable.yml +++ b/Packs/FiltersAndTransformers/Scripts/JsonToTable/JsonToTable.yml @@ -26,7 +26,7 @@ args: description: 'Transformation JSON from value to strings. The syntax is: `{"header_key": {"keys": [, ...], "is_nested": true/false}}`.' scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole tests: - JsonToTable - Test Playbook diff --git a/Packs/FiltersAndTransformers/Scripts/LowerCidrNumAddresses/LowerCidrNumAddresses.yml b/Packs/FiltersAndTransformers/Scripts/LowerCidrNumAddresses/LowerCidrNumAddresses.yml index 1e494b449fdc..40c98bbba1ee 100644 --- a/Packs/FiltersAndTransformers/Scripts/LowerCidrNumAddresses/LowerCidrNumAddresses.yml +++ b/Packs/FiltersAndTransformers/Scripts/LowerCidrNumAddresses/LowerCidrNumAddresses.yml @@ -17,7 +17,7 @@ tags: - filter timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 5.0.0 tests: - No tests (auto formatted) diff --git a/Packs/FiltersAndTransformers/Scripts/MakePair/MakePair.yml b/Packs/FiltersAndTransformers/Scripts/MakePair/MakePair.yml index b6ced0b299c4..3b5a43919955 100644 --- a/Packs/FiltersAndTransformers/Scripts/MakePair/MakePair.yml +++ b/Packs/FiltersAndTransformers/Scripts/MakePair/MakePair.yml @@ -47,7 +47,7 @@ args: description: When each element is given in a dictionary, specify the array it will be merged into (Choose from array1, array2, array1 list[str]: return sorted(lines[1:]) # ignore first line -def extract_text(image_path: str, languages: list[str] = None) -> str: - exe_params = [TESSERACT_EXE, "-v", image_path, 'stdout'] +def extract_text(image_path: str, languages: list[str] = [], verbose: bool = False) -> str: + exe_params = [TESSERACT_EXE, image_path, 'stdout'] + if verbose: + exe_params.extend(["-v"]) + if languages: exe_params.extend(['-l', '+'.join(languages)]) + res = subprocess.run(exe_params, capture_output=True, check=True, text=True) if res.stderr: demisto.debug(f'tesseract returned ok but stderr contains warnings: {res.stderr}') + return res.stdout @@ -37,6 +42,7 @@ def list_languages_command() -> CommandResults: def extract_text_command(args: dict, instance_languages: list, skip_corrupted: bool) -> tuple[list, list]: langs = argToList(args.get('langs')) or instance_languages + verbose = argToBoolean(args.get('verbose', False)) demisto.debug(f"Using langs settings: {langs}") results, errors = [], [] @@ -48,7 +54,7 @@ def extract_text_command(args: dict, instance_languages: list, skip_corrupted: b raise DemistoException(f"Couldn't find entry id: {entry_id}") demisto.debug(f'Extracting text from file: {file_path}') - res = extract_text(file_path['path'], langs) + res = extract_text(file_path['path'], langs, verbose) file_entry = {'EntryID': entry_id, 'Text': res} results.append( CommandResults( diff --git a/Packs/ImageOCR/Integrations/ImageOCR/ImageOCR.yml b/Packs/ImageOCR/Integrations/ImageOCR/ImageOCR.yml index b7dc4ccede66..1e636f9053a1 100644 --- a/Packs/ImageOCR/Integrations/ImageOCR/ImageOCR.yml +++ b/Packs/ImageOCR/Integrations/ImageOCR/ImageOCR.yml @@ -12,7 +12,7 @@ configuration: section: Connect advanced: true required: false -- additionalinfo: If true, will not raise an error if the image is corrupted and could not be processed. +- additionalinfo: If true, will not raise an error if the image is corrupt and could not be processed. display: Skip on corrupted images name: skip_corrupted section: Connect @@ -36,8 +36,12 @@ script: - description: A CSV of language codes of the language to use for OCR. Overrides the default configured language list. isArray: true name: langs - description: Extracts text from an image. + - description: Turn on verbose flag to display tesseract and other used libraries versions. + required: false + defaultValue: False + name: verbose name: image-ocr-extract-text + description: Extract text from images. outputs: - contextPath: File.Text description: Extracted text from the passed image file. diff --git a/Packs/ImageOCR/Integrations/ImageOCR/ImageOCR_test.py b/Packs/ImageOCR/Integrations/ImageOCR/ImageOCR_test.py index 2ca2974d2bc7..0cf40a5ccb77 100644 --- a/Packs/ImageOCR/Integrations/ImageOCR/ImageOCR_test.py +++ b/Packs/ImageOCR/Integrations/ImageOCR/ImageOCR_test.py @@ -52,6 +52,26 @@ def test_extract_text(image, expected_text, langs): assert expected_text in res +def test_extract_text_verbose_params(): + """ + Given: + - An image with text + + When: + - Running the extract_text command + + Then: + - Validate the result with and without the verbose parameter. + """ + path = 'test_data/bomb.jpg' + res_verbose = extract_text(path, verbose=True) + # Some of the verbose data. + assert "tesseract" in res_verbose + # Without verbose. + res_without_verbose = extract_text(path, verbose=False) + assert "tesseract" not in res_without_verbose + + def test_extract_text_command(mocker): """ Given: diff --git a/Packs/ImageOCR/Integrations/ImageOCR/README.md b/Packs/ImageOCR/Integrations/ImageOCR/README.md index 8cc84eee5764..53fedd006f0c 100644 --- a/Packs/ImageOCR/Integrations/ImageOCR/README.md +++ b/Packs/ImageOCR/Integrations/ImageOCR/README.md @@ -77,6 +77,7 @@ Extracts text from an image. | --- | --- | --- | | entryid | A comma-separated list of Entry IDs of image files to process. | Required | | langs | A CSV of language codes of the language to use for OCR. Overrides the default configured language list. | Optional | +| verbose | Turn on verbose flag to display tesseract and other used libraries versions. | Optional | #### Context Output diff --git a/Packs/ImageOCR/ReleaseNotes/1_1_35.md b/Packs/ImageOCR/ReleaseNotes/1_1_35.md new file mode 100644 index 000000000000..ca75d7db00a3 --- /dev/null +++ b/Packs/ImageOCR/ReleaseNotes/1_1_35.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### Image OCR + +- Added the *verbose* argument to the ***image-ocr-extract-text*** command. \ No newline at end of file diff --git a/Packs/ImageOCR/pack_metadata.json b/Packs/ImageOCR/pack_metadata.json index 1db6b6601406..b7bf8db1b0a5 100644 --- a/Packs/ImageOCR/pack_metadata.json +++ b/Packs/ImageOCR/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Image OCR", "description": "Extracts text from images.", "support": "xsoar", - "currentVersion": "1.1.34", + "currentVersion": "1.1.35", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Imperva_Skyfence/ReleaseNotes/1_0_12.md b/Packs/Imperva_Skyfence/ReleaseNotes/1_0_12.md new file mode 100644 index 000000000000..dd9e8b770196 --- /dev/null +++ b/Packs/Imperva_Skyfence/ReleaseNotes/1_0_12.md @@ -0,0 +1,18 @@ + +#### Scripts + +##### ImpSfScheduleTask +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### ImpSfRevokeUnaccessedDevices +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### ImpSfListEndpoints +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Imperva_Skyfence/Scripts/ImpSfListEndpoints/ImpSfListEndpoints.yml b/Packs/Imperva_Skyfence/Scripts/ImpSfListEndpoints/ImpSfListEndpoints.yml index e2ae74c53729..761e6d140551 100644 --- a/Packs/Imperva_Skyfence/Scripts/ImpSfListEndpoints/ImpSfListEndpoints.yml +++ b/Packs/Imperva_Skyfence/Scripts/ImpSfListEndpoints/ImpSfListEndpoints.yml @@ -16,6 +16,6 @@ dependson: must: - imp-sf-list-endpoints fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/Imperva_Skyfence/Scripts/ImpSfRevokeUnaccessedDevices/ImpSfRevokeUnaccessedDevices.yml b/Packs/Imperva_Skyfence/Scripts/ImpSfRevokeUnaccessedDevices/ImpSfRevokeUnaccessedDevices.yml index 09bc369d122f..6a1acc8135a0 100644 --- a/Packs/Imperva_Skyfence/Scripts/ImpSfRevokeUnaccessedDevices/ImpSfRevokeUnaccessedDevices.yml +++ b/Packs/Imperva_Skyfence/Scripts/ImpSfRevokeUnaccessedDevices/ImpSfRevokeUnaccessedDevices.yml @@ -18,6 +18,6 @@ timeout: 0s tests: - No test - old script fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 marketplaces: - xsoar diff --git a/Packs/Imperva_Skyfence/Scripts/ImpSfScheduleTask/ImpSfScheduleTask.yml b/Packs/Imperva_Skyfence/Scripts/ImpSfScheduleTask/ImpSfScheduleTask.yml index 6561ac1d17c8..95060d38d251 100644 --- a/Packs/Imperva_Skyfence/Scripts/ImpSfScheduleTask/ImpSfScheduleTask.yml +++ b/Packs/Imperva_Skyfence/Scripts/ImpSfScheduleTask/ImpSfScheduleTask.yml @@ -26,7 +26,7 @@ dependson: - ImpSfRevokeUnaccessedDevices timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) marketplaces: diff --git a/Packs/Imperva_Skyfence/pack_metadata.json b/Packs/Imperva_Skyfence/pack_metadata.json index c787ee9a970d..006db7b31ea3 100644 --- a/Packs/Imperva_Skyfence/pack_metadata.json +++ b/Packs/Imperva_Skyfence/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Imperva Skyfence", "description": "The Imperva Skyfence Cloud Gateway is a Cloud Access Security Broker (CASB) that provides visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use.", "support": "xsoar", - "currentVersion": "1.0.11", + "currentVersion": "1.0.12", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Imperva_WAF/Integrations/ImpervaWAF/ImpervaWAF.yml b/Packs/Imperva_WAF/Integrations/ImpervaWAF/ImpervaWAF.yml index d62d7a4b2fa2..8fae6cf136fe 100644 --- a/Packs/Imperva_WAF/Integrations/ImpervaWAF/ImpervaWAF.yml +++ b/Packs/Imperva_WAF/Integrations/ImpervaWAF/ImpervaWAF.yml @@ -507,7 +507,7 @@ script: required: true description: Deletes a web service custom policy indicated by the policy name. name: imperva-waf-web-service-custom-policy-delete - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Imperva_WAF/ReleaseNotes/1_0_19.md b/Packs/Imperva_WAF/ReleaseNotes/1_0_19.md new file mode 100644 index 000000000000..98b341d64ca5 --- /dev/null +++ b/Packs/Imperva_WAF/ReleaseNotes/1_0_19.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Imperva WAF +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Imperva_WAF/pack_metadata.json b/Packs/Imperva_WAF/pack_metadata.json index 27381bf0e217..d2ed9ebf9ae7 100644 --- a/Packs/Imperva_WAF/pack_metadata.json +++ b/Packs/Imperva_WAF/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Imperva WAF", "description": "Use the Imperva WAF integration to manage IP groups and Web security policies in Imperva WAF.", "support": "xsoar", - "currentVersion": "1.0.18", + "currentVersion": "1.0.19", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Incapsula/ReleaseNotes/1_1_8.md b/Packs/Incapsula/ReleaseNotes/1_1_8.md new file mode 100644 index 000000000000..df78d03fd08c --- /dev/null +++ b/Packs/Incapsula/ReleaseNotes/1_1_8.md @@ -0,0 +1,28 @@ + +#### Scripts + +##### IncapScheduleTask +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncapGetDomainApproverEmail +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncapListSites +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncapWhitelistCompliance +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncapGetAppInfo +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Incapsula/Scripts/IncapGetAppInfo/IncapGetAppInfo.yml b/Packs/Incapsula/Scripts/IncapGetAppInfo/IncapGetAppInfo.yml index 08c43ec5dd7b..2721c2f3ff55 100644 --- a/Packs/Incapsula/Scripts/IncapGetAppInfo/IncapGetAppInfo.yml +++ b/Packs/Incapsula/Scripts/IncapGetAppInfo/IncapGetAppInfo.yml @@ -15,6 +15,6 @@ dependson: - incap-get-app-info timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/Incapsula/Scripts/IncapGetDomainApproverEmail/IncapGetDomainApproverEmail.yml b/Packs/Incapsula/Scripts/IncapGetDomainApproverEmail/IncapGetDomainApproverEmail.yml index 8f89cfab4f41..2f94bba2224b 100644 --- a/Packs/Incapsula/Scripts/IncapGetDomainApproverEmail/IncapGetDomainApproverEmail.yml +++ b/Packs/Incapsula/Scripts/IncapGetDomainApproverEmail/IncapGetDomainApproverEmail.yml @@ -18,6 +18,6 @@ dependson: - incap-get-domain-approver-email timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/Incapsula/Scripts/IncapListSites/IncapListSites.yml b/Packs/Incapsula/Scripts/IncapListSites/IncapListSites.yml index 643e8c288193..1e4d24108b94 100644 --- a/Packs/Incapsula/Scripts/IncapListSites/IncapListSites.yml +++ b/Packs/Incapsula/Scripts/IncapListSites/IncapListSites.yml @@ -22,6 +22,6 @@ dependson: - incap-list-sites timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/Incapsula/Scripts/IncapScheduleTask/IncapScheduleTask.yml b/Packs/Incapsula/Scripts/IncapScheduleTask/IncapScheduleTask.yml index 4f8d6e9e808d..bdb6dcf3f3e6 100644 --- a/Packs/Incapsula/Scripts/IncapScheduleTask/IncapScheduleTask.yml +++ b/Packs/Incapsula/Scripts/IncapScheduleTask/IncapScheduleTask.yml @@ -28,7 +28,7 @@ dependson: - IncapWhitelistCompliance timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) marketplaces: diff --git a/Packs/Incapsula/Scripts/IncapWhitelistCompliance/IncapWhitelistCompliance.yml b/Packs/Incapsula/Scripts/IncapWhitelistCompliance/IncapWhitelistCompliance.yml index 52351cc51594..89175b6199d8 100644 --- a/Packs/Incapsula/Scripts/IncapWhitelistCompliance/IncapWhitelistCompliance.yml +++ b/Packs/Incapsula/Scripts/IncapWhitelistCompliance/IncapWhitelistCompliance.yml @@ -25,6 +25,6 @@ timeout: 0s tests: - No test - old script fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 marketplaces: - xsoar diff --git a/Packs/Incapsula/pack_metadata.json b/Packs/Incapsula/pack_metadata.json index 0dcaf535e146..ca4469939561 100644 --- a/Packs/Incapsula/pack_metadata.json +++ b/Packs/Incapsula/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Imperva Incapsula", "description": "Uses Incapsula to manage sites and IPs", "support": "xsoar", - "currentVersion": "1.1.7", + "currentVersion": "1.1.8", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/InfoArmor_VigilanteATI/Integrations/InfoArmorVigilanteATI/InfoArmorVigilanteATI.yml b/Packs/InfoArmor_VigilanteATI/Integrations/InfoArmorVigilanteATI/InfoArmorVigilanteATI.yml index e1378245bc42..6b55f0ce417f 100644 --- a/Packs/InfoArmor_VigilanteATI/Integrations/InfoArmorVigilanteATI/InfoArmorVigilanteATI.yml +++ b/Packs/InfoArmor_VigilanteATI/Integrations/InfoArmorVigilanteATI/InfoArmorVigilanteATI.yml @@ -419,7 +419,7 @@ script: type: string - description: Returns the usage data for your account. name: vigilante-account-usage-info - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/InfoArmor_VigilanteATI/ReleaseNotes/1_0_14.md b/Packs/InfoArmor_VigilanteATI/ReleaseNotes/1_0_14.md new file mode 100644 index 000000000000..24066c12c271 --- /dev/null +++ b/Packs/InfoArmor_VigilanteATI/ReleaseNotes/1_0_14.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### InfoArmor VigilanteATI +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/InfoArmor_VigilanteATI/pack_metadata.json b/Packs/InfoArmor_VigilanteATI/pack_metadata.json index 743bd38cb765..2bacaf6533d5 100644 --- a/Packs/InfoArmor_VigilanteATI/pack_metadata.json +++ b/Packs/InfoArmor_VigilanteATI/pack_metadata.json @@ -2,7 +2,7 @@ "name": "InfoArmor VigilanteATI", "description": "VigilanteATI redefines Advanced Threat Intelligence. InfoArmor's VigilanteATI platform and cyber threat services act as an extension of your IT security team.", "support": "xsoar", - "currentVersion": "1.0.13", + "currentVersion": "1.0.14", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Infoblox/Integrations/Infoblox/Infoblox.yml b/Packs/Infoblox/Integrations/Infoblox/Infoblox.yml index e8d36bacc358..65ad45d16503 100644 --- a/Packs/Infoblox/Integrations/Infoblox/Infoblox.yml +++ b/Packs/Infoblox/Integrations/Infoblox/Infoblox.yml @@ -784,7 +784,7 @@ script: - contextPath: Infoblox.NetworkInfo.AdditionalFields description: The additional fields for network. type: Unknown - dockerimage: demisto/python3:3.10.13.88772 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '' subtype: python3 diff --git a/Packs/Infoblox/ReleaseNotes/1_1_3.md b/Packs/Infoblox/ReleaseNotes/1_1_3.md new file mode 100644 index 000000000000..014a5cd7a942 --- /dev/null +++ b/Packs/Infoblox/ReleaseNotes/1_1_3.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Infoblox +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Infoblox/pack_metadata.json b/Packs/Infoblox/pack_metadata.json index 81f12a0f628e..2f8e410e7e94 100644 --- a/Packs/Infoblox/pack_metadata.json +++ b/Packs/Infoblox/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Infoblox NIOS", "description": "Infoblox is a comprehensive solution that consolidates DNS, DHCP, and IP address management into a single platform. It is designed to simplify network management by automating these critical functions and providing a centralized console for managing them.", "support": "xsoar", - "currentVersion": "1.1.2", + "currentVersion": "1.1.3", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/InfobloxBloxOne/Integrations/InfobloxBloxOneThreatDefense/InfobloxBloxOneThreatDefense.yml b/Packs/InfobloxBloxOne/Integrations/InfobloxBloxOneThreatDefense/InfobloxBloxOneThreatDefense.yml index 81a013504efa..36b5381aaf15 100644 --- a/Packs/InfobloxBloxOne/Integrations/InfobloxBloxOneThreatDefense/InfobloxBloxOneThreatDefense.yml +++ b/Packs/InfobloxBloxOne/Integrations/InfobloxBloxOneThreatDefense/InfobloxBloxOneThreatDefense.yml @@ -104,7 +104,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.83255 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.5.0 tests: - No tests (auto formatted) diff --git a/Packs/InfobloxBloxOne/Integrations/InfobloxBloxOneThreatDefenseEventCollector/InfobloxBloxOneThreatDefenseEventCollector.yml b/Packs/InfobloxBloxOne/Integrations/InfobloxBloxOneThreatDefenseEventCollector/InfobloxBloxOneThreatDefenseEventCollector.yml index d8c4306c66e6..6d689d4ad52c 100644 --- a/Packs/InfobloxBloxOne/Integrations/InfobloxBloxOneThreatDefenseEventCollector/InfobloxBloxOneThreatDefenseEventCollector.yml +++ b/Packs/InfobloxBloxOne/Integrations/InfobloxBloxOneThreatDefenseEventCollector/InfobloxBloxOneThreatDefenseEventCollector.yml @@ -69,7 +69,7 @@ script: script: "-" type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.10.0 marketplaces: - marketplacev2 diff --git a/Packs/InfobloxBloxOne/ReleaseNotes/1_1_12.md b/Packs/InfobloxBloxOne/ReleaseNotes/1_1_12.md new file mode 100644 index 000000000000..6f492ef76fbc --- /dev/null +++ b/Packs/InfobloxBloxOne/ReleaseNotes/1_1_12.md @@ -0,0 +1,13 @@ + +#### Integrations + +##### Infoblox BloxOne Threat Defense Event Collector +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### Infoblox BloxOne Threat Defense +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/InfobloxBloxOne/pack_metadata.json b/Packs/InfobloxBloxOne/pack_metadata.json index 2c72a7e675a4..0cb1d06a9a52 100644 --- a/Packs/InfobloxBloxOne/pack_metadata.json +++ b/Packs/InfobloxBloxOne/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Infoblox BloxOne", "description": "Infoblox BloxOne", "support": "xsoar", - "currentVersion": "1.1.11", + "currentVersion": "1.1.12", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/ReleaseNotes/1_3_22.md b/Packs/IntegrationsAndIncidentsHealthCheck/ReleaseNotes/1_3_22.md new file mode 100644 index 000000000000..9a6547f5bf59 --- /dev/null +++ b/Packs/IntegrationsAndIncidentsHealthCheck/ReleaseNotes/1_3_22.md @@ -0,0 +1,113 @@ + +#### Scripts + +##### IncidentsCheck-PlaybooksHealthNames +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncidentsCheck-Widget-CommandsNames +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### GetFailedTasks +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncidentsCheck-Widget-PlaybookNames +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IntegrationsCheck-Widget-IntegrationsErrorsInfo +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### CopyLinkedAnalystNotes +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IntegrationsCheck-Widget-IntegrationsCategory +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncidentsCheck-Widget-CreationDate +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IntegrationsCheck-Widget-NumberChecked +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncidentsCheck-PlaybooksFailingCommands +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncidentsCheck-NumberofIncidentsWithErrors +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### InstancesCheck-NumberofFailedInstances +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### InstancesCheck-NumberofEnabledInstances +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncidentsCheck-Widget-IncidentsErrorsInfo +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IntegrationsCheck-Widget-NumberFailingInstances +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### InstancesCheck-FailedCategories +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncidentsCheck-NumberofIncidentsNoOwner +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncidentsCheck-Widget-UnassignedFailingIncidents +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### RestartFailedTasks +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncidentsCheck-Widget-NumberofErrors +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncidentsCheck-Widget-NumberFailingIncidents +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IncidentsCheck-NumberofTotalEntriesErrors +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/CopyLinkedAnalystNotes/CopyLinkedAnalystNotes.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/CopyLinkedAnalystNotes/CopyLinkedAnalystNotes.yml index 3843b68c589e..3ee6d162c310 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/CopyLinkedAnalystNotes/CopyLinkedAnalystNotes.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/CopyLinkedAnalystNotes/CopyLinkedAnalystNotes.yml @@ -16,7 +16,7 @@ tags: enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No tests (auto formatted) diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/GetFailedTasks/GetFailedTasks.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/GetFailedTasks/GetFailedTasks.yml index aa5224c9e170..1123384e279f 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/GetFailedTasks/GetFailedTasks.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/GetFailedTasks/GetFailedTasks.yml @@ -22,7 +22,7 @@ script: '-' subtype: python3 timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests fromversion: 6.0.0 diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_NumberofIncidentsNoOwner/IncidentsCheck_NumberofIncidentsNoOwner.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_NumberofIncidentsNoOwner/IncidentsCheck_NumberofIncidentsNoOwner.yml index 5d68b3b9de58..c3d544ccff18 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_NumberofIncidentsNoOwner/IncidentsCheck_NumberofIncidentsNoOwner.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_NumberofIncidentsNoOwner/IncidentsCheck_NumberofIncidentsNoOwner.yml @@ -2,7 +2,7 @@ comment: Health Check dynamic section, showing the number of unassigned incident commonfields: id: IncidentsCheck-NumberofIncidentsNoOwner version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentsCheck-NumberofIncidentsNoOwner runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_NumberofIncidentsWithErrors/IncidentsCheck_NumberofIncidentsWithErrors.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_NumberofIncidentsWithErrors/IncidentsCheck_NumberofIncidentsWithErrors.yml index 76bee7a77f35..e415d8dfb348 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_NumberofIncidentsWithErrors/IncidentsCheck_NumberofIncidentsWithErrors.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_NumberofIncidentsWithErrors/IncidentsCheck_NumberofIncidentsWithErrors.yml @@ -2,7 +2,7 @@ comment: Health Check dynamic section, showing the number of failed incidents. commonfields: id: IncidentsCheck-NumberofIncidentsWithErrors version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentsCheck-NumberofIncidentsWithErrors runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_NumberofTotalEntriesErrors/IncidentsCheck_NumberofTotalEntriesErrors.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_NumberofTotalEntriesErrors/IncidentsCheck_NumberofTotalEntriesErrors.yml index 749947515054..3b4529577308 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_NumberofTotalEntriesErrors/IncidentsCheck_NumberofTotalEntriesErrors.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_NumberofTotalEntriesErrors/IncidentsCheck_NumberofTotalEntriesErrors.yml @@ -2,7 +2,7 @@ comment: Health Check dynamic section, showing the total number of errors in fai commonfields: id: IncidentsCheck-NumberofTotalEntriesErrors version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentsCheck-NumberofTotalEntriesErrors runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_PlaybooksFailingCommands/IncidentsCheck_PlaybooksFailingCommands.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_PlaybooksFailingCommands/IncidentsCheck_PlaybooksFailingCommands.yml index 175c0d082b97..5ac404e110ec 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_PlaybooksFailingCommands/IncidentsCheck_PlaybooksFailingCommands.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_PlaybooksFailingCommands/IncidentsCheck_PlaybooksFailingCommands.yml @@ -2,7 +2,7 @@ comment: Health Check dynamic section, showing the top ten commands of the faile commonfields: id: IncidentsCheck-PlaybooksFailingCommands version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentsCheck-PlaybooksFailingCommands runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_PlaybooksHealthNames/IncidentsCheck_PlaybooksHealthNames.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_PlaybooksHealthNames/IncidentsCheck_PlaybooksHealthNames.yml index 3d0a3a3590eb..3dbf502a6d7e 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_PlaybooksHealthNames/IncidentsCheck_PlaybooksHealthNames.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_PlaybooksHealthNames/IncidentsCheck_PlaybooksHealthNames.yml @@ -2,7 +2,7 @@ comment: Health Check dynamic section, showing the top ten playbook names of the commonfields: id: IncidentsCheck-PlaybooksHealthNames version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentsCheck-PlaybooksHealthNames runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_CommandsNames/IncidentsCheck_Widget_CommandsNames.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_CommandsNames/IncidentsCheck_Widget_CommandsNames.yml index a7bc1264958c..b8a32d237be4 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_CommandsNames/IncidentsCheck_Widget_CommandsNames.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_CommandsNames/IncidentsCheck_Widget_CommandsNames.yml @@ -2,7 +2,7 @@ comment: Data output script for populating the dashboard pie graph widget with t commonfields: id: IncidentsCheck-Widget-CommandsNames version: -1 -dockerimage: demisto/python3:3.10.13.87159 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentsCheck-Widget-CommandsNames runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_CreationDate/IncidentsCheck_Widget_CreationDate.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_CreationDate/IncidentsCheck_Widget_CreationDate.yml index 7ceaa5d68a83..89cd70ce4767 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_CreationDate/IncidentsCheck_Widget_CreationDate.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_CreationDate/IncidentsCheck_Widget_CreationDate.yml @@ -2,7 +2,7 @@ comment: Data output script for populating the dashboard line graph widget with commonfields: id: IncidentsCheck-Widget-CreationDate version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentsCheck-Widget-CreationDate runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_IncidentsErrorsInfo/IncidentsCheck_Widget_IncidentsErrorsInfo.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_IncidentsErrorsInfo/IncidentsCheck_Widget_IncidentsErrorsInfo.yml index b07e22fc19dc..f6b9de24aea2 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_IncidentsErrorsInfo/IncidentsCheck_Widget_IncidentsErrorsInfo.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_IncidentsErrorsInfo/IncidentsCheck_Widget_IncidentsErrorsInfo.yml @@ -2,7 +2,7 @@ comment: Data output script for populating the dashboard table graph widget with commonfields: id: IncidentsCheck-Widget-IncidentsErrorsInfo version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentsCheck-Widget-IncidentsErrorsInfo runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_NumberFailingIncidents/IncidentsCheck_Widget_NumberFailingIncidents.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_NumberFailingIncidents/IncidentsCheck_Widget_NumberFailingIncidents.yml index dba552c66122..522bea9a0c07 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_NumberFailingIncidents/IncidentsCheck_Widget_NumberFailingIncidents.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_NumberFailingIncidents/IncidentsCheck_Widget_NumberFailingIncidents.yml @@ -2,7 +2,7 @@ comment: Data output script for populating dashboard number graph widget with th commonfields: id: IncidentsCheck-Widget-NumberFailingIncidents version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentsCheck-Widget-NumberFailingIncidents runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_NumberofErrors/IncidentsCheck_Widget_NumberofErrors.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_NumberofErrors/IncidentsCheck_Widget_NumberofErrors.yml index 9d8e786aebd9..e74b181d5ada 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_NumberofErrors/IncidentsCheck_Widget_NumberofErrors.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_NumberofErrors/IncidentsCheck_Widget_NumberofErrors.yml @@ -2,7 +2,7 @@ comment: Data output script for populating the dashboard number graph widget wit commonfields: id: IncidentsCheck-Widget-NumberofErrors version: -1 -dockerimage: demisto/python3:3.10.13.87159 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentsCheck-Widget-NumberofErrors runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_PlaybookNames/IncidentsCheck_Widget_PlaybookNames.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_PlaybookNames/IncidentsCheck_Widget_PlaybookNames.yml index 0ab72106ab1e..cf9982da8ffb 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_PlaybookNames/IncidentsCheck_Widget_PlaybookNames.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_PlaybookNames/IncidentsCheck_Widget_PlaybookNames.yml @@ -2,7 +2,7 @@ comment: Data output script for populating the dashboard bar graph widget with t commonfields: id: IncidentsCheck-Widget-PlaybookNames version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentsCheck-Widget-PlaybookNames runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_UnassignedFailingIncidents/IncidentsCheck_Widget_UnassignedFailingIncidents.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_UnassignedFailingIncidents/IncidentsCheck_Widget_UnassignedFailingIncidents.yml index 12927d1faab9..10a38496fde6 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_UnassignedFailingIncidents/IncidentsCheck_Widget_UnassignedFailingIncidents.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IncidentsCheck_Widget_UnassignedFailingIncidents/IncidentsCheck_Widget_UnassignedFailingIncidents.yml @@ -2,7 +2,7 @@ comment: Data output script for populating the dashboard number graph widget wit commonfields: id: IncidentsCheck-Widget-UnassignedFailingIncidents version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IncidentsCheck-Widget-UnassignedFailingIncidents runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/InstancesCheck_FailedCategories/InstancesCheck_FailedCategories.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/InstancesCheck_FailedCategories/InstancesCheck_FailedCategories.yml index f3dd2fa65b67..171fce68b2a3 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/InstancesCheck_FailedCategories/InstancesCheck_FailedCategories.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/InstancesCheck_FailedCategories/InstancesCheck_FailedCategories.yml @@ -2,7 +2,7 @@ comment: Health Check dynamic section, showing the top ten categories of the fai commonfields: id: InstancesCheck-FailedCategories version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: InstancesCheck-FailedCategories runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/InstancesCheck_NumberofEnabledInstances/InstancesCheck_NumberofEnabledInstances.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/InstancesCheck_NumberofEnabledInstances/InstancesCheck_NumberofEnabledInstances.yml index 64b604440362..6697fdc833ec 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/InstancesCheck_NumberofEnabledInstances/InstancesCheck_NumberofEnabledInstances.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/InstancesCheck_NumberofEnabledInstances/InstancesCheck_NumberofEnabledInstances.yml @@ -2,7 +2,7 @@ comment: Health Check dynamic section, showing the total number of checked integ commonfields: id: InstancesCheck-NumberofEnabledInstances version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: InstancesCheck-NumberofEnabledInstances runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/InstancesCheck_NumberofFailedInstances/InstancesCheck_NumberofFailedInstances.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/InstancesCheck_NumberofFailedInstances/InstancesCheck_NumberofFailedInstances.yml index 27346d70b55d..53c60c0c8c77 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/InstancesCheck_NumberofFailedInstances/InstancesCheck_NumberofFailedInstances.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/InstancesCheck_NumberofFailedInstances/InstancesCheck_NumberofFailedInstances.yml @@ -2,7 +2,7 @@ comment: Health Check dynamic section, showing the total number of failed integr commonfields: id: InstancesCheck-NumberofFailedInstances version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: InstancesCheck-NumberofFailedInstances runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_IntegrationsCategory/IntegrationsCheck_Widget_IntegrationsCategory.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_IntegrationsCategory/IntegrationsCheck_Widget_IntegrationsCategory.yml index 159f589499e2..dd5a69a09586 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_IntegrationsCategory/IntegrationsCheck_Widget_IntegrationsCategory.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_IntegrationsCategory/IntegrationsCheck_Widget_IntegrationsCategory.yml @@ -2,7 +2,7 @@ comment: Data output script for populating the dashboard pie graph widget with t commonfields: id: IntegrationsCheck-Widget-IntegrationsCategory version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IntegrationsCheck-Widget-IntegrationsCategory runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_IntegrationsErrorsInfo/IntegrationsCheck_Widget_IntegrationsErrorsInfo.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_IntegrationsErrorsInfo/IntegrationsCheck_Widget_IntegrationsErrorsInfo.yml index 24bda2249ba6..be6118c8db01 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_IntegrationsErrorsInfo/IntegrationsCheck_Widget_IntegrationsErrorsInfo.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_IntegrationsErrorsInfo/IntegrationsCheck_Widget_IntegrationsErrorsInfo.yml @@ -2,7 +2,7 @@ comment: Data output script for populating the dashboard table graph widget with commonfields: id: IntegrationsCheck-Widget-IntegrationsErrorsInfo version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IntegrationsCheck-Widget-IntegrationsErrorsInfo runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_NumberChecked/IntegrationsCheck_Widget_NumberChecked.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_NumberChecked/IntegrationsCheck_Widget_NumberChecked.yml index 6cdb2a6a8fe2..38dfa0169ed7 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_NumberChecked/IntegrationsCheck_Widget_NumberChecked.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_NumberChecked/IntegrationsCheck_Widget_NumberChecked.yml @@ -2,7 +2,7 @@ comment: Data output script for populating the dashboard number graph widget wit commonfields: id: IntegrationsCheck-Widget-NumberChecked version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IntegrationsCheck-Widget-NumberChecked runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_NumberFailingInstances/IntegrationsCheck_Widget_NumberFailingInstances.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_NumberFailingInstances/IntegrationsCheck_Widget_NumberFailingInstances.yml index 52b58cede113..18be12deea74 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_NumberFailingInstances/IntegrationsCheck_Widget_NumberFailingInstances.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/IntegrationsCheck_Widget_NumberFailingInstances/IntegrationsCheck_Widget_NumberFailingInstances.yml @@ -2,7 +2,7 @@ comment: Data output script for populating the dashboard number graph widget wit commonfields: id: IntegrationsCheck-Widget-NumberFailingInstances version: -1 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: IntegrationsCheck-Widget-NumberFailingInstances runas: DBotWeakRole diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/RestartFailedTasks/RestartFailedTasks.yml b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/RestartFailedTasks/RestartFailedTasks.yml index b649078fd250..c00f4e0631e2 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/RestartFailedTasks/RestartFailedTasks.yml +++ b/Packs/IntegrationsAndIncidentsHealthCheck/Scripts/RestartFailedTasks/RestartFailedTasks.yml @@ -37,7 +37,7 @@ script: '-' subtype: python3 timeout: 1.2µs type: python -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) dependson: diff --git a/Packs/IntegrationsAndIncidentsHealthCheck/pack_metadata.json b/Packs/IntegrationsAndIncidentsHealthCheck/pack_metadata.json index 35d52d063fce..bfcc44caf507 100644 --- a/Packs/IntegrationsAndIncidentsHealthCheck/pack_metadata.json +++ b/Packs/IntegrationsAndIncidentsHealthCheck/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Integrations & Incidents Health Check", "description": "Do you know which of your integrations or open incidents failed? With this content, you can view your failed integrations and open incidents", "support": "xsoar", - "currentVersion": "1.3.21", + "currentVersion": "1.3.22", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Ipstack/Integrations/Ipstack/Ipstack.yml b/Packs/Ipstack/Integrations/Ipstack/Ipstack.yml index 9782cc6f497c..d1b22e055081 100644 --- a/Packs/Ipstack/Integrations/Ipstack/Ipstack.yml +++ b/Packs/Ipstack/Integrations/Ipstack/Ipstack.yml @@ -90,7 +90,7 @@ script: type: String description: Queries an IP address in ipstack. runonce: false - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 tests: - Ipstack_Test fromversion: 5.0.0 diff --git a/Packs/Ipstack/ReleaseNotes/1_0_16.md b/Packs/Ipstack/ReleaseNotes/1_0_16.md new file mode 100644 index 000000000000..6ae72137ef38 --- /dev/null +++ b/Packs/Ipstack/ReleaseNotes/1_0_16.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### ipstack +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Ipstack/pack_metadata.json b/Packs/Ipstack/pack_metadata.json index e2ed8d7b5eb2..7cec81feace9 100644 --- a/Packs/Ipstack/pack_metadata.json +++ b/Packs/Ipstack/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Ipstack", "description": "One of the leading IP to geolocation APIs and global IP database services.", "support": "xsoar", - "currentVersion": "1.0.15", + "currentVersion": "1.0.16", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/IronPort/Integrations/CiscoEmailSecurityApplianceIronPortV2/CiscoEmailSecurityApplianceIronPortV2.yml b/Packs/IronPort/Integrations/CiscoEmailSecurityApplianceIronPortV2/CiscoEmailSecurityApplianceIronPortV2.yml index 73efab5f20e2..4bdb1dce6443 100644 --- a/Packs/IronPort/Integrations/CiscoEmailSecurityApplianceIronPortV2/CiscoEmailSecurityApplianceIronPortV2.yml +++ b/Packs/IronPort/Integrations/CiscoEmailSecurityApplianceIronPortV2/CiscoEmailSecurityApplianceIronPortV2.yml @@ -101,7 +101,7 @@ script: script: "" type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true commands: - name: cisco-esa-spam-quarantine-message-search diff --git a/Packs/IronPort/ReleaseNotes/2_0_25.md b/Packs/IronPort/ReleaseNotes/2_0_25.md new file mode 100644 index 000000000000..c4ad0acf1eb3 --- /dev/null +++ b/Packs/IronPort/ReleaseNotes/2_0_25.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Cisco ESA +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/IronPort/pack_metadata.json b/Packs/IronPort/pack_metadata.json index 73d570e07f2a..5fbff73cdcbf 100644 --- a/Packs/IronPort/pack_metadata.json +++ b/Packs/IronPort/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cisco Email Security Appliance (IronPort)", "description": "Cisco Email Security protects against ransomware, business email compromise, spoofing, and phishing", "support": "xsoar", - "currentVersion": "2.0.24", + "currentVersion": "2.0.25", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/IronscalesEventCollector/Integrations/IronscalesEventCollector/IronscalesEventCollector.yml b/Packs/IronscalesEventCollector/Integrations/IronscalesEventCollector/IronscalesEventCollector.yml index 16eb911da12b..08fed39d176b 100644 --- a/Packs/IronscalesEventCollector/Integrations/IronscalesEventCollector/IronscalesEventCollector.yml +++ b/Packs/IronscalesEventCollector/Integrations/IronscalesEventCollector/IronscalesEventCollector.yml @@ -74,7 +74,7 @@ script: required: true description: Gets events from Ironscales. name: ironscales-get-events - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 isfetchevents: true script: '' subtype: python3 diff --git a/Packs/IronscalesEventCollector/ReleaseNotes/1_0_10.md b/Packs/IronscalesEventCollector/ReleaseNotes/1_0_10.md new file mode 100644 index 000000000000..5667cc090a4e --- /dev/null +++ b/Packs/IronscalesEventCollector/ReleaseNotes/1_0_10.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Ironscales Event Collector +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/IronscalesEventCollector/pack_metadata.json b/Packs/IronscalesEventCollector/pack_metadata.json index 5f0551cfc2fe..fb3e105297fb 100644 --- a/Packs/IronscalesEventCollector/pack_metadata.json +++ b/Packs/IronscalesEventCollector/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Ironscales Event Collector", "description": "IRONSCALES is a self-learning email security platform, automatically responding to malicious emails.", "support": "xsoar", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/IvantiHeat/Integrations/IvantiHeat/IvantiHeat.yml b/Packs/IvantiHeat/Integrations/IvantiHeat/IvantiHeat.yml index f6bc9949764f..b0cb0d67bde8 100644 --- a/Packs/IvantiHeat/Integrations/IvantiHeat/IvantiHeat.yml +++ b/Packs/IvantiHeat/Integrations/IvantiHeat/IvantiHeat.yml @@ -280,7 +280,7 @@ script: - contextPath: IvantiHeat.incidents.Email description: Incident owner email address. type: String - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/IvantiHeat/ReleaseNotes/1_0_11.md b/Packs/IvantiHeat/ReleaseNotes/1_0_11.md new file mode 100644 index 000000000000..e683642c9d6e --- /dev/null +++ b/Packs/IvantiHeat/ReleaseNotes/1_0_11.md @@ -0,0 +1,26 @@ + +#### Integrations + +##### Ivanti Heat +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + + +#### Scripts + +##### IvantiHeatCreateIncidentExample +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IvantiHeatCreateProblemExample +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### IvantiHeatCloseIncidentExample +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/IvantiHeat/Scripts/IvantiHeatCloseIncidentExample/IvantiHeatCloseIncidentExample.yml b/Packs/IvantiHeat/Scripts/IvantiHeatCloseIncidentExample/IvantiHeatCloseIncidentExample.yml index e1fa28fa9ff8..3c86623b534b 100644 --- a/Packs/IvantiHeat/Scripts/IvantiHeatCloseIncidentExample/IvantiHeatCloseIncidentExample.yml +++ b/Packs/IvantiHeat/Scripts/IvantiHeatCloseIncidentExample/IvantiHeatCloseIncidentExample.yml @@ -13,7 +13,7 @@ args: description: Incident object ID. scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/IvantiHeat/Scripts/IvantiHeatCreateIncidentExample/IvantiHeatCreateIncidentExample.yml b/Packs/IvantiHeat/Scripts/IvantiHeatCreateIncidentExample/IvantiHeatCreateIncidentExample.yml index 7b0295092725..6288d85b2111 100644 --- a/Packs/IvantiHeat/Scripts/IvantiHeatCreateIncidentExample/IvantiHeatCreateIncidentExample.yml +++ b/Packs/IvantiHeat/Scripts/IvantiHeatCreateIncidentExample/IvantiHeatCreateIncidentExample.yml @@ -31,7 +31,7 @@ args: description: Incident customer. scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/IvantiHeat/Scripts/IvantiHeatCreateProblemExample/IvantiHeatCreateProblemExample.yml b/Packs/IvantiHeat/Scripts/IvantiHeatCreateProblemExample/IvantiHeatCreateProblemExample.yml index 4dcebe199ebc..b2ea628ce994 100644 --- a/Packs/IvantiHeat/Scripts/IvantiHeatCreateProblemExample/IvantiHeatCreateProblemExample.yml +++ b/Packs/IvantiHeat/Scripts/IvantiHeatCreateProblemExample/IvantiHeatCreateProblemExample.yml @@ -28,7 +28,7 @@ args: description: Problem description. scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/IvantiHeat/pack_metadata.json b/Packs/IvantiHeat/pack_metadata.json index 7d3b01b26a93..bf7d3527db51 100644 --- a/Packs/IvantiHeat/pack_metadata.json +++ b/Packs/IvantiHeat/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Ivanti Heat", "description": "Use Ivanti Heat integration to manage issues and create Demisto incidents from ivanti.", "support": "xsoar", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/JsonWhoIs/Integrations/JsonWhoIs/JsonWhoIs.yml b/Packs/JsonWhoIs/Integrations/JsonWhoIs/JsonWhoIs.yml index 8bb030d41c9c..ae87115317eb 100644 --- a/Packs/JsonWhoIs/Integrations/JsonWhoIs/JsonWhoIs.yml +++ b/Packs/JsonWhoIs/Integrations/JsonWhoIs/JsonWhoIs.yml @@ -89,7 +89,7 @@ script: - contextPath: Domain.WHOIS.Admin.Phone description: Admin phone number. type: String - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' type: python diff --git a/Packs/JsonWhoIs/ReleaseNotes/1_0_23.md b/Packs/JsonWhoIs/ReleaseNotes/1_0_23.md new file mode 100644 index 000000000000..1fcfc43dbff8 --- /dev/null +++ b/Packs/JsonWhoIs/ReleaseNotes/1_0_23.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### JsonWhoIs +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/JsonWhoIs/pack_metadata.json b/Packs/JsonWhoIs/pack_metadata.json index fbb395d6194b..0d46c6af660a 100644 --- a/Packs/JsonWhoIs/pack_metadata.json +++ b/Packs/JsonWhoIs/pack_metadata.json @@ -2,7 +2,7 @@ "name": "JsonWhoIs", "description": "Provides data enrichment for domains and IP addresses.", "support": "xsoar", - "currentVersion": "1.0.22", + "currentVersion": "1.0.23", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Kafka/Integrations/KafkaV3/KafkaV3.py b/Packs/Kafka/Integrations/KafkaV3/KafkaV3.py index ed9f1852b565..a3292667c523 100644 --- a/Packs/Kafka/Integrations/KafkaV3/KafkaV3.py +++ b/Packs/Kafka/Integrations/KafkaV3/KafkaV3.py @@ -37,7 +37,8 @@ class KafkaCommunicator: SESSION_TIMEOUT: int = 10000 REQUESTS_TIMEOUT: float = 10.0 - POLL_TIMEOUT: float = 10.0 # Increased from 1.0 to prevent frequent 'No results' responses in the splunk-consume-msg command, + POLL_TIMEOUT: float = 1.0 + POLL_TIMEOUT_STOP_UPON_TIMEOUT = 10.0 # which caused test playbook failures in builds. MAX_POLLS_FOR_LOG: int = 100 @@ -278,7 +279,7 @@ def produce(self, topic: str, value: str, partition: Optional[int]) -> None: on_delivery=self.delivery_report) kafka_producer.flush() - def consume(self, topic: str, partition: int = -1, offset: str = '0') -> Message: + def consume(self, poll_timeout: float, topic: str, partition: int = -1, offset: str = '0') -> Message: """Consume a message from kafka Args: @@ -290,8 +291,8 @@ def consume(self, topic: str, partition: int = -1, offset: str = '0') -> Message """ kafka_consumer = self.get_kafka_consumer() kafka_consumer.assign(self.get_topic_partitions(topic, partition, offset, True)) - polled_msg = kafka_consumer.poll(self.POLL_TIMEOUT) - demisto.debug(f"polled {polled_msg}") + polled_msg = kafka_consumer.poll(poll_timeout) + demisto.debug(f"polled {polled_msg} with {poll_timeout=}") kafka_consumer.close() return polled_msg @@ -605,7 +606,8 @@ def consume_message(kafka: KafkaCommunicator, demisto_args: dict) -> CommandResu partition = int(demisto_args.get('partition', -1)) offset = demisto_args.get('offset', '0') - message = kafka.consume(topic=topic, partition=partition, offset=offset) + message = kafka.consume(float(demisto_args.get('poll_timeout') or kafka.POLL_TIMEOUT), + topic=topic, partition=partition, offset=offset) if not message: return 'No message was consumed.' else: @@ -787,7 +789,8 @@ def fetch_incidents(kafka: KafkaCommunicator, demisto_params: dict) -> None: max_messages = int(handle_empty(demisto_params.get('max_fetch', 50), 50)) last_fetched_offsets = demisto.getLastRun().get('last_fetched_offsets', {}) last_topic = demisto.getLastRun().get('last_topic', '') - + stop_consuming_upon_timeout = argToBoolean(demisto_params.get('stop_consuming_upon_timeout', False)) + poll_timeout = kafka.POLL_TIMEOUT_STOP_UPON_TIMEOUT if stop_consuming_upon_timeout else kafka.POLL_TIMEOUT demisto.debug(f"Starting fetch incidents with:\n last_topic: {last_topic}, " f"last_fetched_offsets: {last_fetched_offsets}, " f"topic: {topic}, partitions: {partitions}, offset: {offset}, " @@ -826,13 +829,21 @@ def fetch_incidents(kafka: KafkaCommunicator, demisto_params: dict) -> None: kafka_consumer.assign(topic_partitions) demisto.debug("Beginning to poll messages from kafka") - + num_polled_msg = 0 for _ in range(max_messages): - polled_msg = kafka_consumer.poll(kafka.POLL_TIMEOUT) + # Initial message consumption may take up to + # `session.timeout.ms` for the consumer group to + # rebalance and start consuming + polled_msg = kafka_consumer.poll(poll_timeout) if polled_msg: - demisto.debug("Received a message from Kafka.") + num_polled_msg += 1 + demisto.debug(f"Received a message {num_polled_msg}# from Kafka.") incidents.append(create_incident(message=polled_msg, topic=topic)) last_fetched_offsets[f'{polled_msg.partition()}'] = polled_msg.offset() + elif stop_consuming_upon_timeout and (not polled_msg): + demisto.debug(f"Didn't get a message after {poll_timeout} seconds" + f", stop_consuming_upon_timeout is true, break the loop. {num_polled_msg=}") + break finally: if kafka_consumer: diff --git a/Packs/Kafka/Integrations/KafkaV3/KafkaV3.yml b/Packs/Kafka/Integrations/KafkaV3/KafkaV3.yml index befa417536f6..86340b75ac05 100644 --- a/Packs/Kafka/Integrations/KafkaV3/KafkaV3.yml +++ b/Packs/Kafka/Integrations/KafkaV3/KafkaV3.yml @@ -63,6 +63,12 @@ configuration: name: max_fetch type: 0 required: false +- display: Stop consuming upon timeout + additionalinfo: When fetching a significant number of messages (100+), it's advisable to halt message consumption upon timeout. This ensures that the fetch terminates if no messages are received after a specified duration, instead of requesting messages until reaching the maximum number of messages to fetch. + name: stop_consuming_upon_timeout + type: 8 + advanced: true + required: false - display: Fetch incidents name: isFetch type: 8 @@ -126,6 +132,9 @@ script: name: offset - description: Partition (number). name: partition + - description: Poll timeout to consume a message. + name: poll_timeout + defaultValue: 1.0 description: Consumes a single Kafka message. name: kafka-consume-msg outputs: diff --git a/Packs/Kafka/Integrations/KafkaV3/KafkaV3_test.py b/Packs/Kafka/Integrations/KafkaV3/KafkaV3_test.py index 69bd375feabf..6b9a963869cb 100644 --- a/Packs/Kafka/Integrations/KafkaV3/KafkaV3_test.py +++ b/Packs/Kafka/Integrations/KafkaV3/KafkaV3_test.py @@ -1,4 +1,3 @@ - from CommonServerPython import DemistoException, demisto from KafkaV3 import KafkaCommunicator, command_test_module, KConsumer, KProducer, print_topics, fetch_partitions, \ @@ -59,7 +58,7 @@ def create_cluster_metadata(topic_partitions): """ cluster_metadata = ClusterMetadata() topics_dict = {} - for topic in topic_partitions.keys(): + for topic in topic_partitions: topic_metadata = TopicMetadata() partitions = topic_partitions[topic] partitions_dict = {} @@ -198,7 +197,7 @@ def test_print_topics_without_offsets(mocker, demisto_args, cluster_tree): result = print_topics(KAFKA, demisto_args) assert type(result) is CommandResults # for Pylance assert type(result.outputs) is list # for Pylance - for topic in cluster_tree.keys(): + for topic in cluster_tree: topic_partitions = [{'ID': partition} for partition in cluster_tree[topic]] assert {'Name': topic, 'Partitions': topic_partitions} in result.outputs @@ -282,7 +281,7 @@ def test_fetch_partitions_no_topics(mocker, demisto_args): assert f'Topic {demisto_args["topic"]} was not found in Kafka' in str(exception_info.value) -class MessageMock(object): +class MessageMock: """Mocked message class for easier mocking""" message = None offset_value = None @@ -770,6 +769,113 @@ def test_fetch_incidents(mocker, demisto_params, last_run, cluster_tree, topic_p set_last_run_mock.assert_called_once_with(next_run) +@pytest.mark.parametrize( + "demisto_params, last_run, cluster_tree, topic_partitions, incidents, next_run, polled_msgs, offsets", + [ + pytest.param( + { + "topic": "some-topic", + "partition": "", + "first_fetch": "0", + "max_fetch": "2", + "stop_consuming_upon_timeout": True, + }, + {}, + {"some-topic": [0]}, + [TopicPartition(topic="some-topic", partition=0, offset=1)], + [ + { + "name": "Kafka some-topic partition:0 offset:1", + "details": "polled_msg", + "rawJSON": '{"Topic": "some-topic", "Partition": 0, "Offset": 1, ' + '"Message": "polled_msg"}', + } + ], + {"last_fetched_offsets": {"0": 1}, "last_topic": "some-topic"}, + [ + MessageMock( + message="polled_msg", + partition=0, + offset=1, + timestamp=(TIMESTAMP_NOT_AVAILABLE, 0), + ), + None, + ], + [(0, 2), (0, 2), (0, 2)], + id="first run, offset is 0," "stop_consuming_upon_timeout is true", + ) + ], +) +def test_fetch_incidents_stop_consuming_upon_timeout_is_true( + mocker, + demisto_params, + last_run, + cluster_tree, + topic_partitions, + incidents, + next_run, + polled_msgs, + offsets, +): + """ + Given: + - initialized KafkaCommunicator + - demisto_params + - last_run dict + - available cluster tree + - stop_consuming_upon_timeout + When: + - fetching incidents + Then: + - Assert the relevant topicPartitions are assigned to the consumer + - Assert the polled messages are the right amount + - Assert the created incidents are as expected + - Assert setting the last run + - Assert break method was called + - Assert poll method was called with timeout 10.0 + """ + mocker.patch.object(KConsumer, "__init__", return_value=None) + cluster_metadata = create_cluster_metadata(cluster_tree) + mocker.patch.object(KConsumer, "list_topics", return_value=cluster_metadata) + mocker.patch.object(demisto, "getLastRun", return_value=last_run) + assign_mock = mocker.patch.object(KConsumer, "assign") + poll_mock = mocker.patch.object(KConsumer, "poll", side_effect=polled_msgs) + mocker.patch.object(KConsumer, "get_watermark_offsets", side_effect=offsets) + close_mock = mocker.patch.object(KConsumer, "close") + set_last_run_mock = mocker.patch.object(demisto, "setLastRun") + incidents_mock = mocker.patch.object(demisto, "incidents") + debug = mocker.patch.object(demisto, "debug") + + fetch_incidents(KAFKA, demisto_params) + + assign_mock.assert_called_once_with(topic_partitions) + called_topic_partitions = assign_mock.call_args.args[0] + for partition_num in range(len(topic_partitions)): + assert ( + called_topic_partitions[partition_num].topic + == topic_partitions[partition_num].topic + ) + assert ( + called_topic_partitions[partition_num].partition + == topic_partitions[partition_num].partition + ) + assert ( + called_topic_partitions[partition_num].offset + == topic_partitions[partition_num].offset + ) + + assert len(polled_msgs) == poll_mock.call_count + debug.assert_called_with(f"Fetching finished, setting last run to {next_run}") + assert ( + debug.call_args_list[-2][0][0] + == "Didn't get a message after 10.0 seconds, stop_consuming_upon_timeout is true, break the loop. num_polled_msg=1" + ) + poll_mock.assert_any_call(10.0) + close_mock.assert_called_once() + incidents_mock.assert_called_once_with(incidents) + set_last_run_mock.assert_called_once_with(next_run) + + @pytest.mark.parametrize('demisto_params, last_run, cluster_tree', [ pytest.param( {'topic': 'some-topic', diff --git a/Packs/Kafka/Integrations/KafkaV3/README.md b/Packs/Kafka/Integrations/KafkaV3/README.md index 2a43a565120e..4717823f5366 100644 --- a/Packs/Kafka/Integrations/KafkaV3/README.md +++ b/Packs/Kafka/Integrations/KafkaV3/README.md @@ -27,7 +27,8 @@ This integration is fully compatible with the Kafka v2 integration. | Topic to fetch incidents from (Required for fetch incidents) | | False | | CSV list of partitions to fetch messages from | | False | | Offset to fetch messages from (exclusive) | The initial offset to start fetching from, not including the value set \(e.g., if 3 is set, the first event that will be fetched will be with offset 4\). If you want to start from the earliest or latest, type in 'earliest' or 'latest' accordingly. | False | - | Max number of messages to fetch | | False | + | Maximum number of messages to fetch | | False | + | Stop consuming upon timeout | When fetching a significant number of messages (100+), it's advisable to halt message consumption upon timeout. This ensures that the fetch terminates if no messages are received after a specified duration, instead of requesting messages until reaching the maximum number of messages to fetch. | False | | Consumer Only | | False | | Fetch incidents | | False | | Incident type | | False | @@ -144,6 +145,7 @@ Consumes a single Kafka message. | topic | A topic to get messages from. | Required | | offset | Message offset to filter by. Acceptable values are 'Earliest', 'Latest', or any other offest number. Default is Earliest. | Optional | | partition | Partition (number). | Optional | +| poll_timeout | Poll timeout to consume the message. | Optional | #### Context Output diff --git a/Packs/Kafka/ReleaseNotes/2_0_24.md b/Packs/Kafka/ReleaseNotes/2_0_24.md new file mode 100644 index 000000000000..f35cd5fa49b1 --- /dev/null +++ b/Packs/Kafka/ReleaseNotes/2_0_24.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Kafka v3 + +- Fixed an issue where the ***fetch-incidents*** command failed due to docker timeout. +- Added support for the *Stop consuming upon timeout* advanced integration parameter. +- Added support for the *poll_timeout* argument in the ***kafka-consume-msg*** command. diff --git a/Packs/Kafka/TestPlaybooks/playbook-KafkaV3_Test.yml b/Packs/Kafka/TestPlaybooks/playbook-KafkaV3_Test.yml index 282d7eb42e64..18cfb4d2ca4b 100644 --- a/Packs/Kafka/TestPlaybooks/playbook-KafkaV3_Test.yml +++ b/Packs/Kafka/TestPlaybooks/playbook-KafkaV3_Test.yml @@ -207,6 +207,8 @@ tasks: simple: "0" topic: simple: testsa17 + poll_timeout: + simple: "10.0" separatecontext: false view: |- { diff --git a/Packs/Kafka/pack_metadata.json b/Packs/Kafka/pack_metadata.json index 283f9134e366..9c4544552f0b 100644 --- a/Packs/Kafka/pack_metadata.json +++ b/Packs/Kafka/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Kafka", "description": "Kafka is an open source distributed streaming platform.", "support": "xsoar", - "currentVersion": "2.0.23", + "currentVersion": "2.0.24", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/KasperskySecurityCenter/Integrations/KasperskySecurityCenter/KasperskySecurityCenter.yml b/Packs/KasperskySecurityCenter/Integrations/KasperskySecurityCenter/KasperskySecurityCenter.yml index b04f7a1a67ba..85c833ad1202 100644 --- a/Packs/KasperskySecurityCenter/Integrations/KasperskySecurityCenter/KasperskySecurityCenter.yml +++ b/Packs/KasperskySecurityCenter/Integrations/KasperskySecurityCenter/KasperskySecurityCenter.yml @@ -361,7 +361,7 @@ script: - contextPath: KasperskySecurityCenter.Policy.KLPOL_ID description: Policy ID. type: Number - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/KasperskySecurityCenter/ReleaseNotes/1_0_10.md b/Packs/KasperskySecurityCenter/ReleaseNotes/1_0_10.md new file mode 100644 index 000000000000..2419b9141b93 --- /dev/null +++ b/Packs/KasperskySecurityCenter/ReleaseNotes/1_0_10.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Kaspersky Security Center (Beta) +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/KasperskySecurityCenter/pack_metadata.json b/Packs/KasperskySecurityCenter/pack_metadata.json index 8b0faab06662..0705ef591f6e 100644 --- a/Packs/KasperskySecurityCenter/pack_metadata.json +++ b/Packs/KasperskySecurityCenter/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Kaspersky Security Center", "description": "Manage endpoints and groups through the Kaspersky Security Center.", "support": "xsoar", - "currentVersion": "1.0.9", + "currentVersion": "1.0.10", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Kenna/Integrations/KennaV2/KennaV2.yml b/Packs/Kenna/Integrations/KennaV2/KennaV2.yml index ac52a9eeaca5..45f445a38010 100644 --- a/Packs/Kenna/Integrations/KennaV2/KennaV2.yml +++ b/Packs/Kenna/Integrations/KennaV2/KennaV2.yml @@ -486,7 +486,7 @@ script: description: Operating system of current asset. type: String description: Search assets by external ID. - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Kenna/ReleaseNotes/1_1_22.md b/Packs/Kenna/ReleaseNotes/1_1_22.md new file mode 100644 index 000000000000..6e7741c577a5 --- /dev/null +++ b/Packs/Kenna/ReleaseNotes/1_1_22.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Kenna v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Kenna/pack_metadata.json b/Packs/Kenna/pack_metadata.json index 99877c4d556e..55e1e2efc755 100644 --- a/Packs/Kenna/pack_metadata.json +++ b/Packs/Kenna/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Kenna", "description": "Use the Kenna v2 integration to search and update vulnerabilities, schedule a run connector, and manage tags and attributes.", "support": "xsoar", - "currentVersion": "1.1.21", + "currentVersion": "1.1.22", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Lastline/Integrations/Lastline_v2/Lastline_v2.yml b/Packs/Lastline/Integrations/Lastline_v2/Lastline_v2.yml index 936e91eb0baa..acd4e57abd2b 100644 --- a/Packs/Lastline/Integrations/Lastline_v2/Lastline_v2.yml +++ b/Packs/Lastline/Integrations/Lastline_v2/Lastline_v2.yml @@ -565,7 +565,7 @@ script: - contextPath: Lastline.Submission.Process.process_id description: The process ID. type: string - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' type: python diff --git a/Packs/Lastline/ReleaseNotes/1_0_20.md b/Packs/Lastline/ReleaseNotes/1_0_20.md new file mode 100644 index 000000000000..c095b62a0555 --- /dev/null +++ b/Packs/Lastline/ReleaseNotes/1_0_20.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Lastline v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Lastline/pack_metadata.json b/Packs/Lastline/pack_metadata.json index a242b198ee1e..81036870ca7e 100644 --- a/Packs/Lastline/pack_metadata.json +++ b/Packs/Lastline/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Lastline", "description": "Use the Lastline v2 integration to provide threat analysts and incident response teams with the advanced malware isolation and inspection environment needed to safely execute advanced malware samples, and understand their behavior.", "support": "xsoar", - "currentVersion": "1.0.19", + "currentVersion": "1.0.20", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/LogRhythmRest/Integrations/LogRhythmRest/LogRhythmRest.yml b/Packs/LogRhythmRest/Integrations/LogRhythmRest/LogRhythmRest.yml index 73b07189378c..aabdc8810c51 100644 --- a/Packs/LogRhythmRest/Integrations/LogRhythmRest/LogRhythmRest.yml +++ b/Packs/LogRhythmRest/Integrations/LogRhythmRest/LogRhythmRest.yml @@ -1880,7 +1880,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 tests: - LogRhythm REST test fromversion: 5.0.0 diff --git a/Packs/LogRhythmRest/Integrations/LogRhythmRestV2/LogRhythmRestV2.yml b/Packs/LogRhythmRest/Integrations/LogRhythmRestV2/LogRhythmRestV2.yml index 9a8f4121c0d1..020397f5a74a 100644 --- a/Packs/LogRhythmRest/Integrations/LogRhythmRestV2/LogRhythmRestV2.yml +++ b/Packs/LogRhythmRest/Integrations/LogRhythmRestV2/LogRhythmRestV2.yml @@ -114,7 +114,7 @@ script: script: '' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true commands: - name: lr-alarms-list diff --git a/Packs/LogRhythmRest/ReleaseNotes/2_0_23.md b/Packs/LogRhythmRest/ReleaseNotes/2_0_23.md new file mode 100644 index 000000000000..bed330901eea --- /dev/null +++ b/Packs/LogRhythmRest/ReleaseNotes/2_0_23.md @@ -0,0 +1,13 @@ + +#### Integrations + +##### LogRhythmRest +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### LogRhythmRest v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/LogRhythmRest/pack_metadata.json b/Packs/LogRhythmRest/pack_metadata.json index 268982492041..c15131de1ba2 100644 --- a/Packs/LogRhythmRest/pack_metadata.json +++ b/Packs/LogRhythmRest/pack_metadata.json @@ -2,7 +2,7 @@ "name": "LogRhythm", "description": "LogRhythm security intelligence.", "support": "xsoar", - "currentVersion": "2.0.22", + "currentVersion": "2.0.23", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Lokpath_Keylight/ReleaseNotes/1_1_26.md b/Packs/Lokpath_Keylight/ReleaseNotes/1_1_26.md new file mode 100644 index 000000000000..8f59b59d83e3 --- /dev/null +++ b/Packs/Lokpath_Keylight/ReleaseNotes/1_1_26.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### KeylightCreateIssue +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Lokpath_Keylight/Scripts/KeylightCreateIssue/KeylightCreateIssue.yml b/Packs/Lokpath_Keylight/Scripts/KeylightCreateIssue/KeylightCreateIssue.yml index c1206f1159cd..5b9c0aa1fa19 100644 --- a/Packs/Lokpath_Keylight/Scripts/KeylightCreateIssue/KeylightCreateIssue.yml +++ b/Packs/Lokpath_Keylight/Scripts/KeylightCreateIssue/KeylightCreateIssue.yml @@ -24,6 +24,6 @@ dependson: must: - Lockpath KeyLight v2|||kl-get-records - Lockpath KeyLight v2|||kl-get-component -dockerimage: demisto/python3:3.10.13.84405 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 diff --git a/Packs/Lokpath_Keylight/pack_metadata.json b/Packs/Lokpath_Keylight/pack_metadata.json index 11b97ddb9d39..1b37d545e391 100644 --- a/Packs/Lokpath_Keylight/pack_metadata.json +++ b/Packs/Lokpath_Keylight/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Lockpath Keylight", "description": "Use the LockPath KeyLight integration to manage GRC tickets in the Keylight platform.", "support": "xsoar", - "currentVersion": "1.1.25", + "currentVersion": "1.1.26", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Looker/Integrations/Looker/Looker.yml b/Packs/Looker/Integrations/Looker/Looker.yml index 3ae96e20a6af..ba52d6b7f491 100644 --- a/Packs/Looker/Integrations/Looker/Looker.yml +++ b/Packs/Looker/Integrations/Looker/Looker.yml @@ -176,7 +176,7 @@ script: - contextPath: Looker.Look.LastUpdated description: The time that the look was last updated. type: Date - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' type: python diff --git a/Packs/Looker/ReleaseNotes/1_0_8.md b/Packs/Looker/ReleaseNotes/1_0_8.md new file mode 100644 index 000000000000..71013778e820 --- /dev/null +++ b/Packs/Looker/ReleaseNotes/1_0_8.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Looker +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Looker/pack_metadata.json b/Packs/Looker/pack_metadata.json index 50f97333b05b..9ddb5747ac38 100644 --- a/Packs/Looker/pack_metadata.json +++ b/Packs/Looker/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Looker", "description": "Use the Looker integration to query an explore, save queries as looks, run looks, and fetch look results as incidents.", "support": "xsoar", - "currentVersion": "1.0.7", + "currentVersion": "1.0.8", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MISP/Integrations/MISPV3/MISPV3.py b/Packs/MISP/Integrations/MISPV3/MISPV3.py index c472162228c6..873511e2f4d1 100644 --- a/Packs/MISP/Integrations/MISPV3/MISPV3.py +++ b/Packs/MISP/Integrations/MISPV3/MISPV3.py @@ -21,6 +21,7 @@ def __init__(self, data): temp_file.write(data) def __del__(self): + import os os.remove(self.path) diff --git a/Packs/MISP/Integrations/MISPV3/MISPV3.yml b/Packs/MISP/Integrations/MISPV3/MISPV3.yml index c62de5d6cc90..6f9b0c87b4b3 100644 --- a/Packs/MISP/Integrations/MISPV3/MISPV3.yml +++ b/Packs/MISP/Integrations/MISPV3/MISPV3.yml @@ -2717,7 +2717,7 @@ script: - contextPath: MISP.Role.role_name description: MISP role name. type: string - dockerimage: demisto/pymisp2:2.4.198.112027 + dockerimage: demisto/pymisp2:2.5.2.117270 runonce: false script: '' subtype: python3 diff --git a/Packs/MISP/ReleaseNotes/2_1_48.md b/Packs/MISP/ReleaseNotes/2_1_48.md new file mode 100644 index 000000000000..1a3b7cca03d7 --- /dev/null +++ b/Packs/MISP/ReleaseNotes/2_1_48.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### MISP v3 + +- Fixed an issue with temporary file cleanup when using certificates. +- Updated the Docker image to: *demisto/pymisp2:2.5.2.117270*. diff --git a/Packs/MISP/pack_metadata.json b/Packs/MISP/pack_metadata.json index deedb1bea98b..45ec4cb43382 100644 --- a/Packs/MISP/pack_metadata.json +++ b/Packs/MISP/pack_metadata.json @@ -2,7 +2,7 @@ "name": "MISP", "description": "Malware information and threat sharing platform.", "support": "xsoar", - "currentVersion": "2.1.47", + "currentVersion": "2.1.48", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MITRECoA/ReleaseNotes/1_0_7.md b/Packs/MITRECoA/ReleaseNotes/1_0_7.md new file mode 100644 index 000000000000..2e831003f41d --- /dev/null +++ b/Packs/MITRECoA/ReleaseNotes/1_0_7.md @@ -0,0 +1,13 @@ + +#### Scripts + +##### EntryWidgetCoAHandled +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### EntryWidgetCoATechniquesList +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/MITRECoA/Scripts/EntryWidgetCoAHandled/EntryWidgetCoAHandled.yml b/Packs/MITRECoA/Scripts/EntryWidgetCoAHandled/EntryWidgetCoAHandled.yml index b181ac5cf409..ece259f4be7d 100644 --- a/Packs/MITRECoA/Scripts/EntryWidgetCoAHandled/EntryWidgetCoAHandled.yml +++ b/Packs/MITRECoA/Scripts/EntryWidgetCoAHandled/EntryWidgetCoAHandled.yml @@ -10,7 +10,7 @@ comment: Entry widget that shows the number of techniques that were already hand enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.5.0 tests: diff --git a/Packs/MITRECoA/Scripts/EntryWidgetCoATechniquesList/EntryWidgetCoATechniquesList.yml b/Packs/MITRECoA/Scripts/EntryWidgetCoATechniquesList/EntryWidgetCoATechniquesList.yml index 55a28372f8e6..41dda071efb8 100644 --- a/Packs/MITRECoA/Scripts/EntryWidgetCoATechniquesList/EntryWidgetCoATechniquesList.yml +++ b/Packs/MITRECoA/Scripts/EntryWidgetCoATechniquesList/EntryWidgetCoATechniquesList.yml @@ -10,7 +10,7 @@ comment: Entry widget that shows the number of techniques that were not yet hand enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.5.0 tests: diff --git a/Packs/MITRECoA/pack_metadata.json b/Packs/MITRECoA/pack_metadata.json index 16e65e40fa5b..1a9558686863 100644 --- a/Packs/MITRECoA/pack_metadata.json +++ b/Packs/MITRECoA/pack_metadata.json @@ -2,7 +2,7 @@ "name": "MITRE ATT&CK - Courses of Action", "description": "Looking for actionable intelligence? This intelligence-driven Pack provides manual or automated remediation of MITRE ATT&CK techniques.", "support": "xsoar", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/ML/ReleaseNotes/1_4_16.md b/Packs/ML/ReleaseNotes/1_4_16.md new file mode 100644 index 000000000000..9fef8b2972e5 --- /dev/null +++ b/Packs/ML/ReleaseNotes/1_4_16.md @@ -0,0 +1,23 @@ + +#### Scripts + +##### ExportMLModel +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### ImportMLModel +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### HashIncidentsFields +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### ExtendQueryBasedOnPhishingLabels +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/ML/Scripts/ExportMLModel/ExportMLModel.yml b/Packs/ML/Scripts/ExportMLModel/ExportMLModel.yml index 04ad292178e0..a5477b636cea 100644 --- a/Packs/ML/Scripts/ExportMLModel/ExportMLModel.yml +++ b/Packs/ML/Scripts/ExportMLModel/ExportMLModel.yml @@ -11,7 +11,7 @@ script: '-' subtype: python3 timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole tags: - ml diff --git a/Packs/ML/Scripts/ExtendQueryBasedOnPhishingLabels/ExtendQueryBasedOnPhishingLabels.yml b/Packs/ML/Scripts/ExtendQueryBasedOnPhishingLabels/ExtendQueryBasedOnPhishingLabels.yml index 3362a20b5e2d..1ed18c8fb115 100644 --- a/Packs/ML/Scripts/ExtendQueryBasedOnPhishingLabels/ExtendQueryBasedOnPhishingLabels.yml +++ b/Packs/ML/Scripts/ExtendQueryBasedOnPhishingLabels/ExtendQueryBasedOnPhishingLabels.yml @@ -23,7 +23,7 @@ tags: - ml timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 5.0.0 tests: diff --git a/Packs/ML/Scripts/HashIncidentsFields/HashIncidentsFields.yml b/Packs/ML/Scripts/HashIncidentsFields/HashIncidentsFields.yml index 57cbce894e06..04547cf4064a 100644 --- a/Packs/ML/Scripts/HashIncidentsFields/HashIncidentsFields.yml +++ b/Packs/ML/Scripts/HashIncidentsFields/HashIncidentsFields.yml @@ -65,7 +65,7 @@ tags: - ml timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - hashIncidentFields-test fromversion: 5.0.0 diff --git a/Packs/ML/Scripts/ImportMLModel/ImportMLModel.yml b/Packs/ML/Scripts/ImportMLModel/ImportMLModel.yml index a43ce28e1fe3..76c2cb695b89 100644 --- a/Packs/ML/Scripts/ImportMLModel/ImportMLModel.yml +++ b/Packs/ML/Scripts/ImportMLModel/ImportMLModel.yml @@ -24,7 +24,7 @@ tags: - ml timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole tests: - No tests diff --git a/Packs/ML/pack_metadata.json b/Packs/ML/pack_metadata.json index a616469ae16a..5cb084f880dc 100644 --- a/Packs/ML/pack_metadata.json +++ b/Packs/ML/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Machine Learning", "description": "Help to manage machine learning models in Cortex XSOAR", "support": "xsoar", - "currentVersion": "1.4.15", + "currentVersion": "1.4.16", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MailListener_-_POP3/Integrations/MailListener_POP3/MailListener_POP3.yml b/Packs/MailListener_-_POP3/Integrations/MailListener_POP3/MailListener_POP3.yml index 46f67d524042..178aa26d7ff0 100644 --- a/Packs/MailListener_-_POP3/Integrations/MailListener_POP3/MailListener_POP3.yml +++ b/Packs/MailListener_-_POP3/Integrations/MailListener_POP3/MailListener_POP3.yml @@ -52,7 +52,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.86272 + dockerimage: demisto/python3:3.11.10.115186 tests: - MailListener-POP3 - Test fromversion: 5.0.0 diff --git a/Packs/MailListener_-_POP3/ReleaseNotes/2_0_6.md b/Packs/MailListener_-_POP3/ReleaseNotes/2_0_6.md new file mode 100644 index 000000000000..a7418deab39f --- /dev/null +++ b/Packs/MailListener_-_POP3/ReleaseNotes/2_0_6.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### MailListener - POP3 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/MailListener_-_POP3/pack_metadata.json b/Packs/MailListener_-_POP3/pack_metadata.json index f46945a3a5c7..7501b29c6381 100644 --- a/Packs/MailListener_-_POP3/pack_metadata.json +++ b/Packs/MailListener_-_POP3/pack_metadata.json @@ -2,7 +2,7 @@ "name": "MailListener - POP3", "description": "Listen to a mailbox, enable incident triggering via e-mail", "support": "xsoar", - "currentVersion": "2.0.5", + "currentVersion": "2.0.6", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MajorBreachesInvestigationandResponse/ReleaseNotes/1_6_40.md b/Packs/MajorBreachesInvestigationandResponse/ReleaseNotes/1_6_40.md new file mode 100644 index 000000000000..420226d56d36 --- /dev/null +++ b/Packs/MajorBreachesInvestigationandResponse/ReleaseNotes/1_6_40.md @@ -0,0 +1,43 @@ + +#### Scripts + +##### RapidBreachResponse-RemediationTasksCount-Widget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### RapidBreachResponse-RemainingTasksCount-Widget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### RapidBreachResponse-EradicationTasksCount-Widget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### RapidBreachResponse-HuntingTasksCount-Widget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### RapidBreachResponse-CompletedTasksCount-Widget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### RapidBreachResponse-TotalTasksCount-Widget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### RapidBreachResponse-MitigationTasksCount-Widget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### RapidBreachResponse-TotalIndicatorCount-Widget +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseCompletedTasksCountWidget/RapidBreachResponseCompletedTasksCountWidget.yml b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseCompletedTasksCountWidget/RapidBreachResponseCompletedTasksCountWidget.yml index 1285d16a05f4..6c63e6ee35d8 100644 --- a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseCompletedTasksCountWidget/RapidBreachResponseCompletedTasksCountWidget.yml +++ b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseCompletedTasksCountWidget/RapidBreachResponseCompletedTasksCountWidget.yml @@ -1,7 +1,7 @@ commonfields: id: RapidBreachResponse-CompletedTasksCount-Widget version: -1 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RapidBreachResponse-CompletedTasksCount-Widget runas: DBotWeakRole diff --git a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseEradicationTasksCountWidget/RapidBreachResponseEradicationTasksCountWidget.yml b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseEradicationTasksCountWidget/RapidBreachResponseEradicationTasksCountWidget.yml index e76db2ada9fa..c450ac8f07dc 100644 --- a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseEradicationTasksCountWidget/RapidBreachResponseEradicationTasksCountWidget.yml +++ b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseEradicationTasksCountWidget/RapidBreachResponseEradicationTasksCountWidget.yml @@ -1,7 +1,7 @@ commonfields: id: RapidBreachResponse-EradicationTasksCount-Widget version: -1 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RapidBreachResponse-EradicationTasksCount-Widget runas: DBotWeakRole diff --git a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseHuntingTasksCountWidget/RapidBreachResponseHuntingTasksCountWidget.yml b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseHuntingTasksCountWidget/RapidBreachResponseHuntingTasksCountWidget.yml index a566e8fd2f15..ec19cab88e44 100644 --- a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseHuntingTasksCountWidget/RapidBreachResponseHuntingTasksCountWidget.yml +++ b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseHuntingTasksCountWidget/RapidBreachResponseHuntingTasksCountWidget.yml @@ -1,7 +1,7 @@ commonfields: id: RapidBreachResponse-HuntingTasksCount-Widget version: -1 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RapidBreachResponse-HuntingTasksCount-Widget runas: DBotWeakRole diff --git a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseMitigationTasksCountWidget/RapidBreachResponseMitigationTasksCountWidget.yml b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseMitigationTasksCountWidget/RapidBreachResponseMitigationTasksCountWidget.yml index 43b7d0591b2a..e74a8038f07d 100644 --- a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseMitigationTasksCountWidget/RapidBreachResponseMitigationTasksCountWidget.yml +++ b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseMitigationTasksCountWidget/RapidBreachResponseMitigationTasksCountWidget.yml @@ -1,7 +1,7 @@ commonfields: id: RapidBreachResponse-MitigationTasksCount-Widget version: -1 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RapidBreachResponse-MitigationTasksCount-Widget runas: DBotWeakRole diff --git a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseRemainingTasksCountWidget/RapidBreachResponseRemainingTasksCountWidget.yml b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseRemainingTasksCountWidget/RapidBreachResponseRemainingTasksCountWidget.yml index f367ca8026e8..d7595f8af43f 100644 --- a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseRemainingTasksCountWidget/RapidBreachResponseRemainingTasksCountWidget.yml +++ b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseRemainingTasksCountWidget/RapidBreachResponseRemainingTasksCountWidget.yml @@ -1,7 +1,7 @@ commonfields: id: RapidBreachResponse-RemainingTasksCount-Widget version: -1 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RapidBreachResponse-RemainingTasksCount-Widget runas: DBotWeakRole diff --git a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseRemediationTasksCountWidget/RapidBreachResponseRemediationTasksCountWidget.yml b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseRemediationTasksCountWidget/RapidBreachResponseRemediationTasksCountWidget.yml index 3c1d3506f17c..119d2a0d657b 100644 --- a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseRemediationTasksCountWidget/RapidBreachResponseRemediationTasksCountWidget.yml +++ b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseRemediationTasksCountWidget/RapidBreachResponseRemediationTasksCountWidget.yml @@ -1,7 +1,7 @@ commonfields: id: RapidBreachResponse-RemediationTasksCount-Widget version: -1 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RapidBreachResponse-RemediationTasksCount-Widget runas: DBotWeakRole diff --git a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseTotalIndicatorCountWidget/RapidBreachResponseTotalIndicatorCountWidget.yml b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseTotalIndicatorCountWidget/RapidBreachResponseTotalIndicatorCountWidget.yml index ac4104e3a859..524e2c9b1891 100644 --- a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseTotalIndicatorCountWidget/RapidBreachResponseTotalIndicatorCountWidget.yml +++ b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseTotalIndicatorCountWidget/RapidBreachResponseTotalIndicatorCountWidget.yml @@ -1,7 +1,7 @@ commonfields: id: RapidBreachResponse-TotalIndicatorCount-Widget version: -1 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RapidBreachResponse-TotalIndicatorCount-Widget runas: DBotWeakRole diff --git a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseTotalTasksCountWidget/RapidBreachResponseTotalTasksCountWidget.yml b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseTotalTasksCountWidget/RapidBreachResponseTotalTasksCountWidget.yml index 4c74f82d6fd0..1247c439fd16 100644 --- a/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseTotalTasksCountWidget/RapidBreachResponseTotalTasksCountWidget.yml +++ b/Packs/MajorBreachesInvestigationandResponse/Scripts/RapidBreachResponseTotalTasksCountWidget/RapidBreachResponseTotalTasksCountWidget.yml @@ -1,7 +1,7 @@ commonfields: id: RapidBreachResponse-TotalTasksCount-Widget version: -1 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: RapidBreachResponse-TotalTasksCount-Widget runas: DBotWeakRole diff --git a/Packs/MajorBreachesInvestigationandResponse/pack_metadata.json b/Packs/MajorBreachesInvestigationandResponse/pack_metadata.json index 2c9c35f00e25..d8d33fd25a53 100644 --- a/Packs/MajorBreachesInvestigationandResponse/pack_metadata.json +++ b/Packs/MajorBreachesInvestigationandResponse/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Rapid Breach Response", "description": "This content Pack helps you collect, investigate, and remediate incidents related to major breaches.", "support": "xsoar", - "currentVersion": "1.6.39", + "currentVersion": "1.6.40", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Maltiverse/Integrations/Maltiverse/Maltiverse.yml b/Packs/Maltiverse/Integrations/Maltiverse/Maltiverse.yml index 7a5bf3b3d4df..798fece553e2 100644 --- a/Packs/Maltiverse/Integrations/Maltiverse/Maltiverse.yml +++ b/Packs/Maltiverse/Integrations/Maltiverse/Maltiverse.yml @@ -366,7 +366,7 @@ script: - contextPath: File.Tags description: Attribute to label an IoC. type: String - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Maltiverse/ReleaseNotes/1_0_28.md b/Packs/Maltiverse/ReleaseNotes/1_0_28.md new file mode 100644 index 000000000000..0d6988515acf --- /dev/null +++ b/Packs/Maltiverse/ReleaseNotes/1_0_28.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Maltiverse +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Maltiverse/pack_metadata.json b/Packs/Maltiverse/pack_metadata.json index 7d85b47e78a9..fa33323b7913 100644 --- a/Packs/Maltiverse/pack_metadata.json +++ b/Packs/Maltiverse/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Maltiverse", "description": "Maltiverse helps you to analyze suspicious hashes, URLs, domains, and IP addresses.", "support": "xsoar", - "currentVersion": "1.0.27", + "currentVersion": "1.0.28", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Malware/ReleaseNotes/1_4_14.md b/Packs/Malware/ReleaseNotes/1_4_14.md new file mode 100644 index 000000000000..fe1f46a8cbfe --- /dev/null +++ b/Packs/Malware/ReleaseNotes/1_4_14.md @@ -0,0 +1,13 @@ + +#### Scripts + +##### CreateHashIndicatorWrapper +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### RemoveFileWrapper +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Malware/Scripts/CreateHashIndicatorWrapper/CreateHashIndicatorWrapper.yml b/Packs/Malware/Scripts/CreateHashIndicatorWrapper/CreateHashIndicatorWrapper.yml index b8d5f97d867b..5773e1ce84fb 100644 --- a/Packs/Malware/Scripts/CreateHashIndicatorWrapper/CreateHashIndicatorWrapper.yml +++ b/Packs/Malware/Scripts/CreateHashIndicatorWrapper/CreateHashIndicatorWrapper.yml @@ -229,7 +229,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No tests (auto formatted) diff --git a/Packs/Malware/Scripts/RemoveFileWrapper/RemoveFileWrapper.yml b/Packs/Malware/Scripts/RemoveFileWrapper/RemoveFileWrapper.yml index 3a525e1c6ce5..ee1944675147 100644 --- a/Packs/Malware/Scripts/RemoveFileWrapper/RemoveFileWrapper.yml +++ b/Packs/Malware/Scripts/RemoveFileWrapper/RemoveFileWrapper.yml @@ -82,7 +82,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.0.0 tests: - No tests (auto formatted) diff --git a/Packs/Malware/pack_metadata.json b/Packs/Malware/pack_metadata.json index 5779c5408193..8720e56d8f25 100644 --- a/Packs/Malware/pack_metadata.json +++ b/Packs/Malware/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Malware Core", "description": "Supporting pack for the Malware Investigation & Response pack.", "support": "xsoar", - "currentVersion": "1.4.13", + "currentVersion": "1.4.14", "serverMinVersion": "6.0.0", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", diff --git a/Packs/MalwareBazaar/Integrations/MalwareBazaar/MalwareBazaar.yml b/Packs/MalwareBazaar/Integrations/MalwareBazaar/MalwareBazaar.yml index bb45003b1604..d76ac4cc1ff0 100644 --- a/Packs/MalwareBazaar/Integrations/MalwareBazaar/MalwareBazaar.yml +++ b/Packs/MalwareBazaar/Integrations/MalwareBazaar/MalwareBazaar.yml @@ -437,7 +437,7 @@ script: - contextPath: MalwareBazaar.MalwarebazaarSamplesList.intelligence.mail description: Indicates if this malware sample has been seen in global spam traffic. type: String - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/MalwareBazaar/ReleaseNotes/1_0_17.md b/Packs/MalwareBazaar/ReleaseNotes/1_0_17.md new file mode 100644 index 000000000000..351abce54451 --- /dev/null +++ b/Packs/MalwareBazaar/ReleaseNotes/1_0_17.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### MalwareBazaar +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/MalwareBazaar/pack_metadata.json b/Packs/MalwareBazaar/pack_metadata.json index 0b1f6327ba7d..1ee7579f8216 100644 --- a/Packs/MalwareBazaar/pack_metadata.json +++ b/Packs/MalwareBazaar/pack_metadata.json @@ -2,7 +2,7 @@ "name": "MalwareBazaar", "description": "MalwareBazaar offers an API to download malware samples, comment malware samples, and obtain intel based on file hash, tag, signature, file type, etc.", "support": "xsoar", - "currentVersion": "1.0.16", + "currentVersion": "1.0.17", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MalwareInvestigationAndResponse/ReleaseNotes/2_0_14.md b/Packs/MalwareInvestigationAndResponse/ReleaseNotes/2_0_14.md new file mode 100644 index 000000000000..fca70781f7e6 --- /dev/null +++ b/Packs/MalwareInvestigationAndResponse/ReleaseNotes/2_0_14.md @@ -0,0 +1,43 @@ + +#### Scripts + +##### KillProcessWrapper +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### InvestigationDetailedSummaryToTable +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### InvestigationDetailedSummaryParse +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### ReadProcessesFileXDR +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### InvestigationSummaryParse +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### ReadNetstatFileWrapper +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### ReadProcessFileWrapper +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### InvestigationSummaryToTable +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationDetailedSummaryParse/InvestigationDetailedSummaryParse.yml b/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationDetailedSummaryParse/InvestigationDetailedSummaryParse.yml index ed92c8c73e3d..824f80dd4c9a 100644 --- a/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationDetailedSummaryParse/InvestigationDetailedSummaryParse.yml +++ b/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationDetailedSummaryParse/InvestigationDetailedSummaryParse.yml @@ -26,7 +26,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.2.0 tests: - No tests (auto formatted) diff --git a/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationDetailedSummaryToTable/InvestigationDetailedSummaryToTable.yml b/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationDetailedSummaryToTable/InvestigationDetailedSummaryToTable.yml index f51f89c6cebd..7d98a9dee936 100644 --- a/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationDetailedSummaryToTable/InvestigationDetailedSummaryToTable.yml +++ b/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationDetailedSummaryToTable/InvestigationDetailedSummaryToTable.yml @@ -12,7 +12,7 @@ tags: timeout: '0' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.2.0 tests: - No tests (auto formatted) diff --git a/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationSummaryParse/InvestigationSummaryParse.yml b/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationSummaryParse/InvestigationSummaryParse.yml index 95eb98c83edc..2471238aed0c 100644 --- a/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationSummaryParse/InvestigationSummaryParse.yml +++ b/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationSummaryParse/InvestigationSummaryParse.yml @@ -62,7 +62,7 @@ outputs: script: '-' type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.2.0 tests: - No tests (auto formatted) diff --git a/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationSummaryToTable/InvestigationSummaryToTable.yml b/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationSummaryToTable/InvestigationSummaryToTable.yml index a8d595af6966..0448f94043fb 100644 --- a/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationSummaryToTable/InvestigationSummaryToTable.yml +++ b/Packs/MalwareInvestigationAndResponse/Scripts/InvestigationSummaryToTable/InvestigationSummaryToTable.yml @@ -17,7 +17,7 @@ tags: - field-change-triggered type: python subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.2.0 tests: - No tests (auto formatted) diff --git a/Packs/MalwareInvestigationAndResponse/Scripts/KillProcessWrapper/KillProcessWrapper.yml b/Packs/MalwareInvestigationAndResponse/Scripts/KillProcessWrapper/KillProcessWrapper.yml index bdd388af48f9..2673d366326a 100644 --- a/Packs/MalwareInvestigationAndResponse/Scripts/KillProcessWrapper/KillProcessWrapper.yml +++ b/Packs/MalwareInvestigationAndResponse/Scripts/KillProcessWrapper/KillProcessWrapper.yml @@ -47,7 +47,7 @@ script: '-' subtype: python3 timeout: '0' type: python -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) fromversion: 6.1.0 diff --git a/Packs/MalwareInvestigationAndResponse/Scripts/ReadNetstatFileWrapper/ReadNetstatFileWrapper.yml b/Packs/MalwareInvestigationAndResponse/Scripts/ReadNetstatFileWrapper/ReadNetstatFileWrapper.yml index 4fe459c3743a..4e68bef643b3 100644 --- a/Packs/MalwareInvestigationAndResponse/Scripts/ReadNetstatFileWrapper/ReadNetstatFileWrapper.yml +++ b/Packs/MalwareInvestigationAndResponse/Scripts/ReadNetstatFileWrapper/ReadNetstatFileWrapper.yml @@ -10,7 +10,7 @@ comment: "This Automation is a wrapper - \nIf the CrowdStrike key is present in enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/MalwareInvestigationAndResponse/Scripts/ReadProcessFileWrapper/ReadProcessFileWrapper.yml b/Packs/MalwareInvestigationAndResponse/Scripts/ReadProcessFileWrapper/ReadProcessFileWrapper.yml index 541980d21883..52dd41fa072c 100644 --- a/Packs/MalwareInvestigationAndResponse/Scripts/ReadProcessFileWrapper/ReadProcessFileWrapper.yml +++ b/Packs/MalwareInvestigationAndResponse/Scripts/ReadProcessFileWrapper/ReadProcessFileWrapper.yml @@ -10,7 +10,7 @@ comment: "This Automation is a wrapper - \nIf PaloAltoNetworksXDR is in context enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/MalwareInvestigationAndResponse/Scripts/ReadProcessesFileXDR/ReadProcessesFileXDR.yml b/Packs/MalwareInvestigationAndResponse/Scripts/ReadProcessesFileXDR/ReadProcessesFileXDR.yml index d831b17a4f04..c5f612a3d12e 100644 --- a/Packs/MalwareInvestigationAndResponse/Scripts/ReadProcessesFileXDR/ReadProcessesFileXDR.yml +++ b/Packs/MalwareInvestigationAndResponse/Scripts/ReadProcessesFileXDR/ReadProcessesFileXDR.yml @@ -10,7 +10,7 @@ comment: Return a process list from the XDRIR integration. enabled: true scripttarget: 0 subtype: python3 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 runas: DBotWeakRole fromversion: 6.2.0 tests: diff --git a/Packs/MalwareInvestigationAndResponse/pack_metadata.json b/Packs/MalwareInvestigationAndResponse/pack_metadata.json index c903849d3ff6..a582c0b4ac57 100644 --- a/Packs/MalwareInvestigationAndResponse/pack_metadata.json +++ b/Packs/MalwareInvestigationAndResponse/pack_metadata.json @@ -5,7 +5,7 @@ "videos": [ "https://www.youtube.com/watch?v=DtGIefyoTao" ], - "currentVersion": "2.0.13", + "currentVersion": "2.0.14", "serverMinVersion": "6.5.0", "author": "Cortex XSOAR", "hidden": false, diff --git a/Packs/Mattermost/ReleaseNotes/2_0_4.md b/Packs/Mattermost/ReleaseNotes/2_0_4.md new file mode 100644 index 000000000000..df55314dcefb --- /dev/null +++ b/Packs/Mattermost/ReleaseNotes/2_0_4.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### MattermostAskUser +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Mattermost/Scripts/MattermostAskUser/MattermostAskUser.yml b/Packs/Mattermost/Scripts/MattermostAskUser/MattermostAskUser.yml index 4efdfecdc57c..d4c66326676e 100644 --- a/Packs/Mattermost/Scripts/MattermostAskUser/MattermostAskUser.yml +++ b/Packs/Mattermost/Scripts/MattermostAskUser/MattermostAskUser.yml @@ -43,6 +43,6 @@ args: defaultValue: No response was received from the user. scripttarget: 0 fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.14.99474 +dockerimage: demisto/python3:3.11.10.115186 tests: - MattermostAskUser_testplaybook diff --git a/Packs/Mattermost/pack_metadata.json b/Packs/Mattermost/pack_metadata.json index 5ff51a93c701..21d17ba6f2fb 100644 --- a/Packs/Mattermost/pack_metadata.json +++ b/Packs/Mattermost/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Mattermost", "description": "Send messages and notifications to your Mattermost Team.", "support": "xsoar", - "currentVersion": "2.0.3", + "currentVersion": "2.0.4", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/McAfeeNSM/Integrations/McAfeeNSMv2/McAfeeNSMv2.yml b/Packs/McAfeeNSM/Integrations/McAfeeNSMv2/McAfeeNSMv2.yml index dcacd5f3806e..8912a389930b 100644 --- a/Packs/McAfeeNSM/Integrations/McAfeeNSMv2/McAfeeNSMv2.yml +++ b/Packs/McAfeeNSM/Integrations/McAfeeNSMv2/McAfeeNSMv2.yml @@ -2045,7 +2045,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.99474 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.5.0 tests: - Test_McAfeeNSMv2_using_v9 diff --git a/Packs/McAfeeNSM/ReleaseNotes/1_2_19.md b/Packs/McAfeeNSM/ReleaseNotes/1_2_19.md new file mode 100644 index 000000000000..be5570a96ac0 --- /dev/null +++ b/Packs/McAfeeNSM/ReleaseNotes/1_2_19.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### McAfee NSM v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/McAfeeNSM/pack_metadata.json b/Packs/McAfeeNSM/pack_metadata.json index 82c6c556b0e4..a92a2976d8ec 100644 --- a/Packs/McAfeeNSM/pack_metadata.json +++ b/Packs/McAfeeNSM/pack_metadata.json @@ -2,7 +2,7 @@ "name": "McAfee NSM", "description": "McAfee Network Security Manager", "support": "xsoar", - "currentVersion": "1.2.18", + "currentVersion": "1.2.19", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/McAfeeWebGateway/Integrations/SkyhighSecureWebGatewayOnPrem/SkyhighSecureWebGatewayOnPrem.yml b/Packs/McAfeeWebGateway/Integrations/SkyhighSecureWebGatewayOnPrem/SkyhighSecureWebGatewayOnPrem.yml index 3710ddad5918..8bbaa4b7e90c 100644 --- a/Packs/McAfeeWebGateway/Integrations/SkyhighSecureWebGatewayOnPrem/SkyhighSecureWebGatewayOnPrem.yml +++ b/Packs/McAfeeWebGateway/Integrations/SkyhighSecureWebGatewayOnPrem/SkyhighSecureWebGatewayOnPrem.yml @@ -230,7 +230,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 fromversion: 6.8.0 tests: - No tests (auto formatted) diff --git a/Packs/McAfeeWebGateway/ReleaseNotes/1_0_12.md b/Packs/McAfeeWebGateway/ReleaseNotes/1_0_12.md new file mode 100644 index 000000000000..d6fb8393915f --- /dev/null +++ b/Packs/McAfeeWebGateway/ReleaseNotes/1_0_12.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Skyhigh Secure Web Gateway (On Prem) +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/McAfeeWebGateway/pack_metadata.json b/Packs/McAfeeWebGateway/pack_metadata.json index dde8d45e8ea7..6362feae9023 100644 --- a/Packs/McAfeeWebGateway/pack_metadata.json +++ b/Packs/McAfeeWebGateway/pack_metadata.json @@ -2,7 +2,7 @@ "name": "McAfee Web Gateway", "description": "Blacklist/Whitelist handling", "support": "xsoar", - "currentVersion": "1.0.11", + "currentVersion": "1.0.12", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/McAfee_Advanced_Threat_Defense/Integrations/McAfee_Advanced_Threat_Defense/McAfee_Advanced_Threat_Defense.yml b/Packs/McAfee_Advanced_Threat_Defense/Integrations/McAfee_Advanced_Threat_Defense/McAfee_Advanced_Threat_Defense.yml index 3f6b8de6147f..3ce2aeef1c5f 100644 --- a/Packs/McAfee_Advanced_Threat_Defense/Integrations/McAfee_Advanced_Threat_Defense/McAfee_Advanced_Threat_Defense.yml +++ b/Packs/McAfee_Advanced_Threat_Defense/Integrations/McAfee_Advanced_Threat_Defense/McAfee_Advanced_Threat_Defense.yml @@ -525,7 +525,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 tests: - Test Playbook McAfee ATD - Detonate Remote File From URL -McAfee-ATD - Test diff --git a/Packs/McAfee_Advanced_Threat_Defense/ReleaseNotes/1_0_29.md b/Packs/McAfee_Advanced_Threat_Defense/ReleaseNotes/1_0_29.md new file mode 100644 index 000000000000..f632031dd27d --- /dev/null +++ b/Packs/McAfee_Advanced_Threat_Defense/ReleaseNotes/1_0_29.md @@ -0,0 +1,16 @@ + +#### Integrations + +##### McAfee Advanced Threat Defense +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + + +#### Scripts + +##### ATDDetonate +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/McAfee_Advanced_Threat_Defense/Scripts/ATDDetonate/ATDDetonate.yml b/Packs/McAfee_Advanced_Threat_Defense/Scripts/ATDDetonate/ATDDetonate.yml index e9f5ef04cd9d..b847ec30a03b 100644 --- a/Packs/McAfee_Advanced_Threat_Defense/Scripts/ATDDetonate/ATDDetonate.yml +++ b/Packs/McAfee_Advanced_Threat_Defense/Scripts/ATDDetonate/ATDDetonate.yml @@ -110,6 +110,6 @@ outputs: - contextPath: DBotScore.Score description: The actual score (only in case of report type=json). fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/McAfee_Advanced_Threat_Defense/pack_metadata.json b/Packs/McAfee_Advanced_Threat_Defense/pack_metadata.json index 410c7bbb58e8..a7d932b79a8d 100644 --- a/Packs/McAfee_Advanced_Threat_Defense/pack_metadata.json +++ b/Packs/McAfee_Advanced_Threat_Defense/pack_metadata.json @@ -2,7 +2,7 @@ "name": "McAfee Advanced Threat Defense", "description": "Integrated advanced threat detection: Enhancing protection from network edge to endpoint", "support": "xsoar", - "currentVersion": "1.0.28", + "currentVersion": "1.0.29", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/McAfee_ESM/Integrations/McAfee_ESM_v2/McAfee_ESM_v2.yml b/Packs/McAfee_ESM/Integrations/McAfee_ESM_v2/McAfee_ESM_v2.yml index 813e651205b2..1a48a4857711 100644 --- a/Packs/McAfee_ESM/Integrations/McAfee_ESM_v2/McAfee_ESM_v2.yml +++ b/Packs/McAfee_ESM/Integrations/McAfee_ESM_v2/McAfee_ESM_v2.yml @@ -685,7 +685,7 @@ script: - contextPath: McAfeeESM.Watchlist.name description: The name of the watchlist. type: string - dockerimage: demisto/python3:3.10.13.78623 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/McAfee_ESM/ReleaseNotes/1_1_28.md b/Packs/McAfee_ESM/ReleaseNotes/1_1_28.md new file mode 100644 index 000000000000..4550d72ac312 --- /dev/null +++ b/Packs/McAfee_ESM/ReleaseNotes/1_1_28.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### McAfee ESM v2 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/McAfee_ESM/pack_metadata.json b/Packs/McAfee_ESM/pack_metadata.json index faf757adc87b..9996e030afd2 100644 --- a/Packs/McAfee_ESM/pack_metadata.json +++ b/Packs/McAfee_ESM/pack_metadata.json @@ -2,7 +2,7 @@ "name": "McAfee ESM", "description": "Run queries and receive alarms from Intel Security ESM.", "support": "xsoar", - "currentVersion": "1.1.27", + "currentVersion": "1.1.28", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Microsoft365Defender/ReleaseNotes/4_5_38.md b/Packs/Microsoft365Defender/ReleaseNotes/4_5_38.md new file mode 100644 index 000000000000..9914f8bfaf84 --- /dev/null +++ b/Packs/Microsoft365Defender/ReleaseNotes/4_5_38.md @@ -0,0 +1,13 @@ + +#### Scripts + +##### MS365DefenderCountIncidentCategories +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### MS365DefenderUserListToTable +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Microsoft365Defender/Scripts/MS365DefenderCountIncidentCategories/MS365DefenderCountIncidentCategories.yml b/Packs/Microsoft365Defender/Scripts/MS365DefenderCountIncidentCategories/MS365DefenderCountIncidentCategories.yml index e0c6b9286a01..1755892a85d7 100644 --- a/Packs/Microsoft365Defender/Scripts/MS365DefenderCountIncidentCategories/MS365DefenderCountIncidentCategories.yml +++ b/Packs/Microsoft365Defender/Scripts/MS365DefenderCountIncidentCategories/MS365DefenderCountIncidentCategories.yml @@ -5,7 +5,7 @@ comment: count the categories of alerts in given incident commonfields: id: MS365DefenderCountIncidentCategories version: -1 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: MS365DefenderCountIncidentCategories runas: DBotWeakRole diff --git a/Packs/Microsoft365Defender/Scripts/MS365DefenderUserListToTable/MS365DefenderUserListToTable.yml b/Packs/Microsoft365Defender/Scripts/MS365DefenderUserListToTable/MS365DefenderUserListToTable.yml index a9ae8ed2199f..50f723dc1e5d 100644 --- a/Packs/Microsoft365Defender/Scripts/MS365DefenderUserListToTable/MS365DefenderUserListToTable.yml +++ b/Packs/Microsoft365Defender/Scripts/MS365DefenderUserListToTable/MS365DefenderUserListToTable.yml @@ -4,7 +4,7 @@ args: commonfields: id: MS365DefenderUserListToTable version: -1 -dockerimage: demisto/python3:3.10.13.86272 +dockerimage: demisto/python3:3.11.10.115186 enabled: true name: MS365DefenderUserListToTable runas: DBotWeakRole diff --git a/Packs/Microsoft365Defender/pack_metadata.json b/Packs/Microsoft365Defender/pack_metadata.json index be095384e28e..1826229ae02c 100644 --- a/Packs/Microsoft365Defender/pack_metadata.json +++ b/Packs/Microsoft365Defender/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft 365 Defender", "description": "Microsoft Defender XDR (formerly Microsoft 365 Defender) is a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks.", "support": "xsoar", - "currentVersion": "4.5.37", + "currentVersion": "4.5.38", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftCloudAppSecurity/Integrations/MicrosoftCloudAppSecurity/MicrosoftCloudAppSecurity.yml b/Packs/MicrosoftCloudAppSecurity/Integrations/MicrosoftCloudAppSecurity/MicrosoftCloudAppSecurity.yml index 36cfac886e4f..017f9ff07c64 100644 --- a/Packs/MicrosoftCloudAppSecurity/Integrations/MicrosoftCloudAppSecurity/MicrosoftCloudAppSecurity.yml +++ b/Packs/MicrosoftCloudAppSecurity/Integrations/MicrosoftCloudAppSecurity/MicrosoftCloudAppSecurity.yml @@ -888,7 +888,7 @@ script: - contextPath: MicrosoftCloudAppSecurity.UsersAccounts.userGroups.usersCount description: The number of users in the user group. type: Number - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 isfetch: true runonce: false script: '-' diff --git a/Packs/MicrosoftCloudAppSecurity/ReleaseNotes/2_2_9.md b/Packs/MicrosoftCloudAppSecurity/ReleaseNotes/2_2_9.md new file mode 100644 index 000000000000..7920e775eac1 --- /dev/null +++ b/Packs/MicrosoftCloudAppSecurity/ReleaseNotes/2_2_9.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Microsoft Defender for Cloud Apps +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftCloudAppSecurity/pack_metadata.json b/Packs/MicrosoftCloudAppSecurity/pack_metadata.json index 3e746a702ec0..bac82f24d4e4 100644 --- a/Packs/MicrosoftCloudAppSecurity/pack_metadata.json +++ b/Packs/MicrosoftCloudAppSecurity/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Defender for Cloud Apps", "description": "Microsoft Cloud App Security Integration, a Cloud Access Security Broker that supports various deployment modes", "support": "xsoar", - "currentVersion": "2.2.8", + "currentVersion": "2.2.9", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftDefenderAdvancedThreatProtection/Integrations/MicrosoftDefenderAdvancedThreatProtection/MicrosoftDefenderAdvancedThreatProtection.yml b/Packs/MicrosoftDefenderAdvancedThreatProtection/Integrations/MicrosoftDefenderAdvancedThreatProtection/MicrosoftDefenderAdvancedThreatProtection.yml index a1ae843f595c..7a569c882cf6 100644 --- a/Packs/MicrosoftDefenderAdvancedThreatProtection/Integrations/MicrosoftDefenderAdvancedThreatProtection/MicrosoftDefenderAdvancedThreatProtection.yml +++ b/Packs/MicrosoftDefenderAdvancedThreatProtection/Integrations/MicrosoftDefenderAdvancedThreatProtection/MicrosoftDefenderAdvancedThreatProtection.yml @@ -5651,7 +5651,7 @@ script: execution: false name: microsoft-atp-auth-reset arguments: [] - dockerimage: demisto/crypto:1.0.0.115419 + dockerimage: demisto/crypto:1.0.0.114611 isfetch: true runonce: false script: '-' diff --git a/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_-_False_Positive_Incident_Handling.yml b/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_-_False_Positive_Incident_Handling.yml index 74b2cb8d49ca..2e7e6eaa6935 100644 --- a/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_-_False_Positive_Incident_Handling.yml +++ b/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_-_False_Positive_Incident_Handling.yml @@ -867,3 +867,5 @@ tests: - Microsoft Defender Advanced Threat Protection - Test - Microsoft Defender - ATP - Indicators SC Test fromversion: 6.5.0 +marketplaces: +- xsoar diff --git a/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_-_True_Positive_Incident_Handling.yml b/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_-_True_Positive_Incident_Handling.yml index 9fb39d79bec0..cbbcbcbb102f 100644 --- a/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_-_True_Positive_Incident_Handling.yml +++ b/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_-_True_Positive_Incident_Handling.yml @@ -2047,3 +2047,5 @@ tests: - Microsoft Defender - ATP - Indicators SC Test fromversion: 6.5.0 system: true +marketplaces: +- xsoar diff --git a/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_Malware_-_Incident_Enrichment.yml b/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_Malware_-_Incident_Enrichment.yml index ed067ed4907c..4206fafb1504 100644 --- a/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_Malware_-_Incident_Enrichment.yml +++ b/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_Malware_-_Incident_Enrichment.yml @@ -1619,3 +1619,5 @@ view: |- tests: - Test Playbook - MDE Malware - Incident Enrichment fromversion: 6.5.0 +marketplaces: +- xsoar diff --git a/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_SIEM_ingestion_-_Get_Incident_Data.yml b/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_SIEM_ingestion_-_Get_Incident_Data.yml index 5a3af266936b..add8244985e9 100644 --- a/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_SIEM_ingestion_-_Get_Incident_Data.yml +++ b/Packs/MicrosoftDefenderAdvancedThreatProtection/Playbooks/playbook-MDE_SIEM_ingestion_-_Get_Incident_Data.yml @@ -426,3 +426,5 @@ view: |- tests: - Test Playbook - MDE SIEM ingestion - Get Incident Data fromversion: 6.5.0 +marketplaces: +- xsoar diff --git a/Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_17_4.json b/Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_17_4.json new file mode 100644 index 000000000000..bf6fc6193584 --- /dev/null +++ b/Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_17_4.json @@ -0,0 +1,4 @@ +{ + "breakingChanges": true, + "breakingChangesNotes": "The following playbooks will be removed from XSIAM Marketplace: MDE SIEM ingestion - Get Incident Data,MDE - True Positive Incident Handling,MDE - False Positive Incident Handling,MDE Malware - Incident Enrichment" +} \ No newline at end of file diff --git a/Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_17_4.md b/Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_17_4.md new file mode 100644 index 000000000000..5777b754b1f0 --- /dev/null +++ b/Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_17_4.md @@ -0,0 +1,15 @@ + +#### Playbooks + +##### MDE - True Positive Incident Handling + +- Updated the playbook to be availble only for XSOAR marketplace. +##### MDE SIEM ingestion - Get Incident Data + +- Updated the playbook to be availble only for XSOAR marketplace. +##### MDE - False Positive Incident Handling + +- Updated the playbook to be availble only for XSOAR marketplace. +##### MDE Malware - Incident Enrichment + +- Updated the playbook to be availble only for XSOAR marketplace. diff --git a/Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_17_5.md b/Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_17_5.md new file mode 100644 index 000000000000..279fd1dea1a2 --- /dev/null +++ b/Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_17_5.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Microsoft Defender for Endpoint +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftDefenderAdvancedThreatProtection/pack_metadata.json b/Packs/MicrosoftDefenderAdvancedThreatProtection/pack_metadata.json index 5f879a01fd92..be3852c54886 100644 --- a/Packs/MicrosoftDefenderAdvancedThreatProtection/pack_metadata.json +++ b/Packs/MicrosoftDefenderAdvancedThreatProtection/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Defender for Endpoint", "description": "Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection (ATP)) is a unified platform for preventative protection, post-breach detection, automated investigation, and response.", "support": "xsoar", - "currentVersion": "1.17.3", + "currentVersion": "1.17.5", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftExchangeOnline/Integrations/EwsExtensionEXOPowershellV3/EwsExtensionEXOPowershellV3.ps1 b/Packs/MicrosoftExchangeOnline/Integrations/EwsExtensionEXOPowershellV3/EwsExtensionEXOPowershellV3.ps1 index cda2f534dd69..4a94c623b526 100644 --- a/Packs/MicrosoftExchangeOnline/Integrations/EwsExtensionEXOPowershellV3/EwsExtensionEXOPowershellV3.ps1 +++ b/Packs/MicrosoftExchangeOnline/Integrations/EwsExtensionEXOPowershellV3/EwsExtensionEXOPowershellV3.ps1 @@ -16,7 +16,7 @@ $script:INTEGRATION_NAME = "EWS extension" $script:COMMAND_PREFIX = "ews" $script:INTEGRATION_ENTRY_CONTEXT = "EWS" $script:JUNK_RULE_ENTRY_CONTEXT = "$script:INTEGRATION_ENTRY_CONTEXT.Rule.Junk(val.Email && val.Email == obj.Email)" -$script:MESSAGE_TRACE_ENTRY_CONTEXT = "$script:INTEGRATION_ENTRY_CONTEXT.MessageTrace(val.MessageId && val.MessageId == obj.MessageId)" +$script:MESSAGE_TRACE_ENTRY_CONTEXT = "$script:INTEGRATION_ENTRY_CONTEXT.MessageTrace(val.messageTraceId.value && val.messageTraceId.value == obj.messageTraceId.value)" function ParseJunkRulesToEntryContext([PSObject]$raw_response) { diff --git a/Packs/MicrosoftExchangeOnline/ReleaseNotes/1_5_17.md b/Packs/MicrosoftExchangeOnline/ReleaseNotes/1_5_17.md new file mode 100644 index 000000000000..890354514492 --- /dev/null +++ b/Packs/MicrosoftExchangeOnline/ReleaseNotes/1_5_17.md @@ -0,0 +1,6 @@ + +#### Integrations + +##### EWS Extension Online Powershell v3 + +- Fixed an issue where the ***ews-message-trace-get*** command returned invalid context outputs. diff --git a/Packs/MicrosoftExchangeOnline/pack_metadata.json b/Packs/MicrosoftExchangeOnline/pack_metadata.json index 5c7d498d6039..9413b14c07d4 100644 --- a/Packs/MicrosoftExchangeOnline/pack_metadata.json +++ b/Packs/MicrosoftExchangeOnline/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Exchange Online", "description": "Exchange Online and Office 365 (mail)", "support": "xsoar", - "currentVersion": "1.5.16", + "currentVersion": "1.5.17", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftGraphAPI/Integrations/MicrosoftGraphAPI/MicrosoftGraphAPI.yml b/Packs/MicrosoftGraphAPI/Integrations/MicrosoftGraphAPI/MicrosoftGraphAPI.yml index e516d80c6c48..240b38205689 100644 --- a/Packs/MicrosoftGraphAPI/Integrations/MicrosoftGraphAPI/MicrosoftGraphAPI.yml +++ b/Packs/MicrosoftGraphAPI/Integrations/MicrosoftGraphAPI/MicrosoftGraphAPI.yml @@ -182,7 +182,7 @@ script: - description: Generate the login URL used for Authorization code flow. name: msgraph-api-generate-login-url arguments: [] - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/MicrosoftGraphAPI/ReleaseNotes/1_1_52.md b/Packs/MicrosoftGraphAPI/ReleaseNotes/1_1_52.md new file mode 100644 index 000000000000..2818739d786b --- /dev/null +++ b/Packs/MicrosoftGraphAPI/ReleaseNotes/1_1_52.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Microsoft Graph API +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftGraphAPI/pack_metadata.json b/Packs/MicrosoftGraphAPI/pack_metadata.json index f1ace07576e9..58457a842174 100644 --- a/Packs/MicrosoftGraphAPI/pack_metadata.json +++ b/Packs/MicrosoftGraphAPI/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Graph API", "description": "Use the Microsoft Graph API integration to interact with Microsoft APIs that do not have dedicated integrations in Cortex XSOAR, for example, Mail Single-User, etc.", "support": "xsoar", - "currentVersion": "1.1.51", + "currentVersion": "1.1.52", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftGraphApplications/Integrations/MicrosoftGraphApplications/MicrosoftGraphApplications.yml b/Packs/MicrosoftGraphApplications/Integrations/MicrosoftGraphApplications/MicrosoftGraphApplications.yml index 6124ed32438a..c2520821953e 100644 --- a/Packs/MicrosoftGraphApplications/Integrations/MicrosoftGraphApplications/MicrosoftGraphApplications.yml +++ b/Packs/MicrosoftGraphApplications/Integrations/MicrosoftGraphApplications/MicrosoftGraphApplications.yml @@ -523,7 +523,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 fromversion: 5.0.0 tests: - MSGraph Applications Test diff --git a/Packs/MicrosoftGraphApplications/ReleaseNotes/1_2_48.md b/Packs/MicrosoftGraphApplications/ReleaseNotes/1_2_48.md new file mode 100644 index 000000000000..836f676bec23 --- /dev/null +++ b/Packs/MicrosoftGraphApplications/ReleaseNotes/1_2_48.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Active Directory Applications +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftGraphApplications/pack_metadata.json b/Packs/MicrosoftGraphApplications/pack_metadata.json index d7756d56dc84..b4eb156f16e1 100644 --- a/Packs/MicrosoftGraphApplications/pack_metadata.json +++ b/Packs/MicrosoftGraphApplications/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Graph Applications", "description": "Use this pack to manage connected applications and services", "support": "xsoar", - "currentVersion": "1.2.47", + "currentVersion": "1.2.48", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftGraphCalendar/Integrations/MicrosoftGraphCalendar/MicrosoftGraphCalendar.yml b/Packs/MicrosoftGraphCalendar/Integrations/MicrosoftGraphCalendar/MicrosoftGraphCalendar.yml index dc635d3ed04a..6f4beffa2acb 100644 --- a/Packs/MicrosoftGraphCalendar/Integrations/MicrosoftGraphCalendar/MicrosoftGraphCalendar.yml +++ b/Packs/MicrosoftGraphCalendar/Integrations/MicrosoftGraphCalendar/MicrosoftGraphCalendar.yml @@ -601,7 +601,7 @@ script: execution: false name: msgraph-calendar-auth-reset arguments: [] - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' type: python diff --git a/Packs/MicrosoftGraphCalendar/ReleaseNotes/1_1_28.md b/Packs/MicrosoftGraphCalendar/ReleaseNotes/1_1_28.md new file mode 100644 index 000000000000..4e2f7670f660 --- /dev/null +++ b/Packs/MicrosoftGraphCalendar/ReleaseNotes/1_1_28.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### O365 Outlook Calendar +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftGraphCalendar/pack_metadata.json b/Packs/MicrosoftGraphCalendar/pack_metadata.json index 0ddf5d677ab5..f42950fe8a31 100644 --- a/Packs/MicrosoftGraphCalendar/pack_metadata.json +++ b/Packs/MicrosoftGraphCalendar/pack_metadata.json @@ -1,7 +1,7 @@ { "name": "Microsoft Graph Calendar", "description": "Microsoft Graph Calendar enables you to create and manage different calendars and events\n according to your requirements.", - "currentVersion": "1.1.27", + "currentVersion": "1.1.28", "support": "xsoar", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", diff --git a/Packs/MicrosoftGraphDeviceManagement/Integrations/MicrosoftGraphDeviceManagement/MicrosoftGraphDeviceManagement.yml b/Packs/MicrosoftGraphDeviceManagement/Integrations/MicrosoftGraphDeviceManagement/MicrosoftGraphDeviceManagement.yml index 85ed45b81213..45e01b1f3221 100644 --- a/Packs/MicrosoftGraphDeviceManagement/Integrations/MicrosoftGraphDeviceManagement/MicrosoftGraphDeviceManagement.yml +++ b/Packs/MicrosoftGraphDeviceManagement/Integrations/MicrosoftGraphDeviceManagement/MicrosoftGraphDeviceManagement.yml @@ -983,7 +983,7 @@ script: execution: false name: msgraph-device-auth-reset arguments: [] - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 script: '' subtype: python3 type: python diff --git a/Packs/MicrosoftGraphDeviceManagement/ReleaseNotes/1_1_33.md b/Packs/MicrosoftGraphDeviceManagement/ReleaseNotes/1_1_33.md new file mode 100644 index 000000000000..f66ae9bd8247 --- /dev/null +++ b/Packs/MicrosoftGraphDeviceManagement/ReleaseNotes/1_1_33.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Microsoft Endpoint Manager (Intune) +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftGraphDeviceManagement/pack_metadata.json b/Packs/MicrosoftGraphDeviceManagement/pack_metadata.json index 472aac7ba153..c116a9040fe8 100644 --- a/Packs/MicrosoftGraphDeviceManagement/pack_metadata.json +++ b/Packs/MicrosoftGraphDeviceManagement/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Graph Device Management", "description": "Microsoft Graph Device Management", "support": "xsoar", - "currentVersion": "1.1.32", + "currentVersion": "1.1.33", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftGraphFiles/Integrations/MicrosoftGraphFiles/MicrosoftGraphFiles.yml b/Packs/MicrosoftGraphFiles/Integrations/MicrosoftGraphFiles/MicrosoftGraphFiles.yml index 08103438c85d..bb8d75e807b1 100644 --- a/Packs/MicrosoftGraphFiles/Integrations/MicrosoftGraphFiles/MicrosoftGraphFiles.yml +++ b/Packs/MicrosoftGraphFiles/Integrations/MicrosoftGraphFiles/MicrosoftGraphFiles.yml @@ -762,7 +762,7 @@ script: - description: Generate the login URL used for Authorization code flow. name: msgraph-files-generate-login-url arguments: [] - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 script: '' subtype: python3 type: python diff --git a/Packs/MicrosoftGraphFiles/ReleaseNotes/1_1_31.md b/Packs/MicrosoftGraphFiles/ReleaseNotes/1_1_31.md new file mode 100644 index 000000000000..09d1d0ce9327 --- /dev/null +++ b/Packs/MicrosoftGraphFiles/ReleaseNotes/1_1_31.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### O365 File Management (Onedrive/Sharepoint/Teams) +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftGraphFiles/pack_metadata.json b/Packs/MicrosoftGraphFiles/pack_metadata.json index 70b52b3eda4d..d5473c509599 100644 --- a/Packs/MicrosoftGraphFiles/pack_metadata.json +++ b/Packs/MicrosoftGraphFiles/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Graph Files", "description": "Use the O365 File Management (Onedrive/Sharepoint/Teams) integration to enable your app get authorized access to files in OneDrive, SharePoint, and MS Teams across your entire organization. This integration requires admin consent.", "support": "xsoar", - "currentVersion": "1.1.30", + "currentVersion": "1.1.31", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftGraphGroups/Integrations/MicrosoftGraphGroups/MicrosoftGraphGroups.yml b/Packs/MicrosoftGraphGroups/Integrations/MicrosoftGraphGroups/MicrosoftGraphGroups.yml index 3b105742c628..0c36d7678e98 100644 --- a/Packs/MicrosoftGraphGroups/Integrations/MicrosoftGraphGroups/MicrosoftGraphGroups.yml +++ b/Packs/MicrosoftGraphGroups/Integrations/MicrosoftGraphGroups/MicrosoftGraphGroups.yml @@ -430,7 +430,7 @@ script: execution: false name: msgraph-groups-auth-reset arguments: [] - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/MicrosoftGraphGroups/ReleaseNotes/1_1_52.md b/Packs/MicrosoftGraphGroups/ReleaseNotes/1_1_52.md new file mode 100644 index 000000000000..0562b2bf4603 --- /dev/null +++ b/Packs/MicrosoftGraphGroups/ReleaseNotes/1_1_52.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Active Directory Groups +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftGraphGroups/pack_metadata.json b/Packs/MicrosoftGraphGroups/pack_metadata.json index 833db0a18fc3..3b75b5b1d34a 100644 --- a/Packs/MicrosoftGraphGroups/pack_metadata.json +++ b/Packs/MicrosoftGraphGroups/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Graph Groups", "description": "Microsoft Graph Groups enables you to create and manage different types of groups and group functionality according to your requirements.", "support": "xsoar", - "currentVersion": "1.1.51", + "currentVersion": "1.1.52", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftGraphIdentityandAccess/Integrations/MicrosoftGraphIdentityandAccess/MicrosoftGraphIdentityandAccess.yml b/Packs/MicrosoftGraphIdentityandAccess/Integrations/MicrosoftGraphIdentityandAccess/MicrosoftGraphIdentityandAccess.yml index 0d944d7c181b..313e54c38a6a 100644 --- a/Packs/MicrosoftGraphIdentityandAccess/Integrations/MicrosoftGraphIdentityandAccess/MicrosoftGraphIdentityandAccess.yml +++ b/Packs/MicrosoftGraphIdentityandAccess/Integrations/MicrosoftGraphIdentityandAccess/MicrosoftGraphIdentityandAccess.yml @@ -455,7 +455,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 fromversion: 5.0.0 defaultmapperin: Microsoft Graph Identity and Access Incoming Mapper defaultclassifier: Microsoft Graph Identity and Access Classifier diff --git a/Packs/MicrosoftGraphIdentityandAccess/ReleaseNotes/1_2_56.md b/Packs/MicrosoftGraphIdentityandAccess/ReleaseNotes/1_2_56.md new file mode 100644 index 000000000000..ca0e2a75a4ca --- /dev/null +++ b/Packs/MicrosoftGraphIdentityandAccess/ReleaseNotes/1_2_56.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Azure Active Directory Identity And Access +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftGraphIdentityandAccess/pack_metadata.json b/Packs/MicrosoftGraphIdentityandAccess/pack_metadata.json index dbcbe6971c24..b49c7852d38a 100644 --- a/Packs/MicrosoftGraphIdentityandAccess/pack_metadata.json +++ b/Packs/MicrosoftGraphIdentityandAccess/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Graph Identity and Access", "description": "Use this pack to manage roles and members in Microsoft.", "support": "xsoar", - "currentVersion": "1.2.55", + "currentVersion": "1.2.56", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftGraphMail/Integrations/MicrosoftGraphListener/MicrosoftGraphListener.yml b/Packs/MicrosoftGraphMail/Integrations/MicrosoftGraphListener/MicrosoftGraphListener.yml index dfb191f082df..a5671de081aa 100644 --- a/Packs/MicrosoftGraphMail/Integrations/MicrosoftGraphListener/MicrosoftGraphListener.yml +++ b/Packs/MicrosoftGraphMail/Integrations/MicrosoftGraphListener/MicrosoftGraphListener.yml @@ -930,7 +930,7 @@ script: required: true description: Delete a specific email rule by ID for a user's mailbox using Microsoft Graph API. name: msgraph-mail-delete-rule - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 isfetch: true script: '' type: python diff --git a/Packs/MicrosoftGraphSearch/Integrations/MicrosoftGraphSearch/MicrosoftGraphSearch.yml b/Packs/MicrosoftGraphSearch/Integrations/MicrosoftGraphSearch/MicrosoftGraphSearch.yml index 290f45d9620c..dbcf6f5c66b7 100644 --- a/Packs/MicrosoftGraphSearch/Integrations/MicrosoftGraphSearch/MicrosoftGraphSearch.yml +++ b/Packs/MicrosoftGraphSearch/Integrations/MicrosoftGraphSearch/MicrosoftGraphSearch.yml @@ -84,7 +84,7 @@ script: - name: msgraph-search-generate-login-url arguments: [] description: Generate the login url used for Authorization code flow. - dockerimage: demisto/crypto:1.0.0.66562 + dockerimage: demisto/crypto:1.0.0.114611 script: '' subtype: python3 type: python diff --git a/Packs/MicrosoftGraphSearch/ReleaseNotes/1_0_16.md b/Packs/MicrosoftGraphSearch/ReleaseNotes/1_0_16.md new file mode 100644 index 000000000000..8a9a5015bbcd --- /dev/null +++ b/Packs/MicrosoftGraphSearch/ReleaseNotes/1_0_16.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Microsoft Graph Search +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftGraphSearch/pack_metadata.json b/Packs/MicrosoftGraphSearch/pack_metadata.json index a943515f0429..a843415ccf20 100644 --- a/Packs/MicrosoftGraphSearch/pack_metadata.json +++ b/Packs/MicrosoftGraphSearch/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Graph Search", "description": "Use the Microsoft Search API in Microsoft Graph to search content stored in OneDrive or SharePoint: files, folders, lists, list items, or sites.", "support": "community", - "currentVersion": "1.0.15", + "currentVersion": "1.0.16", "author": "randomizerxd", "url": "", "email": "", diff --git a/Packs/MicrosoftGraphSecurity/Integrations/MicrosoftGraphSecurity/MicrosoftGraphSecurity.yml b/Packs/MicrosoftGraphSecurity/Integrations/MicrosoftGraphSecurity/MicrosoftGraphSecurity.yml index 0b8fec853393..2b2923d2b401 100644 --- a/Packs/MicrosoftGraphSecurity/Integrations/MicrosoftGraphSecurity/MicrosoftGraphSecurity.yml +++ b/Packs/MicrosoftGraphSecurity/Integrations/MicrosoftGraphSecurity/MicrosoftGraphSecurity.yml @@ -2256,7 +2256,7 @@ script: - contextPath: MsGraph.Incident.systemTags description: The system tags associated with the incident. type: String collection - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 isfetch: true runonce: false script: '-' diff --git a/Packs/MicrosoftGraphSecurity/ReleaseNotes/2_2_21.md b/Packs/MicrosoftGraphSecurity/ReleaseNotes/2_2_21.md new file mode 100644 index 000000000000..758c3821143b --- /dev/null +++ b/Packs/MicrosoftGraphSecurity/ReleaseNotes/2_2_21.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Microsoft Graph Security +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftGraphSecurity/pack_metadata.json b/Packs/MicrosoftGraphSecurity/pack_metadata.json index 15eebe629e73..08e57fccaf9a 100644 --- a/Packs/MicrosoftGraphSecurity/pack_metadata.json +++ b/Packs/MicrosoftGraphSecurity/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Graph Security", "description": "Unified gateway to security insights - all from a unified Microsoft Graph\n Security API.", "support": "xsoar", - "currentVersion": "2.2.20", + "currentVersion": "2.2.21", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftGraphTeams/Integrations/MicrosoftGraphTeams/MicrosoftGraphTeams.yml b/Packs/MicrosoftGraphTeams/Integrations/MicrosoftGraphTeams/MicrosoftGraphTeams.yml index 1442043605c2..fe4c27ee1093 100644 --- a/Packs/MicrosoftGraphTeams/Integrations/MicrosoftGraphTeams/MicrosoftGraphTeams.yml +++ b/Packs/MicrosoftGraphTeams/Integrations/MicrosoftGraphTeams/MicrosoftGraphTeams.yml @@ -302,7 +302,7 @@ script: - description: Run this command if for some reason you need to rerun the authentication process. name: msgraph-teams-auth-reset arguments: [] - dockerimage: demisto/crypto:1.0.0.83106 + dockerimage: demisto/crypto:1.0.0.114611 script: '' subtype: python3 type: python diff --git a/Packs/MicrosoftGraphTeams/ReleaseNotes/1_1_9.md b/Packs/MicrosoftGraphTeams/ReleaseNotes/1_1_9.md new file mode 100644 index 000000000000..c6faccd3c25c --- /dev/null +++ b/Packs/MicrosoftGraphTeams/ReleaseNotes/1_1_9.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### O365 Teams (Using Graph API) +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftGraphTeams/pack_metadata.json b/Packs/MicrosoftGraphTeams/pack_metadata.json index ed0cb893bb91..bab42726094f 100644 --- a/Packs/MicrosoftGraphTeams/pack_metadata.json +++ b/Packs/MicrosoftGraphTeams/pack_metadata.json @@ -2,7 +2,7 @@ "name": "MicrosoftGraphTeams", "description": "O365 Teams (Using Graph API) gives you authorized access to a user’s Teams enabling you to facilitate communication through teams as that user, or read conversations and/or messages of that user.", "support": "community", - "currentVersion": "1.1.8", + "currentVersion": "1.1.9", "author": "Joachim Bockland", "url": "", "email": "", diff --git a/Packs/MicrosoftTeams/Integrations/MicrosoftTeamsManagement/MicrosoftTeamsManagement.yml b/Packs/MicrosoftTeams/Integrations/MicrosoftTeamsManagement/MicrosoftTeamsManagement.yml index fbb0bdac533b..1ab50b9530a5 100644 --- a/Packs/MicrosoftTeams/Integrations/MicrosoftTeamsManagement/MicrosoftTeamsManagement.yml +++ b/Packs/MicrosoftTeams/Integrations/MicrosoftTeamsManagement/MicrosoftTeamsManagement.yml @@ -679,7 +679,7 @@ script: - contextPath: MicrosoftTeams.Team.description description: An optional description for the group. type: String - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: '-' subtype: python3 diff --git a/Packs/MicrosoftTeams/ReleaseNotes/1_5_6.md b/Packs/MicrosoftTeams/ReleaseNotes/1_5_6.md new file mode 100644 index 000000000000..8a665fd25187 --- /dev/null +++ b/Packs/MicrosoftTeams/ReleaseNotes/1_5_6.md @@ -0,0 +1,11 @@ + +#### Integrations + +##### Microsoft Teams Management +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + + + + + diff --git a/Packs/MicrosoftTeams/pack_metadata.json b/Packs/MicrosoftTeams/pack_metadata.json index 8beeae781828..67c9185b9daf 100644 --- a/Packs/MicrosoftTeams/pack_metadata.json +++ b/Packs/MicrosoftTeams/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Teams", "description": "Send messages and notifications to your team members.", "support": "xsoar", - "currentVersion": "1.5.5", + "currentVersion": "1.5.6", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Mimecast/ReleaseNotes/2_5_4.md b/Packs/Mimecast/ReleaseNotes/2_5_4.md new file mode 100644 index 000000000000..1c2a7c9b8e14 --- /dev/null +++ b/Packs/Mimecast/ReleaseNotes/2_5_4.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### MimecastFindEmail +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Mimecast/Scripts/MimecastFindEmail/MimecastFindEmail.yml b/Packs/Mimecast/Scripts/MimecastFindEmail/MimecastFindEmail.yml index b993c5464480..abb68866788a 100644 --- a/Packs/Mimecast/Scripts/MimecastFindEmail/MimecastFindEmail.yml +++ b/Packs/Mimecast/Scripts/MimecastFindEmail/MimecastFindEmail.yml @@ -74,6 +74,6 @@ dependson: - mimecast-query timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/Mimecast/pack_metadata.json b/Packs/Mimecast/pack_metadata.json index 9ec691df2452..d01ab88e89d8 100644 --- a/Packs/Mimecast/pack_metadata.json +++ b/Packs/Mimecast/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Mimecast", "description": "Mimecast unified email management offers cloud email services for email security, continuity and archiving emails. Read the detailed instructions to understand how to configure the integration's parameters.", "support": "xsoar", - "currentVersion": "2.5.3", + "currentVersion": "2.5.4", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/NetBox/Integrations/NetBoxEventCollector/NetBoxEventCollector.yml b/Packs/NetBox/Integrations/NetBoxEventCollector/NetBoxEventCollector.yml index 9b29c7b382cb..f5acaee562ec 100644 --- a/Packs/NetBox/Integrations/NetBoxEventCollector/NetBoxEventCollector.yml +++ b/Packs/NetBox/Integrations/NetBoxEventCollector/NetBoxEventCollector.yml @@ -58,7 +58,7 @@ script: name: limit description: Gets events from NetBox. name: netbox-get-events - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 isfetchevents: true script: '-' subtype: python3 diff --git a/Packs/NetBox/ReleaseNotes/1_0_18.md b/Packs/NetBox/ReleaseNotes/1_0_18.md new file mode 100644 index 000000000000..6eb372ff348f --- /dev/null +++ b/Packs/NetBox/ReleaseNotes/1_0_18.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### NetBox Event Collector +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/NetBox/pack_metadata.json b/Packs/NetBox/pack_metadata.json index 2e3139cd6b87..e253dab9c875 100644 --- a/Packs/NetBox/pack_metadata.json +++ b/Packs/NetBox/pack_metadata.json @@ -2,7 +2,7 @@ "name": "NetBox", "description": "This is the NetBox event collector integration for XSIAM", "support": "xsoar", - "currentVersion": "1.0.17", + "currentVersion": "1.0.18", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Netcraft_V2/Integrations/Netcraft/Netcraft.yml b/Packs/Netcraft_V2/Integrations/Netcraft/Netcraft.yml index 511a27efd0a1..8c736ebc45db 100644 --- a/Packs/Netcraft_V2/Integrations/Netcraft/Netcraft.yml +++ b/Packs/Netcraft_V2/Integrations/Netcraft/Netcraft.yml @@ -1499,7 +1499,7 @@ script: type: string script: '-' type: python - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 subtype: python3 isfetch: true runonce: false diff --git a/Packs/Netcraft_V2/ReleaseNotes/1_0_3.md b/Packs/Netcraft_V2/ReleaseNotes/1_0_3.md new file mode 100644 index 000000000000..06c140c0704b --- /dev/null +++ b/Packs/Netcraft_V2/ReleaseNotes/1_0_3.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Netcraft +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Netcraft_V2/pack_metadata.json b/Packs/Netcraft_V2/pack_metadata.json index 96bc8bc1f97c..5582ba32d4f0 100644 --- a/Packs/Netcraft_V2/pack_metadata.json +++ b/Packs/Netcraft_V2/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Netcraft", "description": "Netcraft takedown, submission and screenshot management.", "support": "xsoar", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Netskope/Integrations/NetskopeAPIv1/NetskopeAPIv1.yml b/Packs/Netskope/Integrations/NetskopeAPIv1/NetskopeAPIv1.yml index 750ea017aae4..144f348ba535 100644 --- a/Packs/Netskope/Integrations/NetskopeAPIv1/NetskopeAPIv1.yml +++ b/Packs/Netskope/Integrations/NetskopeAPIv1/NetskopeAPIv1.yml @@ -494,7 +494,7 @@ script: - contextPath: Netskope.Host.agent_status description: The status of the agent on the device. type: String - dockerimage: demisto/python3:3.11.9.105369 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: "-" diff --git a/Packs/Netskope/Integrations/NetskopeEventCollector/NetskopeEventCollector.yml b/Packs/Netskope/Integrations/NetskopeEventCollector/NetskopeEventCollector.yml index 8163cc7c756c..6ec9258f04d9 100644 --- a/Packs/Netskope/Integrations/NetskopeEventCollector/NetskopeEventCollector.yml +++ b/Packs/Netskope/Integrations/NetskopeEventCollector/NetskopeEventCollector.yml @@ -75,7 +75,7 @@ script: defaultValue: 10000 description: Returns events extracted from SaaS traffic and or logs. name: netskope-get-events - dockerimage: demisto/python3:3.11.9.107421 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Netskope/ReleaseNotes/4_0_1.md b/Packs/Netskope/ReleaseNotes/4_0_1.md new file mode 100644 index 000000000000..c17de7049a5e --- /dev/null +++ b/Packs/Netskope/ReleaseNotes/4_0_1.md @@ -0,0 +1,13 @@ + +#### Integrations + +##### Netskope Event Collector +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + +##### Netskope (API v1) +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Netskope/pack_metadata.json b/Packs/Netskope/pack_metadata.json index 6dde75ac5487..7edd223200ee 100644 --- a/Packs/Netskope/pack_metadata.json +++ b/Packs/Netskope/pack_metadata.json @@ -2,15 +2,20 @@ "name": "Netskope", "description": "Cloud access security broker that enables to find, understand, and secure cloud apps.", "support": "xsoar", - "currentVersion": "4.0.0", + "currentVersion": "4.0.1", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", "created": "2020-04-14T00:00:00Z", - "categories": ["Network Security"], + "categories": [ + "Network Security" + ], "tags": [], "useCases": [], "keywords": [], - "marketplaces": ["xsoar", "marketplacev2"], + "marketplaces": [ + "xsoar", + "marketplacev2" + ], "defaultDataSource": "NetskopeEventCollector" -} +} \ No newline at end of file diff --git a/Packs/NutanixHypervisor/Integrations/NutanixHypervisor/NutanixHypervisor.yml b/Packs/NutanixHypervisor/Integrations/NutanixHypervisor/NutanixHypervisor.yml index 9fece53260bd..b947d2933689 100644 --- a/Packs/NutanixHypervisor/Integrations/NutanixHypervisor/NutanixHypervisor.yml +++ b/Packs/NutanixHypervisor/Integrations/NutanixHypervisor/NutanixHypervisor.yml @@ -779,7 +779,7 @@ script: - contextPath: NutanixHypervisor.ResolvedFilterAlerts.alert_status_list.message description: Message returned by the resolve operation. type: String - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true script: '' subtype: python3 diff --git a/Packs/NutanixHypervisor/ReleaseNotes/1_0_25.md b/Packs/NutanixHypervisor/ReleaseNotes/1_0_25.md new file mode 100644 index 000000000000..649a11ae0689 --- /dev/null +++ b/Packs/NutanixHypervisor/ReleaseNotes/1_0_25.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Nutanix Hypervisor +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/NutanixHypervisor/pack_metadata.json b/Packs/NutanixHypervisor/pack_metadata.json index 38550e9ea490..f97aecccdb52 100644 --- a/Packs/NutanixHypervisor/pack_metadata.json +++ b/Packs/NutanixHypervisor/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Nutanix Hypervisor", "description": "Nutanix Hypervisor abstracts and isolates the VMs and their programs from the underlying server hardware, enabling a more efficient use of physical resources, simpler maintenance and operations, and reduced costs.", "support": "xsoar", - "currentVersion": "1.0.24", + "currentVersion": "1.0.25", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/OSQuery/ReleaseNotes/1_0_11.md b/Packs/OSQuery/ReleaseNotes/1_0_11.md new file mode 100644 index 000000000000..e7d196842166 --- /dev/null +++ b/Packs/OSQuery/ReleaseNotes/1_0_11.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### OSQueryBasicQuery +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/OSQuery/Scripts/OSQueryBasicQuery/OSQueryBasicQuery.yml b/Packs/OSQuery/Scripts/OSQueryBasicQuery/OSQueryBasicQuery.yml index 3ccdbf5b4b1c..e730d78afc16 100644 --- a/Packs/OSQuery/Scripts/OSQueryBasicQuery/OSQueryBasicQuery.yml +++ b/Packs/OSQuery/Scripts/OSQueryBasicQuery/OSQueryBasicQuery.yml @@ -25,6 +25,6 @@ dependson: - RemoteExec timeout: 0s fromversion: 5.0.0 -dockerimage: demisto/python3:3.10.13.83255 +dockerimage: demisto/python3:3.11.10.115186 tests: - No tests (auto formatted) diff --git a/Packs/OSQuery/pack_metadata.json b/Packs/OSQuery/pack_metadata.json index cace562072d7..2fac983ada90 100644 --- a/Packs/OSQuery/pack_metadata.json +++ b/Packs/OSQuery/pack_metadata.json @@ -2,7 +2,7 @@ "name": "OS Query", "description": "Run OS query on a linux system.", "support": "xsoar", - "currentVersion": "1.0.10", + "currentVersion": "1.0.11", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Office365/ModelingRules/Office365/Office365.xif b/Packs/Office365/ModelingRules/Office365/Office365.xif index 20d882eaa43d..0cab66e3ae34 100644 --- a/Packs/Office365/ModelingRules/Office365/Office365.xif +++ b/Packs/Office365/ModelingRules/Office365/Office365.xif @@ -47,7 +47,7 @@ call o365_common_fields xdm.target.resource.name = coalesce(formname, objectid_clean), xdm.source.host.device_id = EntityId, xdm.email.sender = p2sender, - xdm.email.recipients = coalesce(arraycreate(targetuserid), arraycreate(ReleaseTo), arraycreate(recipients)), + xdm.email.recipients = if(arraystring(arraycreate(targetuserid), ", ") != "", arraycreate(targetuserid), arraystring(arraycreate(ReleaseTo), ", ") != "", arraycreate(ReleaseTo), arraycreate(recipients)), xdm.source.user.username = coalesce(username, members_displayname), xdm.source.user.upn = coalesce(members_upn, actoruserid, UserId), xdm.source.user.user_type = if(user_type_string ~= "0|1|2|3", XDM_CONST.USER_TYPE_REGULAR, user_type_string ~= "4|5|6|7|8", XDM_CONST.USER_TYPE_SERVICE_ACCOUNT), @@ -67,9 +67,9 @@ call o365_common_fields xdm.email.message_id = coalesce(NetworkMessageId, to_string(messageid), internetmessageid), xdm.target.file.file_type = FileType, xdm.target.file.sha256 = `sha256`, - xdm.event.outcome = if(EnforcementMode = 1, XDM_CONST.OUTCOME_UNKNOWN, to_string(EnforcementMode) ~= "2|3", XDM_CONST.OUTCOME_PARTIAL, EnforcementMode = 4, XDM_CONST.OUTCOME_FAILED, EnforcementMode = 5, XDM_CONST.OUTCOME_SUCCESS, ResultStatus = "Succeeded", XDM_CONST.OUTCOME_SUCCESS, ResultStatus = "PartiallySucceeded", XDM_CONST.OUTCOME_PARTIAL, ResultStatus = "Failed", XDM_CONST.OUTCOME_FAILED, ResultStatus ~= "[Tt]rue", XDM_CONST.OUTCOME_SUCCESS, ResultStatus ~= "[Ff]alse", XDM_CONST.OUTCOME_FAILED), + xdm.event.outcome = if(EnforcementMode = 1, XDM_CONST.OUTCOME_UNKNOWN, to_string(EnforcementMode) ~= "2|3", XDM_CONST.OUTCOME_PARTIAL, EnforcementMode = 4, XDM_CONST.OUTCOME_FAILED, EnforcementMode = 5, XDM_CONST.OUTCOME_SUCCESS, lowercase(ResultStatus) = "partiallysucceeded", XDM_CONST.OUTCOME_PARTIAL, lowercase(ResultStatus) ~= "succe", XDM_CONST.OUTCOME_SUCCESS, ResultStatus = "Failed", XDM_CONST.OUTCOME_FAILED, lowercase(ResultStatus) = "true", XDM_CONST.OUTCOME_SUCCESS, lowercase(ResultStatus) = "false", XDM_CONST.OUTCOME_FAILED), xdm.event.outcome_reason = coalesce(Reason, translate_EnforcementMode, ResultStatus), - xdm.observer.action = coalesce(to_string(actions), Status, translate_EnforcementMode, ResultStatus), + xdm.observer.action = coalesce(to_string(actions), Status, translate_EnforcementMode), xdm.network.rule = Name, xdm.source.host.hostname = coalesce(entityname, DeviceName), xdm.alert.severity = Severity, @@ -123,7 +123,6 @@ call o365_common_fields xdm.source.user.identifier = coalesce(LogonUserSid, UserKey), xdm.source.user.username = LogonUserDisplayName, xdm.intermediate.host.hostname = OriginatingServer, - xdm.target.resource.id = formid, xdm.observer.type = Workload, xdm.source.ipv4 = check_src_ipv4, xdm.source.ipv6 = check_src_ipv6, @@ -134,7 +133,7 @@ call o365_common_fields xdm.email.subject = coalesce(replex(Item -> Subject, "\"", ""), replex(ExchangeMetaData -> Subject, "\"", "")), xdm.source.process.name = arraystring(regextract(ClientProcessName, "^(\S+)\.\S+"), ""), xdm.email.sender = coalesce(ExchangeMetaData -> From, sender), - xdm.email.recipients = coalesce(arraymap(ExchangeMetaData -> To[], replex("@element", "\"", "")), arraycreate(receivers)), + xdm.email.recipients = if(arraystring(arraycreate(receivers), ", ") != "", arraycreate(receivers), arraymap(ExchangeMetaData -> To[], replex("@element", "\"", ""))), xdm.email.cc = arraymap(ExchangeMetaData -> CC[], replex("@element", "\"", "")), xdm.email.bcc = arraymap(ExchangeMetaData -> BCC[], replex("@element", "\"", "")), xdm.email.origination_timestamp = parse_timestamp( "%Y-%m-%dT%H:%M:%S", ExchangeMetaData -> Sent), diff --git a/Packs/Office365/ReleaseNotes/1_0_7.md b/Packs/Office365/ReleaseNotes/1_0_7.md new file mode 100644 index 000000000000..ff518519e4a1 --- /dev/null +++ b/Packs/Office365/ReleaseNotes/1_0_7.md @@ -0,0 +1,6 @@ +#### Modeling Rules +##### Office 365 Modeling Rule +Improved implementation of Modeling Rule for the following fields: +- *xdm.email.recipients* +- *xdm.observer.action* +- *xdm.event.outcome* diff --git a/Packs/Office365/pack_metadata.json b/Packs/Office365/pack_metadata.json index 92a45879b102..0e7459bf17bf 100644 --- a/Packs/Office365/pack_metadata.json +++ b/Packs/Office365/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Office 365", "description": "The product family of productivity and collaboration cloud based softwares owned by Microsoft.", "support": "xsoar", - "currentVersion": "1.0.6", + "currentVersion": "1.0.7", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Okta/Integrations/OktaEventCollector/OktaEventCollector.py b/Packs/Okta/Integrations/OktaEventCollector/OktaEventCollector.py index 93a4cb78de37..d31c54b3b387 100644 --- a/Packs/Okta/Integrations/OktaEventCollector/OktaEventCollector.py +++ b/Packs/Okta/Integrations/OktaEventCollector/OktaEventCollector.py @@ -1,6 +1,6 @@ from http import HTTPStatus from typing import cast - +from dateutil.parser import parse from CommonServerPython import * VENDOR = "okta" @@ -131,7 +131,14 @@ def get_last_run(events: List[dict], last_run_after, next_link) -> dict: if event.get('published') != last_time: break ids.append(event.get('uuid')) - last_time = datetime.strptime(str(last_time).lower().replace('z', ''), '%Y-%m-%dt%H:%M:%S.%f') + try: + last_time = datetime.strptime(str(last_time).lower().replace('z', ''), '%Y-%m-%dt%H:%M:%S.%f') + except ValueError: + last_time = parse(str(last_time).lower().replace('z', '')) + except Exception as e: # General exception + demisto.error(f'Unexpected error parsing published date from event: {e}') + return {} + return {'after': last_time.isoformat(), 'ids': ids, 'next_link': next_link} @@ -160,7 +167,7 @@ def fetch_events(client: Client, return events, next_link -def main(): # pragma: no cover +def main(): try: start_time_epoch = int(time.time()) demisto_params = demisto.params() @@ -179,7 +186,7 @@ def main(): # pragma: no cover get_events_command(client, events_limit, since=after.isoformat()) demisto.results('ok') - if command == 'okta-get-events': + elif command == 'okta-get-events': after = cast(datetime, dateparser.parse(demisto_args.get('from_date').strip())) events, _, _ = get_events_command(client, events_limit, since=after.isoformat()) command_results = CommandResults( @@ -205,10 +212,14 @@ def main(): # pragma: no cover last_run_after=last_run_after, last_object_ids=last_object_ids, next_link=next_link) demisto.debug(f'sending_events_to_xsiam: {len(events)}') send_events_to_xsiam(events[:events_limit], vendor=VENDOR, product=PRODUCT) - demisto.setLastRun(get_last_run(events, last_run_after, next_link)) + last_run = get_last_run(events, last_run_after, next_link) + if last_run: + demisto.setLastRun(get_last_run(events, last_run_after, next_link)) + else: + return_error('Unrecognized command: ' + demisto.command()) except Exception as e: - return_error(f'Failed to execute {demisto.command()} command. Error: {str(e)}') + return_error(f'Failed to execute {demisto.command()} command. Error: {e}') if __name__ in ('__main__', '__builtin__', 'builtins'): diff --git a/Packs/Okta/Integrations/OktaEventCollector/OktaEventCollector.yml b/Packs/Okta/Integrations/OktaEventCollector/OktaEventCollector.yml index c99544759b8e..2aa7f6b606b0 100644 --- a/Packs/Okta/Integrations/OktaEventCollector/OktaEventCollector.yml +++ b/Packs/Okta/Integrations/OktaEventCollector/OktaEventCollector.yml @@ -73,7 +73,7 @@ script: required: false description: Manual command to fetch events and display them. name: okta-get-events - dockerimage: demisto/fastapi:0.115.4.115067 + dockerimage: demisto/fastapi:0.115.5.117397 isfetchevents: true subtype: python3 marketplaces: diff --git a/Packs/Okta/Integrations/OktaEventCollector/OktaEventCollector_test.py b/Packs/Okta/Integrations/OktaEventCollector/OktaEventCollector_test.py index da96791f0dfe..3f85b3793f1b 100644 --- a/Packs/Okta/Integrations/OktaEventCollector/OktaEventCollector_test.py +++ b/Packs/Okta/Integrations/OktaEventCollector/OktaEventCollector_test.py @@ -1,9 +1,9 @@ from unittest.mock import MagicMock - +import dateutil.parser._parser import pytest from freezegun import freeze_time from OktaEventCollector import Client, DemistoException, fetch_events, get_events_command, get_last_run, main, remove_duplicates - +import requests_mock import demistomock as demisto @@ -71,11 +71,36 @@ def test_remove_duplicates(events, ids, result): '1d0844b6-3148-11ec-9027-a5b57ec5fbbb'], 'next_link': ''}), ([], '2022-04-17T12:31:36.667', - {'after': '2022-04-17T12:31:36.667000', 'ids': [], 'next_link': ''})]) + {'after': '2022-04-17T12:31:36.667000', 'ids': [], 'next_link': ''}) +]) def test_get_last_run(events, last_run_after, result): assert get_last_run(events, last_run_after, next_link='') == result +def test_get_last_run_with_different_format(): + events = [{'published': '2022-04-17T12:31:36', + 'uuid': '1d0844b6-3148-11ec-9027-a5b57ec5faaa'}, + {'published': '2022-04-17T12:32:36', + 'uuid': '1d0844b6-3148-11ec-9027-a5b57ec5fbbb'}, + {'published': '2022-04-17T12:33:36', + 'uuid': '1d0844b6-3148-11ec-9027-a5b57ec5fccc'}] + last_run_after = '2022-04-17T11:30:00' + expected_result = {'after': '2022-04-17T12:33:36', 'ids': ['1d0844b6-3148-11ec-9027-a5b57ec5fccc'], 'next_link': ''} + assert get_last_run(events, last_run_after, next_link='') == expected_result + + +def test_get_last_run_invalid_date_format(): + events = [{'published': '2022-04-17T12:31:36', + 'uuid': '1d0844b6-3148-11ec-9027-a5b57ec5faaa'}, + {'published': '2022-04-17T12:32:36', + 'uuid': '1d0844b6-3148-11ec-9027-a5b57ec5fbbb'}, + {'published': 'xxxyyyzzz', + 'uuid': '1d0844b6-3148-11ec-9027-a5b57ec5fccc'}] + last_run_after = '2022-04-17T11:30:00' + with pytest.raises(dateutil.parser._parser.ParserError): + get_last_run(events, last_run_after, next_link='') + + def test_get_events_success(dummy_client, mocker): mock_remove_duplicates = MagicMock() mock_remove_duplicates.return_value = [{'id': 1, @@ -143,7 +168,7 @@ def test_fetch_event(dummy_client, mocker): @freeze_time('2022-04-17T12:32:36.667Z') -def test_429_too_many_requests(mocker, requests_mock): +def test_429_too_many_requests(mocker): mock_events = [ { @@ -163,16 +188,6 @@ def test_429_too_many_requests(mocker, requests_mock): 'published': '2022-04-17T14:00:03.000Z' } ] - requests_mock.get( - 'https://testurl.com/api/v1/logs?since=2022-04-17T12%3A32%3A36.667000%2B00%3A00&sortOrder=ASCENDING&limit=5', - json=mock_events) - requests_mock.get('https://testurl.com/api/v1/logs?since=2022-04-17T14%3A00%3A03.000Z&sortOrder=ASCENDING&limit=5', - status_code=429, - reason='Too many requests', - headers={ - 'x-rate-limit-remaining': '0', - 'x-rate-limit-reset': '1698343702', - }) mocker.patch.object(demisto, 'command', return_value='fetch-events') mocker.patch.object(demisto, 'getLastRun', return_value={}) @@ -188,6 +203,72 @@ def test_429_too_many_requests(mocker, requests_mock): }) send_events_to_xsiam_mock = mocker.patch('OktaEventCollector.send_events_to_xsiam', return_value={}) - main() + with requests_mock.Mocker() as m: + m.get( + 'https://testurl.com/api/v1/logs?since=2022-04-17T12%3A32%3A36.667000%2B00%3A00&sortOrder=ASCENDING&limit=5', + json=mock_events) + m.get('https://testurl.com/api/v1/logs?since=2022-04-17T14%3A00%3A03.000Z&sortOrder=ASCENDING&limit=5', + status_code=429, + reason='Too many requests', + headers={ + 'x-rate-limit-remaining': '0', + 'x-rate-limit-reset': '1698343702', + }) + + main() send_events_to_xsiam_mock.assert_called_once_with(mock_events, vendor='okta', product='okta') + + +@freeze_time('2022-04-17T12:32:36.667Z') +@pytest.mark.parametrize("address, command", [ + ('https://testurl.com/api/v1/logs?sortOrder=ASCENDING&since=2022-04-16T12%3A32%3A36.667000&limit=5', 'okta-get-events'), + ('https://testurl.com/api/v1/logs?sortOrder=ASCENDING&since=2022-04-17T11%3A32%3A36.667000&limit=5', 'test-module') +]) +def test_okta_get_events(mocker, address, command): + + mock_events = [ + { + 'uuid': 1, + 'published': '2022-04-17T14:00:00.000Z' + }, + { + 'uuid': 2, + 'published': '2022-04-17T14:00:01.000Z' + }, + { + 'uuid': 3, + 'published': '2022-04-17T14:00:02.000Z' + }, + { + 'uuid': 4, + 'published': '2022-04-17T14:00:03.000Z' + } + ] + mocker.patch.object(demisto, 'command', return_value=command) + mocker.patch.object(demisto, 'getLastRun', return_value={}) + mocker.patch.object(demisto, 'args', return_value={ + 'from_date': '1 day', + 'should_push_events': True, + }) + mocker.patch.object(demisto, 'params', return_value={ + 'url': 'https://testurl.com', + 'api_key': { + 'password': 'TESTAPIKEY' + }, + 'limit': 5, + 'after': '2022-04-17T12:32:36.667Z', + 'proxy': False, + 'verify': False + }) + send_events_to_xsiam_mock = mocker.patch('OktaEventCollector.send_events_to_xsiam', return_value={}) + with requests_mock.Mocker() as m: + m.get( + address, + json=mock_events) + main() + + if command == 'test-module': + send_events_to_xsiam_mock.assert_not_called() + else: + send_events_to_xsiam_mock.assert_called_once_with(mock_events, vendor='okta', product='okta') diff --git a/Packs/Okta/Integrations/Okta_IAM/Okta_IAM.yml b/Packs/Okta/Integrations/Okta_IAM/Okta_IAM.yml index a627ed911e0d..ee6f697aaf97 100644 --- a/Packs/Okta/Integrations/Okta_IAM/Okta_IAM.yml +++ b/Packs/Okta/Integrations/Okta_IAM/Okta_IAM.yml @@ -535,7 +535,7 @@ script: - contextPath: Okta.Logs.Events.target.displayName description: Display name of a target. type: String - dockerimage: demisto/python3:3.10.14.95663 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true runonce: false script: '-' diff --git a/Packs/Okta/Integrations/Okta_v2/Okta_v2.yml b/Packs/Okta/Integrations/Okta_v2/Okta_v2.yml index 8d933b47829c..4a33eb525e0d 100644 --- a/Packs/Okta/Integrations/Okta_v2/Okta_v2.yml +++ b/Packs/Okta/Integrations/Okta_v2/Okta_v2.yml @@ -1506,7 +1506,7 @@ script: - description: Reset OAuth authentication data (authentication process will start from the beginning, and a new token will be generated). name: okta-auth-reset arguments: [] - dockerimage: demisto/crypto:1.0.0.111961 + dockerimage: demisto/crypto:1.0.0.114611 runonce: false script: "" subtype: python3 diff --git a/Packs/Okta/ReleaseNotes/3_3_7.md b/Packs/Okta/ReleaseNotes/3_3_7.md new file mode 100644 index 000000000000..9ec5cfa336f7 --- /dev/null +++ b/Packs/Okta/ReleaseNotes/3_3_7.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Okta Event Collector + +- Improved implementation of date parsing for events. +- Updated the Docker image to: *demisto/fastapi:0.115.5.117397*. diff --git a/Packs/Okta/ReleaseNotes/3_3_8.md b/Packs/Okta/ReleaseNotes/3_3_8.md new file mode 100644 index 000000000000..9590d4b0c8df --- /dev/null +++ b/Packs/Okta/ReleaseNotes/3_3_8.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Okta v2 +- Updated the Docker image to: *demisto/crypto:1.0.0.114611*. + + diff --git a/Packs/Okta/ReleaseNotes/3_3_9.md b/Packs/Okta/ReleaseNotes/3_3_9.md new file mode 100644 index 000000000000..4f8873e67bd5 --- /dev/null +++ b/Packs/Okta/ReleaseNotes/3_3_9.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Okta IAM +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Okta/pack_metadata.json b/Packs/Okta/pack_metadata.json index 1860f150e7f7..151704c8aeb7 100644 --- a/Packs/Okta/pack_metadata.json +++ b/Packs/Okta/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Okta", "description": "Integration with Okta's cloud-based identity management service.", "support": "xsoar", - "currentVersion": "3.3.6", + "currentVersion": "3.3.9", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/OktaAuth0/Integrations/OktaAuth0EventCollector/OktaAuth0EventCollector.yml b/Packs/OktaAuth0/Integrations/OktaAuth0EventCollector/OktaAuth0EventCollector.yml index 9fbfaf93892f..8b724bc8d187 100644 --- a/Packs/OktaAuth0/Integrations/OktaAuth0EventCollector/OktaAuth0EventCollector.yml +++ b/Packs/OktaAuth0/Integrations/OktaAuth0EventCollector/OktaAuth0EventCollector.yml @@ -61,7 +61,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.87159 + dockerimage: demisto/python3:3.11.10.115186 marketplaces: - marketplacev2 fromversion: 8.2.0 diff --git a/Packs/OktaAuth0/ReleaseNotes/1_0_3.md b/Packs/OktaAuth0/ReleaseNotes/1_0_3.md new file mode 100644 index 000000000000..135cf397a15e --- /dev/null +++ b/Packs/OktaAuth0/ReleaseNotes/1_0_3.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Okta Auth0 Event Collector +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/OktaAuth0/pack_metadata.json b/Packs/OktaAuth0/pack_metadata.json index a8ea82975386..63c7949fe8df 100644 --- a/Packs/OktaAuth0/pack_metadata.json +++ b/Packs/OktaAuth0/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Okta Auth0", "description": "Identity platform to manage access to your applications.", "support": "xsoar", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/OnboardingIntegration/ReleaseNotes/1_1_5.md b/Packs/OnboardingIntegration/ReleaseNotes/1_1_5.md new file mode 100644 index 000000000000..df63ba20c1e0 --- /dev/null +++ b/Packs/OnboardingIntegration/ReleaseNotes/1_1_5.md @@ -0,0 +1,8 @@ + +#### Scripts + +##### OnboardingCleanup +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/OnboardingIntegration/Scripts/OnboardingCleanup/OnboardingCleanup.yml b/Packs/OnboardingIntegration/Scripts/OnboardingCleanup/OnboardingCleanup.yml index 7ce10f7e168b..cefc5a8c721f 100644 --- a/Packs/OnboardingIntegration/Scripts/OnboardingCleanup/OnboardingCleanup.yml +++ b/Packs/OnboardingIntegration/Scripts/OnboardingCleanup/OnboardingCleanup.yml @@ -13,7 +13,7 @@ type: python tags: [] enabled: true scripttarget: 0 -dockerimage: demisto/python3:3.10.14.91134 +dockerimage: demisto/python3:3.11.10.115186 subtype: python3 tests: - No Tests diff --git a/Packs/OnboardingIntegration/pack_metadata.json b/Packs/OnboardingIntegration/pack_metadata.json index b8dd893d3c40..3b0dcab8e77a 100644 --- a/Packs/OnboardingIntegration/pack_metadata.json +++ b/Packs/OnboardingIntegration/pack_metadata.json @@ -2,7 +2,7 @@ "name": "OnboardingIntegration", "description": "Creates mock email incidents using one of two randomly selected HTML templates. Textual content is randomly generated and defined to include some text (100 random words) and the following data (at least 5 of each data type): IP addresses, URLs, SHA-1 hashes, SHA-256 hashes, MD5 hashes, email addresses, domain names.", "support": "xsoar", - "currentVersion": "1.1.4", + "currentVersion": "1.1.5", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/OneLogin/Integrations/OneLoginEventCollector/OneLoginEventCollector.yml b/Packs/OneLogin/Integrations/OneLoginEventCollector/OneLoginEventCollector.yml index c7d302d99b84..cfcd93aeda40 100644 --- a/Packs/OneLogin/Integrations/OneLoginEventCollector/OneLoginEventCollector.yml +++ b/Packs/OneLogin/Integrations/OneLoginEventCollector/OneLoginEventCollector.yml @@ -63,7 +63,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/python3:3.10.13.84405 + dockerimage: demisto/python3:3.11.10.115186 marketplaces: - marketplacev2 fromversion: 6.8.0 diff --git a/Packs/OneLogin/ReleaseNotes/1_0_13.md b/Packs/OneLogin/ReleaseNotes/1_0_13.md new file mode 100644 index 000000000000..482bf6e58f40 --- /dev/null +++ b/Packs/OneLogin/ReleaseNotes/1_0_13.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### OneLogin Event Collector +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/OneLogin/pack_metadata.json b/Packs/OneLogin/pack_metadata.json index 9dc53a660530..53af2519a75c 100644 --- a/Packs/OneLogin/pack_metadata.json +++ b/Packs/OneLogin/pack_metadata.json @@ -2,7 +2,7 @@ "name": "OneLogin", "description": "Simple customer authentication and streamlined workforce identity operations with APIs.", "support": "xsoar", - "currentVersion": "1.0.12", + "currentVersion": "1.0.13", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/OpenCTI/Integrations/OpenCTI/README.md b/Packs/OpenCTI/Integrations/OpenCTI/README.md index 4fdf2cc86ac8..e1e2b0966294 100644 --- a/Packs/OpenCTI/Integrations/OpenCTI/README.md +++ b/Packs/OpenCTI/Integrations/OpenCTI/README.md @@ -1,22 +1,18 @@ Manages indicators from OpenCTI. This integration was tested with version 5.12.17 of OpenCTI. -## Configure OpenCTI on Cortex XSOAR +## Configure OpenCTI in Cortex -1. Navigate to **Settings** > **Integrations** > **Servers & Services**. -2. Search for OpenCTI. -3. Click **Add instance** to create and configure a new integration instance. - | **Parameter** | **Required** | - | --- | --- | - | Base URL | True | - | API Key (leave empty. Fill in the API key in the password field.) | False | - | Trust any certificate (not secure) | False | - | Use system proxy settings | False | +| **Parameter** | **Required** | +| --- | --- | +| Base URL | True | +| API Key (leave empty. Fill in the API key in the password field.) | False | +| Trust any certificate (not secure) | False | +| Use system proxy settings | False | -4. Click **Test** to validate the URLs, token, and connection. ## Commands -You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. +You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details. ### opencti-get-indicators *** @@ -634,4 +630,3 @@ Get a list of all marking definitions. >|---|---| >| TLP:GREEN | dc911977-796a-4d96-95e4-615bd1c41263 | >| TLP:AMBER | 9128e411-c759-4af0-aeb0-b65f12082648 | - diff --git a/Packs/OpenCVE/Integrations/OpenCVE/OpenCVE.yml b/Packs/OpenCVE/Integrations/OpenCVE/OpenCVE.yml index 4117abb8a201..1fb54c8ce8cf 100644 --- a/Packs/OpenCVE/Integrations/OpenCVE/OpenCVE.yml +++ b/Packs/OpenCVE/Integrations/OpenCVE/OpenCVE.yml @@ -203,7 +203,7 @@ script: outputs: - contextPath: vendors description: Vendors. - dockerimage: demisto/python3:3.10.14.99865 + dockerimage: demisto/python3:3.11.10.115186 feed: false isFetchSamples: true runonce: false diff --git a/Packs/OpenCVE/Integrations/OpenCVE/README.md b/Packs/OpenCVE/Integrations/OpenCVE/README.md index a2d4523f324b..db9948dc0811 100644 --- a/Packs/OpenCVE/Integrations/OpenCVE/README.md +++ b/Packs/OpenCVE/Integrations/OpenCVE/README.md @@ -1,24 +1,20 @@ Ingests CVEs from an instance of OpenCVE. -## Configure OpenCVE on Cortex XSOAR +## Configure OpenCVE in Cortex -1. Navigate to **Settings** > **Integrations** > **Servers & Services**. -2. Search for OpenCVE. -3. Click **Add instance** to create and configure a new integration instance. - | **Parameter** | **Description** | **Required** | - | --- | --- | --- | - | Server URL | | True | - | Username | | True | - | Password | | True | - | Source Reliability | Reliability of the source providing the intelligence data. | True | - | Trust any certificate (not secure) | | False | +| **Parameter** | **Description** | **Required** | +| --- | --- | --- | +| Server URL | | True | +| Username | | True | +| Password | | True | +| Source Reliability | Reliability of the source providing the intelligence data. | True | +| Trust any certificate (not secure) | | False | -4. Click **Test** to validate the URLs, token, and connection. ## Commands -You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. +You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details. ### opencve-latest @@ -254,4 +250,4 @@ List the products associated to a vendor or get a specific product of a vendor b | **Path** | **Type** | **Description** | | --- | --- | --- | -| vendors | unknown | Vendors. | +| vendors | unknown | Vendors. | \ No newline at end of file diff --git a/Packs/OpenCVE/ReleaseNotes/1_0_6.md b/Packs/OpenCVE/ReleaseNotes/1_0_6.md new file mode 100644 index 000000000000..11c1cac9f7c1 --- /dev/null +++ b/Packs/OpenCVE/ReleaseNotes/1_0_6.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### OpenCVE +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/OpenCVE/pack_metadata.json b/Packs/OpenCVE/pack_metadata.json index 2414fdc4592e..f2d0f9a4b956 100644 --- a/Packs/OpenCVE/pack_metadata.json +++ b/Packs/OpenCVE/pack_metadata.json @@ -2,7 +2,7 @@ "name": "OpenCVE", "description": "Ingests CVEs from OpenCVE", "support": "xsoar", - "currentVersion": "1.0.5", + "currentVersion": "1.0.6", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/OpenPhish/Integrations/OpenPhish_v2/README.md b/Packs/OpenPhish/Integrations/OpenPhish_v2/README.md index b1567b93f4df..206e7d13152f 100644 --- a/Packs/OpenPhish/Integrations/OpenPhish_v2/README.md +++ b/Packs/OpenPhish/Integrations/OpenPhish_v2/README.md @@ -1,20 +1,16 @@ OpenPhish uses proprietary Artificial Intelligence algorithms to automatically identify zero-day phishing sites and provide comprehensive, actionable, real-time threat intelligence. -## Configure OpenPhish_v2 on Cortex XSOAR +## Configure OpenPhish_v2 in Cortex -1. Navigate to **Settings** > **Integrations** > **Servers & Services**. -2. Search for OpenPhish v2. -3. Click **Add instance** to create and configure a new integration instance. - | **Parameter** | **Description** | **Required** | - | --- | --- | --- | - | https | Use HTTPS connection | False | - | fetchIntervalHours | Database refresh interval \(hours\) | False | - | proxy | Use system proxy settings | False | - | insecure | Trust any certificate \(not secure\) | False | +| **Parameter** | **Description** | **Required** | +| --- | --- | --- | +| https | Use HTTPS connection | False | +| fetchIntervalHours | Database refresh interval \(hours\) | False | +| proxy | Use system proxy settings | False | +| insecure | Trust any certificate \(not secure\) | False | -4. Click **Test** to validate the URLs, token, and connection. ## Commands -You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. +You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details. ### url *** diff --git a/Packs/OpenSourceVulnerabilities/Integrations/OSV/README.md b/Packs/OpenSourceVulnerabilities/Integrations/OSV/README.md index 5cc820c0c0b9..fd6e5d85d7eb 100644 --- a/Packs/OpenSourceVulnerabilities/Integrations/OSV/README.md +++ b/Packs/OpenSourceVulnerabilities/Integrations/OSV/README.md @@ -1,22 +1,18 @@ OSV (Open Source Vulnerability) is a vulnerability database for open source projects. For each vulnerability, it perform bisects to figure out the exact commit that introduces the bug, as well the exact commit that fixes it. This is cross referenced against upstream repositories to figure out the affected tags and commit ranges -## Configure OSV on Cortex XSOAR +## Configure OSV in Cortex -1. Navigate to **Settings** > **Integrations** > **Servers & Services**. -2. Search for OSV. -3. Click **Add instance** to create and configure a new integration instance. - | **Parameter** | **Required** | - | --- | --- | - | Server URL (e.g. https://api.osv.dev) | True | - | Trust any certificate (not secure) | | - | Use system proxy settings | | +| **Parameter** | **Required** | +| --- | --- | +| Server URL (e.g. https://api.osv.dev) | True | +| Trust any certificate (not secure) | | +| Use system proxy settings | | -4. Click **Test** to validate the URLs, token, and connection. ## Commands -You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. +You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details. ### osv-get-vuln-by-id @@ -112,4 +108,4 @@ Query vulnerabilities for a particular project based on package name and verion | OSV.VulnerabilityList.vulns.affected.ranges.events.introduced | string | The earliest version/commit where this vulnerability was introduced in. | | OSV.VulnerabilityList.vulns.affected.ranges.events.fixed | string | The version/commit that this vulnerability was fixed in. | | OSV.VulnerabilityList.vulns.affected.ranges.events.limit | string | The limit to apply to the range. | -| OSV.VulnerabilityList.vulns.references.url | string | Reference URL for more details. | +| OSV.VulnerabilityList.vulns.references.url | string | Reference URL for more details. | \ No newline at end of file diff --git a/Packs/OpsGenie/Integrations/OpsGenieV3/OpsGenieV3.yml b/Packs/OpsGenie/Integrations/OpsGenieV3/OpsGenieV3.yml index aef5e98bb9a6..f33029e84ab0 100644 --- a/Packs/OpsGenie/Integrations/OpsGenieV3/OpsGenieV3.yml +++ b/Packs/OpsGenie/Integrations/OpsGenieV3/OpsGenieV3.yml @@ -1392,7 +1392,7 @@ script: - contextPath: OpsGenie.AddAlertDetails.success description: Whether the request was successful. type: Boolean - dockerimage: demisto/python3:3.10.14.100715 + dockerimage: demisto/python3:3.11.10.115186 isfetch: true script: '-' type: python diff --git a/Packs/OpsGenie/Integrations/OpsGenieV3/README.md b/Packs/OpsGenie/Integrations/OpsGenieV3/README.md index 21cd23f856db..db81ae5393b7 100644 --- a/Packs/OpsGenie/Integrations/OpsGenieV3/README.md +++ b/Packs/OpsGenie/Integrations/OpsGenieV3/README.md @@ -4,31 +4,27 @@ This integration was integrated and tested with OpsGenie. Some changes have been made that might affect your existing content. If you are upgrading from a previous of this integration, see [Breaking Changes](#breaking-changes-from-the-previous-version-of-this-integration-opsgenie-v3). -## Configure OpsGenie v3 on Cortex XSOAR - -1. Navigate to **Settings** > **Integrations** > **Servers & Services**. -2. Search for OpsGenie v3. -3. Click **Add instance** to create and configure a new integration instance. - - | **Parameter** | **Description** | **Required** | - | --- | --- | --- | - | Server URL (e.g., https://api.opsgenie.com) | | True | - | API Token | | False | - | Fetch incidents | | False | - | First fetch timestamp (<number> <time unit>, e.g., 12 hours, 7 days) | | False | - | Max Fetch | | False | - | Event types | Fetch only events with selected event types. | False | - | Status | Fetch only events with selected status. If query is used, this parameter will be overridden. | False | - | Priority | Fetch only events with selected priority. If query is used, this parameter will be overridden. | False | - | Tags | Fetch only events with selected tags. If query is used, this parameter will be overridden. | False | - | Query | Query parameters will be used as URL encoded values for “query” key. i.e. 'https://api.opsgenie.com/v2/alerts?query=status%3Aopenor%20acknowledged%3Atrue&amp;limit=10&amp;sort=createdAt' | False | - | Incident type | | False | - | Trust any certificate (not secure) | | False | - | Use system proxy settings | | False | - -4. Click **Test** to validate the URLs, token, and connection. +## Configure OpsGenie v3 in Cortex + + +| **Parameter** | **Description** | **Required** | +| --- | --- | --- | +| Server URL (e.g., https://api.opsgenie.com) | | True | +| API Token | | False | +| Fetch incidents | | False | +| First fetch timestamp (<number> <time unit>, e.g., 12 hours, 7 days) | | False | +| Max Fetch | | False | +| Event types | Fetch only events with selected event types. | False | +| Status | Fetch only events with selected status. If query is used, this parameter will be overridden. | False | +| Priority | Fetch only events with selected priority. If query is used, this parameter will be overridden. | False | +| Tags | Fetch only events with selected tags. If query is used, this parameter will be overridden. | False | +| Query | Query parameters will be used as URL encoded values for “query” key. i.e. 'https://api.opsgenie.com/v2/alerts?query=status%3Aopenor%20acknowledged%3Atrue&amp;limit=10&amp;sort=createdAt' | False | +| Incident type | | False | +| Trust any certificate (not secure) | | False | +| Use system proxy settings | | False | + ## Commands -You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. +You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details. ### opsgenie-create-alert *** @@ -1954,4 +1950,4 @@ Adds details to an OpsGenie Alert. | OpsGenie.AddAlertDetails.processedAt | Date | When the request was processed. | | OpsGenie.AddAlertDetails.requestId | String | The ID of the request. | | OpsGenie.AddAlertDetails.status | String | The human readable result of the request. | -| OpsGenie.AddAlertDetails.success | Boolean | Whether the request was successful. | +| OpsGenie.AddAlertDetails.success | Boolean | Whether the request was successful. | \ No newline at end of file diff --git a/Packs/OpsGenie/ReleaseNotes/2_0_25.md b/Packs/OpsGenie/ReleaseNotes/2_0_25.md new file mode 100644 index 000000000000..6d3fe9348718 --- /dev/null +++ b/Packs/OpsGenie/ReleaseNotes/2_0_25.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### OpsGenie v3 +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/OpsGenie/pack_metadata.json b/Packs/OpsGenie/pack_metadata.json index 34ea8c5e254e..7ca22b7d5271 100644 --- a/Packs/OpsGenie/pack_metadata.json +++ b/Packs/OpsGenie/pack_metadata.json @@ -2,7 +2,7 @@ "name": "OpsGenie", "description": "Get current on-call assignments, schedules, and users info", "support": "xsoar", - "currentVersion": "2.0.24", + "currentVersion": "2.0.25", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Opsgeniev2/Integrations/Opsgeniev2/README.md b/Packs/Opsgeniev2/Integrations/Opsgeniev2/README.md index eb728d7c7ef1..902b44c833de 100644 --- a/Packs/Opsgeniev2/Integrations/Opsgeniev2/README.md +++ b/Packs/Opsgeniev2/Integrations/Opsgeniev2/README.md @@ -1,21 +1,17 @@ Integration with Atlassian OpsGenie V2 This integration was integrated and tested with version 1.0.0 of Opsgeniev2 -## Configure Opsgeniev2 on Cortex XSOAR +## Configure Opsgeniev2 in Cortex -1. Navigate to **Settings** > **Integrations** > **Servers & Services**. -2. Search for Opsgeniev2. -3. Click **Add instance** to create and configure a new integration instance. - | **Parameter** | **Description** | **Required** | - | --- | --- | --- | - | Server URL (e.g. https://example.net) | | True | - | Trust any certificate (not secure) | | False | - | Use system proxy settings | | False | - | API Token | Must be created from the Teams API Integration section. | False | +| **Parameter** | **Description** | **Required** | +| --- | --- | --- | +| Server URL (e.g. https://example.net) | | True | +| Trust any certificate (not secure) | | False | +| Use system proxy settings | | False | +| API Token | Must be created from the Teams API Integration section. | False | -4. Click **Test** to validate the URLs, token, and connection. ## Commands -You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. +You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details. ### list-alerts *** diff --git a/Packs/OracleCloudInfrastructure/Integrations/OracleCloudInfrastructureEventCollector/README.md b/Packs/OracleCloudInfrastructure/Integrations/OracleCloudInfrastructureEventCollector/README.md index b5afdca4f051..9644ac624db1 100644 --- a/Packs/OracleCloudInfrastructure/Integrations/OracleCloudInfrastructureEventCollector/README.md +++ b/Packs/OracleCloudInfrastructure/Integrations/OracleCloudInfrastructureEventCollector/README.md @@ -5,11 +5,8 @@ Audit log events can be used for security audits, to track usage of and changes [Oracle Cloud Infrastructure Audit Logs API documentation](https://docs.oracle.com/en-us/iaas/Content/Logging/Concepts/audit_logs.htm) [Oracle Cloud Infrastructure Audit API Endpoints (available Regions)](https://docs.oracle.com/en-us/iaas/api/#/en/audit/20190901) -## Configure Oracle Cloud Infrastructure Event Collector on Cortex XSIAM +## Configure Oracle Cloud Infrastructure Event Collector in Cortex -1. Navigate to **Settings** > **Configurations** > **Automation & Feed Integrations**. -2. Search for *Oracle Cloud Infrastructure*. -3. Click **Add instance** to create and configure a new integration instance. #### OCI Related Parameters Oracle Cloud Infrastructure SDKs and CLI require basic configuration information, which is achieved by using configuration parameters either with a configuration file or a runtime defined configuration dictionary. This integration uses the runtime defined configuration dictionary. @@ -28,9 +25,8 @@ More about OCI configuration [here](https://docs.oracle.com/en-us/iaas/Content/A | Trust any certificate (not secure) | Use SSL secure connection or ‘None’. | False | | User system proxy settings | Runs the integration instance using the proxy server (HTTP or HTTPS) that you defined in the server configuration. | False | -4. Click **Test** to validate the URLs, tokens, and connection. ## Commands -You can execute the following command from the Cortex XSIAM CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details. +You can execute the following command from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details. #### oracle-cloud-infrastructure-get-events *** @@ -45,4 +41,3 @@ Manual command to fetch and display events. | **Argument Name** | **Description** | **Required** | | --- | --- | --- | | should_push_events | Set this argument to true in order to create events, otherwise the command will only display them. Default is false. | True | - diff --git a/Packs/OracleCloudInfrastructureFeed/Integrations/OracleCloudInfrastructureFeed/README.md b/Packs/OracleCloudInfrastructureFeed/Integrations/OracleCloudInfrastructureFeed/README.md index a48c20e0dd95..e1718a1fc51f 100644 --- a/Packs/OracleCloudInfrastructureFeed/Integrations/OracleCloudInfrastructureFeed/README.md +++ b/Packs/OracleCloudInfrastructureFeed/Integrations/OracleCloudInfrastructureFeed/README.md @@ -1,32 +1,28 @@ Oracle Cloud Infrastructure Feed (OCI Feed) This feed provides information about public IP address ranges for services that are deployed in Oracle Cloud Infrastructure. -## Configure Oracle Cloud Infrastructure Feed on Cortex XSOAR - -1. Navigate to **Settings** > **Integrations** > **Servers & Services**. -2. Search for Oracle Cloud Infrastructure Feed. -3. Click **Add instance** to create and configure a new integration instance. - - | **Parameter** | **Description** | **Required** | - | --- | --- | --- | - | Fetch indicators | | False | - | Server's URL | | True | - | Indicator Reputation | Indicators from this integration instance will be marked with this reputation | False | - | Source Reliability | Reliability of the source providing the intelligence data | True | - | Traffic Light Protocol Color | The Traffic Light Protocol \(TLP\) designation to apply to indicators fetched from the feed | False | - | Feed Fetch Interval | | False | - | Bypass exclusion list | When selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system. | False | - | Trust any certificate (not secure) | | False | - | Use system proxy settings | | False | - | | | False | - | | | False | - | Tags | Supports CSV values. | False | - | Create relationships | | False | - -4. Click **Test** to validate the URLs, token, and connection. +## Configure Oracle Cloud Infrastructure Feed in Cortex + + +| **Parameter** | **Description** | **Required** | +| --- | --- | --- | +| Fetch indicators | | False | +| Server's URL | | True | +| Indicator Reputation | Indicators from this integration instance will be marked with this reputation | False | +| Source Reliability | Reliability of the source providing the intelligence data | True | +| Traffic Light Protocol Color | The Traffic Light Protocol \(TLP\) designation to apply to indicators fetched from the feed | False | +| Feed Fetch Interval | | False | +| Bypass exclusion list | When selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system. | False | +| Trust any certificate (not secure) | | False | +| Use system proxy settings | | False | +| | | False | +| | | False | +| Tags | Supports CSV values. | False | +| Create relationships | | False | + ## Commands -You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. +You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details. ### oci-get-indicators @@ -46,4 +42,4 @@ Gets indicators from the feed. #### Context Output -There is no context output for this command. +There is no context output for this command. \ No newline at end of file diff --git a/Packs/Oracle_IAM/Integrations/OracleIAM/OracleIAM.yml b/Packs/Oracle_IAM/Integrations/OracleIAM/OracleIAM.yml index dfe88207b726..955269ad7129 100644 --- a/Packs/Oracle_IAM/Integrations/OracleIAM/OracleIAM.yml +++ b/Packs/Oracle_IAM/Integrations/OracleIAM/OracleIAM.yml @@ -337,7 +337,7 @@ script: type: Unknown - description: Retrieves a User Profile schema, which holds all of the user fields within the application. Used for outgoing-mapping through the Get Schema option. name: get-mapping-fields - dockerimage: demisto/python3:3.10.14.91134 + dockerimage: demisto/python3:3.11.10.115186 runonce: false script: '-' subtype: python3 diff --git a/Packs/Oracle_IAM/Integrations/OracleIAM/README.md b/Packs/Oracle_IAM/Integrations/OracleIAM/README.md index 8a5d04b85946..e2beff9ba9a8 100644 --- a/Packs/Oracle_IAM/Integrations/OracleIAM/README.md +++ b/Packs/Oracle_IAM/Integrations/OracleIAM/README.md @@ -12,30 +12,26 @@ Integrate with Oracle Identity Access Management service to execute CRUD (create For more information, refer to the [Identity Lifecycle Management article](https://xsoar.pan.dev/docs/reference/articles/identity-lifecycle-management). -## Configure OracleIAM on Cortex XSOAR - -1. Navigate to **Settings** > **Integrations** > **Servers & Services**. -2. Search for OracleIAM. -3. Click **Add instance** to create and configure a new integration instance. - - | **Parameter** | **Required** | - | --- | --- | - | Base URL | True | - | Username | True | - | Password | True | - | Allow creating users | False | - | Allow updating users | False | - | Allow enabling users | False | - | Allow disabling users | False | - | Automatically create user if not found in update command | False | - | Incoming Mapper | True | - | Outgoing Mapper | True | - | Trust any certificate (not secure) | False | - | Use system proxy settings | False | - -4. Click **Test** to validate the URLs, token, and connection. +## Configure OracleIAM in Cortex + + +| **Parameter** | **Required** | +| --- | --- | +| Base URL | True | +| Username | True | +| Password | True | +| Allow creating users | False | +| Allow updating users | False | +| Allow enabling users | False | +| Allow disabling users | False | +| Automatically create user if not found in update command | False | +| Incoming Mapper | True | +| Outgoing Mapper | True | +| Trust any certificate (not secure) | False | +| Use system proxy settings | False | + ## Commands -You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. +You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details. ### iam-create-user *** @@ -750,4 +746,4 @@ Updates an existing group resource. This command allows individual (or groups of >### Oracle Cloud Update Group: >|brand|id|instanceName|success| >|---|---|---|---| ->| OracleIAM | 121212 | OracleIAM_instance_1 | true | +>| OracleIAM | 121212 | OracleIAM_instance_1 | true | \ No newline at end of file diff --git a/Packs/Oracle_IAM/ReleaseNotes/1_0_25.md b/Packs/Oracle_IAM/ReleaseNotes/1_0_25.md new file mode 100644 index 000000000000..fc0d84bd4c2f --- /dev/null +++ b/Packs/Oracle_IAM/ReleaseNotes/1_0_25.md @@ -0,0 +1,8 @@ + +#### Integrations + +##### Oracle IAM +- Updated the Docker image to: *demisto/python3:3.11.10.115186*. + + + diff --git a/Packs/Oracle_IAM/pack_metadata.json b/Packs/Oracle_IAM/pack_metadata.json index 0ed4ac4049ee..f11653d76c2f 100644 --- a/Packs/Oracle_IAM/pack_metadata.json +++ b/Packs/Oracle_IAM/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Oracle IAM", "description": "Oracle IAM", "support": "xsoar", - "currentVersion": "1.0.24", + "currentVersion": "1.0.25", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Orca/Integrations/Orca/README.md b/Packs/Orca/Integrations/Orca/README.md index 41e4fca0901f..7577d7b2e638 100644 --- a/Packs/Orca/Integrations/Orca/README.md +++ b/Packs/Orca/Integrations/Orca/README.md @@ -1,25 +1,21 @@ Agentless, Workload-Deep, Context-Aware Security and Compliance for AWS, Azure, and GCP. This integration was integrated and tested with Orca -## Configure Orca on Cortex XSOAR - -1. Navigate to **Settings** > **Integrations** > **Servers & Services**. -2. Search for Orca. - Click **Add instance** to create and configure a new integration instance. - - | **Parameter** | **Description** | **Required** | - | --- | --- | --- | - | apitoken | API Token | True | - | api_host | API Host without schema. Default: `api.orcasecurity.io` | False - | first_fetch | First fetch timestamp \(`` `