Endgame
Integration version: 9.0
Integrate Endgame with Google Security Operations SOAR
For detailed instructions on how to configure an integration in Google Security Operations SOAR, see Configure integrations.
Actions
Enrich Entities
Enrich a Google Security Operations SOAR Host and IP entities based on the information from Endgame.
Parameters
N/A
Use cases
The action can be used in the playbooks investigating activity on devices. If the device has the Endgame agent installed, then the action pulls Endgame information on device to enrich Google Security Operations SOAR entities.
Run on
This action runs on the following entities:
- Host
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
Endgame_Domain | Always |
Endgame_endpoint_id | Always |
Endgame_hostname | Always |
Endgame_sensors_status | Always |
Endgame_sensors_id | Always |
Endgame_sensors_status | Always |
Endgame_sensors_id | Always |
Endgame_policy_status | Always |
Endgame_policy_name | Always |
Endgame_policy_id | Always |
Endgame_is_isolated | Always |
Script result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
{
"data": [
{
"domain": "InstallerInitiated",
"updated_at": "2019-11-01T05:42:08.149079+00:00",
"id": "1682418d-02ff-43cd-a730-bcae8215a514",
"display_operating_system": "CentOS 7.6",
"hostname": "example",
"mac_address": "01:23:45:ab:cd:ef",
"upgrade_status": "",
"base_image": false,
"isolation_updated_at": null,
"status": "monitored",
"ad_distinguished_name": "",
"ad_hostname": "",
"tags": [
{
"id": "a0927aeb-915a-466d-a5eb-5d7b6f9217c5",
"name": "BLUE TEAM"
},
{
"id": "bede2f24-593c-45e4-9863-9c2438f0f163",
"name": "SOC"
},
{
"id": "fc2dfcc8-9329-4f33-86a2-877bfb27575e",
"name": "CORE ENV"
}
],
"isolation_request_status": null,
"alert_count": 0,
"investigation_count": 0,
"groups": [
{
"is_dynamic": false,
"count": 4,
"id": "c1af3cd6-2638-4144-842d-adc9cfb67fb9",
"name": "SOC"
}
],
"sensors": [
{
"status": "monitored",
"sensor_version": "3.52.12",
"policy_status": "successful",
"policy_name": "Lab (Detect-Only)",
"sensor_type": "hunt",
"id": "fbb87923-a833-5581-a160-7f4f85a21bd0",
"policy_id": "a1d72bce-1f61-4ba8-bcd4-dfa97148335f"
}
],
"ip_address": "192.0.2.1",
"is_isolated": false,
"operating_system": "Linux 3.10.0-957.27.2.el7.x86_64",
"name": "example",
"status_changed_at": "2020-01-07T08:15:11.865854+00:00",
"core_os": "linux",
"created_at": "2019-03-19T05:07:50.598837+00:00",
"error": null,
"machine_id": "827255f4-53a2-1823-cac0-7c0f7730ca26"
},
{
"domain": "InstallerInitiated",
"updated_at": "2019-11-01T05:42:09.150756+00:00",
"id": "12c3530d-657f-4ccd-835e-6df9affeed3d",
"display_operating_system": "Ubuntu 18.04.3",
"hostname": "example",
"mac_address": "01:23:45:ab:cd:ef",
"upgrade_status": "",
"base_image": false,
"isolation_updated_at": null,
"status": "monitored",
"ad_distinguished_name": "",
"ad_hostname": "",
"tags": [],
"isolation_request_status": null,
"alert_count": 0,
"investigation_count": 0,
"groups": [
{
"is_dynamic": false,
"count": 4,
"id": "c1af3cd6-2638-4144-842d-adc9cfb67fb9",
"name": "SOC"
}
],
"sensors": [
{
"status": "monitored",
"sensor_version": "3.52.12",
"policy_status": "successful",
"policy_name": "Lab (Detect-Only)",
"sensor_type": "hunt",
"id": "dc2e35cc-0c87-5a60-8fc8-de23ef747d02",
"policy_id": "a1d72bce-1f61-4ba8-bcd4-dfa97148335f"
}
],
"ip_address": "192.0.2.1",
"is_isolated": false,
"operating_system": "Linux 4.15.0-72-generic",
"name": "example",
"status_changed_at": "2020-01-07T08:15:16.875375+00:00",
"core_os": "linux",
"created_at": "2019-09-20T21:34:51.966863+00:00",
"error": null,
"machine_id": "5ae8ddd9-9339-ae4b-ccf7-5ed68f38b3a9"
}
],
"metadata": {
"count": 38,
"previous_url": null,
"timestamp": "2020-01-07T18:09:43.765744",
"next": null,
"per_page": 50,
"next_url": null,
"transaction_id": "569cdc38-8c7a-4b93-af99-aaf907dc8dd6",
"previous": null
}
}
List Investigations
List Endgame investigations.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
OS | String | Solaris,Windows,MacOs,Linux | Specify for which OS you want to list investigations. Parameter can take multiple values as a comma-separated string. |
Fetch investigations for the last X hours | Int | N/A | Return investigations created for the specified timeframe in hours. |
Max Investigation to Return | Int | N/A | Specify how many investigation you want to query. |
Use cases
Investigations are used to hunt different objects of the endpoints, for example, processes, IP addresses, and files. This action allows the user to list investigations. Analysts may use this action to make sure that all of the required investigations are being performed on the system.
Run on
This action runs on all entities.
Action results
Script result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
{
"data": [
{
"created_by_chat": false,
"name": "Example User + 2020-01-08T13:47:51.334336_utc",
"core_os": "windows",
"created_at": "2020-01-08T13:47:51.340497+00:00",
"task_completion": {
"completed_tasks": 1,
"total_tasks": 1
},
"archived": false,
"created_by": {
"username": "admin",
"last_name": "User",
"is_active": true,
"is_editable": true,
"is_ldap": false,
"is_removable": false,
"timezone": null,
"id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"first_name": "Example",
"last_viewed_alert": "2020-01-07T09:24:22.925000",
"is_sso": false,
"is_superuser": true,
"role": {
"role": "Admin",
"id": "37e9e54e-0bb8-5058-9bd4-50a0d0fbea35",
"permissions": {
"endpoints.scan": true,
"sensor.admin.view": true,
"sensor.admin.update": true,
"endpoints.delete": true,
"endpoints.respond": true,
"search.search": true,
"sensor.admin.create": true,
"alerts.admin.forwardalerts": true,
"endpoints.tag": true,
"user.delete": true,
"endpoints.deploy": true,
"user.update": true,
"search.save": true,
"investigation.create": true,
"endpoints.view": true,
"user.view": true,
"sensor.admin.download": true,
"alerts.view": true,
"alerts.update": true,
"search.delete": true,
"sensor.admin.delete": true,
"endpoints.uninstall": true,
"investigation.view": true,
"admin": true,
"investigation.update": true,
"endpoints.changeconfiguration": true,
"user.create": true
}
},
"type": "Local",
"email": null
},
"updated_at": "2020-01-08T13:47:51.379966+00:00",
"created_by_user_display_name": "Example User",
"canceled_by_user_id": null,
"version": 2,
"endpoint_count": 1,
"assigned_to": {
"username": "admin",
"last_name": "User",
"is_active": true,
"is_editable": true,
"is_ldap": false,
"is_removable": false,
"timezone": null,
"id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"first_name": "Example",
"last_viewed_alert": "2020-01-07T09:24:22.925000",
"is_sso": false,
"is_superuser": true,
"role": {
"role": "Admin",
"id": "37e9e54e-0bb8-5058-9bd4-50a0d0fbea35",
"permissions": {
"endpoints.scan": true,
"sensor.admin.view": true,
"sensor.admin.update": true,
"endpoints.delete": true,
"endpoints.respond": true,
"search.search": true,
"sensor.admin.create": true,
"alerts.admin.forwardalerts": true,
"endpoints.tag": true,
"user.delete": true,
"endpoints.deploy": true,
"user.update": true,
"search.save": true,
"investigation.create": true,
"endpoints.view": true,
"user.view": true,
"sensor.admin.download": true,
"alerts.view": true,
"alerts.update": true,
"search.delete": true,
"sensor.admin.delete": true,
"endpoints.uninstall": true,
"investigation.view": true,
"admin": true,
"investigation.update": true,
"endpoints.changeconfiguration": true,
"user.create": true
}
},
"type": "Local",
"email": null
},
"id": "e0ad7613-daf6-435f-98f6-ce40eae01acc",
"canceled_by_user_display_name": null,
"user_display_name": "Example User",
"hunt_count": 1,
"is_canceled": false
}
],
"metadata": {
"count": 46,
"previous_url": null,
"timestamp": "2020-01-08T16:02:09.251511",
"next": 2,
"per_page": 1,
"next_url": "/api/v1/investigations/?per_page=1&page=2",
"previous": null
}
}
Get Investigation Details
Get information on a specific Endgame investigation.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Investigation ID | String | N/A | Specify Endgame investigation ID to search for. |
Use cases
Investigations are used to hunt different objects of the endpoints, for example, processes, IP addresses, and files. This action allows the user to get more information about specific investigations. Analysts may use this action to make sure that all of the required tasks were performed on the system.
Run on
This action runs on all entities.
Action Results
Script result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
{
"data": {
"tasks": [
"6500673c-d246-41a3-882d-d3a339f28497"
],
"user_display_name": "Example User",
"task_types": [
"Process Survey"
],
"task_completion": {
"completed_tasks": 1,
"total_tasks": 1
},
"updated_at": "2020-01-06T13:30:33.851816+00:00",
"created_by_user_display_name": "Example User",
"id": "54caeedc-d6b0-4ca0-8f64-8798d1c34d54",
"task_completions_by_type": {
"Process Survey": {
"completed_tasks": 1,
"task_type_id": "2fbf0c36-5160-5c31-99ec-0fa5880c6bd1",
"total_tasks": 1
}
},
"archived": false,
"user_id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"is_canceled": false,
"created_by": {
"username": "admin",
"last_name": "User",
"is_active": true,
"is_editable": true,
"is_ldap": false,
"is_removable": false,
"timezone": null,
"id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"first_name": "Example",
"last_viewed_alert": "2020-01-06T09:27:04.097000",
"is_sso": false,
"is_superuser": true,
"role": {
"role": "Admin",
"id": "37e9e54e-0bb8-5058-9bd4-50a0d0fbea35",
"permissions": {
"endpoints.scan": true,
"sensor.admin.view": true,
"sensor.admin.update": true,
"endpoints.delete": true,
"endpoints.respond": true,
"search.search": true,
"sensor.admin.create": true,
"alerts.admin.forwardalerts": true,
"endpoints.tag": true,
"user.delete": true,
"endpoints.deploy": true,
"user.update": true,
"search.save": true,
"investigation.create": true,
"endpoints.view": true,
"user.view": true,
"sensor.admin.download": true,
"alerts.view": true,
"alerts.update": true,
"search.delete": true,
"sensor.admin.delete": true,
"endpoints.uninstall": true,
"investigation.view": true,
"admin": true,
"investigation.update": true,
"endpoints.changeconfiguration": true,
"user.create": true
}
},
"type": "Local",
"email": null
},
"hunt_count": 1,
"canceled_by_user_id": null,
"version": 2,
"endpoint_count": 1,
"canceled_by_user_display_name": null,
"created_by_user_id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"account_id": "c374bb8a-9a98-4823-b280-68e74c170a0e",
"created_by_chat": false,
"sensors": [
"8eef6873-6db7-58ab-a1ca-68dc19b54117"
],
"name": "Example User + 2020-01-06T13:30:33.808543_utc",
"core_os": "windows",
"created_at": "2020-01-06T13:30:33.813747+00:00",
"assigned_to": {
"username": "admin",
"last_name": "User",
"is_active": true,
"is_editable": true,
"is_ldap": false,
"is_removable": false,
"timezone": null,
"id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"first_name": "Example",
"last_viewed_alert": "2020-01-06T09:27:04.097000",
"is_sso": false,
"is_superuser": true,
"role": {
"role": "Admin",
"id": "37e9e54e-0bb8-5058-9bd4-50a0d0fbea35",
"permissions": {
"endpoints.scan": true,
"sensor.admin.view": true,
"sensor.admin.update": true,
"endpoints.delete": true,
"endpoints.respond": true,
"search.search": true,
"sensor.admin.create": true,
"alerts.admin.forwardalerts": true,
"endpoints.tag": true,
"user.delete": true,
"endpoints.deploy": true,
"user.update": true,
"search.save": true,
"investigation.create": true,
"endpoints.view": true,
"user.view": true,
"sensor.admin.download": true,
"alerts.view": true,
"alerts.update": true,
"search.delete": true,
"sensor.admin.delete": true,
"endpoints.uninstall": true,
"investigation.view": true,
"admin": true,
"investigation.update": true,
"endpoints.changeconfiguration": true,
"user.create": true
}
},
"type": "Local",
"email": null
},
"endpoints": [
"b23c8a14-69e0-4966-b78a-c9fba4fdd934"
]
},
"metadata": {
"timestamp": "2020-01-06T14:00:53.716517"
}
}
Get Host Isolation Config
Get host isolation config defined in Endgame.
Parameters
N/A
Use cases
This action is used to get information about host isolation config. This config allows isolated hosts to connect to the IP addresses listed there. Analysts may use this action to verify that all of the required IP addresses are in the host isolation config.
Run on
This action runs on all entities.
Action results
Script result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
{
"data": [
{
"id": "47999eeb-f076-5aca-a7cc-56bf7ac2b647",
"comments": [
{
"comment": "Testing API",
"entity_id": "47999eeb-f076-5aca-a7cc-56bf7ac2b647",
"user_id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"account_id": "c374bb8a-9a98-4823-b280-68e74c170a0e",
"entity_type": "whitelisted_ip",
"created_at": "2020-01-07T15:59:56Z",
"updated_at": "2020-01-07T15:59:56Z",
"id": 547,
"activity_type": "comment"
}
],
"addr": "192.0.2.1/30"
},
{
"id": "6ab5575c-718e-5e24-bd4d-77e0694ad6fc",
"comments": [
{
"comment": "Testing API",
"entity_id": "6ab5575c-718e-5e24-bd4d-77e0694ad6fc",
"user_id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"account_id": "c374bb8a-9a98-4823-b280-68e74c170a0e",
"entity_type": "whitelisted_ip",
"created_at": "2020-01-07T15:58:29Z",
"updated_at": "2020-01-07T15:58:29Z",
"id": 545,
"activity_type": "comment"
}
],
"addr": "192.0.2.11/32"
},
{
"id": "72bdf5d2-4cc6-5ccf-9787-a539fae9c517",
"comments": [
{
"comment": "CIDR Test",
"entity_id": "72bdf5d2-4cc6-5ccf-9787-a539fae9c517",
"user_id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"account_id": "c374bb8a-9a98-4823-b280-68e74c170a0e",
"entity_type": "whitelisted_ip",
"created_at": "2020-01-07T15:58:04Z",
"updated_at": "2020-01-07T15:58:04Z",
"id": 543,
"activity_type": "comment"
}
],
"addr": "198.51.100.1/32"
},
{
"id": "5aa89c8f-a535-5876-840c-af33a7ec1419",
"comments": [
{
"comment": "Testing API",
"entity_id": "5aa89c8f-a535-5876-840c-af33a7ec1419",
"user_id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"account_id": "c374bb8a-9a98-4823-b280-68e74c170a0e",
"entity_type": "whitelisted_ip",
"created_at": "2020-01-07T15:57:24Z",
"updated_at": "2020-01-07T15:57:24Z",
"id": 541,
"activity_type": "comment"
}
],
"addr": "198.51.100.10"
},
{
"id": "06461575-700b-596d-8662-7ea0aff28e9c",
"comments": [
{
"comment": "Test Isolation",
"entity_id": "06461575-700b-596d-8662-7ea0aff28e9c",
"user_id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"account_id": "c374bb8a-9a98-4823-b280-68e74c170a0e",
"entity_type": "whitelisted_ip",
"created_at": "2020-01-07T15:55:21Z",
"updated_at": "2020-01-07T15:55:21Z",
"id": 539,
"activity_type": "comment"
}
],
"addr": "203.0.113.1"
}
],
"metadata": {
"count": 5,
"previous_url": null,
"timestamp": "2020-01-07T16:00:19.754687",
"next": null,
"per_page": 10,
"next_url": null,
"previous": null
}
}
Add IP Subnet to Host Isolation Config
Add an IP subnet to host isolation config defined in Endgame.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
IP Subnet | String | N/A | Enter the IPv4 Subnet that you want to add to Host Isolation Config. |
Description | String | N/A | Enter the description to the IP Subnet. |
Create Insight | Checkbox | unchecked | If enabled, creates Insight after successful execution of this action. |
Use cases
This action is used to get information about host isolation config. This config allows isolated hosts to connect to the IP subnets listed there. Analysts may use this action to add required IP subnets to the host isolation config.
Run On
This action runs on all entities.
Action Results
Insights
If an IP subnet was added to the host isolation config using Endgame, then create an insight to indicate this.
Script result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
Remove IP Subnet From Host Isolation Config
Remove an IP subnet from host isolation config defined in Endgame.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
IP Subnet | String | N/A | Enter the IPv4 Subnet that you want to add to Host Isolation Config. |
Create Insight | Checkbox | unchecked | If enabled, creates Insight after successful execution of this action. |
Use cases
This action is used to get information about host isolation config. This config allows isolated hosts to connect to the IP subnets listed there. Analysts may use this action to remove IP subnets that are no longer required from the host isolation config.
Run on
This action runs on all entities.
Action results
Insights
If an IP subnet was removed from the host isolation config using Endgame, then create an insight to indicate this.
Script result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
Collect Autoruns (Windows Only)
Collect autoruns from the Endgame endpoint.
Parameters
Parameter Display Name | Type | Default Value | Description |
---|---|---|---|
Max Items to Return | Integer | 1000 | Specify how many autoruns to return. |
Category "All" | Checkbox | Checked | If enabled, search for all autorun categories. |
Category "Network Provider" | Checkbox | Unchecked | If enabled, search for "Network Provider" autorun category. |
Category "Office" | Checkbox | Unchecked | If enabled, search for "Office" autorun category . |
Category "Driver" | Checkbox | Unchecked | If enabled, search for "Driver" autorun category. |
Category "App Init" | Checkbox | Unchecked | If enabled, search for "App Init" autorun category. |
Category "Winlogon" | Checkbox | Unchecked | If enabled, search for "Winlogon" autorun category. |
Category "Print Monitor" | Checkbox | Unchecked | If enabled, search for "Print Monitor" autorun category. |
Category "Ease of Access" | Checkbox | Unchecked | If enabled, search for "Ease of Access" autorun category. |
Category "WMI" | Checkbox | Unchecked | If enabled, search for "WMI" autorun category. |
Category "LSA Provider" | Checkbox | Unchecked | If enabled, search for "LSA Provider" autorun category. |
Category "Service" | Checkbox | Unchecked | If enabled, search for "Service" autorun category. |
Category "Bits" | Checkbox | Unchecked | If enabled, search for "Bits" autorun category. |
Category "Known dll" | Checkbox | Unchecked | If enabled, search for "Known dll" autorun category. |
Category "Print Provider" | Checkbox | Unchecked | If enabled, search for "Print Provider" autorun category. |
Category "Image Hijack" | Checkbox | Unchecked | If enabled, search for "Image Hijack" autorun category. |
Category "Startup Folder" | Checkbox | Unchecked | If enabled, search for "Startup Folder" autorun category. |
Category "Internet Explorer" | Checkbox | Unchecked | If enabled, search for "Internet Explorer" autorun category. |
Category "Codec" | Checkbox | Unchecked | If enabled, search for "Codec" autorun category. |
Category "Logon" | Checkbox | Unchecked | If enabled, search for "Logon" autorun category. |
Category "Search Order Hijack" | Checkbox | Unchecked | If enabled, search for "Search Order Hijack" autorun category. |
Category "Winsock Provider" | Checkbox | Unchecked | If enabled, search for "Winsock Provider" autorun category . |
Category "Boot Execute' | Checkbox | Unchecked | If enabled, search for "Boot Execute" autorun category. |
Category "Phantom dll" | Checkbox | Unchecked | If enabled, search for "Phantom dll" autorun category. |
Category "Com Hijack" | Checkbox | Unchecked | If enabled, search for "Com Hijack" autorun category. |
Category "Explorer" | Checkbox | Unchecked | If enabled, search for "Explorer" autorun category. |
Category "Scheduled Task" | Checkbox | Unchecked | If enabled, search for "Scheduled Task" autorun category. |
Include All Metadata | Checkbox | Checked | If enabled, provides all available data. |
Include Malware Classification Metadata | Checkbox | Unchecked | If enabled, provides information about MalwareScore. |
Include Authenticode Metadata | Checkbox | Unchecked | If enabled, provides Signer Information. |
Include MD5 Hash | Checkbox | Unchecked | If enabled, provides MD5 hash in the response. |
Include SHA-1 Hash | Checkbox | Unchecked | If enabled, provides SHA-1 hash in the response. |
Include SHA-256 Hash | Checkbox | Unchecked | If enabled, provides SHA-256 hash in the response. |
Use cases
This action can be used to gather information about autoruns on the endpoint. This data can assist analysts to perform triage and remediation processes.
Run on
This action runs on the following entities:
- Host
- IP Address
Action results
Script result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
{
"data": {
"count": 1,
"per_page": 50,
"previous": null,
"tasks": [
{
"user_id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"data": {
"category_option": {
"category_network_provider": true,
"category_office": false,
"category_driver": false,
"category_app_init": false,
"category_winlogon": false,
"category_print_monitor": false,
"category_ease_of_access": false,
"category_wmi": false,
"category_lsa_provider": false,
"category_service": false,
"category_bits": false,
"category_known_dll": false,
"category_print_provider": false,
"category_image_hijack": false,
"category_startup_folder": false,
"category_internet_explorer": false,
"category_codec": false,
"category_logon": false,
"category_all": false,
"category_search_order_hijack": false,
"category_winsock_provider": false,
"category_boot_execute": false,
"category_phantom_dll": false,
"category_com_hijack": false,
"category_explorer": false,
"category_scheduled_task": false
},
"metadata_option": {
"metadata_all": true,
"metadata_malware_classification": false,
"metadata_sha1": false,
"metadata_sha256": false,
"metadata_authenticode": false,
"metadata_md5": false
}
},
"account_id": "c374bb8a-9a98-4823-b280-68e74c170a0e",
"metadata": {
"sensor_id": "8eef6873-6db7-58ab-a1ca-68dc19b54117",
"investigation_id": "0b043f77-531f-4109-93b1-e01019ad0980",
"task_id": "e667b0c3-39de-4862-9baf-d6697db79721",
"echo": "",
"endpoint_id": "b23c8a14-69e0-4966-b78a-c9fba4fdd934",
"destination_plugin": "autoruns",
"key": "collectAutoRunsRequest",
"semantic_version": "3.52.\\d+",
"collection_id": "2393f424-bf57-40af-81e6-91b95acf5409"
}
}
],
"next": null
},
"metadata": {
"timestamp": "2020-01-08T13:15:37.238341"
}
}
Isolate Host
Isolate Endgame endpoint. This action supports only Windows and macOS systems.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Create Insight | Checkbox | Unchecked | If enabled, creates an Insight after successful execution of this action. |
Use cases
This action is used to get information about host isolation config. This config allows isolated hosts to connect to the IP subnets listed there. Analysts may use this action to add required IP subnets to the host isolation config.
Run on
This action runs on the following entities:
- Host
- IP Address
Action results
Entity enrichment
N/A
Insights
If the endpoint was isolated using Endgame agent, then create an insight to indicate this.
Script result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
{
"data": {
"valid": true,
"bulk_task_id": "a6ccc2f7-39a7-42e7-b646-41b281316b1d",
"error_messages": []
},
"metadata": {
"timestamp": "2020-01-08T15:09:22.474963"
}
}
Unisolate Host
Unisolate an Endgame endpoint. This action supports only Windows and macOS systems.
Parameters
Parameter Display Name | Type | Default Value | Description |
---|---|---|---|
Create Insight | Checkbox | Unchecked | If enabled, creates an Insight after successful execution of this action. |
Run on
This action runs on the following entities:
- Host
- IP Address
Action Results
Insights
If the endpoint was unisolated using Endgame agent, then create an insight to indicate this.
Script result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
{
"data": {
"domain": "InstallerInitiated",
"updated_at": "2020-01-08T08:16:26.063394+00:00",
"id": "b23c8a14-69e0-4966-b78a-c9fba4fdd934",
"display_operating_system": "Windows 10 (v1511)",
"hostname": "example",
"mac_address": "01:23:45:ab:cd:ef",
"upgrade_status": "",
"base_image": false,
"isolation_updated_at": "2020-01-08T15:09:24.665367+00:00",
"status": "monitored",
"ad_distinguished_name": "CN=EXAMPLE,CN=Computers,DC=example,DC=com",
"ad_hostname": "example.com",
"tags": [],
"isolation_request_status": null,
"alert_count": 0,
"groups": [
{
"is_dynamic": false,
"count": 2,
"id": "d9de26c9-ee63-4d38-9997-7418bd13c45e",
"name": "Demo: APT28"
}
],
"sensors": [
{
"status": "monitored",
"sensor_version": "3.52.12",
"policy_status": "successful",
"policy_name": "Lab (Detect-Only with Streaming)",
"sensor_type": "hunt",
"id": "8eef6873-6db7-58ab-a1ca-68dc19b54117",
"policy_id": "07b7a44f-25f3-4e5c-977b-2915de8160c5"
}
],
"ip_address": "192.0.2.3",
"is_isolated": false,
"operating_system": "Windows 10.0",
"name": "example",
"status_changed_at": "2020-01-08T12:30:48.704802+00:00",
"core_os": "windows",
"created_at": "2019-11-01T06:31:32.519640+00:00",
"error": null,
"machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8"
},
"metadata": {
"timestamp": "2020-01-08T15:16:34.303701"
}
}
Download file
Download a file from a specific Endgame endpoint.
Parameters
Parameter Display Name | Type | Default Value | Description |
---|---|---|---|
Full File Path | String | N/A | If enabled, creates an Insight after successful execution of this action. |
Full Download Folder Path | String | N/A | Enter the path to the folder, where you want to store this file. |
Expected SHA-256 Hash | String | N/A | Enter the expected SHA-256 hash. |
Use cases
You can use this action to access the files from endpoints. Files should sometimes be processed manually, and this activity helps users to access the required files.
Run on
This action runs on the following entities:
- Host
- IP Address
Action results
Insights
If the endpoint was unisolated using the Endgame agent, then create an insight to indicate this.
Script result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
If status is success
, the JSON result is as follows:
{
"data": {
"status": "success",
"doc_type": "collection",
"endpoint": {
"domain": "InstallerInitiated",
"updated_at": "2019-11-01T05:41:10.150817+00:00",
"id": "a3cdc174-3af0-400a-85c3-bbb1435a6b61",
"display_operating_system": "Ubuntu 18.04.1",
"hostname": "example",
"mac_address": "01:23:45:ab:cd:ef",
"base_image": false,
"isolation_updated_at": null,
"status": "monitored",
"ad_distinguished_name": "",
"ad_hostname": "",
"tags": [
{
"id": "fc2dfcc8-9329-4f33-86a2-877bfb27575e",
"name": "CORE ENV"
}
],
"isolation_request_status": null,
"upgrade_status": "",
"groups": [
{
"is_dynamic": false,
"count": 1,
"id": "e453d4f6-95c9-4dc5-bc41-2f4cae423e19",
"name": "Demo: Bad Admin"
}
],
"sensors": [
{
"status": "A",
"sensor_version": "3.52.12",
"sensor_type": "hunt",
"id": "c7347a4b-3e71-5514-980f-90bdbab758cf"
}
],
"ip_address": "192.0.2.1",
"is_isolated": false,
"operating_system": "Linux 4.15.0-29-generic",
"name": "example",
"status_changed_at": "2020-01-07T08:16:46.895105+00:00",
"core_os": "linux",
"created_at": "2019-03-19T04:25:06.953312+00:00",
"error": null,
"machine_id": "b389c979-2fb1-6a8c-63bc-5547b3c26d1d"
},
"task_id": "0854ae75-47ca-438a-8731-615defac44ac",
"family": "response",
"data": {
"results": [
{
"size": 1731,
"endpoint": {
"status": "monitored",
"ad_distinguished_name": "",
"ad_hostname": "",
"operating_system": "Linux 4.15.0-29-generic",
"name": "example",
"display_operating_system": "Ubuntu 18.04.1",
"hostname": "example",
"updated_at": "2020-01-07T08:16:44Z",
"mac_address": "01:23:45:ab:cd:ef",
"ip_address": "192.0.2.1",
"id": "a3cdc174-3af0-400a-85c3-bbb1435a6b61"
},
"user_id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"account_id": "c374bb8a-9a98-4823-b280-68e74c170a0e",
"investigation_id": null,
"filepath": "/home/a-arobinson/Downloads/bad_admin.sh",
"bulk_task_id": null,
"created_by": "a-arobinson",
"file_uuid": "4c45cc36-b6ca-412a-ae0b-ed214a9c7187",
"correlation_id": "13dfca7b-9e75-4115-be93-e6684dbfc7c8",
"user": {
"username": "admin",
"first_name": "Example",
"last_name": "User",
"id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1"
},
"chunk_size": 26214400,
"existing_path": "/home/a-arobinson/Downloads/bad_admin.sh",
"sha256": "8066b309db13bae560c15c35f42247a0f778786f0056d326ff3e6dffd1eac4f8",
"origination_task_id": "0854ae75-47ca-438a-8731-615defac44ac",
"md5": "6441b8f58feddb5a5f6fcd81c117ecb8"
}
]
},
"created_at": "2020-01-07T11:28:02.826397Z",
"os_type": "linux",
"machine_id": "b389c979-2fb1-6a8c-63bc-5547b3c26d1d",
"type": "downloadFileResponse",
"id": "d6fb3bf3-afea-44e0-8472-389f4e7e0002"
},
"metadata": {
"count": 1,
"previous_url": null,
"timestamp": "2020-01-07T11:41:56.750788",
"next": null,
"per_page": 50,
"next_url": null,
"previous": null
}
}
If the status is failure
, the JSON result is as follows:
{
"data": {
"status": "failure",
"doc_type": "collection",
"endpoint": {
"domain": "InstallerInitiated",
"updated_at": "2019-11-01T05:42:09.150756+00:00",
"id": "12c3530d-657f-4ccd-835e-6df9affeed3d",
"display_operating_system": "Ubuntu 18.04.3",
"hostname": "example",
"mac_address": "01:23:45:ab:cd:ef",
"base_image": false,
"isolation_updated_at": null,
"status": "monitored",
"ad_distinguished_name": "",
"ad_hostname": "",
"tags": [],
"isolation_request_status": null,
"upgrade_status": "",
"groups": [
{
"is_dynamic": false,
"count": 4,
"id": "c1af3cd6-2638-4144-842d-adc9cfb67fb9",
"name": "SOC"
}
],
"sensors": [
{
"status": "A",
"sensor_version": "3.52.12",
"sensor_type": "hunt",
"id": "dc2e35cc-0c87-5a60-8fc8-de23ef747d02"
}
],
"ip_address": "192.0.2.1",
"is_isolated": false,
"operating_system": "Linux 4.15.0-72-generic",
"name": "example",
"status_changed_at": "2020-01-19T11:05:16.765186+00:00",
"core_os": "linux",
"created_at": "2019-09-20T21:34:51.966863+00:00",
"error": null,
"machine_id": "5ae8ddd9-9339-ae4b-ccf7-5ed68f38b3a9"
},
"task_id": "85148460-c868-4fe5-a3e6-0d90784fadd1",
"family": "response",
"data": {
"results": [
{
"endpoint": {
"status": "monitored",
"ad_distinguished_name": "",
"ad_hostname": "",
"operating_system": "Linux 4.15.0-72-generic",
"name": "example",
"display_operating_system": "Ubuntu 18.04.3",
"hostname": "example",
"updated_at": "2020-01-16T14:04:22Z",
"mac_address": "01:23:45:ab:cd:ef",
"ip_address": "192.0.2.1",
"id": "12c3530d-657f-4ccd-835e-6df9affeed3d"
},
"user_id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1",
"account_id": "c374bb8a-9a98-4823-b280-68e74c170a0e",
"investigation_id": null,
"expected_sha256": "123",
"bulk_task_id": null,
"correlation_id": "a7dc04c8-932c-4056-9477-8095b1fa15d8",
"user": {
"username": "admin",
"first_name": "Example",
"last_name": "User",
"id": "5ed3c5d7-f450-489d-8b5f-9430b18da4c1"
},
"chunk_size": 26214400,
"existing_path": "/home/example/Downloads/bad_admin.sh",
"origination_task_id": "85148460-c868-4fe5-a3e6-0d90784fadd1"
}
]
},
"created_at": "2020-01-19T12:19:57Z",
"os_type": "linux",
"machine_id": "5ae8ddd9-9339-ae4b-ccf7-5ed68f38b3a9",
"type": "downloadFileResponse",
"id": "8eb6b538-d480-4210-92fb-df08a3a4dfb9"
},
"metadata": {
"count": 1,
"previous_url": null,
"timestamp": "2020-01-19T12:23:23.623961",
"next": null,
"per_page": 50,
"next_url": null,
"previous": null
}
}
Delete file
Delete a file from an Endgame endpoint.
Parameters
Parameter Display Name | Type | Default Value | Description |
---|---|---|---|
File Path | String | N/A | Enter the path to the file. |
Use cases
This action is used to delete files from the endpoint. For example, it can be used when malware was found and an analyst wants to remove it.
Run on
This action runs on the following entities:
- Host
- IP Address
Action results
Insights
If the endpoint was unisolated using the Endgame agent, then create an insight to indicate this.
Script result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
(status = success)
{
"data": [
{
"status": "success",
"doc_type": "collection",
"endpoint": {
"domain": "InstallerInitiated",
"updated_at": "2019-11-01T05:41:10.150817+00:00",
"id": "a3cdc174-3af0-400a-85c3-bbb1435a6b61",
"display_operating_system": "Ubuntu 18.04.1",
"hostname": "08203s-lubu1804",
"mac_address": "01:23:45:ab:cd:ef",
"upgrade_status": "",
"base_image": false,
"isolation_updated_at": null,
"status": "monitored",
"ad_distinguished_name": "",
"ad_hostname": "",
"tags": [
{
"id": "fc2dfcc8-9329-4f33-86a2-877bfb27575e",
"name": "CORE ENV"
}
],
"isolation_request_status": null,
"groups": [
{
"is_dynamic": false,
"count": 1,
"id": "e453d4f6-95c9-4dc5-bc41-2f4cae423e19",
"name": "Demo: Bad Admin"
}
],
"sensors": [
{
"status": "monitored",
"sensor_version": "3.52.12",
"policy_status": "successful",
"policy_name": "Lab (Detect-Only with Streaming)",
"sensor_type": "hunt",
"id": "c7347a4b-3e71-5514-980f-90bdbab758cf",
"policy_id": "07b7a44f-25f3-4e5c-977b-2915de8160c5"
}
],
"ip_address": "192.0.2.1",
"is_isolated": false,
"operating_system": "Linux 4.15.0-29-generic",
"name": "08203s-lubu1804",
"status_changed_at": "2020-01-20T07:25:02.633331+00:00",
"core_os": "linux",
"created_at": "2019-03-19T04:25:06.953312+00:00",
"error": null,
"machine_id": "b389c979-2fb1-6a8c-63bc-5547b3c26d1d"
},
"task_id": "bfb82b8d-71a0-4e5f-9cfe-bd573ea32b25",
"family": "response",
"created_at": "2020-01-20T07:31:37Z",
"local_msg": "Success",
"system_msg": null,
"system_code": null,
"local_code": 0,
"os_type": "linux",
"machine_id": "b389c979-2fb1-6a8c-63bc-5547b3c26d1d",
"type": "deleteFileResponse",
"id": "eb50fe9c-1059-42d4-9f5f-52e5af4ae64d"
}
],
"metadata": {
"count": 1,
"previous_url": null,
"timestamp": "2020-01-20T07:32:04.425044",
"next": null,
"per_page": 50,
"next_url": null,
"previous": null
}
}
(status = failure) local_msg and system_msg will be used.
{
"data": [
{
"status": "failure",
"doc_type": "collection",
"endpoint": {
"domain": "InstallerInitiated",
"updated_at": "2019-11-01T05:41:10.150817+00:00",
"id": "a3cdc174-3af0-400a-85c3-bbb1435a6b61",
"display_operating_system": "Ubuntu 18.04.1",
"hostname": "08203s-lubu1804",
"mac_address": "01:23:45:ab:cd:ef",
"upgrade_status": "",
"base_image": false,
"isolation_updated_at": null,
"status": "monitored",
"ad_distinguished_name": "",
"ad_hostname": "",
"tags": [
{
"id": "fc2dfcc8-9329-4f33-86a2-877bfb27575e",
"name": "CORE ENV"
}
],
"isolation_request_status": null,
"groups": [
{
"is_dynamic": false,
"count": 1,
"id": "e453d4f6-95c9-4dc5-bc41-2f4cae423e19",
"name": "Demo: Bad Admin"
}
],
"sensors": [
{
"status": "monitored",
"sensor_version": "3.52.12",
"policy_status": "successful",
"policy_name": "Lab (Detect-Only with Streaming)",
"sensor_type": "hunt",
"id": "c7347a4b-3e71-5514-980f-90bdbab758cf",
"policy_id": "07b7a44f-25f3-4e5c-977b-2915de8160c5"
}
],
"ip_address": "192.0.2.1",
"is_isolated": false,
"operating_system": "Linux 4.15.0-29-generic",
"name": "08203s-lubu1804",
"status_changed_at": "2020-01-07T08:16:46.895105+00:00",
"core_os": "linux",
"created_at": "2019-03-19T04:25:06.953312+00:00",
"error": null,
"machine_id": "b389c979-2fb1-6a8c-63bc-5547b3c26d1d"
},
"task_id": "5da277fe-503d-468a-822b-8801d9671cde",
"family": "response",
"created_at": "2020-01-07T13:10:50Z",
"local_msg": "Not found",
"system_msg": null,
"system_code": null,
"local_code": -7,
"os_type": "linux",
"machine_id": "b389c979-2fb1-6a8c-63bc-5547b3c26d1d",
"type": "deleteFileResponse",
"id": "6f3e6148-6801-4cb8-8a5d-25f75ea93555"
}
],
"metadata": {
"count": 1,
"previous_url": null,
"timestamp": "2020-01-07T13:16:18.834163",
"next": null,
"per_page": 5,
"next_url": null,
"previous": null
}
}
Drivers Survey (Windows only)
Get the information on drivers from a specific Endgame endpoint.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Max Items to Return | String | 50 | Specify how many items to return. |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
driver_basename | Returns if it exists in JSON result |
driver_filename | Returns if it exists in JSON result |
date_modified | Returns if it exists in JSON result |
driver_file_version | Returns if it exists in JSON result |
driver_load_address | Returns if it exists in JSON result |
collection_id | Returns if it exists in JSON result |
hashes | Returns if it exists in JSON result |
machine_id | Returns if it exists in JSON result |
driver_product_version | Returns if it exists in JSON result |
driver_description | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"EntityResult":
[{ "driver_basename": "test.exe",
"driver_filename": "C:\\\\Windows\\\\system32\\\\test.exe",
"date_modified": 1446189483.0185645,
"driver_file_version": "10.0.10586.0 (th2_release.151029-1700)",
"driver_load_address": "12345678",
"collection_id": "a9925cf1-6d4c-4bea-b13d-12345678",
"hashes": {
"sha256": "9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08",
"md5": "098f6bcd4621d373cade4e832627b4f6",
"sha1": "a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"
},
"machine_id": "5dc677fd-6b47-7df9-f7f4-12345678",
"driver_product_version": "10.0.10586.0",
"driver_description": "Test"
}],
"Entity": "PC-01"
}]
Firewall Survey (Windows only)
Get information about the firewall rules on a specific Endgame endpoint.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Max Items to Return | String | 50 | Specify how many items to return. |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
direction | Returns if it exists in JSON result |
machine_id | Returns if it exists in JSON result |
description | Returns if it exists in JSON result |
remote_addresses | Returns if it exists in JSON result |
protocol_number | Returns if it exists in JSON result |
enabled | Returns if it exists in JSON result |
edge_traversal | Returns if it exists in JSON result |
profiles | Returns if it exists in JSON result |
interface_types | Returns if it exists in JSON result |
rule_name | Returns if it exists in JSON result |
icmp_and_type_codes | Returns if it exists in JSON result |
local_addresses | Returns if it exists in JSON result |
application_name | Returns if it exists in JSON result |
collection_id | Returns if it exists in JSON result |
remote_ports | Returns if it exists in JSON result |
action | Returns if it exists in JSON result |
local_ports | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"EntityResult":
[{
"direction": "in",
"machine_id": "870499c3-d6bf-8edd-972d-12345678",
"description": "Inbound rule for Google Chrome to allow mDNS traffic.",
"remote_addresses": "*",
"protocol_number": 17,
"enabled": true,
"edge_traversal": false,
"profiles":
["domain", "public", "private"],
"interface_types": "All",
"rule_name": "Google Chrome (mDNS-In)",
"icmp_and_type_codes": "",
"local_addresses": "*",
"application_name": "C:\\\\Program Files (x86)\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe",
"collection_id": "0925eea5-c61f-464a-ba61-12345678",
"remote_ports": "*",
"action": "allow",
"local_ports": "1234"
}],
"Entity": "PC-01"
}]
Get Endpoints
List all endpoints.
Parameters
N/A
Run on
This action runs on all entities.
Action results
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"domain": "",
"updated_at": "2019-05-30T01:40:21.126499+00:00",
"id": "db33d864-7d58-4d85-9d2d-1a98a101995d",
"display_operating_system": "Windows 7 (SP1)",
"hostname": "ip-AC170169",
"mac_address": "01:23:45:ab:cd:ef",
"isolation_updated_at": "",
"status": "monitored",
"ad_distinguished_name": "",
"ad_hostname": "",
"tags": [],
"isolation_request_status": "",
"alert_count": 72,
"investigation_count": 0,
"groups": [],
"sensors":
[{
"status": "monitored",
"sensor_version": "3.51.10",
"policy_status": "successful",
"policy_name": "POC-Lab",
"sensor_type": "hunt",
"id": "ec17f7bb-1d63-536a-b694-ca066cc2572e",
"policy_id": "d31f0192-b8e2-49ae-ae54-041376183b7f"
}],
"ip_address": "192.0.2.1",
"is_isolated": "false",
"operating_system": "Windows 6.1 Service Pack 1",
"name": "ip-AC170169",
"status_changed_at": "2019-05-30T01:40:18.200770+00:00",
"core_os": "windows",
"created_at": "2019-05-30T01:36:43.761600+00:00",
"error":
[{
"msg": "Installer failure - Execution failed for (http://192.0.2.1:5985/wsman)\\n",
"deployment_id": "90C2BAA6-B38B-4037-9A9E-7C8628E8D7D6",
"code": 1001, "ts": 1559180421.125456
}],
"machine_id": "4f1adabb-17c4-e39e-caa7-7900562d0b51"
}]
Hunt File
Searches for running files.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Endpoints Core OS | String | windows | Select an operating system (for example, Windows, Linux, or Mac) to filter the Endpoints list. Note: You can only create a single investigation for endpoints that run on the same operating system. |
MD5 Hashes | String | N/A | ADVANCED CONFIGURATION for this hunt. Enter MD5 Hashes, separated by comma. |
SHA1 Hashes | String | N/A | ADVANCED CONFIGURATION for this hunt. Enter SHA-1 Hashes, separated by comma. |
SHA256 Hashes | String | N/A | ADVANCED CONFIGURATION for this hunt. Enter SHA256 Hashes, separated by comma. |
Directory | String | N/A | The starting directory path Example C:\windows\system32 |
Find File | String | N/A | Enter the filename(s) to search. Enter a regular expression to narrow search results. |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
meta_data | Returns if it exists in JSON result |
file_path | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"meta_data":
{ "hashes":
{ "sha256": "4705ba6793dc93c1bbe2a9e790e9e22778d217531b1750471206fd5c52bbd2b5",
"md5": "6383522c180badc4e1d5c30a5c4f4913",
"sha1": "62a30e96459b694f7b22d730c460a65cd2ebaaca"
},
"file_name_timestamps":
{ "accessed": 1468675289.0711532,
"entry_modified": 0,
"modified": 1468675289.0711532,
"created": 1468675404.0330572
},
"file_attributes": 38,
"file_size": 174
},
"file_path": "C:\\\\Program Files\\\\desktop.ini"
},
{
"meta_data":
{ "hashes":
{ "sha256": "44fe5eebd80e46f903d68c07bcf06d187a3698bf3953bc58bb578465e2e0fe6c",
"md5": "6bd5fb46283aa48e638bef47510c47da",
"sha1": "c38d46ec6c9bc8baece4a459b617f44d10af973c"
},
"file_name_timestamps":
{
"accessed": 1468675289.0024028,
"entry_modified": 0,
"modified": 1468675289.0024028,
"created": 1468675404.0111823
},
"file_attributes": 38,
"file_size": 645
},
"file_path": "C:\\\\Program Files\\\\Common Files\\\\microsoft shared\\\\Stationery\\\\Desktop.ini"
}]
Hunt IP
Searches for network connections.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Endpoints Core OS | String | windows | Select an operating system (for example, Windows, Linux, or Mac) to filter the Endpoints list. Note: You can only create a single investigation for endpoints that run on the same operating system. |
Remote IP Address | String | N/A | remote IP address - separated by comma |
Local IP Address | String | N/A | separated by comma |
State | String | N/A | Enter state to return. Example: ANY |
Protocol | String | N/A | Example: ANY, UDP, TCP |
Network Port | String | N/A | N/A |
Network Remote | String | N/A | Network Remote or Local. |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
parent_name | Returns if it exists in JSON result |
domain | Returns if it exists in JSON result |
exe | Returns if it exists in JSON result |
name | Returns if it exists in JSON result |
has_unbacked_execute_memory | Returns if it exists in JSON result |
pid | Returns if it exists in JSON result |
up_time | Returns if it exists in JSON result |
is_sensor | Returns if it exists in JSON result |
cmdline | Returns if it exists in JSON result |
parent_exe | Returns if it exists in JSON result |
unbacked_execute_byte_count | Returns if it exists in JSON result |
create_time | Returns if it exists in JSON result |
user | Returns if it exists in JSON result |
sid | Returns if it exists in JSON result |
threads | Returns if it exists in JSON result |
ppid | Returns if it exists in JSON result |
unbacked_execute_region_count | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"parent_name": "System Idle Process",
"domain": "NT AUTHORITY",
"exe": "",
"name": "System",
"has_unbacked_execute_memory": false,
"pid": 4,
"up_time": 2384701,
"is_sensor": false,
"cmdline": "",
"parent_exe": "",
"unbacked_execute_byte_count": 0,
"create_time": 1559179903,
"user": "SYSTEM",
"sid": "S-1-5-18",
"threads":
[{
"thread_id": 8
}, {
"thread_id": 12,
"up_time": 13206038203,
"create_time": -11644473599
}, {
"thread_id": 16,
"up_time": 13206038203,
"create_time": -11644473599
}],
"ppid": 0,
"unbacked_execute_region_count": 0
}]
Hunt Process
Searches for running processes.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Endpoints Core OS | String | windows | Select an operating system (i.e., Windows, Linux, or Mac) to filter the Endpoints list. Note: You can only create a single investigation for endpoints that run on the same operating system. |
MD5 Hashes | String | N/A | ADVANCED CONFIGURATION for this hunt. Enter MD5 Hashes, separated by comma. |
SHA1 Hashes | String | N/A | ADVANCED CONFIGURATION for this hunt. Enter SHA-1 Hashes, separated by comma. |
SHA256 Hashes | String | N/A | ADVANCED CONFIGURATION for this hunt. Enter SHA256 Hashes, separated by comma. |
Process Name | String | N/A | ADVANCED CONFIGURATION for this hunt. Enter Process Name ex. iss.exe* |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
parent_name | Returns if it exists in JSON result |
domain | Returns if it exists in JSON result |
exe | Returns if it exists in JSON result |
name | Returns if it exists in JSON result |
has_unbacked_execute_memory | Returns if it exists in JSON result |
pid | Returns if it exists in JSON result |
up_time | Returns if it exists in JSON result |
is_sensor | Returns if it exists in JSON result |
cmdline | Returns if it exists in JSON result |
parent_exe | Returns if it exists in JSON result |
unbacked_execute_byte_count | Returns if it exists in JSON result |
create_time | Returns if it exists in JSON result |
user | Returns if it exists in JSON result |
sid | Returns if it exists in JSON result |
threads | Returns if it exists in JSON result |
ppid | Returns if it exists in JSON result |
unbacked_execute_region_count | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"parent_name": "System Idle Process",
"domain": "NT AUTHORITY",
"exe": "",
"name": "System",
"has_unbacked_execute_memory": false,
"pid": 4,
"up_time": 2384701,
"is_sensor": false,
"cmdline": "",
"parent_exe": "",
"unbacked_execute_byte_count": 0,
"create_time": 1559179903,
"user": "SYSTEM",
"sid": "S-1-5-18",
"threads":
[{
"thread_id": 8
},{
"thread_id": 12,
"up_time": 13206038203,
"create_time": -11644473599
},{
"thread_id": 16,
"up_time": 13206038203,
"create_time": -11644473599
}],
"ppid": 0,
"unbacked_execute_region_count": 0
}]
Hunt Registry
Searches for a registry key or value name.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Hive | String | ALL | One of the following: HKEY_CLASSES_ROOT, HKEY_CURRENT_CONFIG, HKEY_USERS, HKEY_LOCAL_MACHINE, ALL. |
Keys | String | N/A | Registry Key or Value Name. |
Min Size | String | N/A | Min byte size. |
Max Size | String | N/A | Max byte size. |
Endpoints Core OS | String | windows | Select an operating system (i.e., Windows, Linux, or Mac) to filter the Endpoints list. Note: You can only create a single investigation for endpoints that run on the same operating system. |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
parent_name | Returns if it exists in JSON result |
domain | Returns if it exists in JSON result |
exe | Returns if it exists in JSON result |
name | Returns if it exists in JSON result |
up_time | Returns if it exists in JSON result |
is_sensor | Returns if it exists in JSON result |
cmdline | Returns if it exists in JSON result |
parent_exe | Returns if it exists in JSON result |
unbacked_execute_byte_count | Returns if it exists in JSON result |
create_time | Returns if it exists in JSON result |
user | Returns if it exists in JSON result |
sid | Returns if it exists in JSON result |
threads | Returns if it exists in JSON result |
ppid | Returns if it exists in JSON result |
unbacked_execute_region_count | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"parent_name": "System Idle Process",
"domain": "NT AUTHORITY",
"exe": "",
"name": "System",
"has_unbacked_execute_memory": false,
"pid": 4,
"up_time": 2384701,
"is_sensor": false,
"cmdline": "",
"parent_exe": "",
"unbacked_execute_byte_count": 0,
"create_time": 1559179903,
"user": "SYSTEM",
"sid": "S-1-5-18",
"threads":
[{
"thread_id": 8
},{
"thread_id": 12,
"up_time": 13206038203,
"create_time": -11644473599
}, {
"thread_id": 16,
"up_time": 13206038203,
"create_time": -11644473599
}],
"ppid": 0,
"unbacked_execute_region_count": 0
}]
Hunt User
Searches the network for logged in users.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Endpoints Core OS | String | windows | Select an operating system (i.e., Windows, Linux, or Mac) to filter the Endpoints list. Note: You can only create a single investigation for endpoints that run on the same operating system. |
Find Username | String | N/A | ADVANCED CONFIGURATION for this hunt. Enter username(s), separate multiple entries with a semicolon. |
Domain Name | String | N/A | ADVANCED CONFIGURATION for this hunt. Enter Domain Name. |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
parent_name | Returns if it exists in JSON result |
domain | Returns if it exists in JSON result |
exe | Returns if it exists in JSON result |
name | Returns if it exists in JSON result |
has_unbacked_execute_memory | Returns if it exists in JSON result |
pid | Returns if it exists in JSON result |
up_time | Returns if it exists in JSON result |
is_sensor | Returns if it exists in JSON result |
cmdline | Returns if it exists in JSON result |
parent_exe | Returns if it exists in JSON result |
unbacked_execute_byte_count | Returns if it exists in JSON result |
create_time | Returns if it exists in JSON result |
user | Returns if it exists in JSON result |
sid | Returns if it exists in JSON result |
threads | Returns if it exists in JSON result |
ppid | Returns if it exists in JSON result |
unbacked_execute_region_count | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"parent_name": "System Idle Process",
"domain": "NT AUTHORITY",
"exe": "",
"name": "System",
"has_unbacked_execute_memory": false,
"pid": 4,
"up_time": 2384701,
"is_sensor": false,
"Cmdline":"",
"parent_exe": "",
"unbacked_execute_byte_count": 0,
"create_time": 1559179903,
"user": "SYSTEM",
"sid": "S-1-5-18",
"threads":
[{
"thread_id": 8
}, {
"thread_id": 12,
"up_time": 13206038203,
"create_time": -11644473599
}, {
"thread_id": 16,
"up_time": 13206038203,
"create_time": -11644473599
}],
"ppid": 0,
"unbacked_execute_region_count": 0
}]
Kill Process
Kill a process in a specific Endgame endpoint.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Process Name | String | N/A | Enter the process name |
PID | String | N/A | Enter ID of the process. |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
Network Survey
Get information about connections, DNS cache, NetBIOS, ARP, and Route tables from a specific Endgame endpoint.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Max Items to Return | String | 50 | Specify how many autoruns to return. |
Include Route Entries Information | Checkbox | Checked | Specify to get information about the Route Entries. |
Include Net Bios Information | Checkbox | Checked | Specify to get information about Net Bios. |
Include DNS Cache Information | Checkbox | Checked | Specify to get information about the DNS Cache. |
Include ARP Table Information | Checkbox | Checked | Specify to get information about the ARP table. |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
connections | Returns if it exists in JSON result |
netbios_info | Returns if it exists in JSON result |
arp_table | Returns if it exists in JSON result |
route_table | Returns if it exists in JSON result |
dns_cache | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"EntityResult":
{
"connections":
[{
"connection_type": "SOCK_STREAM",
"collection_id": "50e74bd2-1cd4-412c-a7fc-24cf1456e883",
"exe": "C:\\\\Windows\\\\System32\\\\test.exe",
"connection_status": "LISTEN",
"name": "test.exe",
"family": "ipv4",
"local_port": 111,
"remote_port": 0,
"pid": 700,
"remote_address": "0.0.0.0",
"create_time": 1583314664,
"connection_timestamp": 1583314664.0117714,
"local_address": "0.0.0.0",
"protocol": "tcp",
"hashes":
{
"sha256": "5d00bbeb147e0c838a622fc42c543b2913d57eaca4e69d9a37ed61e98c819347", "md5": "8497852ed44aff902d502015792d315d",
"sha1": "800a4c2e524fc392c45748eae1691fa01d24ea4c"
},
"machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8"
}],
"netbios_info":
[{
"comment": "",
"name": "PC-01",
"version_major": 10,
"netbios_neighbor_type": 8392747,
"platform": "WINDOWS NT",
"version_minor": 0
}],
"arp_table":
[{
"connection_type": "SOCK_STREAM",
"collection_id": "50e74bd2-1cd4-412c-a7fc-24cf1456e883",
"exe": "C:\\\\Windows\\\\System32\\\\test.exe",
"connection_status": "LISTEN",
"name": "test.exe",
"family": "ipv4",
"local_port": 111,
"remote_port": 0,
"pid": 700,
"remote_address": "0.0.0.0",
"create_time": 1583314664,
"connection_timestamp": 1583314664.0117714,
"local_address": "0.0.0.0",
"protocol": "tcp",
"hashes": {"sha256": "5d00bbeb147e0c838a622fc42c543b2913d57eaca4e69d9a37ed61e98c819347", "md5": "8497852ed44aff902d502015792d315d",
"sha1": "800a4c2e524fc392c45748eae1691fa01d24ea4c"},
"machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8"
}],
"route_table":
[{
"machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8",
"family": "ipv4",
"destination": "0.0.0.0",
"netmask": "0.0.0.0",
"collection_id": "50e74bd2-1cd4-412c-a7fc-24cf1456e883",
"interface_name": "Ethernet0",
"gateway": "1.1.1.1"
}],
"dns_cache":
[{
"name": "test.ms",
"dns_record_type": "A",
"ttl": 0,
"collection_id": "50e74bd2-1cd4-412c-a7fc-24cf1456e883",
"machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8",
"query_error": 9701
}]
},
"Entity": "PC-01"
}]
Ping
Test connectivity to the Endgame server.
Parameters
N/A
Run on
This action runs on all entities.
Action results
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
Process Survey
Get information about running processes on a specific Endgame endpoint.
Parameters
Parameter | Type | Default Vaule | Description |
---|---|---|---|
Max Items to Return | String | 50 | Specify how many items to return. |
Detect Fileless Attacks (Windows Only) | Checkbox | Unchecked | Specify to detect fileless attacks. Windows Only. |
Detect Malware With MalwareScore (Windows Only) | Checkbox | Unchecked | Specify to detect malware processes with MalwareScore. Windows Only. |
Collect Process Threads | Checkbox | Unchecked | Specify to include information about the amount of process threads in the response. |
Return Only Suspicious Processes | Checkbox | Checked | Specify to return only suspicious processes from the endpoint. By the Endgame definition: Suspicious processes are unbacked executable processes. |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
domain | Returns if it exists in JSON result |
name_suspicious | Returns if it exists in JSON result |
pid | Returns if it exists in JSON result |
name_uncommon_path | Returns if it exists in JSON result |
repeat_offender | Returns if it exists in JSON result |
cmdline | Returns if it exists in JSON result |
create_time | Returns if it exists in JSON result |
parent_name | Returns if it exists in JSON result |
has_unbacked_execute_memory | Returns if it exists in JSON result |
sid | Returns if it exists in JSON result |
ppid | Returns if it exists in JSON result |
up_time | Returns if it exists in JSON result |
unbacked_execute_region_count | Returns if it exists in JSON result |
is_sensor | Returns if it exists in JSON result |
threads | Returns if it exists in JSON result |
user | Returns if it exists in JSON result |
collection_id | Returns if it exists in JSON result |
parent_exe | Returns if it exists in JSON result |
exe | Returns if it exists in JSON result |
name | Returns if it exists in JSON result |
unbacked_execute_byte_count | Returns if it exists in JSON result |
machine_id | Returns if it exists in JSON result |
unbacked_execute_region_count | Returns if it exists in JSON result |
tty_device_minor_number | Returns if it exists in JSON result |
uid | Returns if it exists in JSON result |
name_suspicious | Returns if it exists in JSON result |
phys_memory_bytes | Returns if it exists in JSON result |
pid | Returns if it exists in JSON result |
env_variables | Returns if it exists in JSON result |
repeat_offender | Returns if it exists in JSON result |
cmdline | Returns if it exists in JSON result |
create_time | Returns if it exists in JSON result |
tty_device_major_number | Returns if it exists in JSON result |
parent_name | Returns if it exists in JSON result |
group | Returns if it exists in JSON result |
cpu_percent | Returns if it exists in JSON result |
has_unbacked_execute_memory | Returns if it exists in JSON result |
gid | Returns if it exists in JSON result |
sha256 | Returns if it exists in JSON result |
cwd | Returns if it exists in JSON result |
exe | Returns if it exists in JSON result |
up_time | Returns if it exists in JSON result |
short_name | Returns if it exists in JSON result |
tty_device_name | Returns if it exists in JSON result |
is_sensor | Returns if it exists in JSON result |
sha1 | Returns if it exists in JSON result |
threads | Returns if it exists in JSON result |
name_uncommon_path | Returns if it exists in JSON result |
collection_id | Returns if it exists in JSON result |
md5 | Returns if it exists in JSON result |
argv_list | Returns if it exists in JSON result |
num_threads | Returns if it exists in JSON result |
user | Returns if it exists in JSON result |
virt_memory_bytes | Returns if it exists in JSON result |
name | Returns if it exists in JSON result |
session_id | Returns if it exists in JSON result |
memory_percent | Returns if it exists in JSON result |
machine_id | Returns if it exists in JSON result |
unbacked_execute_byte_count | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"EntityResult":
[{
"domain": "NT AUTHORITY",
"name_suspicious": false,
"pid": 4,
"name_uncommon_path": false,
"repeat_offender": false,
"cmdline": "",
"create_time": 1583314654,
"parent_name": "System Idle Process",
"has_unbacked_execute_memory": false,
"sid": "S-1-5-18",
"ppid": 0,
"up_time": 342643,
"unbacked_execute_region_count": 0,
"is_sensor": false,
"threads":
[{ "thread_id": 12,
"up_time": 13228130896,
"create_time": -11644473599
},
{
"thread_id": 16,
"up_time": 13228130896,
"create_time": -11644473599
}],
"user": "SYSTEM",
"collection_id": "ac1fb296-db5a-4426-b32e-292e4a50188d",
"parent_exe": "",
"exe": "",
"name": "System",
"unbacked_execute_byte_count": 0,
"machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8"
}],
"Entity": "PC-01"
},
{
"EntityResult":
[{
"unbacked_execute_region_count": 0,
"tty_device_minor_number": 0,
"uid": 0,
"name_suspicious": false,
"phys_memory_bytes": 8900608,
"pid": 1,
"env_variables":
[ "HOME=/",
"init=/sbin/init",
"NETWORK_SKIP_ENSLAVED=",
"recovery=",
"TERM=linux",
"drop_caps=",
"BOOT_IMAGE=/vmlinuz-4.15.0-88-generic",
"PATH=/sbin:/usr/sbin:/bin:/usr/bin",
"PWD=/", "rootmnt=/root" ],
"repeat_offender": false,
"cmdline": "/sbin/init maybe-ubiquity",
"create_time": 1583632302,
"tty_device_major_number": 0,
"parent_name": "",
"group": "root",
"cpu_percent": 0,
"has_unbacked_execute_memory": false,
"gid": 0,
"sha256": "3a14ff4b18505543eda4dccb054aa5860478a95ed0cac76da392f3472da3ad67",
"cwd": "/",
"exe": "/lib/systemd/systemd",
"up_time": 24942,
"short_name": "systemd",
"tty_device_name": "",
"is_sensor": false,
"sha1": "e016f80b87101a74b52d15ce2726560a6e128b60",
"threads": [{"thread_id": 1}],
"name_uncommon_path": false,
"collection_id": "bcb6b33a-0ffb-4e72-818a-1731024dfd79",
"md5": "ca563cf817f03ed7d01a6462818a5791",
"argv_list": ["/sbin/init", "maybe-ubiquity"],
"num_threads": 1,
"ppid": 0,
"virt_memory_bytes": 79818752,
"name": "systemd",
"session_id": 1,
"memory_percent": 0.21517109870910645,
"parent_exe": "",
"unbacked_execute_byte_count": 0,
"machine_id": "5ae8ddd9-9339-ae4b-ccf7-5ed68f38b3a9",
"user": "root"
}],
"Entity": "PC-202"
}]
Removable Media Survey (Windows only)
DGet information about removable media from a specific Endgame endpoint.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Max Items to Return | String | 50 | Specify how many items to return. |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
name | Returns if it exists in JSON result |
is_storage_device | Returns if it exists in JSON result |
vendor_id | Returns if it exists in JSON result |
collection_id | Returns if it exists in JSON result |
last_connect_time | Returns if it exists in JSON result |
serial_number | Returns if it exists in JSON result |
machine_id | Returns if it exists in JSON result |
is_connected | Returns if it exists in JSON result |
product_id | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"EntityResult":
[{ "name": "USB Composite Device",
"is_storage_device": false,
"vendor_id": "0E0F",
"collection_id": "fbe61b16-e6b2-4595-8409-abf4ce15fa85",
"last_connect_time": 1552596043.0610971,
"serial_number": "6&35D1F50B&0&1",
"machine_id": "a4c05d5a-7ebc-c3ab-1beb-f1fe517768d8",
"is_connected": false,
"product_id": "0003"
}],
"Entity": "PC-01"
}]
Software Survey (Windows only)
Get information about an installed software on a specific Endgame endpoint.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Max Items to Return | String | 50 | Specify how many items to return. |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
publisher | Returns if it exists in JSON result |
machine_id | Returns if it exists in JSON result |
package | Returns if it exists in JSON result |
install_date | Returns if it exists in JSON result |
version | Returns if it exists in JSON result |
collection_id | Returns if it exists in JSON result |
installed_for | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"EntityResult":
[{
"publisher": "John Doe",
"machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8",
"package": "Test",
"install_date": "20191008",
"version": "18.06",
"collection_id": "fc079e17-8a2e-40d9-94c9-b974e5534e58",
"installed_for": "allUsers"
}],
"Entity": "PC-01"
}]
System Survey
Get system information on a single endgame endpoint, such as memory use, dns, and OS.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Max Items to Return | String | 50 | Specify how many items to return. |
Include Security Product Information (Windows only) | Checkbox | Checked | Specify to get information about the security products installed on the endpoint (Windows only). |
Include Patch Information (Windows only) | Checkbox | Checked | Specify to get information about patches (Windows only). |
Include Disk Information | Checkbox | Checked | Specify to get information about Disks. |
Include Network Interface Information | Checkbox | Checked | Specify to get information about network interfaces. |
Run on
This action runs on the following entities:
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
patches_info | Returns if it exists in JSON result |
Disks_info | Returns if it exists in JSON result |
network_interfaces | Returns if it exists in JSON result |
Os_info | Returns if it exists in JSON result |
installed_security_products | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"EntityResult":
{
"patches_info":
[{
"collection_id": "f7d a62bb-318d-40c1-a490-85979c0c9ede",
"installed_on": "2/3/2018",
"hotfix_id": "KB4049065",
"machine_id": "870499c3-d6bf-8edd-972d-f2f6621dd971"
}],
"Disks_info":
[{
"disk_id": "\\\\Device\\\\HarddiskVolume2",
"fstype": "NTFS",
"disk_total": 15579738112,
"disk_free": 1219571712,
"collection_id": "a27ebace-32ec-4257-ab4f-7da49f02a9d4",
"device": "\\\\Device\\\\HarddiskVolume2",
"path": "C:\\\\",
"machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8"
}],
"network_interfaces":
[{
"machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8",
"mac_address": "01:23:45:ab:cd:ef",
"ipv4_addresses": ["1.1.1.1"],
"ipv6_addresses": ["1111::1111:1111:1111:1111"],
"collection_id": "a27ebace-32ec-4257-ab4f-7da49f02a9d4",
"smp_interface": true,
"interface_name": "Ethernet0"
}],
"Os_info":
[{
"memory":
{ "ram_free": 1240039424,
"page_percent_used": 36.89334358507761,
"page_total": 2818101248,
"ram_percent_used": 42.24349594504104,
"ram_total": 2147012608,
"ram_used": 906973184,
"page_used": 1039691776,
"page_free": 1778409472
},
"doc_type": "collection",
"domain": "PC-01.test.com",
"endpoint":
{ "status": "unmonitored",
"ad_distinguished_name":
"CN=PC_01,OU=TESTOU,OU=Organization,DC=test,DC=com",
"ad_hostname": "test.com",
"operating_system": "Windows 10.0 ",
"name": "PC-01",
"display_operating_system": "Windows 10 (v1511)",
"hostname": "PC-01",
"updated_at": "2020-03-08T08:27:22.919880+00:00",
"mac_address": "01:23:45:ab:cd:ef",
"machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8",
"ip_address": "1.1.1.1",
"id": "b23c8a14-69e0-4966-b78a-c9fba4fdd934"
},
"investigation_id": "85cff906-8b39-4a37-aa05-84950c9b2a02",
"hostname": "PC-01",
"bulk_task_id": null,
"original_machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8",
"os_version":
{
"os_minor": 0,
"os_is_server": false,
"os_major": 10,
"os_build_number": 10586,
"os_service_pack": ""
},
"correlation_id": "7e17de5a-abcb-4de0-a510-7ca79bfdc345",
"architecture": "x64",
"sensor_info":
{
"malware_feature_version": "3.0.0",
"sensor_build_time": "1581375786",
"sensor_commit_sha": "80af56b6b295de785e502d82f39deac34973b2dd",
"sensor_build_number": 48,
"sensor_version": "3.53.9"
},
"time":
{
"tz_observes_dst": true,
"tz_currently_in_dst": false,
"tz_name": "Pacific Standard Time",
"tz_offset_minutes": 480
},
"os_type": "windows",
"ad_info":
{
"distinguished_name": "CN=PC-01,OU=TESTOU,OU=Organization,DC=test,DC=com",
"domain_hostname": "test.com"
},
"origination_task_id": "d3d67012-cfb1-47d0-8ec9-bf7ffb68a019"
}],
"installed_security_products":
[{
"security_product_type": "AntiVirus",
"collection_id": "a27ebace-32ec-4257-ab4f-7da49f02a9d4",
"machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8",
"enabled": false, "name": "Windows Defender"
}]
},
"Entity": "PC-01"
}]
User Sessions Survey
Get information about an active user sessions on a specific Endgame endpoint.
Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Max Items to Return | String | 50 | Specify how many items to return. |
Run on
- Hostname
- IP Address
Action results
Entity enrichment
Enrichment Field Name | Logic-When to apply |
---|---|
username | Returns if it exists in JSON result |
shell | Returns if it exists in JSON result |
uid | Returns if it exists in JSON result |
started | Returns if it exists in JSON result |
hostname | Returns if it exists in JSON result |
host_ip | Returns if it exists in JSON result |
session_id | Returns if it exists in JSON result |
session_count | Returns if it exists in JSON result |
terminal | Returns if it exists in JSON result |
ended | Returns if it exists in JSON result |
gid | Returns if it exists in JSON result |
collection_id | Returns if it exists in JSON result |
machine_id | Returns if it exists in JSON result |
started | Returns if it exists in JSON result |
password_last_set | Returns if it exists in JSON result |
logon_type | Returns if it exists in JSON result |
sid | Returns if it exists in JSON result |
Script result
Script Result Name | Value options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON result
[{
"EntityResult":
[{
"username": "endgame",
"shell": "/opt/endgame/bin/console",
"uid": 1000,
"started": 1582554802.55514,
"hostname": "",
"host_ip": "",
"session_id": 887,
"session_count": 1,
"terminal": "tty1",
"ended": 0,
"gid": 1000,
"collection_id": "1aebade8-9f7b-4237-8c43-2aed8729511e",
"machine_id": "827255f4-53a2-1823-cac0-7c0f7730ca26"
}],
"Entity": "PC-01"
}, {
"EntityResult":
[{
"username": "example",
"domain": "3B",
"started": 1580205134.001,
"session_count": 1,
"ended": 0,
"password_last_set": 0,
"logon_type": "interactive",
"sid": "",
"collection_id": "88b876b1-5063-40a8-b40e-440df5eb8952",
"machine_id": "5dc677fd-6b47-7df9-f7f4-d45434c8d0f8"
}],
"Entity": "PC-02"
}
Connectors
For detailed instructions on how to configure a connector in Google Security Operations SOAR, see Configuring the connector.
Endgame Connector
Use the following parameters to configure the connector:
Parameter | Type | Default Value | Description |
---|---|---|---|
DeviceProductField | String | device_product | The field name used to determine the device product. |
EventClassId | String | event_name | The field name used to determine the event name (sub-type) |
PythonProcessTimeout | String | 30 | The timeout limit (in seconds) for the python process running current script |
API Root | String | N/A | N/A |
Username | String | N/A | N/A |
Password | Password | N/A | N/A |
Verify SSL | Checkbox | Unchecked | N/A |
Max Days Backwards | String | N/A | N/A |
Environment Field Name | String | N/A | If defined, the connector extracts the environment from the specified event field. You can manipulate the field data using the regular expression pattern field to extract a specific string. |
Alerts Count Limit | String | N/A | N/A |
Proxy Server Address | String | N/A | The address of the proxy server to use. |
Proxy Username | String | N/A | The proxy username to authenticate with. |
Proxy Password | Password | N/A | The proxy password to authenticate with. |
Connector rules
The connector supports proxy.
The connector supports the dynamic list.