-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Gem Security pack #33434
Gem Security pack #33434
Conversation
|
Thank you for your contribution. Your generosity and caring are unrivaled! Make sure to register your contribution by filling the Contribution Registration form, so our content wizard @merit-maita will know the proposed changes are ready to be reviewed. |
@liormgem - Thanks for the contribution. When filling out the Contribution Form, use |
Pack includes: 1 Automation 3 Classifiers 16 Incident Fields 1 Incident Type 1 Integration 1 Layout 3 Playbooks 1 Pre-process Rule
fc5f850
to
80080ee
Compare
@liormgem can you please address this comment, so i can go ahead and review the pr |
Hi @liormgem, I've reviewed your contribution. Thank you for your effort and dedication. I would appreciate it if you could address the following feedback: Classification and Mapping
PlaybooksGem Handle Alert for Root Usage
Gem Handle ec2
Gem Validate triggering event
Incident Fields
Layout
Please let me know if there are any more revisions needed or if there's anything else I can assist you with. Best regards, |
Hi @melamedbn, All your remarks were addressed and fixed, answers to your clarification questions are below:
There are small differences in the way the webhook sends the Gem alerts and the way the fetching Endpoint serves it.
It is.
The playbook is not relevant in this case.
It’s still relevant manually and I think that’s ok Thanks, |
Hi @maimorag, I'm working on uploading the example video to the demisto-assets repo and then I'll submit the Contribution form. Lior |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @liormgem
A couple of notes from my side.
- Note that I usually suggest not using the exact brand
GEM
in the commands. In case a customer would like to copy your integration, he will need to change all the OOTB playbooks as well (there is an option to choose the non-brand command from the PB itself). This isn't required, however, a tip from my experience.
- Usually we add a
Done
task at the end. Just a cosmetic tip.
- Note that you don't have a playbook associated with your incident type. Once the investigation started the user would need to choose how to handle it automatically.
- Extracting all indicators from all fields might impact server performance, hence, suggesting to extract indicators from only necessary fields (basically the ones that you mapped).
Let me know if you need me to elaborate more on a point or help with anything else.
Cheers!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @ssokolovich,
Thank you for the review.
- I think that would be fine with the amount of content we have.
- Will be Added
- Customers we consulted prefer to not have a default playbook
- There are indicators in other parts of the incident, not just in the mapped fields and we would like it to be processed. The number of incidents is low enough (not less than 10 a day) to not have an impact.
- We will leave it as it is, for now, it's extra information.
Lior
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cool! so just let me know when you fix # 2 and also please remember to update the playbook images.
Then waiting for your update @liormgem.
Cheers!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great, done.
@ssokolovich
For the Reviewer: Trigger build request has been accepted for this contribution PR. |
For the Reviewer: Successfully created a pipeline in GitLab with url: https://gitlab.xdr.pan.local/xdr/cortex-content/content/-/pipelines/1005764 |
fa6cb54
into
demisto:contrib/Gem-Security_gem_security_pack
Thank you for your contribution. Your external PR has been merged and the changes are now included in an internal PR for further review. The internal PR will be merged to the master branch within 3 business days. |
* Gem Security pack Commit Pack includes: 1 Automation 3 Classifiers 16 Incident Fields 1 Incident Type 1 Integration 1 Layout 3 Playbooks 1 Pre-process Rule * Ci fix (#5) * Fix post commit validation issues * Fix tests coverage * Fix indent (#6) * Cr fix (#7) * Fix playbooks * Format playbooks and fix Gem Alert Classifier * Fix blank space in Gem Layout * Fix incident fields * Fix cr (#8) * Fix double line * Update playbooks (#9) Co-authored-by: Lior Maman <[email protected]>
* Gem Security pack Commit Pack includes: 1 Automation 3 Classifiers 16 Incident Fields 1 Incident Type 1 Integration 1 Layout 3 Playbooks 1 Pre-process Rule * Ci fix (demisto#5) * Fix post commit validation issues * Fix tests coverage * Fix indent (demisto#6) * Cr fix (demisto#7) * Fix playbooks * Format playbooks and fix Gem Alert Classifier * Fix blank space in Gem Layout * Fix incident fields * Fix cr (#8) * Fix double line * Update playbooks (demisto#9) Co-authored-by: Lior Maman <[email protected]>
Contributing to Cortex XSOAR Content
Make sure to register your contribution by filling the contribution registration form
The Pull Request will be reviewed only after the contribution registration form is filled.
Status
Related Issues
fixes: link to the issue
Description
Pack Gem integrates with the Gem Security platform.
Pack includes:
Must have