We've added the following new steps and improvements:
Utility steps
Cybereason
Microsoft Azure AD
Okta
Splunk
Torq
Veeam
New Templates:
We've added the following new templates to the template library:
Utility steps
Several new utility steps are now available:
Encoding Utils:
Markdown to HTML
Cybereason
Several new steps were added to the Cybereason integration:
Get MalOp Details
List MalOps
Microsoft Azure AD
The Reset User Password step has a new optional parameter:
Revoke user sessions: When set to Yes, this will revoke all active sessions for the user after the password reset.
Okta
The Reset User Password step has several new optional parameters:
User ID: The user's ID.
Revoke sessions: Revokes all User sessions, except for the current session, if set to true.
Send email: Whether to send an email with the password reset link to the user.
Max retries: The maximum number of times a step will be retried. By default (-1), the step will keep retrying for up to 50 seconds.
Retry delay: Initial delay before retry attempts is in seconds. An exponential backoff calculation will be applied to this value.
Splunk
A new step was added to the Splunk integration:
Get Saved Searches
Torq
The Create a Service API Key step has a new optional parameter:
Expires at: Expiration time for the API key
Veeam
The List Malware Events step has several new optional parameters:
Order column: Sorts events by one of the event parameters.
Order asc: If true, sorts events in the ascending order by the orderColumn parameter.
Type filter: Filters events by event type.
Detected after: Returns events created after the specified time, in UTC.
Detected before: Returns events created before the specified time, in UTC.
Backupobject filter: Filters events by backup object ID.
State filter: Filters events by state.
Source filter: Filters events by source type.
Severity filter: Filters events by severity.
Created by filter: Filters events by the createdBy pattern.
Engine filter Filters events by the engine pattern.