We've added the following new integrations, steps, and improvements:
New integrations:
Adobe PDF Services
ClickHouse
MongoDB Atlas
Splunk Enterprise Security
Zscaler Deception
New steps and improvements:
Darktrace
Elastic
Github
Google Threat Intelligence
Hibob
Microsoft Azure AD
Microsoft Sentinel
Microsoft Teams Bot
Okta
Palo Alto Cortex XDR
Reco
SentinelOne
Slack Custom App
Snowflake
Splunk
New Templates:
We've added the following template to the template library:
Adobe PDF Services
A new Adobe PDF Services step integration is now available on the Integrations page. The following steps are available:
Check HTML to PDF Job Status
Get Upload Pre-signed URI
Download Asset
ClickHouse
A new ClickHouse steps integration is now available on the Integrations page. The following step is available:
Run a SQL command
MongoDB Atlas
A new MongoDB Atlas steps integration is now available on the Integrations page. The following steps are available:
Create Organization User
List Organization Projects
Remove Organization User
List Organization Users
List Organizations
Splunk Enterprise Security
A new Splunk Enterprise Security steps integration is now available on the Integrations page. The following steps are available:
Delete one or more items from a Threat Intel collection
Add a new entry in Analytic Stories
Update a specific Investigation artifact
Retrieve information about a specific Investigation artifact
Update Notable Event
List one or more items from a Threat Intel collection
Zscaler Deception
A new Zscaler Deception steps integration is now available on the Integrations page. The following steps are available:
List User Basic Information
List VMs
List Users
Get ZPA Connetors
Get incidents
Get events
DarkTrace
A new step was added to the DarkTrace integration:
Run DarkTrace API POST Request with Body
Elastic
A new step was added to the Elastic integration:
List Detection Rules
GitHub
A new step was added to the GitHub integration:
Merge a Pull Request
Google Threat Intelligence
Several new steps were added to the Google Threat Intelligence integration:
Get Threat Graph Comments
List Monitors
Get File Relationships
List DTM Alerts
Hibob
The List employees step has several new optional parameters:
Fields: An optional list of fields to be returned in the response. When not specified, a default set of fields and categories is returned.
Filters: An optional filter based on a field and a condition to filter the results. We currently support passing only a single filter. Use this to filter which employees to return. If not provided, it will return data of all the employees that can be accessed by this service user.
Show inactive: Defines whether the response should include inactive employees.
Microsoft Azure AD
The Get All Users step has a new optional parameter:
Filter query: An OData filter expression used to filter the results.
Microsoft Sentinel
Several new steps were added to the Microsoft Sentinel integration:
Create or Update Scheduled Alert Rule
Delete Alert Rule
Microsoft Teams Bot
A new step was added to the Microsoft Teams Bot integration:
Send Adaptive Card Form GCC
The Post Adaptive Card GCC step has a new optional parameter:
Graph app ID: Your Microsoft Graph App ID. This is the ID of the application registered in Azure AD that your bot uses to authenticate with Microsoft Graph.
The Send Adaptive Card Form GCC step has a new optional parameter:
Graph app ID: Your Microsoft Graph App ID. This is the ID of the application registered in Azure AD that your bot uses to authenticate with Microsoft Graph.
Okta
Several new steps were added to the Okta integration:
List users with roles
List Custom Roles
Palo Alto Cortex XDR
A new step was added to the Cortex XDR integration:
Update Alerts
Reco
Several new steps were added to the Reco integration:
Get Identity Overview
Update Alert Status
Update Alert Severity
SentinelOne
A new step was added to the SentinelOne integration:
Generate API Token
Slack Custom App
A new step was added to the Slack Custom App integration:
Reset User Sessions
Snowflake
A new step was added to the Snowflake integration:
Retrieve Partition from Statement
Splunk
The Get Saved Searches step has several new optional parameters:
Number of entries
Offset: Index of first item to return.
Filter: Response filter, where the response field values are matched against this search expression. Example: search=foo matches on any field with the string foo in the name.
Sort direction: Response sort order
Sort key: Field name to use for sorting