From 2dbcb68959639444139c72180a5e46aa7163b1c7 Mon Sep 17 00:00:00 2001 From: inbalapt1 <164751454+inbalapt1@users.noreply.github.com> Date: Sun, 10 Nov 2024 09:31:33 +0200 Subject: [PATCH] Aud demisto/auto update docker staging branch 38 (#37120) * demisto/auth-utils:1.0.0.115527 | 0-100 | PR batch #1/1 (#37113) * Updated docker image to demisto/auth-utils:1.0.0.115527. PR batch #1/1 * Update Akamai_SIEM.yml * Update BoxV2.yml * Update Infinipoint.yml * Update ZoomEventCollector.yml --------- Co-authored-by: root Co-authored-by: inbalapt1 <164751454+inbalapt1@users.noreply.github.com> * update release notes --------- Co-authored-by: content-bot <55035720+content-bot@users.noreply.github.com> Co-authored-by: root --- Packs/Akamai_WAF/Integrations/Akamai_WAF/Akamai_WAF.yml | 2 +- Packs/Akamai_WAF/ReleaseNotes/2_0_13.md | 7 +++++++ Packs/Akamai_WAF/pack_metadata.json | 2 +- .../AlibabaActionTrailEventCollector.yml | 2 +- Packs/AlibabaActionTrail/ReleaseNotes/1_1_1.md | 7 +++++++ Packs/AlibabaActionTrail/pack_metadata.json | 2 +- .../Integrations/AzureDataExplorer/AzureDataExplorer.yml | 2 +- Packs/AzureDataExplorer/ReleaseNotes/1_3_4.md | 7 +++++++ Packs/AzureDataExplorer/pack_metadata.json | 2 +- .../Integrations/BoxEventsCollector/BoxEventsCollector.yml | 2 +- Packs/Box/ReleaseNotes/3_2_3.md | 7 +++++++ Packs/Box/pack_metadata.json | 2 +- .../Integrations/Cylance_Protect_v2/Cylance_Protect_v2.yml | 2 +- Packs/Cylance_Protect/ReleaseNotes/1_1_37.md | 7 +++++++ Packs/Cylance_Protect/pack_metadata.json | 2 +- Packs/Gem/Integrations/Gem/Gem.yml | 2 +- Packs/Gem/ReleaseNotes/1_0_2.md | 7 +++++++ Packs/Gem/pack_metadata.json | 2 +- Packs/GitHub/Integrations/GitHub/GitHub.yml | 2 +- Packs/GitHub/ReleaseNotes/2_1_3.md | 7 +++++++ Packs/GitHub/pack_metadata.json | 2 +- Packs/JWT/Integrations/JWT/JWT.yml | 2 +- Packs/JWT/ReleaseNotes/1_0_3.md | 7 +++++++ Packs/JWT/pack_metadata.json | 2 +- Packs/Keyfactor/Integrations/Keyfactor/Keyfactor.yml | 2 +- Packs/Keyfactor/ReleaseNotes/1_0_2.md | 7 +++++++ Packs/Keyfactor/pack_metadata.json | 2 +- .../Integrations/Malwarebytes/Malwarebytes.yml | 2 +- Packs/Malwarebytes/ReleaseNotes/1_1_19.md | 7 +++++++ Packs/Malwarebytes/pack_metadata.json | 2 +- .../MicrosoftDefenderEventCollector.yml | 2 +- Packs/MicrosoftCloudAppSecurity/ReleaseNotes/2_2_7.md | 7 +++++++ Packs/MicrosoftCloudAppSecurity/pack_metadata.json | 2 +- .../Microsoft365DefenderEventCollector.yml | 2 +- .../ReleaseNotes/1_16_43.md | 7 +++++++ .../pack_metadata.json | 2 +- .../MicrosoftManagementActivity.yml | 2 +- Packs/MicrosoftManagementActivity/ReleaseNotes/1_3_49.md | 7 +++++++ Packs/MicrosoftManagementActivity/pack_metadata.json | 2 +- Packs/Pcysys/Integrations/Pcysys/Pcysys.yml | 2 +- Packs/Pcysys/ReleaseNotes/1_3_9.md | 7 +++++++ Packs/Pcysys/pack_metadata.json | 2 +- Packs/Silverfort/Integrations/Silverfort/Silverfort.yml | 2 +- Packs/Silverfort/ReleaseNotes/2_0_28.md | 7 +++++++ Packs/Silverfort/pack_metadata.json | 2 +- Packs/Troubleshoot/ReleaseNotes/2_1_1.md | 7 +++++++ .../CertificatesTroubleshoot/CertificatesTroubleshoot.yml | 2 +- Packs/Troubleshoot/pack_metadata.json | 2 +- Packs/Uptycs/Integrations/Uptycs/Uptycs.yml | 2 +- Packs/Uptycs/ReleaseNotes/1_0_13.md | 7 +++++++ Packs/Uptycs/pack_metadata.json | 2 +- .../WindowsRemoteManagement/WindowsRemoteManagement.yml | 2 +- Packs/WinRM/ReleaseNotes/1_0_5.md | 7 +++++++ Packs/WinRM/pack_metadata.json | 2 +- Packs/Zoom/Integrations/Zoom_IAM/Zoom_IAM.yml | 2 +- Packs/Zoom/ReleaseNotes/1_6_16.md | 7 +++++++ Packs/Zoom/pack_metadata.json | 2 +- 57 files changed, 171 insertions(+), 38 deletions(-) create mode 100644 Packs/Akamai_WAF/ReleaseNotes/2_0_13.md create mode 100644 Packs/AlibabaActionTrail/ReleaseNotes/1_1_1.md create mode 100644 Packs/AzureDataExplorer/ReleaseNotes/1_3_4.md create mode 100644 Packs/Box/ReleaseNotes/3_2_3.md create mode 100644 Packs/Cylance_Protect/ReleaseNotes/1_1_37.md create mode 100644 Packs/Gem/ReleaseNotes/1_0_2.md create mode 100644 Packs/GitHub/ReleaseNotes/2_1_3.md create mode 100644 Packs/JWT/ReleaseNotes/1_0_3.md create mode 100644 Packs/Keyfactor/ReleaseNotes/1_0_2.md create mode 100644 Packs/Malwarebytes/ReleaseNotes/1_1_19.md create mode 100644 Packs/MicrosoftCloudAppSecurity/ReleaseNotes/2_2_7.md create mode 100644 Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_16_43.md create mode 100644 Packs/MicrosoftManagementActivity/ReleaseNotes/1_3_49.md create mode 100644 Packs/Pcysys/ReleaseNotes/1_3_9.md create mode 100644 Packs/Silverfort/ReleaseNotes/2_0_28.md create mode 100644 Packs/Troubleshoot/ReleaseNotes/2_1_1.md create mode 100644 Packs/Uptycs/ReleaseNotes/1_0_13.md create mode 100644 Packs/WinRM/ReleaseNotes/1_0_5.md create mode 100644 Packs/Zoom/ReleaseNotes/1_6_16.md diff --git a/Packs/Akamai_WAF/Integrations/Akamai_WAF/Akamai_WAF.yml b/Packs/Akamai_WAF/Integrations/Akamai_WAF/Akamai_WAF.yml index 610e839c0b5d..093d135bab88 100644 --- a/Packs/Akamai_WAF/Integrations/Akamai_WAF/Akamai_WAF.yml +++ b/Packs/Akamai_WAF/Integrations/Akamai_WAF/Akamai_WAF.yml @@ -1510,7 +1510,7 @@ script: required: true description: Get an enrollment in CPS by enrollment id. name: akamai-get-cps-enrollment-by-id - dockerimage: demisto/auth-utils:1.0.0.105764 + dockerimage: demisto/auth-utils:1.0.0.115527 script: '' subtype: python3 type: python diff --git a/Packs/Akamai_WAF/ReleaseNotes/2_0_13.md b/Packs/Akamai_WAF/ReleaseNotes/2_0_13.md new file mode 100644 index 000000000000..755d3b41c805 --- /dev/null +++ b/Packs/Akamai_WAF/ReleaseNotes/2_0_13.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Akamai WAF + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/Akamai_WAF/pack_metadata.json b/Packs/Akamai_WAF/pack_metadata.json index 5ea59016041d..cf4dac00b3f8 100644 --- a/Packs/Akamai_WAF/pack_metadata.json +++ b/Packs/Akamai_WAF/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Akamai WAF", "description": "Use the Akamai WAF integration to manage common sets of lists used by various Akamai security products and features.", "support": "xsoar", - "currentVersion": "2.0.12", + "currentVersion": "2.0.13", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AlibabaActionTrail/Integrations/AlibabaActionTrailEventCollector/AlibabaActionTrailEventCollector.yml b/Packs/AlibabaActionTrail/Integrations/AlibabaActionTrailEventCollector/AlibabaActionTrailEventCollector.yml index f5e75e38ba13..892f2495e45d 100644 --- a/Packs/AlibabaActionTrail/Integrations/AlibabaActionTrailEventCollector/AlibabaActionTrailEventCollector.yml +++ b/Packs/AlibabaActionTrail/Integrations/AlibabaActionTrailEventCollector/AlibabaActionTrailEventCollector.yml @@ -81,7 +81,7 @@ script: - "True" - "False" required: true - dockerimage: demisto/auth-utils:1.0.0.94075 + dockerimage: demisto/auth-utils:1.0.0.115527 isfetchevents: true subtype: python3 marketplaces: diff --git a/Packs/AlibabaActionTrail/ReleaseNotes/1_1_1.md b/Packs/AlibabaActionTrail/ReleaseNotes/1_1_1.md new file mode 100644 index 000000000000..4c18523453d8 --- /dev/null +++ b/Packs/AlibabaActionTrail/ReleaseNotes/1_1_1.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Alibaba Action Trail Event Collector + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/AlibabaActionTrail/pack_metadata.json b/Packs/AlibabaActionTrail/pack_metadata.json index b0f1d399887c..49ebc1d65de4 100644 --- a/Packs/AlibabaActionTrail/pack_metadata.json +++ b/Packs/AlibabaActionTrail/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Alibaba Action Trail", "description": "An Integration Pack to fetch Alibaba action trail events.", "support": "xsoar", - "currentVersion": "1.1.0", + "currentVersion": "1.1.1", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/AzureDataExplorer/Integrations/AzureDataExplorer/AzureDataExplorer.yml b/Packs/AzureDataExplorer/Integrations/AzureDataExplorer/AzureDataExplorer.yml index d8e9870b4402..f97708bc1d5d 100644 --- a/Packs/AzureDataExplorer/Integrations/AzureDataExplorer/AzureDataExplorer.yml +++ b/Packs/AzureDataExplorer/Integrations/AzureDataExplorer/AzureDataExplorer.yml @@ -435,7 +435,7 @@ script: - description: Generate the login url used for Authorization code flow. name: azure-data-explorer-generate-login-url arguments: [] - dockerimage: demisto/auth-utils:1.0.0.99717 + dockerimage: demisto/auth-utils:1.0.0.115527 runonce: false script: "-" subtype: python3 diff --git a/Packs/AzureDataExplorer/ReleaseNotes/1_3_4.md b/Packs/AzureDataExplorer/ReleaseNotes/1_3_4.md new file mode 100644 index 000000000000..a1ab21e58304 --- /dev/null +++ b/Packs/AzureDataExplorer/ReleaseNotes/1_3_4.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Azure Data Explorer + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/AzureDataExplorer/pack_metadata.json b/Packs/AzureDataExplorer/pack_metadata.json index 9c2ac7402590..bd2b957e3833 100644 --- a/Packs/AzureDataExplorer/pack_metadata.json +++ b/Packs/AzureDataExplorer/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Azure Data Explorer", "description": "Use Azure Data Explorer integration to collect and analyze data inside clusters of Azure Data Explorer and manage search queries.", "support": "xsoar", - "currentVersion": "1.3.3", + "currentVersion": "1.3.4", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Box/Integrations/BoxEventsCollector/BoxEventsCollector.yml b/Packs/Box/Integrations/BoxEventsCollector/BoxEventsCollector.yml index 727ff3bb0593..4cc72721d799 100644 --- a/Packs/Box/Integrations/BoxEventsCollector/BoxEventsCollector.yml +++ b/Packs/Box/Integrations/BoxEventsCollector/BoxEventsCollector.yml @@ -57,7 +57,7 @@ script: defaultValue: 3 days description: Get events. name: box-get-events - dockerimage: demisto/auth-utils:1.0.0.108110 + dockerimage: demisto/auth-utils:1.0.0.115527 runonce: false script: '-' subtype: python3 diff --git a/Packs/Box/ReleaseNotes/3_2_3.md b/Packs/Box/ReleaseNotes/3_2_3.md new file mode 100644 index 000000000000..a406d2c3ef04 --- /dev/null +++ b/Packs/Box/ReleaseNotes/3_2_3.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Box Event Collector + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/Box/pack_metadata.json b/Packs/Box/pack_metadata.json index 89cc05ef5647..df653fb1eb76 100644 --- a/Packs/Box/pack_metadata.json +++ b/Packs/Box/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Box", "description": "Manage Box users", "support": "xsoar", - "currentVersion": "3.2.2", + "currentVersion": "3.2.3", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Cylance_Protect/Integrations/Cylance_Protect_v2/Cylance_Protect_v2.yml b/Packs/Cylance_Protect/Integrations/Cylance_Protect_v2/Cylance_Protect_v2.yml index c33e2d8b2965..d56893a9f8d5 100644 --- a/Packs/Cylance_Protect/Integrations/Cylance_Protect_v2/Cylance_Protect_v2.yml +++ b/Packs/Cylance_Protect/Integrations/Cylance_Protect_v2/Cylance_Protect_v2.yml @@ -968,7 +968,7 @@ script: - contextPath: InstaQuery.List description: The list of InstaQuery. type: string - dockerimage: demisto/auth-utils:1.0.0.101747 + dockerimage: demisto/auth-utils:1.0.0.115527 isfetch: true script: '' subtype: python3 diff --git a/Packs/Cylance_Protect/ReleaseNotes/1_1_37.md b/Packs/Cylance_Protect/ReleaseNotes/1_1_37.md new file mode 100644 index 000000000000..715a28e8a8a4 --- /dev/null +++ b/Packs/Cylance_Protect/ReleaseNotes/1_1_37.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Cylance Protect v2 + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/Cylance_Protect/pack_metadata.json b/Packs/Cylance_Protect/pack_metadata.json index 7040144f51ea..9b8483cd8933 100644 --- a/Packs/Cylance_Protect/pack_metadata.json +++ b/Packs/Cylance_Protect/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Cylance Protect", "description": "Manage Endpoints using Cylance protect", "support": "xsoar", - "currentVersion": "1.1.36", + "currentVersion": "1.1.37", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Gem/Integrations/Gem/Gem.yml b/Packs/Gem/Integrations/Gem/Gem.yml index ed51a16b1cd0..aaa1458b5926 100644 --- a/Packs/Gem/Integrations/Gem/Gem.yml +++ b/Packs/Gem/Integrations/Gem/Gem.yml @@ -1053,7 +1053,7 @@ script: script: "-" type: python subtype: python3 - dockerimage: demisto/auth-utils:1.0.0.96804 # TODO: This docker image was selected since it contains the "jwt" package. Double check if it's the correct one. + dockerimage: demisto/auth-utils:1.0.0.115527 # TODO: This docker image was selected since it contains the "jwt" package. Double check if it's the correct one. fromversion: 6.12.0 tests: - No tests diff --git a/Packs/Gem/ReleaseNotes/1_0_2.md b/Packs/Gem/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..572dce5b5c10 --- /dev/null +++ b/Packs/Gem/ReleaseNotes/1_0_2.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Gem + + +- Updated the Docker image to: *one.*. diff --git a/Packs/Gem/pack_metadata.json b/Packs/Gem/pack_metadata.json index d971ede580fe..14c2aae08607 100644 --- a/Packs/Gem/pack_metadata.json +++ b/Packs/Gem/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Gem", "description": "Integrate with Gem to use alerts as a trigger for Cortex XSOAR’s custom playbooks, and automate response to specific TTPs and scenarios.", "support": "partner", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "Gem Security", "url": "https://gem.security/", "email": "support@gem.security", diff --git a/Packs/GitHub/Integrations/GitHub/GitHub.yml b/Packs/GitHub/Integrations/GitHub/GitHub.yml index fc00bb5d63d2..8225b6f3d2a2 100644 --- a/Packs/GitHub/Integrations/GitHub/GitHub.yml +++ b/Packs/GitHub/Integrations/GitHub/GitHub.yml @@ -3662,7 +3662,7 @@ script: - contextPath: GitHub.Workflow.updated_at description: Datetime the GitHub workflow was updated at. type: Date - dockerimage: demisto/auth-utils:1.0.0.100419 + dockerimage: demisto/auth-utils:1.0.0.115527 isfetch: true runonce: false script: '-' diff --git a/Packs/GitHub/ReleaseNotes/2_1_3.md b/Packs/GitHub/ReleaseNotes/2_1_3.md new file mode 100644 index 000000000000..4f382251d16b --- /dev/null +++ b/Packs/GitHub/ReleaseNotes/2_1_3.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### GitHub + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/GitHub/pack_metadata.json b/Packs/GitHub/pack_metadata.json index 8eca21a69d5e..6d44b59c7f0a 100644 --- a/Packs/GitHub/pack_metadata.json +++ b/Packs/GitHub/pack_metadata.json @@ -2,7 +2,7 @@ "name": "GitHub", "description": "Manage GitHub issues and pull requests directly from Cortex XSOAR", "support": "xsoar", - "currentVersion": "2.1.2", + "currentVersion": "2.1.3", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/JWT/Integrations/JWT/JWT.yml b/Packs/JWT/Integrations/JWT/JWT.yml index 0fbbbfa49ec9..ae7a4b374d92 100644 --- a/Packs/JWT/Integrations/JWT/JWT.yml +++ b/Packs/JWT/Integrations/JWT/JWT.yml @@ -165,7 +165,7 @@ script: name: secret description: A command to decode JWT tokens name: jwt-decode-token - dockerimage: demisto/auth-utils:1.0.0.76157 + dockerimage: demisto/auth-utils:1.0.0.115527 runonce: false script: '-' subtype: python3 diff --git a/Packs/JWT/ReleaseNotes/1_0_3.md b/Packs/JWT/ReleaseNotes/1_0_3.md new file mode 100644 index 000000000000..ea9584f50ab3 --- /dev/null +++ b/Packs/JWT/ReleaseNotes/1_0_3.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### JWT + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/JWT/pack_metadata.json b/Packs/JWT/pack_metadata.json index 851bd4d3ff1d..6b707c95f1eb 100644 --- a/Packs/JWT/pack_metadata.json +++ b/Packs/JWT/pack_metadata.json @@ -2,7 +2,7 @@ "name": "JWT Token Generator", "description": "An Integration Used to Generate JWT Token", "support": "community", - "currentVersion": "1.0.2", + "currentVersion": "1.0.3", "author": "Ayman Mahmoud", "url": "https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/bd-p/Cortex_XSOAR_Discussions", "email": "", diff --git a/Packs/Keyfactor/Integrations/Keyfactor/Keyfactor.yml b/Packs/Keyfactor/Integrations/Keyfactor/Keyfactor.yml index 7356a16eb09f..238941cdc552 100644 --- a/Packs/Keyfactor/Integrations/Keyfactor/Keyfactor.yml +++ b/Packs/Keyfactor/Integrations/Keyfactor/Keyfactor.yml @@ -101,7 +101,7 @@ script: - contextPath: Keyfactor.CertInfo.Lists.formated_chain description: Formatted Certificate's Trust Chain type: string - dockerimage: demisto/auth-utils:1.0.0.76157 + dockerimage: demisto/auth-utils:1.0.0.115527 script: '' subtype: python3 type: python diff --git a/Packs/Keyfactor/ReleaseNotes/1_0_2.md b/Packs/Keyfactor/ReleaseNotes/1_0_2.md new file mode 100644 index 000000000000..9eef05714eb0 --- /dev/null +++ b/Packs/Keyfactor/ReleaseNotes/1_0_2.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Keyfactor + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/Keyfactor/pack_metadata.json b/Packs/Keyfactor/pack_metadata.json index c559ff6a7e35..4783b295c955 100644 --- a/Packs/Keyfactor/pack_metadata.json +++ b/Packs/Keyfactor/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Keyfactor", "description": "Basic Keyfactor Integration that Posts CSR and Retrieves the certificates.", "support": "community", - "currentVersion": "1.0.1", + "currentVersion": "1.0.2", "author": "davistonehub", "url": "", "email": "", diff --git a/Packs/Malwarebytes/Integrations/Malwarebytes/Malwarebytes.yml b/Packs/Malwarebytes/Integrations/Malwarebytes/Malwarebytes.yml index 3c4bf000d56b..6570b7273bf7 100644 --- a/Packs/Malwarebytes/Integrations/Malwarebytes/Malwarebytes.yml +++ b/Packs/Malwarebytes/Integrations/Malwarebytes/Malwarebytes.yml @@ -349,7 +349,7 @@ script: - contextPath: Malwarebytes.Endpoint.Suspicious_Activities description: Suspicious Activities for the host. type: string - dockerimage: demisto/auth-utils:1.0.0.91447 + dockerimage: demisto/auth-utils:1.0.0.115527 isfetch: true runonce: false script: '-' diff --git a/Packs/Malwarebytes/ReleaseNotes/1_1_19.md b/Packs/Malwarebytes/ReleaseNotes/1_1_19.md new file mode 100644 index 000000000000..456f33eaafb5 --- /dev/null +++ b/Packs/Malwarebytes/ReleaseNotes/1_1_19.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Malwarebytes + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/Malwarebytes/pack_metadata.json b/Packs/Malwarebytes/pack_metadata.json index cbb741248b7b..559a25a987ca 100644 --- a/Packs/Malwarebytes/pack_metadata.json +++ b/Packs/Malwarebytes/pack_metadata.json @@ -2,7 +2,7 @@ "name": "ThreatDown", "description": "ThreatDown (powered by Malwarebytes) Integration & Playbooks", "support": "partner", - "currentVersion": "1.1.18", + "currentVersion": "1.1.19", "author": "ThreatDown", "url": "https://support.threatdown.com/hc/en-us/requests/new", "email": "support@threatdown.com", diff --git a/Packs/MicrosoftCloudAppSecurity/Integrations/MicrosoftDefenderEventCollector/MicrosoftDefenderEventCollector.yml b/Packs/MicrosoftCloudAppSecurity/Integrations/MicrosoftDefenderEventCollector/MicrosoftDefenderEventCollector.yml index 4279514ce969..a8cbfa45a8ec 100644 --- a/Packs/MicrosoftCloudAppSecurity/Integrations/MicrosoftDefenderEventCollector/MicrosoftDefenderEventCollector.yml +++ b/Packs/MicrosoftCloudAppSecurity/Integrations/MicrosoftDefenderEventCollector/MicrosoftDefenderEventCollector.yml @@ -119,7 +119,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/auth-utils:1.0.0.108110 + dockerimage: demisto/auth-utils:1.0.0.115527 fromversion: 6.8.0 marketplaces: - marketplacev2 diff --git a/Packs/MicrosoftCloudAppSecurity/ReleaseNotes/2_2_7.md b/Packs/MicrosoftCloudAppSecurity/ReleaseNotes/2_2_7.md new file mode 100644 index 000000000000..b6970547fdbe --- /dev/null +++ b/Packs/MicrosoftCloudAppSecurity/ReleaseNotes/2_2_7.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Microsoft Defender for Cloud Apps Event Collector + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/MicrosoftCloudAppSecurity/pack_metadata.json b/Packs/MicrosoftCloudAppSecurity/pack_metadata.json index 91ff04bc2da4..138c1d64a7a8 100644 --- a/Packs/MicrosoftCloudAppSecurity/pack_metadata.json +++ b/Packs/MicrosoftCloudAppSecurity/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Defender for Cloud Apps", "description": "Microsoft Cloud App Security Integration, a Cloud Access Security Broker that supports various deployment modes", "support": "xsoar", - "currentVersion": "2.2.6", + "currentVersion": "2.2.7", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftDefenderAdvancedThreatProtection/Integrations/Microsoft365DefenderEventCollector/Microsoft365DefenderEventCollector.yml b/Packs/MicrosoftDefenderAdvancedThreatProtection/Integrations/Microsoft365DefenderEventCollector/Microsoft365DefenderEventCollector.yml index bc37dc3d48b9..f1f524c84607 100644 --- a/Packs/MicrosoftDefenderAdvancedThreatProtection/Integrations/Microsoft365DefenderEventCollector/Microsoft365DefenderEventCollector.yml +++ b/Packs/MicrosoftDefenderAdvancedThreatProtection/Integrations/Microsoft365DefenderEventCollector/Microsoft365DefenderEventCollector.yml @@ -121,7 +121,7 @@ script: script: '-' type: python subtype: python3 - dockerimage: demisto/auth-utils:1.0.0.114762 + dockerimage: demisto/auth-utils:1.0.0.115527 fromversion: 6.8.0 marketplaces: - marketplacev2 diff --git a/Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_16_43.md b/Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_16_43.md new file mode 100644 index 000000000000..23538207d7b1 --- /dev/null +++ b/Packs/MicrosoftDefenderAdvancedThreatProtection/ReleaseNotes/1_16_43.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Microsoft Defender for Endpoint Alerts + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/MicrosoftDefenderAdvancedThreatProtection/pack_metadata.json b/Packs/MicrosoftDefenderAdvancedThreatProtection/pack_metadata.json index 8cca16892685..d5008e37d753 100644 --- a/Packs/MicrosoftDefenderAdvancedThreatProtection/pack_metadata.json +++ b/Packs/MicrosoftDefenderAdvancedThreatProtection/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Defender for Endpoint", "description": "Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection (ATP)) is a unified platform for preventative protection, post-breach detection, automated investigation, and response.", "support": "xsoar", - "currentVersion": "1.16.42", + "currentVersion": "1.16.43", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/MicrosoftManagementActivity/Integrations/MicrosoftManagementActivity/MicrosoftManagementActivity.yml b/Packs/MicrosoftManagementActivity/Integrations/MicrosoftManagementActivity/MicrosoftManagementActivity.yml index 52b1f9d89531..08dee25ad26c 100644 --- a/Packs/MicrosoftManagementActivity/Integrations/MicrosoftManagementActivity/MicrosoftManagementActivity.yml +++ b/Packs/MicrosoftManagementActivity/Integrations/MicrosoftManagementActivity/MicrosoftManagementActivity.yml @@ -290,7 +290,7 @@ script: - description: Run this command if for some reason you need to rerun the authentication process. name: ms-management-activity-auth-reset arguments: [] - dockerimage: demisto/auth-utils:1.0.0.110710 + dockerimage: demisto/auth-utils:1.0.0.115527 isfetch: true runonce: false script: '-' diff --git a/Packs/MicrosoftManagementActivity/ReleaseNotes/1_3_49.md b/Packs/MicrosoftManagementActivity/ReleaseNotes/1_3_49.md new file mode 100644 index 000000000000..47a912f31d6b --- /dev/null +++ b/Packs/MicrosoftManagementActivity/ReleaseNotes/1_3_49.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Microsoft Management Activity API (O365 Azure Events) + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/MicrosoftManagementActivity/pack_metadata.json b/Packs/MicrosoftManagementActivity/pack_metadata.json index fdecf52a9726..ed84b88f3bcd 100644 --- a/Packs/MicrosoftManagementActivity/pack_metadata.json +++ b/Packs/MicrosoftManagementActivity/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Microsoft Management Activity API (O365/Azure Events)", "description": "An integration for Microsoft's management activity API, which enables you to fetch content records and manage your subscriptions.", "support": "xsoar", - "currentVersion": "1.3.48", + "currentVersion": "1.3.49", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Pcysys/Integrations/Pcysys/Pcysys.yml b/Packs/Pcysys/Integrations/Pcysys/Pcysys.yml index b1ac811fc02b..8e99d5cef584 100644 --- a/Packs/Pcysys/Integrations/Pcysys/Pcysys.yml +++ b/Packs/Pcysys/Integrations/Pcysys/Pcysys.yml @@ -121,7 +121,7 @@ script: - contextPath: Pentera.TaskRun.FullActionReport.Status description: 'The status of the action. Can be: success, failed, canceled, no_results.' type: String - dockerimage: demisto/auth-utils:1.0.0.76157 + dockerimage: demisto/auth-utils:1.0.0.115527 runonce: false script: '-' subtype: python3 diff --git a/Packs/Pcysys/ReleaseNotes/1_3_9.md b/Packs/Pcysys/ReleaseNotes/1_3_9.md new file mode 100644 index 000000000000..77438f2f9fc4 --- /dev/null +++ b/Packs/Pcysys/ReleaseNotes/1_3_9.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Pentera + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/Pcysys/pack_metadata.json b/Packs/Pcysys/pack_metadata.json index 011b06199f40..46292ebb47e9 100644 --- a/Packs/Pcysys/pack_metadata.json +++ b/Packs/Pcysys/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Pentera", "description": "Automate remediation actions based on Pentera, the Automated Security Validation Platform, proactively exposing high-risk vulnerabilities.", "support": "partner", - "currentVersion": "1.3.8", + "currentVersion": "1.3.9", "author": "Pentera", "url": "https://pentera.io", "email": "support@pentera.io", diff --git a/Packs/Silverfort/Integrations/Silverfort/Silverfort.yml b/Packs/Silverfort/Integrations/Silverfort/Silverfort.yml index 17ed04d9b9da..999a787708a8 100644 --- a/Packs/Silverfort/Integrations/Silverfort/Silverfort.yml +++ b/Packs/Silverfort/Integrations/Silverfort/Silverfort.yml @@ -117,7 +117,7 @@ script: required: true description: Update the resource entity risk. name: silverfort-update-resource-risk - dockerimage: demisto/auth-utils:1.0.0.91447 + dockerimage: demisto/auth-utils:1.0.0.115527 runonce: false script: '-' subtype: python3 diff --git a/Packs/Silverfort/ReleaseNotes/2_0_28.md b/Packs/Silverfort/ReleaseNotes/2_0_28.md new file mode 100644 index 000000000000..59813660ec62 --- /dev/null +++ b/Packs/Silverfort/ReleaseNotes/2_0_28.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Silverfort + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/Silverfort/pack_metadata.json b/Packs/Silverfort/pack_metadata.json index 3a800e076f3a..1ea564457d46 100644 --- a/Packs/Silverfort/pack_metadata.json +++ b/Packs/Silverfort/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Silverfort", "description": "Silverfort protects organizations from data breaches by delivering strong authentication across entire corporate networks and cloud environments, without requiring any modifications to endpoints or servers. Using patent-pending technology, Silverfort's agentless approach enables multi-factor authentication and AI-driven adaptive authentication even for systems that don’t support it today, including proprietary systems, critical infrastructure, shared folders, IoT devices, and more. Use Silverfort integration to get & update Silverfort risk severity. This integration was integrated and tested with Silverfort version 2.12.", "support": "partner", - "currentVersion": "2.0.27", + "currentVersion": "2.0.28", "author": "Silverfort", "url": "https://support.silverfort.com/", "email": "support@silverfort.com", diff --git a/Packs/Troubleshoot/ReleaseNotes/2_1_1.md b/Packs/Troubleshoot/ReleaseNotes/2_1_1.md new file mode 100644 index 000000000000..880efcf5b3d5 --- /dev/null +++ b/Packs/Troubleshoot/ReleaseNotes/2_1_1.md @@ -0,0 +1,7 @@ + +#### Scripts + +##### CertificatesTroubleshoot + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/Troubleshoot/Scripts/CertificatesTroubleshoot/CertificatesTroubleshoot.yml b/Packs/Troubleshoot/Scripts/CertificatesTroubleshoot/CertificatesTroubleshoot.yml index 5420553c4f88..756126ae33aa 100644 --- a/Packs/Troubleshoot/Scripts/CertificatesTroubleshoot/CertificatesTroubleshoot.yml +++ b/Packs/Troubleshoot/Scripts/CertificatesTroubleshoot/CertificatesTroubleshoot.yml @@ -337,7 +337,7 @@ tags: - Utility timeout: '0' type: python -dockerimage: demisto/auth-utils:1.0.0.103532 +dockerimage: demisto/auth-utils:1.0.0.115527 runas: DBotWeakRole tests: - No tests (auto formatted) diff --git a/Packs/Troubleshoot/pack_metadata.json b/Packs/Troubleshoot/pack_metadata.json index 321edc4d4fbe..52bcff0976c8 100644 --- a/Packs/Troubleshoot/pack_metadata.json +++ b/Packs/Troubleshoot/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Troubleshoot", "description": "Use this pack to troubleshoot your environment.", "support": "xsoar", - "currentVersion": "2.1.0", + "currentVersion": "2.1.1", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Uptycs/Integrations/Uptycs/Uptycs.yml b/Packs/Uptycs/Integrations/Uptycs/Uptycs.yml index b9fd641b7805..c0f9b49b0e03 100644 --- a/Packs/Uptycs/Integrations/Uptycs/Uptycs.yml +++ b/Packs/Uptycs/Integrations/Uptycs/Uptycs.yml @@ -1518,7 +1518,7 @@ script: - name: filename required: true description: The name of the file being uploaded. This file should be uploaded to Cortex XSOAR in the Playground War Room using the paperclip icon next to the CLI. - dockerimage: demisto/auth-utils:1.0.0.91932 + dockerimage: demisto/auth-utils:1.0.0.115527 isfetch: true runonce: true script: '-' diff --git a/Packs/Uptycs/ReleaseNotes/1_0_13.md b/Packs/Uptycs/ReleaseNotes/1_0_13.md new file mode 100644 index 000000000000..a4e697a54d3f --- /dev/null +++ b/Packs/Uptycs/ReleaseNotes/1_0_13.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Uptycs + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/Uptycs/pack_metadata.json b/Packs/Uptycs/pack_metadata.json index 9ffcf506d82a..cceba6b9fcb3 100644 --- a/Packs/Uptycs/pack_metadata.json +++ b/Packs/Uptycs/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Uptycs", "description": "Fetches data from the Uptycs database.", "support": "partner", - "currentVersion": "1.0.12", + "currentVersion": "1.0.13", "author": "Uptycs Inc.", "url": "https://www.uptycs.com", "email": "support@uptycs.com", diff --git a/Packs/WinRM/Integrations/WindowsRemoteManagement/WindowsRemoteManagement.yml b/Packs/WinRM/Integrations/WindowsRemoteManagement/WindowsRemoteManagement.yml index 2c75c39db7d0..f91177d30b5d 100644 --- a/Packs/WinRM/Integrations/WindowsRemoteManagement/WindowsRemoteManagement.yml +++ b/Packs/WinRM/Integrations/WindowsRemoteManagement/WindowsRemoteManagement.yml @@ -338,7 +338,7 @@ script: - contextPath: WinRM.Powershell.Status description: Status code of the WInRM command description: Executes a Powershell script on the endpoint - dockerimage: demisto/auth-utils:1.0.0.76157 + dockerimage: demisto/auth-utils:1.0.0.115527 subtype: python3 fromversion: 5.0.0 tests: diff --git a/Packs/WinRM/ReleaseNotes/1_0_5.md b/Packs/WinRM/ReleaseNotes/1_0_5.md new file mode 100644 index 000000000000..53b62c0ef83a --- /dev/null +++ b/Packs/WinRM/ReleaseNotes/1_0_5.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Windows Remote Management (Beta) + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/WinRM/pack_metadata.json b/Packs/WinRM/pack_metadata.json index 3df62028a7f9..48fb2571cda6 100644 --- a/Packs/WinRM/pack_metadata.json +++ b/Packs/WinRM/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Windows Remote Management", "description": "Uses the Python pywinrm library and commands to execute either a process or using Powershell scripts.", "support": "xsoar", - "currentVersion": "1.0.4", + "currentVersion": "1.0.5", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "", diff --git a/Packs/Zoom/Integrations/Zoom_IAM/Zoom_IAM.yml b/Packs/Zoom/Integrations/Zoom_IAM/Zoom_IAM.yml index d6fc9fe8cf38..0ff33b90370f 100644 --- a/Packs/Zoom/Integrations/Zoom_IAM/Zoom_IAM.yml +++ b/Packs/Zoom/Integrations/Zoom_IAM/Zoom_IAM.yml @@ -164,7 +164,7 @@ script: required: true - description: Retrieves a User Profile schema, which holds all of the user fields within the application. Used for outgoing-mapping through the Get Schema option. name: get-mapping-fields - dockerimage: demisto/auth-utils:1.0.0.76157 + dockerimage: demisto/auth-utils:1.0.0.115527 ismappable: true isremotesyncout: true script: '-' diff --git a/Packs/Zoom/ReleaseNotes/1_6_16.md b/Packs/Zoom/ReleaseNotes/1_6_16.md new file mode 100644 index 000000000000..5cd4b681cbe6 --- /dev/null +++ b/Packs/Zoom/ReleaseNotes/1_6_16.md @@ -0,0 +1,7 @@ + +#### Integrations + +##### Zoom_IAM + + +- Updated the Docker image to: *demisto/auth-utils:1.0.0.115527*. diff --git a/Packs/Zoom/pack_metadata.json b/Packs/Zoom/pack_metadata.json index 6dde9552a549..4a23d565de23 100644 --- a/Packs/Zoom/pack_metadata.json +++ b/Packs/Zoom/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Zoom", "description": "Use the Zoom integration manage your Zoom users and meetings", "support": "xsoar", - "currentVersion": "1.6.15", + "currentVersion": "1.6.16", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "",