Integrate Siemplify with Google SecOps
This document explains how to integrate Siemplify with Google Security Operations (Google SecOps).
Integration version: 90.0
Use cases
The Siemplify integration can address the following use cases:
Phishing investigation: Use Google SecOps capabilities to automate the process of analyzing phishing emails, extracting indicators of compromise (IOCs), and enriching them with threat intelligence.
Malware containment: Use Google SecOps capabilities to automatically isolate infected endpoints, initiate scans, and quarantine malicious files upon detection of malware.
Vulnerability management: Use Google SecOps capabilities to orchestrate vulnerability scans, prioritize vulnerabilities based on risk, and automatically create tickets for remediation.
Threat hunting: Use Google SecOps capabilities to automate running of threat hunting queries across various security tools and datasets.
Security alert triage: Use Google SecOps capabilities to automatically enrich security alerts with contextual information, correlate them with other events, and prioritize them based on severity.
Incident response: Use Google SecOps capabilities to orchestrate the entire incident response process, from initial detection to containment and eradication.
Compliance reporting: Use Google SecOps capabilities to automate the collection and analysis of security data for compliance reporting.
Integration parameters
The Siemplify integration requires the following parameters:
Parameter | Description |
---|---|
Monitors Mail Recipients |
Required. A comma-separated list of email addresses to validate. The default value is |
Elastic Server Address |
Required. The address of the Elastic server. The default value is |
For instructions about how to configure an integration in Google SecOps, see Configure integrations.
You can make changes at a later stage, if needed. After you configure an integration instance, you can use it in playbooks. For more information about how to configure and support multiple instances, see Supporting multiple instances.
Actions
For more information about actions, see Respond to pending actions from Your Workdesk and Perform a manual action.
Add Entity Insight
Use the Add Entity Insight action to add an insight to the targeted Google SecOps entity in Siemplify.
This action runs on all Google SecOps entities.
Action inputs
The Add Entity Insight action requires the following parameters:
Parameter | Description |
---|---|
Message |
Required. The message to add to the entity. This parameter supports HTML elements, such as headings
( |
Action outputs
The Add Entity Insight action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add Entity Insight action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Add Entity Insight". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Add Entity Insight action:
Script result name | Value |
---|---|
is_success |
true or false |
Add General Insight
Use the Add General Insight action to add a general insight to the case.
This action runs on all Google SecOps entities.
Action inputs
The Add General Insight action requires the following parameters:
Parameter | Description |
---|---|
Title |
Required. The title of the insight. |
Message |
Required. The message to add to the entity. This parameter supports HTML elements, such as headings
( |
Triggered By |
Optional. A justification for the insight. |
Action outputs
The Add General Insight action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add General Insight action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Add General Insight". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Add General Insight action:
Script result name | Value |
---|---|
is_success |
true or false |
Add Tags To Similar Cases
Use the Add Tags To Similar Cases action to add tags to similar cases.
To find similar cases, the action uses the siemplify.get_similar_cases()
function with the retrieved parameters that returns a list of case IDs.
This action doesn't run on Google SecOps entities.
Action inputs
The Add Tags To Similar Cases action requires the following parameters:
Parameter | Description |
---|---|
Rule Generator |
Optional. If selected, the action searches for similar cases using the rule generator. Selected by default. |
Port |
Optional. If selected, the action searches for similar cases using port numbers. Selected by default. |
Category Outcome |
Optional. If selected, the action searches for similar cases using the category outcome. Selected by default. |
Entity Identifier |
Optional. If selected, the action searches for similar cases using the entity identifier. Selected by default. |
Days Back |
Required. The number of days to look back when searching for similar cases. |
Tags |
Required. A comma-separated list of tags to add to similar cases. |
Action outputs
The Add Tags To Similar Cases action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add Tags To Similar Cases action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Add Tags To Similar Cases". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Add Tags To Similar Cases action:
Script result name | Value |
---|---|
SimilarCasesIds |
A list of similar case IDs. |
Add to Custom List
Use the Add to Custom List action to add an entity identifier to a categorized custom list and perform future comparisons in other actions.
This action runs on all Google SecOps entities.
Action inputs
The Add to Custom List action requires the following parameters:
Parameter | Description |
---|---|
Category |
Required. A custom list of categories to use. |
Action outputs
The Add to Custom List action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add to Custom List action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Add to Custom List". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Add to Custom List action:
Script result name | Value |
---|---|
is_success |
true or false |
Assign Case
Use the Assign Case action to assign a case to a specific user or user group.
This action runs on all Google SecOps entities.
Action inputs
The Assign Case action requires the following parameters:
Parameter | Description |
---|---|
Assigned User |
Required. A user or user group to assign a case to. |
Action outputs
The Assign Case action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add to Custom List action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Assign Case". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Assign Case action:
Script result name | Value |
---|---|
is_success |
true or false |
Attach Playbook to Alert
Use the Attach Playbook to Alert action to attach a specific playbook to an alert.
This action runs on all Google SecOps entities.
Action inputs
The Attach Playbook to Alert action requires the following parameters:
Parameter | Description |
---|---|
Playbook Name |
Required. The name of the playbook to attach to the current alert. |
Action outputs
The Attach Playbook to Alert action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Search Graphs action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Attach Playbook to Alert". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Attach Playbook to Alert action:
Script result name | Value |
---|---|
Script Result | true or false |
Case Comment
Use the Case Comment action to add a comment to the case in which the current alert is grouped.
This action runs on all Google SecOps entities.
Action inputs
The Case Comment action requires the following parameters:
Parameter | Description |
---|---|
Comment |
Required. The comment to add to the case. |
Action outputs
The Case Comment action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add Vote To Entity action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Case Comment". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Case Comment action:
Script result name | Value |
---|---|
SuccessStatus |
true or false |
Case Tag
Use the Case Tag action to add a tag to the case which the current alert is grouped into.
This action runs on all Google SecOps entities.
Action inputs
The Case Tag action requires the following parameters:
Parameter | Description |
---|---|
Tag |
Required. A tag to add to the case. |
Action outputs
The Case Tag action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Case Tag action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Add Vote To Entity". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Case Tag action:
Script result name | Value |
---|---|
is_success |
true or false |
Change Alert Priority
Use the Change Alert Priority action to update the priority of an alert in a case.
This action runs on all Google SecOps entities.
Action inputs
The Change Alert Priority action requires the following parameters:
Parameter | Description |
---|---|
Alert Priority |
Required. The new priority for the alert. The possible values are as follows:
|
Action outputs
The Change Alert Priority action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add Vote To Entity action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Change Alert Priority". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Change Alert Priority action:
Script result name | Value |
---|---|
Script Result | true or false |
Change Case Stage
Use the Change Case Stage action to change the case stage.
This action runs on all Google SecOps entities.
Action inputs
The Change Case Stage action requires the following parameters:
Parameter | Description |
---|---|
Stage |
Required. The stage to move the case to. The possible values are as follows:
|
Action outputs
The Change Case Stage action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add Vote To Entity action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Change Case Stage". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Change Case Stage action:
Script result name | Value |
---|---|
Script Result | true or false |
Change Priority
Use the Change Priority action to updates the priority of the investigated case.
This action runs on all Google SecOps entities.
Action inputs
The Change Priority action requires the following parameters:
Parameter | Description |
---|---|
Priority |
Required. The priority to set for the case. The possible values are as follows:
|
Action outputs
The Change Priority action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add Vote To Entity action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Close Alert". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Change Priority action:
Script result name | Value |
---|---|
Script Result | true or false |
Close Alert
Use the Close Alert action to close the alert.
This action runs on all Google SecOps entities.
Action inputs
The Close Alert action requires the following parameters:
Parameter | Description |
---|---|
Reason |
Required. A reason for closing the alert. The possible values are as follows:
|
Root Cause |
Required. A primary cause for closing the alert. |
Comment |
Required. A comment to add to the alert. |
Assign to User |
Optional. The user to assign the alert to. |
Tags |
Optional. A comma-separated list of tags. |
Action outputs
The Close Alert action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add Vote To Entity action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Close Alert". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Close Alert action:
Script result name | Value |
---|---|
StatusResult |
true or false |
Close Case
Use the Close Case action to close the case.
This action runs on all Google SecOps entities.
Action inputs
The Close Case action requires the following parameters:
Parameter | Description |
---|---|
Reason |
Required. A reason for closing the case. The possible values are as follows:
|
Root Cause |
Required. A primary cause for closing the case. |
Comment |
Required. A comment to add to the case. |
Action outputs
The Close Case action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add Vote To Entity action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Close Case". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Close Case action:
Script result name | Value |
---|---|
StatusResult |
true or false |
Create Entity
Use the Create Entity action to create a new entity and add it to an alert.
This action runs on all Google SecOps entities.
Action inputs
The Create Entity action requires the following parameters:
Parameter | Description |
---|---|
Entities Identifies |
Required. A comma-separated list of entity identifiers to create in the case,
such as |
Delimiter |
Optional. The delimiter used to split the input from the If you don't set a value, the action treats the input as a single entity identifier. The default value is |
Entity Type |
Required. The type of the entity to create, such as |
Is Internal |
Optional. If selected, the action treats entities as part of an internal network. Not selected by default. |
Is Suspicious |
Optional. If selected, the action treats entities as suspicious. Not selected by default. |
Action outputs
The Create Entity action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Create Entity action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Create Entity". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Create Entity action:
Script result name | Value |
---|---|
StatusResult |
true or false |
Create Gemini Case Summary
Use the Create Gemini Case Summary action to create a new Gemini case summary and add it to an alert.
This action runs on all Google SecOps entities.
Action inputs
None.
Action outputs
The Create Gemini Case Summary action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Create Gemini Case Summary action:
{
"summary": "On the Linux agent instance-1 (IP addresses 10.150.0.3 and 34.85.128.214), user vanshikavw_google_com initiated the process curl (SHA1 hash 3395856ce81f2b7382dee72602f798b642f14140) to create the malware file /home/vanshikavw_google_com/eicar_test_vanshikavw-test-new.\n* VirusTotal identifies the SHA1 hash 3395856ce81f2b7382dee72602f798b642f14140 as a virus.eicar/test.\n* CURL is associated with multiple actors, including APT27, APT34, APT41, APT44, APT9, FIN11, FIN13, FIN6, TEMP.Armageddon, Turla Team, UNC1151, UNC1860, UNC215, UNC2165, UNC2500, UNC251, UNC2595, UNC2633, UNC2900, UNC2975, UNC3569, UNC3661, UNC3944, UNC4483, UNC4936, UNC4962, UNC5007, UNC5051, UNC5055, UNC5156, UNC5221, UNC5266, UNC5330, UNC5371, UNC5470, UNC5859, and UNC961.\n* CURL is known to use MITRE ATT&CK techniques such as T1113, T1095, T1036, T1553, T1222, T1055, T1140, T1070, T1027, T1622, T1057, T1010, T1083, T1518, T1082, T1016, T1059, T1496, and T1588.\n* A GTI MALWARE search did not find any information about eicar_test_vanshikavw-test-new.\n* A GTI IP_ADDRESS search did not find any information about 10.150.0.3 or 34.85.128.214.",
"next_steps": ["Isolate instance-1 to prevent any potential lateral movement or further compromise of the network, as the curl process is associated with multiple threat actors.",
"Investigate the user account vanshikavw_google_com to determine if the user's credentials have been compromised or if the user initiated the curl process intentionally, as the curl process is associated with multiple threat actors.",
"Analyze the network traffic to and from the IP addresses 10.150.0.3 and 34.85.128.214 for any suspicious communication patterns, as the curl process is associated with multiple threat actors.",
"Examine the process execution logs on instance-1 for any other unusual or unauthorized activities, as the curl process is associated with multiple threat actors.",
"Review the configuration of the Linux agent on instance-1 to ensure that it is properly secured and that no unauthorized modifications have been made, as the curl process is associated with multiple threat actors."],
"reasons": ["The case involves a Linux agent instance-1 (IP addresses 10.150.0.3 and 34.85.128.214) where user vanshikavw_google_com initiated the process curl to create the file /home/vanshikavw_google_com/eicar_test_vanshikavw-test-new.",
"The SHA1 hash 3395856ce81f2b7382dee72602f798b642f14140 of the curl process is identified by VirusTotal as virus.eicar/test, indicating it is a known test virus.",
"The process CURL is associated with multiple threat actors, including APT27, APT34, APT41, APT44, APT9, FIN11, FIN13, FIN6, TEMP.Armageddon, Turla Team, UNC1151, UNC1860, UNC215, UNC2165, UNC2500, UNC251, UNC2595, UNC2633, UNC2900, UNC2975, UNC3569, UNC3661, UNC3944, UNC4483, UNC4936, UNC4962, UNC5007, UNC5051, UNC5055, UNC5156, UNC5221, UNC5266, UNC5330, UNC5371, UNC5470, UNC5859, and UNC961, suggesting a potential link to malicious activity.",
"CURL is known to use various MITRE ATT&CK techniques such as T1113, T1095, T1036, T1553, T1222, T1055, T1140, T1070, T1027, T1622, T1057, T1010, T1083, T1518, T1082, T1016, T1059, T1496, and T1588, indicating a wide range of potential malicious behaviors.",
"The file eicar_test_vanshikavw-test-new was not found in GTI MALWARE searches, and the IP addresses 10.150.0.3 and 34.85.128.214 were not found in GTI IP_ADDRESS searches."]}
Output messages
The Create Gemini Case Summary action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Create Gemini Case Summary". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Create Gemini Case Summary action:
Script result name | Value |
---|---|
is_success |
true or false |
Create Or Update Entity Properties
Use the Create Or Update Entity Properties action to create or change properties for entities in the entity scope.
This action runs on all Google SecOps entities.
Action inputs
The Create Or Update Entity Properties action requires the following parameters:
Parameter | Description |
---|---|
Entity Field |
Required. The name of the entity field to create or update. |
Field Value |
Required. The value to set for the specified entity field. |
Action outputs
The Create Or Update Entity Properties action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add Vote To Entity action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Create Or Update Entity Properties". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Create Or Update Entity Properties action:
Script result name | Value |
---|---|
is_success |
true or false |
Get Case Details
Use the Get Case Details action to get all the data from a case (this includes comments, entity information, insights, playbooks that ran, alert information, and events).
TThis action doesn't run on Google SecOps entities.
Action inputs
The Get Case Details action requires the following parameters:
Parameter | Description |
---|---|
Case Id |
Optional. The ID of the case to query. If nothing is provided, the action will default to using the current case. |
Fields to Return |
Optional. A comma-separated list of fields to return. If nothing is provided, all fields are returned. Note: Nested values can be retrieved by chaining keys and list indexes using the |
Nested Keys Delimiter |
Optional. The character used to separate nested keys when requesting specific fields. The delimiter cannot be a comma( Nested key retrieval requires this delimiter. |
Action outputs
The Get Case Details action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Get Case Details action:
{
"id": 24879,
"creationTimeUnixTimeInMs": 1750862500562,
"modificationTimeUnixTimeInMs": 1750862500562,
"name": "Malware",
"priority": -1,
"isImportant": false,
"isIncident": false,
"startTimeUnixTimeInMs": 1727243021999,
"endTimeUnixTimeInMs": 1727243022479,
"assignedUser": "@Tier1",
"description": null,
"isTestCase": true,
"type": 1,
"stage": "Triage",
"environment": "Default Environment",
"status": 1,
"incidentId": null,
"tags": ["hi", "Simulated Case"],
"alertCards": [{
"id": 172354,
"creationTimeUnixTimeInMs": 1750862500651,
"modificationTimeUnixTimeInMs": 1750862500651,
"identifier": "EICAR_TEST_VANSHIKAVW-TEST-NEW0CC43705-04A7-43FD-88CD-B3E7FECA881D",
"status": 0,
"name": "EICAR_TEST_VANSHIKAVW-TEST-NEW",
"priority": -1,
"workflowsStatus": 1,
"slaExpirationUnixTime": null,
"slaCriticalExpirationUnixTime": null,
"startTime": 1727243021999,
"endTime": 1727243022479,
"alertGroupIdentifier": "MalwareSFBrxjAXvKJsJyKe5iQalf00zrv/QwX966dRoEyP2eA=_8cc160b5-7039-421c-926c-1a98073f11d2",
"eventsCount": 3,
"title": "EICAR_TEST_VANSHIKAVW-TEST-NEW",
"ruleGenerator": "Malware",
"deviceProduct": "SentinelOneV2",
"deviceVendor": "SentinelOneV2",
"playbookAttached": "Testing",
"playbookRunCount": 1,
"isManualAlert": false,
"sla": {
"slaExpirationTime": null,
"criticalExpirationTime": null,
"expirationStatus": 2,
"remainingTimeSinceLastPause": null
},
"fieldsGroups": [],
"sourceUrl": null,
"sourceRuleUrl": null,
"siemAlertId": null,
"relatedCases": [],
"lastSourceUpdateUnixTimeInMs": null,
"caseId": 24879,
"nestingDepth": 0
}],
"isOverflowCase": false,
"isManualCase": false,
"slaExpirationUnixTime": null,
"slaCriticalExpirationUnixTime": null,
"stageSlaExpirationUnixTimeInMs": null,
"stageSlaCriticalExpirationUnixTimeInMs": null,
"canOpenIncident": false,
"sla": {
"slaExpirationTime": null,
"criticalExpirationTime": null,
"expirationStatus": 2,
"remainingTimeSinceLastPause": null
},
"stageSla": {
"slaExpirationTime": null,
"criticalExpirationTime": null,
"expirationStatus": 2,
"remainingTimeSinceLastPause": null},
"relatedAlertTicketId": null,
"relatedAlertCards": []
}
Output messages
The Get Case Details action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get Case Details". Reason: ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Case Details action:
Script result name | Value |
---|---|
is_success |
true or false |
Get Connector Context Value
Use the Get Connector Context Value action to get a value that is stored under a specified key in the Google SecOps database for a connector context.
This action doesn't run on Google SecOps entities.
Action inputs
The Get Connector Context Value action requires the following parameters:
Parameter | Description |
---|---|
Connector Identifier |
Required. The connector identifier for which to retrieve the context value. |
Key Name |
Required. The key name for which to retrieve the context value. |
Create Case Wall Table |
Optional. If selected, the action creates a Case Wall table with the retrieved context value, unless the value exceeds the character limit. Selected by default. |
Action outputs
The Get Connector Context Value action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Case Wall table
The Get Connector Context Value action can generate the following table:
Table name: Connector
Table columns:
- Connector identifier
- Key
- Value
Output messages
The Get Connector Context Value action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get Connector Context Value". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Connector Context Value action:
Script result name | Value |
---|---|
is_success |
true or false |
Get Scope Context Value
Use the Get Scope Context Value action to get a value that is stored under a specified key in the Google SecOps database.
This action can work with the following scopes: alert, case, and global.
This action doesn't run on Google SecOps entities.
Action inputs
The Get Scope Context Value action requires the following parameters:
Parameter | Description |
---|---|
Context Scope |
Required. The context scope to retrieve data from. Possible values are as follows:
|
Key Name |
Required. The key name to retrieve the corresponding value from the specified context. |
Create Case Wall Table |
Optional. If selected, the action creates a Case Wall table with the retrieved context value, unless the value exceeds the character limit. Selected by default. |
Action outputs
The Get Scope Context Value action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Case Wall table
The Get Scope Context Value action can generate the following table:
Table name: SCOPE
Table columns:
- Key
- Value
Output messages
The Get Scope Context Value action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get Scope Context Value". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Scope Context Value action:
Script result name | Value |
---|---|
is_success |
true or false |
Get Similar Cases
Use the Get Similar Cases action to search for similar cases and return their IDs.
This action runs on all Google SecOps entities.
Action inputs
The Get Similar Cases action requires the following parameters:
Parameter | Description |
---|---|
Rule Generator |
Optional. If selected, the action searches for similar cases using the rule generator. Selected by default. |
Port |
Optional. If selected, the action searches for similar cases using port numbers. Selected by default. |
Category Outcome |
Optional. If selected, the action searches for similar cases using the category outcome. Selected by default. |
Entity Identifier |
Optional. If selected, the action searches for similar cases using the entity identifier. Selected by default. |
Days Back |
Required. The number of days prior to today for the action to search for similar cases. |
Include Open Cases |
Optional. If selected, the action searches through open cases. Selected by default. |
Include Closed Cases |
Optional. If selected, the action searches through closed cases. Selected by default. |
The Get Similar Cases action applies the logical AND
operator to
the Rule Generator
, Port
, Category Outcome
, Entity Identifier
,
Include Open Cases
, and Include Closed Cases
parameters to use them in the
same search.
Action outputs
The Get Similar Cases action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Get Similar Cases action:
{
"results": [{
"id": 23874,
"name": "Malware",
"tags": ["hi", "Simulated Case"],
"start time": "2024-09-25 05:43:41.999000+00:00",
"start time unix": 1727243021999,
"last modified": "2025-06-19 13:24:01.062000+00:00",
"priority": "Informative",
"assigned user": "@Tier1",
"matching_criteria": {
"ruleGenerator": true,
"port": true,
"outcome": true,
"entities": true
},
"matched_entities": [
{"entity": "INSTANCE-1", "type": "HOSTNAME", "isSuspicious": false},
{"entity": "10.150.0.3", "type": "ADDRESS", "isSuspicious": false}, {"entity": "172.17.0.1", "type": "ADDRESS", "isSuspicious": false}, {"entity": "VANSHIKAVW_GOOGLE_COM", "type": "USERUNIQNAME", "isSuspicious": false},
{"entity": "CURL", "type": "PROCESS", "isSuspicious": false}, {"entity": "EICAR_TEST_VANSHIKAVW-TEST-NEW", "type": "FILENAME", "isSuspicious": false},
{"entity": "3395856CE81F2B7382DEE72602F798B642F14140", "type": "FILEHASH", "isSuspicious": false},
{"entity": "34.85.128.214", "type": "ADDRESS", "isSuspicious": false},
{"entity": "/HOME/VANSHIKAVW_GOOGLE_COM/EICAR_TEST_VANSHIKAVW-TEST-NEW", "type": "FILENAME", "isSuspicious": false}
],
"status": "Open"}],
"stats":
{"Malicious": 0.0, "Is Important": 0.0, "Is Incident": 0.0, "Status Open": 100.0},
"platform_url": "https://soarapitest.backstory.chronicle.security/"
}
Output messages
The Get Similar Cases action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Get Similar Cases". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Get Similar Cases action:
Script result name | Value |
---|---|
SimilarCasesIds |
CASE_IDS_LIST
|
Instruction
Use the Instruction action to set instructions for an analyst.
This action runs on all Google SecOps entities.
Action inputs
The Instruction action requires the following parameters:
Parameter | Description |
---|---|
Instruction |
Required. The instruction content for the analyst. |
Action outputs
The Instruction action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Add Vote To Entity action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Instruction". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Instruction action:
Script result name | Value |
---|---|
Script Result | true or false |
Is In Custom List
Use the Is In Custom List action to check whether the entity identifier is part of a specified custom list.
This action runs on all Google SecOps entities.
Action inputs
The Is In Custom List action requires the following parameters:
Parameter | Description |
---|---|
Category |
Required. A custom list category to check for alert entities. |
Action outputs
The Is In Custom List action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Is In Custom List action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Is In Custom List". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Is In Custom List action:
Script result name | Value |
---|---|
ScriptResult |
true or false |
Mark As Important
Use the Mark As Important action to mark a case as important.
This action runs on all Google SecOps entities.
Action inputs
None.
Action outputs
The Mark As Important action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Mark As Important action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Mark As Important". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Mark As Important action:
Script result name | Value |
---|---|
Script Result | true or false |
Open Web Url
Use the Open Web Url action to generate a browser link.
This action runs on all Google SecOps entities.
Action inputs
The Open Web Url action requires the following parameters:
Parameter | Description |
---|---|
Title |
Required. The title of the URL. |
URL |
Required. The target URL. |
Action outputs
The Open Web Url action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Open Web Url action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Open Web Url". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Open Web Url action:
Script result name | Value |
---|---|
Script Result | true or false |
Pause Alert SLA
Use the Pause Alert SLA action to pause the Service Level Agreement (SLA) timer for a specific alert in the case.
This action doesn't run on Google SecOps entities.
Action inputs
The Pause Alert SLA action requires the following parameters:
Parameter | Description |
---|---|
Message |
Optional. The reason for pausing the alert SLA. |
Action outputs
The Pause Alert SLA action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Pause Alert SLA action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Pause Alert SLA". Reason: ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Pause Alert SLA action:
Script result name | Value |
---|---|
is_success |
true or false |
Permitted Alert Time
Use the Permitted Alert Time action to check if the start time of a selected alert complies with a user-defined time conditions.
This action runs on all Google SecOps entities.
Action inputs
The Permitted Alert Time action requires the following parameters:
Parameter | Description |
---|---|
Permitted Start Time |
Required. The start time of the permitted period for alerts. |
Permitted End Time |
Required. The end time of the permitted period for alerts. |
Monday |
Optional. If selected, the action treats Mondays as permitted days for alerts. Not selected by default. |
Tuesday |
Optional. If selected, the action treats Tuesdays as permitted days for alerts. Selected by default. |
Wednesday |
Optional. If selected, the action treats Wednesdays as permitted days for alerts. Selected by default. |
Thursday |
Optional. If selected, the action treats Thursdays as permitted days for alerts. Not selected by default. |
Friday |
Optional. If selected, the action treats Fridays as permitted days for alerts. Not selected by default. |
Saturday |
Optional. If selected, the action treats Saturdays as permitted days for alerts. Not selected by default. |
Sunday |
Optional. If selected, the action treats Sundays as permitted days for alerts. Not selected by default. |
Timestamp Type |
Optional. The type of timestamp that will be used for comparison. |
Input Timezone |
Optional. The timezone name. For example: UTC. This action also supports input with IANA zones (eq America/New_York). If the input is provided using zones, then the action automatically adjusts for daylight savings. |
Action outputs
The Permitted Alert Time action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Permitted Alert Time action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Permitted Alert Time". Reason: ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Permitted Alert Time action:
Script result name | Value |
---|---|
Permitted |
true or false |
Ping
Use the Ping action to test the connectivity.
This action runs on all Google SecOps entities.
Action inputs
None.
Action outputs
The Ping action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Ping action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Ping". Reason: ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Ping action:
Script result name | Value |
---|---|
Script Result | true or false |
Raise Incident
Use the Raise Incident action to raise a case incident and mark the true
positive cases as Critical
.
This action runs on all Google SecOps entities.
Action inputs
The Raise Incident action requires the following parameters:
Parameter | Description |
---|---|
Soc Role |
Optional. The Google SecOps SOC role to assign the case to. |
Action outputs
The Raise Incident action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Search ASM Issues action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Raise Incident". Reason: ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Raise Incident action:
Script result name | Value |
---|---|
Script Result | true or false |
Remove Tag
Use the Remove Tag action to remove tags from a case.
This action runs on all Google SecOps entities.
Action inputs
The Remove Tag action requires the following parameters:
Parameter | Description |
---|---|
Tag |
Required. A comma-separated list of tags to remove from a case. |
Action outputs
The Remove Tag action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Remove Tag action can return the following output messages:
Output message | Message description |
---|---|
Successfully removed the following tags from case CASE_ID:TAGS |
The action succeeded. |
|
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Remove Tag action:
Script result name | Value |
---|---|
is_success |
true or false |
Remove From Custom List
Use the Remove From Custom List action to remove entities that are associated with an alert from a specified custom list category.
This action runs on all Google SecOps entities.
Action inputs
The Remove From Custom List action requires the following parameters:
Parameter | Description |
---|---|
Category |
Required. The custom list category name from which to remove the entities. |
Action outputs
The Remove From Custom List action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Remove From Custom List action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Remove From Custom List". Reason: ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Remove From Custom List action:
Script result name | Value |
---|---|
ScriptResult |
true or false |
Resume Alert SLA
Use the Resume Alert SLA action to restart the Service Level Agreement (SLA) timer for a specific alert in the case.
This action doesn't run on Google SecOps entities.
Action inputs
None.
Action outputs
The Resume Alert SLA action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Resume Alert SLA action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Resume Alert SLA". Reason: ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Resume Alert SLA action:
Script result name | Value |
---|---|
is_success |
true or false |
Set Alert SLA
Use the Set Alert SLA action to set the SLA timer for an alert.
This action has the highest priority and overrides the existing SLA defined for the specific alert.
This action doesn't run on Google SecOps entities.
Action inputs
The Set Alert SLA action requires the following parameters:
Parameter | Description |
---|---|
SLA Period |
Required. The SLA breach period. The default value is |
SLA Time Unit |
Required. The time unit for the SLA period. The default value is
The possible values are as follows:
|
SLA Time To Critical Period |
Required. The critical SLA threshold. The default value is |
SLA Time To Critical Unit |
Required. The time unit for the critical SLA period. The default value is The possible values are as follows:
|
Action outputs
The Set Alert SLA action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Set Alert SLA action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Set Alert SLA". Reason: ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Set Alert SLA action:
Script result name | Value |
---|---|
is_success |
true or false |
Set Case SLA
Use the Set Case SLA action to set the SLA for a case.
This action has the highest priority and overrides the existing SLA defined for the specific case.
This action doesn't run on Google SecOps entities.
Action inputs
The Set Case SLA action requires the following parameters:
Parameter | Description |
---|---|
SLA Period |
Required. The SLA breach period. The default value is |
SLA Time Unit |
Required. The time unit for the SLA period. The default value is
The possible values are as follows:
|
SLA Time To Critical Period |
Required. The critical SLA threshold. The default value is |
SLA Time To Critical Unit |
Required. The time unit for the critical SLA period. The default value is The possible values are as follows:
|
Action outputs
The Set Case SLA action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Search ASM Issues action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Set Case SLA". Reason: ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Set Case SLA action:
Script result name | Value |
---|---|
is_success |
true or false |
Set Custom Fields
Use the Set Custom Fields action to set values for custom fields.
This action doesn't run on Google SecOps entities.
Action inputs
The Set Custom Fields action requires the following parameters:
Parameter | Description |
---|---|
Scope |
Required. The scope to set for the custom fields. The possible values are The default value is |
Custom Fields Data |
Required. The values to update for the custom fields. You can update multiple custom fields in a single action run. The default value is as follows: { "Custom Field Name 1": "Custom Field Value 1", "Custom Field Name 2": "Custom Field Value 2" } |
Append Values |
Optional. If selected, the action appends the inputs from the
If not selected, the action overwrites the existing
values with the inputs from the Not selected by default. |
Action outputs
The Set Custom Fields action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Set Custom Fields action:
{
"Custom Field Name": "Updated Custom Field Value",
"Custom Field Name": "Updated Custom Field Value",
}
Output messages
The Set Custom Fields action can return the following output messages:
Output message | Message description |
---|---|
Successfully updated the following SCOPE custom fields: UPDATED_CUSTOM_FIELD_NAMES |
The action succeeded. |
Error executing action "Set Custom Fields". Reason: ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Set Custom Fields action:
Script result name | Value |
---|---|
is_success |
true or false |
Set Risk Score
Use the Set Risk Score action to update the risk score of a case.
This action doesn't run on Google SecOps entities.
Action inputs
The Set Risk Score action requires the following parameters:
Parameter | Description |
---|---|
Risk Score |
Required. The risk score to set for the selected case. |
Action outputs
The Set Risk Score action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Set Risk Score action can return the following output messages:
Output message | Message description |
---|---|
Successfully set Risk Score for case CASE_ID |
The action succeeded. |
Error executing action "Set Risk Score". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Set Risk Score action:
Script result name | Value |
---|---|
is_success |
true or false |
Set Scope Context Value
Use the Set Scope Context Value action to set a value for a key that is stored in the Google SecOps database.
This action doesn't run on Google SecOps entities.
Action inputs
The Set Scope Context Value action requires the following parameters:
Parameter | Description |
---|---|
Context Scope |
Required. The context scope to retrieve data from. Possible values are as follows:
|
Key Name |
Required. The key name to retrieve the corresponding value from the specified context. |
Key Value |
Required. The value to store under the specified key. |
Action outputs
The Get Scope Context Value action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Set Scope Context Value action can return the following output messages:
Output message | Message description |
---|---|
Successfully set context value for the context key
CONTEXT_KEY with scope
CONTEXT_SCOPE. |
The action succeeded. |
Error executing action "Set Scope Context Value". Reason:
ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Set Scope Context Value action:
Script result name | Value |
---|---|
is_success |
true or false |
Update Case Description
Use the Update Case Description action to update a case description.
This action doesn't run on Google SecOps entities.
Action inputs
The Update Case Description action requires the following parameters:
Parameter | Description |
---|---|
Description |
Required. The description to set for the case. |
Action outputs
The Update Case Description action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Update Case Description action can return the following output messages:
Output message | Message description |
---|---|
Successfully updated the case description. |
The action succeeded. |
Error executing action "Update Case Description". Reason: ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Update Case Description action:
Script result name | Value |
---|---|
StatusResult |
true or false |
Wait For Custom Fields
Use the Wait For Custom Fields action to wait for custom fields values to continue playbook execution.
This action doesn't run on Google SecOps entities.
Action inputs
The Wait For Custom Fields action requires the following parameters:
Parameter | Description |
---|---|
Scope |
Required. The scope to set for the custom fields. The possible values are The default value is |
Custom Fields Data |
Required. The required conditions for the custom fields to allow the action to resume running a playbook. Configure the custom field names and their required values as a JSON object. If you set conditions for multiple fields, the action waits for all fields to match their respective conditions. The action behavior depends on the input that you provide. For the action to resume running a playbook with any value in a custom field, configure an empty string for the custom field as follows: { "Custom Field": "" } For the action to resume running a playbook when the custom field equals
a specific value, such as { "Custom Field": "VALUE_1" } The default value is as follows: { "Custom Field Name 1": "Custom Field Value 1", "Custom Field Name 2": "Custom Field Value 2" } |
Action outputs
The Wait For Custom Fields action provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Available |
Output messages | Available |
Script result | Available |
JSON result
The following example shows the JSON result output received when using the Wait For Custom Fields action:
{
"Custom Field Name": "Updated Custom Field Value",
"Custom Field Name": "Updated Custom Field Value",
}
Output messages
The Wait For Custom Fields action can return the following output messages:
Output message | Message description |
---|---|
|
The action succeeded. |
Error executing action "Wait For Custom Fields". Reason: ERROR_REASON |
The action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table lists the value for the script result output when using the Wait For Custom Fields action:
Script result name | Value |
---|---|
is_success |
true or false |
Jobs
The Siemplify integration lets you use the following jobs:
Siemplify - Actions Monitor
Use the Siemplify - Actions Monitor job to get notifications for all actions that have failed individually at least three times in the past three hours.
Job inputs
The Siemplify - Actions Monitor job requires the following parameters:
Parameter | Description |
---|---|
Run Interval In Seconds |
Optional. The interval in seconds for the job to run. This parameter determines how often the integration checks for failed playbook actions. The default value is |
Is Enabled |
Optional. If selected, the job is active. Selected by default. |
Siemplify - Cases Collector DB
Use the Siemplify - Cases Collector DB job to retrieve and process security cases from a designated publisher.
Job inputs
The Siemplify - Cases Collector DB job requires the following parameters:
Parameter | Description |
---|---|
Publisher Id |
Required. The ID of the publisher from which to collect cases and logs. |
Verify SSL |
Optional. If selected, the job verifies that the SSL certificate of the publisher is valid. Not selected by default. |
Siemplify - Logs Collector
Use the Siemplify - Logs Collector job to retrieve and process logs from a specified publisher.
Job inputs
The Siemplify - Logs Collector job requires the following parameters:
Parameter | Description |
---|---|
Publisher Id |
Required. The ID of the publisher from which to collect the logs. |
Verify SSL |
Optional. If selected, the job verifies that the SSL certificate of the publisher is valid. Not selected by default. |
Need more help? Get answers from Community members and Google SecOps professionals.