Skip to content

splunk-soar-connectors/infobloxthreatdefensewithddi

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Infoblox Threat Defense with DDI

Publisher: Infoblox
Connector Version: 1.0.0
Product Vendor: Infoblox
Product Name: Infoblox Threat Defense with DDI
Minimum Product Version: 6.4.1

This app integrates with Infoblox Threat Defense with DDI to provide DNS Security, Threat Intelligence, and Centralized DDI (DNS, DHCP, and IP Address Management) capabilities. It enables automated lookups of IP and host asset data, and management of custom lists for security policies.

Explanation of Data Ingestion

This integration supports two types of data ingestion: DNS Security Events and SOC Insights. If an ingestion type is not selected while configuring asset, data ingestion will not occur. Only one data ingestion type can be configured per asset. To configure multiple data ingestions, set up multiple assets.

The below details describe the configuration and usage of the Infoblox integration for Splunk SOAR, focusing on the two on-poll ingestion types: DNS Security Events and SOC Insights.


On-Poll Configuration

Poll Now Feature

The Poll Now action retrieves the data based on the Max Hours Backwards parameter which is default set to 24 hours for ingestion type DNS Security Events.

Important Notes:

  • The Poll Now feature ignores the following parameters: Source ID, Maximum containers, and Maximum artifacts.
  • The Poll Now feature does not store a checkpoint file, meaning it will fetch data according to the configured parameters without considering previous ingestions.

Scheduled / Interval Polling

Recommended Ingestion:
To optimize ingestion and reduce the volume of unnecessary events, it is strongly recommended to apply the maximum number of relevant filters. This ensures efficient processing and minimizes noise in the Splunk SOAR environment.

Limit Parameter:
The limit parameter controls the maximum number of records ingested per poll. The default value is 100; adjust based on your requirements.

Max Hours Backwards Parameter:
For the first poll, this parameter determines how many hours of historical data to fetch. For subsequent polls, the integration uses the timestamp from the last poll as the starting point.


DNS Security Events

  • Parameters:

    • Max Hours Backwards: Number of hours before the first connector iteration to retrieve alerts from (integer, default: 0).
    • Queried name: Filter by comma-separated queried domain names (string list).
    • Policy Name: Filter by comma-separated security policy names (string list).
    • Threat Level: Filter by threat severity level (LOW, MEDIUM, HIGH) (string).
    • Threat Class: Filter by comma-separated threat category (e.g., "Malware", "MalwareDownload") (string list).
    • Threat Family: Filter by comma-separated threat family (e.g., Log4Shell, OPENRESOLVER) (string).
    • Threat Indicator: Filter by comma-separated threat indicators (domains, IPs) (string list).
    • Policy Action: Filter by comma-separated action performed (Log, Block, Default, Redirect) (string list).
    • Feed Name: Filter by comma-separated threat feed or custom list name (string list).
    • Network: Filter by comma-separated network name, on-premises host, endpoint, or DFP name (string list).
    • Limit: Maximum number of records to retrieve per polling cycle (integer, default: 100).
  • Severity Mapping of DNS Security Events:

    Threat Level SOAR Container Severity
    HIGH High
    MEDIUM Medium
    LOW Low
    INFO Low
  • Container Creation:
    Each DNS Security Event will create a separate container in Splunk SOAR with relevant metadata and artifacts containing the event details.

  • Important API Limitation:
    The DNS Security Events API does not support sorting, and records are returned in descending order by default. This may result in data loss if there are more records than the specified limit. To minimize this risk, apply relevant filters and adjust the limit parameter appropriately.


SOC Insights

  • Parameters:

    • Status: Filter Insights by their current status (ACTIVE, CLOSED) (string).
    • Threat Type: Filter Insights by the type of threat detected (string).
    • Priority: Filter Insights by priority level (LOW, INFO, MEDIUM, HIGH, CRITICAL) (string).
  • Severity Mapping of SOC Insights:

    Priority Level SOAR Container Severity
    CRITICAL High
    HIGH High
    MEDIUM Medium
    LOW Low
    INFO Low
  • Container Creation:
    Each SOC Insight will create a separate container in Splunk SOAR with relevant metadata and artifacts containing the insight details.

  • Container Updates:
    SOC Insight containers and artifacts will not be updated after initial ingestion, even if the insight is updated in Infoblox.

  • Event Deduplication:
    Events will be deduplicated based on the event ID to prevent duplicate containers.


Best Practices

  • Filtering Recommendations:
    To optimize ingestion and reduce the volume of unnecessary events, it is strongly recommended to apply the maximum number of relevant filters. This ensures efficient processing and minimizes noise in the Splunk SOAR environment.

  • Time-based Polling:
    DNS Security Events ingestion type uses time-based filtering for incremental polling. The timestamp of the last fetched event will be used as the new polling start time, ensuring only new events are ingested in subsequent polls.

  • Multiple Assets Configuration:
    For organizations that need to ingest both DNS Security Events and SOC Insights simultaneously, configure two separate assets, one for each ingestion type.


Playbooks

  • Playbooks for Infoblox Threat Defense with DDI are available in the repository. Refer to the README for detailed instructions on setup and configuration.

Configuration variables

This table lists the configuration variables required to operate Infoblox Threat Defense with DDI. These variables are specified when configuring a Infoblox Threat Defense with DDI asset in Splunk SOAR.

VARIABLE REQUIRED TYPE DESCRIPTION
base_url required string Base URL for Infoblox API (e.g., https://csp.infoblox.com)
api_key required password API Key for authentication
ingestion_type optional string Type of data to retrieve and ingest
queried_name optional string Filter by comma-separated queried domain names (DNS Security Events)
policy_name optional string Filter by comma-separated security policy names (DNS Security Events)
threat_level optional string Filter by threat severity level (DNS Security Events)
threat_class optional string Filter by comma-separated threat class (DNS Security Events)
threat_family optional string Filter by comma-separated threat family (DNS Security Events)
threat_indicator optional string Filter by comma-separated threat indicators (domains, IPs) (DNS Security Events)
policy_action optional string Filter by comma-separated action performed (Log, Block, Default, Redirect) (DNS Security Events)
feed_name optional string Filter by comma-separated threat feed or custom list name (DNS Security Events)
network optional string Filter by comma-separated network name, on-premises host, endpoint, or DFP name (DNS Security Events)
limit optional numeric Specify the maximum number of events to fetch (default: 100) (DNS Security Events)
max_hours_backwards optional numeric Specify the number of hours of historical data to retrieve for manual polling (default: 24 hours) (DNS Security Events)
soc_status optional string Filter by SOC Insight status (Infoblox SOC Insight)
soc_threat_type optional string Filter by SOC Insight threat type detected (Infoblox SOC Insight)
soc_priority optional string Filter by SOC Insight priority level (Infoblox SOC Insight)

Supported Actions

on poll - Ingest data from Infoblox (DNS Security Events or SOC Insights based on configuration)
test connectivity - Validate the asset configuration for connectivity using supplied configuration
initiate indicator intel lookup - Initiate an indicator investigation using Infoblox Dossier
get indicator intel lookup result - Retrieve the result of a previously initiated Dossier lookup for an indicator (IP/URL/Host/MAC/Hash)
ip asset data lookup - Look up asset data for a given IP address using IPAM address information
get custom list - Retrieve Custom Lists from Infoblox by ID, name, or filtering criteria
remove custom list - Delete a Custom List from Infoblox Cloud
create network list - Create a Network List with specified name, items, and optional description
update network list - Update metadata and CIDRs of a specified network list
get network list - Retrieve network lists and their metadata
get soc insights assets - Retrieve the list of associated assets for a given Insight ID
remove network list - Remove a specific network list by ID
host asset data lookup - Look up host asset data using IPAM host information to retrieve detailed host information from Infoblox
dns record lookup - Perform a DNS record query to retrieve associated IPs or domains from Infoblox DDI
dhcp lease lookup - Perform a DHCP lease query to retrieve lease information from Infoblox DDI
indicator threat lookup - Lookup threat intelligence details for an indicator using Infoblox TIDE
create custom list - Create a new custom list with specified details and items
update custom list - Update metadata of an existing custom list such as name, description, confidence level, threat level, or tags
remove security policy - Remove a specific Security Policy by Security Policy ID
get security policy - Retrieve Security Policies and their metadata
create security policy - Create a Security Policy, including its name, rules, associated network lists, DNS Forwarding Proxies (DFPs) etc
update custom list items - Insert or remove individual items (e.g., IPs, domains) in a custom list
update security policy - Update a specific Security Policy, including its name, rules, associated network lists, DNS Forwarding Proxies (DFPs) etc
get soc insights comments - Retrieve the list of comments associated with a specific Insight ID from Infoblox, optionally filtered by a time range
get soc insights indicators - Retrieve a filtered list of indicators associated with a specific Insight ID from Infoblox, supporting multiple filter parameters
get soc insights events - Retrieve a detailed list of threat-related events for a specific Insight ID from Infoblox SOC Insights

action: 'on poll'

Ingest data from Infoblox (DNS Security Events or SOC Insights based on configuration)

Type: ingest
Read only: True

Action Parameters

No parameters are required for this action

Action Output

No Output

action: 'test connectivity'

Validate the asset configuration for connectivity using supplied configuration

Type: test
Read only: True

Action Parameters

No parameters are required for this action

Action Output

No Output

action: 'initiate indicator intel lookup'

Initiate an indicator investigation using Infoblox Dossier

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
indicator_type required Specify the type of indicator to search for string
indicator_value required Specify the indicator value(s) based on the indicator type you want to search for string ip ipv6 url email hash host name
source optional Specify the comma-separated sources to query string
wait_for_results optional If set to true, the call will wait for results to complete else return the jobID string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.indicator_type string Host IP
action_result.parameter.indicator_value string ip ipv6 url email hash host name 1.1.1.1
action_result.parameter.source string atp gcs
action_result.parameter.wait_for_results string true false
action_result.data.*.job.id string 2e14fe00-38e0-4707-bd53-44cc00108cc0
action_result.data.*.results.*.data.A.*.ip string 142.251.16.101
action_result.data.*.results.*.data.A.*.reverse string bl-in-f101.1e100.net.
action_result.data.*.results.*.data.A.*.ttl numeric 297
action_result.data.*.results.*.data.actor_description string Google Search is a fully-automated search engine.
action_result.data.*.results.*.data.actor_id string ca3db41a-9419-4a23-a179-f8661d4548a1
action_result.data.*.results.*.data.actor_name string Google Search
action_result.data.*.results.*.data.asn_num string 13335
action_result.data.*.results.*.data.attack_chain.command_and_control string
action_result.data.*.results.*.data.attack_chain.*.category string Technique
action_result.data.*.results.*.data.attack_chain.*.description string
action_result.data.*.results.*.data.attack_chain.*.detection string
action_result.data.*.results.*.data.attack_chain.*.external_reference.*.description string
action_result.data.*.results.*.data.attack_chain.*.external_reference.*.external_id string T1056
action_result.data.*.results.*.data.attack_chain.*.external_reference.*.source_name string mitre-attack
action_result.data.*.results.*.data.attack_chain.*.external_reference.*.url string https://attack.mitre.org/techniques/T1056
action_result.data.*.results.*.data.attack_chain.*.id string IC
action_result.data.*.results.*.data.attack_chain.*.name string Input Capture
action_result.data.*.results.*.data.attack_chain.*.version string 1.0
action_result.data.*.results.*.data.attack_chain.lateral_movement string
action_result.data.*.results.*.data.attack_chain.persistence string
action_result.data.*.results.*.data.attack_chain.privilege_escalation string
action_result.data.*.results.*.data.category_name string Search Engines
action_result.data.*.results.*.data.city string Sydney
action_result.data.*.results.*.data.country_code string AU
action_result.data.*.results.*.data.country_name string Australia
action_result.data.*.results.*.data.customer_first_dns_query string 2021-07-01
action_result.data.*.results.*.data.customer_last_dns_query string 2025-07-28
action_result.data.*.results.*.data.date_captured string 2025-07-23 00:52:46
action_result.data.*.results.*.data.display_name string Google Search
action_result.data.*.results.*.data.domain string google.com
action_result.data.*.results.*.data.hostname string google.com
action_result.data.*.results.*.data.ikb_first_classified_malicious string
action_result.data.*.results.*.data.ikb_submitted string 2022-03-22T11:25:55.000Z
action_result.data.*.results.*.data.image string
action_result.data.*.results.*.data.impacted_devices.*.deviceCount numeric 8
action_result.data.*.results.*.data.impacted_devices.*.device_name string 82.140.0.80
action_result.data.*.results.*.data.impacted_devices.*.network string CREST_DFP (DFP)
action_result.data.*.results.*.data.impacted_devices.*.qip string 82.140.0.80
action_result.data.*.results.*.data.impacted_devices.*.timestamp string 1753665659
action_result.data.*.results.*.data.info string bad http status
action_result.data.*.results.*.data.interval string [49, 67]
action_result.data.*.results.*.data.is_valid boolean True False
action_result.data.*.results.*.data.is_valid_chain.is_valid boolean True False
action_result.data.*.results.*.data.isp string Cloudflare, Inc.
action_result.data.*.results.*.data.issuer string GlobalSign Root CA
action_result.data.*.results.*.data.latitude numeric -33.8688
action_result.data.*.results.*.data.longitude numeric 151.209
action_result.data.*.results.*.data.matches.*.confidence string high
action_result.data.*.results.*.data.matches.*.domain string ns1.google.com
action_result.data.*.results.*.data.matches.*.malicious_counts string 229974
action_result.data.*.results.*.data.matches.*.ns_reputation_confidence string high
action_result.data.*.results.*.data.matches.*.ns_reputation_label string Very Low Risk
action_result.data.*.results.*.data.matches.*.ns_reputation_malicious_counts string 0
action_result.data.*.results.*.data.matches.*.ns_reputation_popular string False
action_result.data.*.results.*.data.matches.*.ns_reputation_rare string True
action_result.data.*.results.*.data.matches.*.ns_reputation_raw_score string -inf
action_result.data.*.results.*.data.matches.*.ns_reputation_score string 0
action_result.data.*.results.*.data.matches.*.ns_reputation_total_counts string 638
action_result.data.*.results.*.data.matches.*.popular string True
action_result.data.*.results.*.data.matches.*.rare string False
action_result.data.*.results.*.data.matches.*.raw_score string -3.7113174165239293
action_result.data.*.results.*.data.matches.*.score string 5
action_result.data.*.results.*.data.matches.*.score_label string Moderate Risk
action_result.data.*.results.*.data.matches.*.tld string com
action_result.data.*.results.*.data.matches.*.total_counts string 9637673
action_result.data.*.results.*.data.org string
action_result.data.*.results.*.data.page string 1
action_result.data.*.results.*.data.postal_code string 1001
action_result.data.*.results.*.data.ptr_record string one.one.one.one
action_result.data.*.results.*.data.rank numeric 55
action_result.data.*.results.*.data.raw_cert string
action_result.data.*.results.*.data.rcode string NOERROR
action_result.data.*.results.*.data.reason string bad api response status code: 401
action_result.data.*.results.*.data.record_count numeric 71
action_result.data.*.results.*.data.records.*.class string InternetInfrastructure
action_result.data.*.results.*.data.records.*.detected string 2024-10-10T17:58:08Z
action_result.data.*.results.*.data.records.*.expiration string 2025-10-10T17:58:08Z
action_result.data.*.results.*.data.records.*.feed_name string ib-low-block
action_result.data.*.results.*.data.records.*.indicator string 1.1.1.1
action_result.data.*.results.*.data.records.*.property string InternetInfrastructure_DoHService
action_result.data.*.results.*.data.records.*.threat_level numeric
action_result.data.*.results.*.data.region string New South Wales
action_result.data.*.results.*.data.related_count string 190
action_result.data.*.results.*.data.requests_by_day.*.requests numeric 2
action_result.data.*.results.*.data.requests_by_day.*.timestamp string 1751241600
action_result.data.*.results.*.data.response.ip_response string
action_result.data.*.results.*.data.response.parsed_whois.contacts string
action_result.data.*.results.*.data.response.parsed_whois.created_date string 1997-09-15T04:00:00Z
action_result.data.*.results.*.data.response.parsed_whois.domain string GOOGLE.COM
action_result.data.*.results.*.data.response.parsed_whois.expired_date string 2028-09-14T04:00:00Z
action_result.data.*.results.*.data.response.parsed_whois.other_properties.registry_domain_id string 2138514_DOMAIN_COM-VRSN
action_result.data.*.results.*.data.response.parsed_whois.registrar.abuse_contact_email string
action_result.data.*.results.*.data.response.parsed_whois.registrar.abuse_contact_phone string
action_result.data.*.results.*.data.response.parsed_whois.registrar.iana_id string 292
action_result.data.*.results.*.data.response.parsed_whois.registrar.name string MarkMonitor Inc.
action_result.data.*.results.*.data.response.parsed_whois.updated_date string 2019-09-09T15:39:04Z
action_result.data.*.results.*.data.response.raw string
action_result.data.*.results.*.data.response.registrant string MarkMonitor Inc.
action_result.data.*.results.*.data.response.registration.created string 1997-09-15T04:00:00Z
action_result.data.*.results.*.data.response.registration.expires string 2028-09-14T04:00:00Z
action_result.data.*.results.*.data.response.registration.registrar string MarkMonitor Inc.
action_result.data.*.results.*.data.response.registration.updated string 2019-09-09T15:39:04Z
action_result.data.*.results.*.data.response.whois.date string 2025-07-30
action_result.data.*.results.*.data.response.whois.record string
action_result.data.*.results.*.data.results.*.confidence_level string HIGH
action_result.data.*.results.*.data.results.*.created_time string 2025-07-29T06:11:10Z
action_result.data.*.results.*.data.results.*.description string Global list of known malicious domains for all sites.
action_result.data.*.results.*.data.results.*.id numeric 834468
action_result.data.*.results.*.data.results.*.item_count numeric 2
action_result.data.*.results.*.data.results.*.threat_level string HIGH
action_result.data.*.results.*.data.results.*.type string custom_list
action_result.data.*.results.*.data.results.*.updated_time string 2025-07-29T06:28:45Z
action_result.data.*.results.*.data.results.*.description string Google Search is a fully-automated search engine.
action_result.data.*.results.*.data.results.*.labels.category string
action_result.data.*.results.*.data.results.*.labels.subcategory string
action_result.data.*.results.*.data.results.*.name string Search Engines
action_result.data.*.results.*.data.ssl_cert_chain.*.expires string 2025-September-29
action_result.data.*.results.*.data.ssl_cert_chain.*.issuer.common_name string WR2
action_result.data.*.results.*.data.ssl_cert_chain.*.public_key_algorithm string ECDSA
action_result.data.*.results.*.data.ssl_cert_chain.*.serial_number string 104690999963482091989177059696995060279
action_result.data.*.results.*.data.ssl_cert_chain.*.signature_algorithm string SHA256-RSA
action_result.data.*.results.*.data.ssl_cert_chain.*.subject.common_name string *.google.com
action_result.data.*.results.*.data.ssl_cert_chain.*.version numeric 3
action_result.data.*.results.*.data.status string No match
action_result.data.*.results.*.data.threat.*.batch_id string d78fde3c-d456-11ee-8c27-75dfebb61a1a
action_result.data.*.results.*.data.threat.*.class string Phishing
action_result.data.*.results.*.data.threat.*.confidence numeric 100
action_result.data.*.results.*.data.threat.*.confidence_score numeric 8
action_result.data.*.results.*.data.threat.*.confidence_score_rating string High
action_result.data.*.results.*.data.threat.*.confidence_score_vector string COSIS:1.0/SR:H/POP:N/TLD:N/CP:F
action_result.data.*.results.*.data.threat.*.detected string 2024-02-26T03:23:49.295Z
action_result.data.*.results.*.data.threat.*.domain string google.com
action_result.data.*.results.*.data.threat.*.expiration string 2024-06-25T03:23:49.295Z
action_result.data.*.results.*.data.threat.*.extended.attack_chain string ACIS:1.0/FWK:MTK/PLT:['M', 'W', 'L']/IA:{SA:[]},{SL:[]},{SVS:[]}/EXE:{CHF:[]},{UE:[]}/DE:{CHF:[]}/COLL:{IC:['EMP', 'POSH', 'POWS', 'REMC', 'PUP', 'QRAT', 'COBS']}
action_result.data.*.results.*.data.threat.*.extended.confidence_score string {"rating": "High", "vector": "CSS:1.0/SR:H/POP:N/TLD:N/CP:F", "score": "7.72"}
action_result.data.*.results.*.data.threat.*.extended.cyberint_guid string 98a7696ca30bd22aaed188aa9b8ea805
action_result.data.*.results.*.data.threat.*.extended.extended string b5ade1e0dfc2ce7550e1bee3bd0e3623https
action_result.data.*.results.*.data.threat.*.extended.from_email string "Kinneys Automotive Service" noreply@demandforced3.com
action_result.data.*.results.*.data.threat.*.extended.no_whitelist string false
action_result.data.*.results.*.data.threat.*.extended.notes string Indicators associated with phishing campaign targeting Miles & More
action_result.data.*.results.*.data.threat.*.extended.protocol string http
action_result.data.*.results.*.data.threat.*.extended.references string https://urlscan.io/result/bd4e198d-b413-4951-bfab-000206285185/
action_result.data.*.results.*.data.threat.*.extended.risk_score string {"rating": "High", "vector": "RSS:1.0/TSS:M/TLD:N/CVSS:L/EX:H/MOD:N/AVL:N/T:M/DT:L", "score": "7.85"}
action_result.data.*.results.*.data.threat.*.extended.subject_line string The hottest months are here - is your car overheating?
action_result.data.*.results.*.data.threat.*.extended.threat_score string {"rating": "Medium", "vector": "TSS:1.0/AV:N/AC:L/PR:L/UI:R/EX:H/MOD:N/AVL:N/CI:N/ASN:H/TLD:N/DOP:N/P:F", "score": "6.0"}
action_result.data.*.results.*.data.threat.*.full_profile string IID:IB_NOC
action_result.data.*.results.*.data.threat.*.hash string 447163012e9a41fdcca93e947b0ced12201547a13ecccd3efa2a07d0baa45cb2
action_result.data.*.results.*.data.threat.*.hash_type string SHA256
action_result.data.*.results.*.data.threat.*.host string google.com
action_result.data.*.results.*.data.threat.*.id string d79387bd-d456-11ee-8c27-75dfebb61a1a
action_result.data.*.results.*.data.threat.*.imported string 2024-02-26T03:26:34.411Z
action_result.data.*.results.*.data.threat.*.profile string IID
action_result.data.*.results.*.data.threat.*.property string Phishing_Generic
action_result.data.*.results.*.data.threat.*.received string 2024-02-26T03:26:34.411Z
action_result.data.*.results.*.data.threat.*.risk_score numeric 8
action_result.data.*.results.*.data.threat.*.risk_score_rating string High
action_result.data.*.results.*.data.threat.*.risk_score_vector string RSIS:1.0/TSS:M/TLD:N/CVSS:M/EX:H/MOD:N/AVL:N/T:M/DT:L
action_result.data.*.results.*.data.threat.*.threat_level numeric 100
action_result.data.*.results.*.data.threat.*.threat_score numeric 6.5
action_result.data.*.results.*.data.threat.*.threat_score_rating string Medium
action_result.data.*.results.*.data.threat.*.threat_score_vector string TSIS:1.0/AV:N/AC:L/PR:N/UI:R/EX:H/MOD:N/AVL:N/CI:N/ASN:N/TLD:N/DOP:N/P:F
action_result.data.*.results.*.data.threat.*.tld string com
action_result.data.*.results.*.data.threat.*.type string URL
action_result.data.*.results.*.data.threat.*.up string true
action_result.data.*.results.*.data.threat.*.url string http://google.com/amp/s/kuretid.cj-plus.de/2591-DE-43663/3004-DE-83582
action_result.data.*.results.*.data.url_title string Google
action_result.data.*.results.*.data.valid_after string 2028-01-28 00:00:42
action_result.data.*.results.*.data.valid_before string 2020-06-19 00:00:42
action_result.data.*.results.*.data.value string 1.1.1.1
action_result.data.*.results.*.data.whitelisted boolean True False
action_result.data.*.results.*.params.target string ip ipv6 url email hash host name
action_result.data.*.tasks.*.create_time string 2025-07-30T12:57:16.516Z
action_result.data.*.tasks.*.create_ts numeric 1753880236516
action_result.data.*.tasks.*.end_time string 2025-07-30T12:57:16.534Z
action_result.data.*.tasks.*.end_ts numeric 1753880236534
action_result.data.*.tasks.*.id string 0059f4ae-ac28-45fa-8a77-7ac6067cc1f3
action_result.data.*.tasks.*.params.source string urlhaus
action_result.data.*.tasks.*.params.target string google.com
action_result.data.*.tasks.*.params.type string host
action_result.data.*.tasks.*.results string
action_result.data.*.tasks.*.rl boolean True False
action_result.data.*.tasks.*.start_time string 2025-07-30T12:57:16.526Z
action_result.data.*.tasks.*.start_ts numeric 1753880236526
action_result.data.*.tasks.*.state string completed
action_result.data.*.tasks.*.status string success
action_result.summary string
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'get indicator intel lookup result'

Retrieve the result of a previously initiated Dossier lookup for an indicator (IP/URL/Host/MAC/Hash)

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
job_id required Specify the Job ID of the Dossier lookup job to retrieve the results for string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.job_id string
action_result.data.*.results.*.data string
action_result.data.*.results.*.data.info string bad http status
action_result.data.*.results.*.data.reason string bad api response status code: 403
action_result.data.*.results.*.data.record_count numeric 2
action_result.data.*.results.*.data.threat.*.batch_id string d1973fe0-3bc2-11f0-8f6b-4dbd30b8660e
action_result.data.*.results.*.data.threat.*.class string APT
action_result.data.*.results.*.data.threat.*.detected string 2025-05-20T12:35:31Z
action_result.data.*.results.*.data.threat.*.domain string example.com
action_result.data.*.results.*.data.threat.*.email string comments@example.com
action_result.data.*.results.*.data.threat.*.expiration string 2026-05-06T14:00:00Z
action_result.data.*.results.*.data.threat.*.extended.comments string THis is a sample email with a comment
action_result.data.*.results.*.data.threat.*.extended.notes string THis is a sample email with a comment
action_result.data.*.results.*.data.threat.*.full_profile string 001SAND30ab5807046:Netskope1
action_result.data.*.results.*.data.threat.*.host string example.com
action_result.data.*.results.*.data.threat.*.id string d19ae961-3bc2-11f0-8f6b-4dbd30b8660e
action_result.data.*.results.*.data.threat.*.imported string 2025-05-28T12:53:57.474Z
action_result.data.*.results.*.data.threat.*.profile string 001SAND30ab5807046
action_result.data.*.results.*.data.threat.*.property string APT_EmdiviC2
action_result.data.*.results.*.data.threat.*.received string 2025-05-28T12:53:57.474Z
action_result.data.*.results.*.data.threat.*.threat_label string Netskope CE
action_result.data.*.results.*.data.threat.*.threat_level numeric 100
action_result.data.*.results.*.data.threat.*.tld string com
action_result.data.*.results.*.data.threat.*.type string EMAIL
action_result.data.*.results.*.data.threat.*.up string true
action_result.data.*.results.*.params.source string
action_result.data.*.results.*.params.target string ip ipv6 url email hash host name
action_result.data.*.results.*.params.type string
action_result.data.*.results.*.status string
action_result.data.*.results.*.time numeric
action_result.data.*.results.*.v string
action_result.summary string
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'ip asset data lookup'

Look up asset data for a given IP address using IPAM address information

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
ip_filter optional Filter IP addresses by specific criteria (e.g., address=="192.168.1.100" or state=="USED") string
address_state optional Filter by IP address state string
scope optional Specify the scope for IP address lookup string
tag_filter optional Filter IP addresses by specific tags (e.g. 'Tenable_scan'=='true') string
offset optional Specify the offset from where to start pagination (default: 0) numeric
limit optional Specify the maximum number of results to return (default: 100) numeric
order_by optional Comma-separated JSON fields to sort the results. Use asc or desc for sorting direction. Defaults to ascending. Supports dot notation for nested fields (e.g. json_field_name asc desc) string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.address_state string Used Free Any
action_result.parameter.ip_filter string address=="192.168.1.100" state=="USED"
action_result.parameter.limit numeric 1
action_result.parameter.offset numeric 1
action_result.parameter.order_by string
action_result.parameter.scope string global us-east
action_result.parameter.tag_filter string Rapid7_scan = True
action_result.data.*.results.*.address string ip ipv6
action_result.data.*.results.*.dhcp_info string
action_result.data.*.results.*.discovery_attrs string
action_result.data.*.results.*.discovery_metadata string
action_result.data.*.results.*.external_keys string
action_result.data.*.results.*.host string host name
action_result.data.*.results.*.hwaddr string
action_result.data.*.results.*.id string
action_result.data.*.results.*.protocol string
action_result.data.*.results.*.state string
action_result.data.*.results.*.tags.Rapid7_scan_id string 286
action_result.data.*.results.*.tags.Rapid7_scan_time string 2025-07-18 10:37:07
action_result.data.*.results.*.tags.Snow_cmdb_table_name string cmdb_ci_ip_device
action_result.data.*.results.*.tags.Snow_sys_id string 759b5756479212106f74bc8f016d43f0
action_result.data.*.results.*.updated_at string
action_result.data.*.results.*.usage string
action_result.summary string
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'get custom list'

Retrieve Custom Lists from Infoblox by ID, name, or filtering criteria

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
custom_list_id optional Specify the ID of the custom list to retrieve numeric
name optional The name of the custom list (name filtering can be only used in pairing with type) string
type optional The type of the custom list string
tag_filter optional Filter custom lists by specific tags (e.g: Test1=ss1) string
tag_sort_order optional Sort custom list by Tags (e.g: Test1) string
offset optional Specify the offset from where to start pagination numeric
limit optional Specify the maximum number of results to return numeric

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.custom_list_id numeric
action_result.parameter.limit numeric 1
action_result.parameter.name string
action_result.parameter.offset numeric 1
action_result.parameter.tag_filter string
action_result.parameter.tag_sort_order string
action_result.parameter.type string
action_result.data.*.results.*.confidence_level string
action_result.data.*.results.*.description string
action_result.data.*.results.*.id numeric
action_result.data.*.results.*.item_count numeric
action_result.data.*.results.*.items_described.*.description string
action_result.data.*.results.*.items_described.*.item string 193.56.2.11/32
action_result.data.*.results.*.items_described.*.status string ACTIVE
action_result.data.*.results.*.items_described.*.status_details string
action_result.data.*.results.*.name string
action_result.data.*.results.*.threat_level string
action_result.summary.custom_list_id numeric 834753
action_result.summary.name string temp-custom
action_result.summary.total_objects numeric 1
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'remove custom list'

Delete a Custom List from Infoblox Cloud

Type: generic
Read only: False

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
id required ID of the custom List to delete numeric

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.id numeric
action_result.data string
action_result.summary.list_id numeric
action_result.summary.status string deleted
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'create network list'

Create a Network List with specified name, items, and optional description

Type: generic
Read only: False

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
name required Specify the name of the network list string
items required Specify the comma-separated items to include in the network list (e.g. 193.56.2.11/32,2001:db8:ffff:ffff:ffff:ffff:ffff:fff1/128) string
description optional Specify a description for the network list string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.description string
action_result.parameter.items string 193.56.2.11/32 2001:db8:ffff:ffff:ffff:ffff:ffff:fff1/128
action_result.parameter.name string
action_result.data.*.results.description string
action_result.data.*.results.id numeric
action_result.data.*.results.name string
action_result.data.*.results.policy_id numeric
action_result.summary.description string temporary desc
action_result.summary.name string test-network
action_result.summary.network_list_id numeric 1859146
action_result.summary.security_policy_id numeric 204970
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'update network list'

Update metadata and CIDRs of a specified network list

Type: generic
Read only: False

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
network_list_id required Specify the ID of the network list to update numeric
name optional Specify the name of the network list string
items optional Specify the comma-separated items to include in the network list (e.g. 193.56.2.11/32,2001:db8:ffff:ffff:ffff:ffff:ffff:fff1/128) string
description optional Specify a description for the network list (use 'empty' to clear the description) string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.description string
action_result.parameter.items string 193.56.2.11/32 2001:db8:ffff:ffff:ffff:ffff:ffff:fff1/128
action_result.parameter.name string
action_result.parameter.network_list_id numeric
action_result.data.*.results.description string
action_result.data.*.results.id numeric
action_result.data.*.results.name string
action_result.data.*.results.policy_id numeric
action_result.summary.description string update desc
action_result.summary.name string test update
action_result.summary.network_list_id numeric 1859146
action_result.summary.security_policy_id numeric 204970
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'get network list'

Retrieve network lists and their metadata

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
network_list_id optional Specify the ID of a specific network list to retrieve. If provided, all other filter parameters will be ignored numeric
filter optional Filter network lists by a logical expression string (e.g., name == 'net_list1'). Ignored if network_list_id is provided string
offset optional Specify the offset from where to start pagination numeric
limit optional Specify the maximum number of results to return numeric

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.filter string
action_result.parameter.limit numeric 1
action_result.parameter.network_list_id numeric
action_result.parameter.offset numeric 1
action_result.data.*.results.*.created_time string
action_result.data.*.results.*.description string
action_result.data.*.results.*.id numeric
action_result.data.*.results.*.name string
action_result.data.*.results.*.policy_id numeric
action_result.summary string
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'get soc insights assets'

Retrieve the list of associated assets for a given Insight ID

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
insight_id required ID of the insight to retrieve assets from string infoblox insight id
asset_ip optional Filter assets by IP address string ip ipv6
mac_address optional Filter assets by MAC address string mac address
os_version optional Filter assets by operating system version string
user optional Filter assets by associated user string user name
limit optional Maximum number of results to return numeric
from optional Filter by assets changed after this time in this format: YYYY-MM-DDTHH:mm:ss.SSS string
to optional Filter by assets changed before this time in this format: YYYY-MM-DDTHH:mm:ss.SSS string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.asset_ip string ip ipv6
action_result.parameter.from string
action_result.parameter.insight_id string infoblox insight id
action_result.parameter.limit numeric 1
action_result.parameter.mac_address string mac address
action_result.parameter.os_version string
action_result.parameter.to string
action_result.parameter.user string user name
action_result.data.*.cmac string mac address
action_result.data.*.mostRecentAction string Not Blocked
action_result.data.*.osVersion string
action_result.data.*.qip string ip ipv6
action_result.data.*.threatLevelMax string
action_result.data.*.user string user name
action_result.summary string
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'remove network list'

Remove a specific network list by ID

Type: generic
Read only: False

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
network_list_id required Specify the ID of the network list to delete numeric

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.network_list_id numeric
action_result.data string
action_result.summary.network_list_id numeric
action_result.message string
summary.total_objects numeric
summary.total_objects_successful numeric

action: 'host asset data lookup'

Look up host asset data using IPAM host information to retrieve detailed host information from Infoblox

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
host_filter optional Filter IPAM hosts by specific criteria (e.g., name=="webserver01" or ip_address=="192.168.1.100") string
tag_filter optional Filter IPAM hosts by specific tags (e.g. 'Tenable_scan'=='true') string
offset optional Specify the offset from where to start pagination (default: 0) numeric
limit optional Specify the maximum number of results to return (default: 100) numeric
order_by optional Comma-separated JSON fields to sort the results. Use asc or desc for sorting direction. Defaults to ascending. Supports dot notation for nested fields (e.g. json_field_name asc desc) string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.host_filter string
action_result.parameter.limit numeric 1
action_result.parameter.offset numeric 1
action_result.parameter.order_by string
action_result.parameter.tag_filter string
action_result.data.*.page string
action_result.data.*.results.*.addresses.*.address string ip ipv6
action_result.data.*.results.*.addresses.*.ref string ipam/address/1a010fa0-617d-11f0-96d4-5a693772c4ec
action_result.data.*.results.*.addresses.*.space string
action_result.data.*.results.*.auto_generate_records boolean True False
action_result.data.*.results.*.comment string
action_result.data.*.results.*.created_at string
action_result.data.*.results.*.id string
action_result.data.*.results.*.name string
action_result.data.*.results.*.tags string
action_result.data.*.results.*.tags.Rapid7_scan string true
action_result.data.*.results.*.tags.Rapid7_scan_id string 297
action_result.data.*.results.*.tags.Rapid7_scan_time string 2025-07-21 09:32:57
action_result.data.*.results.*.tags.Rapid7_sync string true
action_result.data.*.results.*.updated_at string
action_result.summary string
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'dns record lookup'

Perform a DNS record query to retrieve associated IPs or domains from Infoblox DDI

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
dns_record_filter optional Filter DNS records by specific criteria (e.g., type=="PTR" and absolute_zone_name == "Test") string
tag_filter optional Filter DNS records by specific tags (e.g., 'nios/federation_enabled'==true) string
offset optional Specify the offset from where to start pagination (default: 0) numeric
limit optional Specify the maximum number of results to return (default: 100) numeric
order_by optional Comma-separated JSON fields to sort the results. Use asc or desc for sorting direction. Defaults to ascending. Supports dot notation for nested fields (e.g. json_field_name asc desc) string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.dns_record_filter string
action_result.parameter.limit numeric 1
action_result.parameter.offset numeric 1
action_result.parameter.order_by string
action_result.parameter.tag_filter string
action_result.data.*.results.*.absolute_name_spec string
action_result.data.*.results.*.disabled boolean
action_result.data.*.results.*.id string
action_result.data.*.results.*.inheritance_sources string
action_result.data.*.results.*.name_in_zone string
action_result.data.*.results.*.nios_metadata string
action_result.data.*.results.*.options string
action_result.data.*.results.*.provider_metadata string
action_result.data.*.results.*.rdata.address string 192.168.10.101
action_result.data.*.results.*.ttl numeric
action_result.data.*.results.*.type string
action_result.data.*.results.*.updated_at string
action_result.data.*.results.*.view_name string
action_result.summary string
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'dhcp lease lookup'

Perform a DHCP lease query to retrieve lease information from Infoblox DDI

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
dhcp_lease_filter optional Filter DHCP leases by specific criteria (e.g., address == "127.0.0.1" and hostname == "ubuntu") string
offset optional Specify the offset from where to start pagination (default: 0) numeric
limit optional Specify the maximum number of results to return (default: 100) numeric
order_by optional Comma-separated JSON fields to sort the results. Use asc or desc for sorting direction. Defaults to ascending. Supports dot notation for nested fields (e.g. json_field_name asc desc) string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.dhcp_lease_filter string
action_result.parameter.limit numeric 1
action_result.parameter.offset numeric 1
action_result.parameter.order_by string
action_result.data.*.results.*.address string ip ipv6
action_result.data.*.results.*.ends string
action_result.data.*.results.*.hardware string
action_result.data.*.results.*.hostname string
action_result.data.*.results.*.protocol string
action_result.data.*.results.*.space string
action_result.data.*.results.*.starts string
action_result.data.*.results.*.state string
action_result.summary string
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'indicator threat lookup'

Lookup threat intelligence details for an indicator using Infoblox TIDE

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
indicator_type optional Specify the type of indicator to search for string
limit optional Maximum number of results to return (1-10000) numeric
indicator_value optional Specify the indicator value based on the indicator type you want to search for string ip ipv6 url email hash host name
domain optional Specify the domain(s) to search for string
tld optional Specify the top-level domain(s) to search for string
class optional Specify the comma-separated threat class(es) to search for string
target optional Specify target(s) to search for string
expiration optional Period of time after which data is no longer considered active (YYYY-MM-DDThh:mm:ss.sssZ) string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.class string
action_result.parameter.domain string
action_result.parameter.expiration string
action_result.parameter.indicator_type string IP Host
action_result.parameter.indicator_value string ip ipv6 url email hash host name
action_result.parameter.limit numeric 1
action_result.parameter.target string
action_result.parameter.tld string
action_result.data.*.threat.*.extended.original_profile string IID:ANALYST
action_result.data.*.threat.*.extended.protocol string http
action_result.data.*.threat.*.extended.references string https://www.facebook.com/ads/library/?id=2061372931018687,https://www.virustotal.com/gui/file/447163012e9a41fdcca93e947b0ced12201547a13ecccd3efa2a07d0baa45cb2?nocache=1
action_result.data.*.threat.*.extended.sample_sha256 string e6ae7a2081e7cd25ef9773fdd59344b9060286f88dae5f1e4168534dcc427e6b
action_result.data.*.threat.*.hash_type string SHA256
action_result.data.*.threat.*.threat_label string IP IoC
action_result.data.*.threat.*.up string true
action_result.summary.indicator_type string All
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'create custom list'

Create a new custom list with specified details and items

Type: contain
Read only: False

This action creates a new custom list in Infoblox Cloud using the Advanced Threat Control and Firewall (ATCFW) API. You can specify the list name, type, items (IPv4/IPv6 addresses or domain names), description, confidence level, threat level, and tags. The action validates input parameters and handles duplicate name errors appropriately.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
name required Specify the name of the custom list to create string
type required Specify the type of custom list to create string
items optional Specify comma-separated items to include in the custom list (e.g. 193.56.2.11/32,2001:db8:ffff:ffff:ffff:ffff:ffff:fff1/128) string
description optional Specify description of the custom list string
confidence_level optional Specify the confidence level for the custom list string
threat_level optional Specify the threat level for the custom list string
tags optional Add tags to categorize and organize the custom list in JSON format. Example: {"environment":"production","team":"security"} string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.confidence_level string HIGH MEDIUM LOW
action_result.parameter.description string Security blocklist for malicious domains
action_result.parameter.items string 192.168.1.1,example.com,2001:db8::1
action_result.parameter.name string security_blocklist threat_indicators
action_result.parameter.tags string {"environment":"production","team":"security"}
action_result.parameter.threat_level string LOW MEDIUM HIGH INFO
action_result.parameter.type string custom_list
action_result.data.*.results.confidence_level string LOW MEDIUM HIGH
action_result.data.*.results.description string Custom List A Description Security blocklist for malicious domains
action_result.data.*.results.id numeric 832628 451290
action_result.data.*.results.item_count numeric 3 15 0
action_result.data.*.results.name string custom_list_ad_1 security_blocklist
action_result.data.*.results.threat_level string INFO LOW MEDIUM HIGH
action_result.summary.custom_list_id numeric 834753
action_result.summary.custom_list_name string temp-custom
action_result.summary.item_count numeric 2
action_result.summary.total_objects numeric 1
action_result.summary.total_objects_successful numeric 1
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'update custom list'

Update metadata of an existing custom list such as name, description, confidence level, threat level, or tags

Type: generic
Read only: False

This action updates an existing custom list in Infoblox Threat Defense with DDI using the Advanced Threat Control and Firewall (ATCFW) API. You can update the list name, description, confidence level, threat level, and tags. Names must be unique among custom lists belonging to the same account.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
custom_list_id required Specify the ID of the custom list to update numeric
name optional Specify the new name of the custom list (must be unique) string
description optional Specify the new description of the custom list string
confidence_level optional Specify the confidence level for the custom list string
threat_level optional Specify the threat level for the custom list string
tags optional Add tags to categorize and organize the custom list (JSON format). Use 'empty' to clear existing tags string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.confidence_level string HIGH
action_result.parameter.custom_list_id numeric 831224
action_result.parameter.description string Updated description for the custom list
action_result.parameter.name string updated_custom_list
action_result.parameter.tags string {"category": "security", "priority": "high"}
action_result.parameter.threat_level string MEDIUM
action_result.data.*.results.confidence_level string LOW MEDIUM HIGH
action_result.data.*.results.description string Updated Custom List Description Updated security blocklist for malicious domains
action_result.data.*.results.id numeric 831224 451290
action_result.data.*.results.item_count numeric 3 15 0
action_result.data.*.results.name string updated_custom_list security_blocklist_v2
action_result.data.*.results.threat_level string INFO LOW MEDIUM HIGH
action_result.summary.custom_list_id numeric 834753
action_result.summary.custom_list_name string temp-custom
action_result.summary.item_count numeric 2
action_result.summary.total_objects numeric 1
action_result.summary.total_objects_successful numeric 1
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'remove security policy'

Remove a specific Security Policy by Security Policy ID

Type: generic
Read only: False

This action permanently removes a security policy from Infoblox Cloud using the Advanced Threat Control and Firewall (ATCFW) API. The security policy will be deleted from the system and can no longer be used to enforce security rules. This action cannot be undone.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
security_policy_id required Specify the ID of the security policy to delete numeric

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.security_policy_id numeric 12345 67890
action_result.data string
action_result.summary.security_policy_id numeric 12345
action_result.message string Successfully removed security policy with ID: 12345
summary.total_objects numeric
summary.total_objects_successful numeric

action: 'get security policy'

Retrieve Security Policies and their metadata

Type: investigate
Read only: True

This action retrieves Security Policies and their metadata from Infoblox Cloud using the Advanced Threat Control and Firewall (ATCFW) API. You can filter policies by name, description, tags, and other criteria.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
security_policy_filter optional A logical expression string to filter security policies (e.g., name=='sec_policy_a') string
tag_filter optional Filter security policy by specific tags string
tag_sort_filter optional Sort security policy list by Tags string
offset optional Specify the offset from where to start pagination numeric
limit optional Specify the maximum number of results to return numeric

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.limit numeric 100
action_result.parameter.offset numeric 0
action_result.parameter.security_policy_filter string name=='sec_policy_a'
action_result.parameter.tag_filter string
action_result.parameter.tag_sort_filter string
action_result.data.*.results.*.default_action string action_allow
action_result.data.*.results.*.description string Security Policy Description
action_result.data.*.results.*.id numeric 207665
action_result.data.*.results.*.migration_status.uses_legacy_feeds boolean True False
action_result.data.*.results.*.name string CDS_Block
action_result.data.*.results.*.rules.*.description string Suspicious destinations: Enables protection against hostnames
action_result.data.*.results.*.scope_expr string
action_result.data.*.results.*.tags string
action_result.summary string
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'create security policy'

Create a Security Policy, including its name, rules, associated network lists, DNS Forwarding Proxies (DFPs) etc

Type: generic
Read only: False

This action creates a new Security Policy in Infoblox Cloud using the Advanced Threat Control and Firewall (ATCFW) API. The policy can include rules, network lists, DNS Forwarding Proxies, roaming device groups, and various configuration settings. The Security Policy name must be unique within the account.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
name required Specify the name of the security policy to create string
description optional Specify description for this security policy string
rules optional Specify security rules as a list of JSON objects, each with action, type, data, policy_name and redirect_name string
network_lists optional Specify the comma-separated network lists to associate with this policy (e.g 522436, 522438) string
dfps optional Specify the comma-separated DNS Forwarding Proxies to associate with this policy (e.g 12456, 12458) string
roaming_device_groups optional Specify the comma-separated Roaming Device Groups to associate with this policy (e.g 56312, 56316) string
block_dns_rebind_attack optional Specify whether to block DNS rebinding attacks (true/false) string
safe_search optional Specify whether to enable safe search filtering (true/false) string
tags optional Add tags used to categorize and organize the Security Policy string
additional_parameters optional JSON object containing additional parameters to update (precedence, access_codes, doh_enabled, doh_fqdn, ecs, onprem_resolve, dfp_services, net_address_dfps, user_groups, default_redirect_name) string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.additional_parameters string
action_result.parameter.block_dns_rebind_attack string true false
action_result.parameter.description string Security Policy A Description
action_result.parameter.dfps string 12456, 12458
action_result.parameter.name string security_policy_a
action_result.parameter.network_lists string 522436, 522438
action_result.parameter.roaming_device_groups string 56312, 56316
action_result.parameter.rules string
action_result.parameter.safe_search string true false
action_result.parameter.tags string
action_result.data.*.results.default_action string action_allow
action_result.data.*.results.description string Security Policy A Description
action_result.data.*.results.id numeric 226075
action_result.data.*.results.migration_status.uses_legacy_feeds boolean True False
action_result.data.*.results.name string security_policy_a
action_result.data.*.results.rules.*.description string Suspicious destinations: Enables protection against hostnames that have not been directly linked to malicious behavior but behave in a manner that suggests malicious behavior may be imminent.
action_result.data.*.results.scope_expr string
action_result.data.*.results.tags string
action_result.summary string
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'update custom list items'

Insert or remove individual items (e.g., IPs, domains) in a custom list

Type: generic
Read only: False

This action allows you to insert or remove individual items from a custom list without replacing the entire list. You can add new items or remove existing items by specifying the action type and providing a comma-separated list of items. Duplicate items will be silently skipped during insertion operations.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
custom_list_id required Specify the ID of the custom list to update numeric
action required Insert or Delete custom List items string
items required Specify comma-separated IPs and domains to add or remove from the custom list (e.g. 193.56.2.11/32,2001:db8:ffff:ffff:ffff:ffff:ffff:fff1/128) string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.action string Add Remove
action_result.parameter.custom_list_id numeric 12345
action_result.parameter.items string 193.56.2.11/32, example.com
action_result.data.*.deleted_items.*.description string
action_result.data.*.deleted_items.*.item string 193.56.2.11/32
action_result.data.*.deleted_items.*.status numeric -1
action_result.data.*.deleted_items.*.status_details string
action_result.summary string
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'update security policy'

Update a specific Security Policy, including its name, rules, associated network lists, DNS Forwarding Proxies (DFPs) etc

Type: generic
Read only: False

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
security_policy_id required Specify the ID of the security policy to update numeric
name optional Specify the name of the security policy to update string
description optional Specify an updated description for this security policy string
rules optional Specify updated security rules as a list of JSON objects, each with action, type, data, policy_name and redirect_name string
network_lists optional Specify the comma-separated network lists to associate with this policy (e.g 522436, 522438) string
dfps optional Specify the comma-separated DNS Forwarding Proxies to associate with this policy (e.g 12456, 12458) string
roaming_device_groups optional Specify the comma-separated Roaming Device Groups to associate with this policy (e.g 56312, 56316) string
block_dns_rebind_attack optional Specify whether to block DNS rebinding attacks (true/false) string
safe_search optional Specify whether to enable safe search filtering (true/false) string
tags optional Update tags used to categorize and organize the Security Policy string
additional_parameters optional JSON object containing additional parameters to update (precedence, access_codes, doh_enabled, doh_fqdn, ecs, onprem_resolve, dfp_services, net_address_dfps, user_groups, default_redirect_name) string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.additional_parameters string
action_result.parameter.block_dns_rebind_attack string
action_result.parameter.description string
action_result.parameter.dfps string 12456, 12458
action_result.parameter.name string
action_result.parameter.network_lists string
action_result.parameter.roaming_device_groups string 56312, 56316
action_result.parameter.rules string
action_result.parameter.safe_search string true false
action_result.parameter.security_policy_id numeric
action_result.parameter.tags string
action_result.data.*.results.default_action string
action_result.data.*.results.description string
action_result.data.*.results.id numeric
action_result.data.*.results.migration_status.uses_legacy_feeds boolean True False
action_result.data.*.results.name string
action_result.data.*.results.rules.*.description string Suspicious destinations: Enables protection against hostnames
action_result.data.*.results.scope_expr string
action_result.data.*.results.tags string
action_result.summary.default_action string action_allow
action_result.summary.description string dscription
action_result.summary.name string temp-policy
action_result.summary.policy_id numeric 227005
action_result.summary.update_status string Success
action_result.summary.updated_time string 2025-07-31T05:16:37Z
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'get soc insights comments'

Retrieve the list of comments associated with a specific Insight ID from Infoblox, optionally filtered by a time range

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
insight_id required ID of the insight to retrieve comments from string infoblox insight id
from optional Filter by comments changed after this time in this format: YYYY-MM-DDTHH:mm:ss.SSS string
to optional Filter by comments changed before this time in this format: YYYY-MM-DDTHH:mm:ss.SSS string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.from string 2025-06-11T04:10:00.000
action_result.parameter.insight_id string infoblox insight id ea970c56-9d69-4844-8dc2-77d9be724c43
action_result.parameter.to string 2025-06-11T04:10:00.000
action_result.data.*.comments.*.commentsChanger string dhruvil.bhatt@crestdatasys.com
action_result.data.*.comments.*.dateChanged string 2025-07-08T11:55:49.551
action_result.data.*.comments.*.newComment string ServiceNow incident: INC0010052
action_result.data.*.comments.*.status string Active
action_result.summary.from_filter string Not specified
action_result.summary.insight_id string d00070a8-6ce9-40dd-8e2e-b8b7c05b303f
action_result.summary.to_filter string Not specified
summary.total_objects numeric 1
summary.total_objects_successful numeric 1
action_result.message string

action: 'get soc insights indicators'

Retrieve a filtered list of indicators associated with a specific Insight ID from Infoblox, supporting multiple filter parameters

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
insight_id required ID of the insight to retrieve indicators from string infoblox insight id
confidence optional Filter by confidence score string
indicator optional Filter by specific indicator value string
actor optional Filter by threat actor string
action optional Filter by action taken string
from optional Filter by indicators seen after this time in this format: YYYY-MM-DDTHH:mm:ss.SSS string
to optional Filter by indicators seen before this time in this format: YYYY-MM-DDTHH:mm:ss.SSS string
limit optional Specify the maximum number of results to return (default: 100) numeric

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.action string Not Blocked
action_result.parameter.actor string spam_azure_aws
action_result.parameter.confidence string 3
action_result.parameter.from string 2025-06-11T04:10:00.000
action_result.parameter.indicator string ikhwanschoolday.us
action_result.parameter.insight_id string infoblox insight id ea970c56-9d69-4844-8dc2-77d9be724c43
action_result.parameter.limit numeric 100
action_result.parameter.to string 2025-06-11T04:10:00.000
action_result.data.*.indicators.*.action string Not Blocked
action_result.data.*.indicators.*.actor string spam_azure_aws
action_result.data.*.indicators.*.confidence string 3
action_result.data.*.indicators.*.count numeric 1
action_result.data.*.indicators.*.feedName string AntiMalware
action_result.data.*.indicators.*.indicator string ikhwanschoolday.us
action_result.data.*.indicators.*.macAddress string 64:c2:b3:d9:41:3d
action_result.data.*.indicators.*.threatLevelMax string 3
action_result.summary.insight_id string d00070a8-6ce9-40dd-8e2e-b8b7c05b303f
action_result.summary.limit_applied numeric 1
action_result.summary.total_indicators numeric 1
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

action: 'get soc insights events'

Retrieve a detailed list of threat-related events for a specific Insight ID from Infoblox SOC Insights

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
insight_id required ID of the insight to retrieve events from string
device_ip optional Filter assets by Device IP string ip ipv6
query optional Filter by query string string
query_type optional Filter events by DNS query type (e.g., TXT, A, MX) string
source optional Filter events by the threat intelligence source or feed (e.g., DFP (DFP)) string
indicator optional Filter events by a specific threat indicator such as a domain, IP, or hash (e.g., hmdns.top) string
threat_level optional Filter by threat level string
confidence_level optional Filter by confidence level string
limit optional Specify the maximum number of results to return numeric
from optional Filter by events detected after this time in format YYYY-MM-DDTHH:mm:ss.SSS string
to optional Filter by events detected before this time in format YYYY-MM-DDTHH:mm:ss.SSS string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.confidence_level string High
action_result.parameter.device_ip string ip ipv6 87.121.84.128
action_result.parameter.from string 2025-07-09T12:48:48.000
action_result.parameter.indicator string hmdns.top
action_result.parameter.insight_id string ea970c56-9d69-4844-8dc2-77d9be724c43
action_result.parameter.limit numeric 100
action_result.parameter.query string aaa.hmdns.top.
action_result.parameter.query_type string TXT
action_result.parameter.source string CREST_DFP (DFP)
action_result.parameter.threat_level string High
action_result.parameter.to string 2025-07-09T12:48:48.000
action_result.data.*.events.*.action string Block
action_result.data.*.events.*.confidenceLevel string High
action_result.data.*.events.*.deviceCountry string United States
action_result.data.*.events.*.deviceIp string ip ipv6 87.121.84.128
action_result.data.*.events.*.deviceName string 87.121.84.128
action_result.data.*.events.*.macAddress string 64:c2:b3:d9:41:3d
action_result.data.*.events.*.osVersion string Chrome OS
action_result.data.*.events.*.policy string Default Global Policy
action_result.data.*.events.*.threatFamily string EmergentDomain
action_result.data.*.events.*.threatLevel string High
action_result.summary string
summary.total_objects numeric
summary.total_objects_successful numeric
action_result.message string

Auto-generated Splunk SOAR Connector documentation.

Copyright 2025 Splunk Inc.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

About

No description, website, or topics provided.

Resources

License

Contributing

Stars

Watchers

Forks

Packages

No packages published

Contributors 6