Endgame

Integration version: 9.0

Important: Endgame was acquired by Elastic and became part of Elastic Security.

Integrate Endgame with Google Security Operations

For detailed instructions on how to configure an integration inGoogle SecOps, seeConfigureintegrations.

Actions

Enrich Entities

Enrich a Google SecOps Host and IP entities based on the informationfrom Endgame.

Parameters

N/A

Use cases

The action can be used in the playbooks investigating activity on devices. Ifthe device has the Endgame agent installed, then the action pulls Endgameinformation on device to enrich Google SecOps entities.

Run on

This action runs on the following entities:

  • Host
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
Endgame_DomainAlways
Endgame_endpoint_idAlways
Endgame_hostnameAlways
Endgame_sensors_statusAlways
Endgame_sensors_idAlways
Endgame_sensors_statusAlways
Endgame_sensors_idAlways
Endgame_policy_statusAlways
Endgame_policy_nameAlways
Endgame_policy_idAlways
Endgame_is_isolatedAlways
Script result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON result
{"data":[{"domain":"InstallerInitiated","updated_at":"2019-11-01T05:42:08.149079+00:00","id":"1682418d-02ff-43cd-a730-bcae8215a514","display_operating_system":"CentOS 7.6","hostname":"example","mac_address":"01:23:45:ab:cd:ef","upgrade_status":"","base_image":false,"isolation_updated_at":null,"status":"monitored","ad_distinguished_name":"","ad_hostname":"","tags":[{"id":"a0927aeb-915a-466d-a5eb-5d7b6f9217c5","name":"BLUE TEAM"},{"id":"bede2f24-593c-45e4-9863-9c2438f0f163","name":"SOC"},{"id":"fc2dfcc8-9329-4f33-86a2-877bfb27575e","name":"CORE ENV"}],"isolation_request_status":null,"alert_count":0,"investigation_count":0,"groups":[{"is_dynamic":false,"count":4,"id":"c1af3cd6-2638-4144-842d-adc9cfb67fb9","name":"SOC"}],"sensors":[{"status":"monitored","sensor_version":"3.52.12","policy_status":"successful","policy_name":"Lab (Detect-Only)","sensor_type":"hunt","id":"fbb87923-a833-5581-a160-7f4f85a21bd0","policy_id":"a1d72bce-1f61-4ba8-bcd4-dfa97148335f"}],"ip_address":"192.0.2.1","is_isolated":false,"operating_system":"Linux 3.10.0-957.27.2.el7.x86_64","name":"example","status_changed_at":"2020-01-07T08:15:11.865854+00:00","core_os":"linux","created_at":"2019-03-19T05:07:50.598837+00:00","error":null,"machine_id":"827255f4-53a2-1823-cac0-7c0f7730ca26"},{"domain":"InstallerInitiated","updated_at":"2019-11-01T05:42:09.150756+00:00","id":"12c3530d-657f-4ccd-835e-6df9affeed3d","display_operating_system":"Ubuntu 18.04.3","hostname":"example","mac_address":"01:23:45:ab:cd:ef","upgrade_status":"","base_image":false,"isolation_updated_at":null,"status":"monitored","ad_distinguished_name":"","ad_hostname":"","tags":[],"isolation_request_status":null,"alert_count":0,"investigation_count":0,"groups":[{"is_dynamic":false,"count":4,"id":"c1af3cd6-2638-4144-842d-adc9cfb67fb9","name":"SOC"}],"sensors":[{"status":"monitored","sensor_version":"3.52.12","policy_status":"successful","policy_name":"Lab (Detect-Only)","sensor_type":"hunt","id":"dc2e35cc-0c87-5a60-8fc8-de23ef747d02","policy_id":"a1d72bce-1f61-4ba8-bcd4-dfa97148335f"}],"ip_address":"192.0.2.1","is_isolated":false,"operating_system":"Linux 4.15.0-72-generic","name":"example","status_changed_at":"2020-01-07T08:15:16.875375+00:00","core_os":"linux","created_at":"2019-09-20T21:34:51.966863+00:00","error":null,"machine_id":"5ae8ddd9-9339-ae4b-ccf7-5ed68f38b3a9"}],"metadata":{"count":38,"previous_url":null,"timestamp":"2020-01-07T18:09:43.765744","next":null,"per_page":50,"next_url":null,"transaction_id":"569cdc38-8c7a-4b93-af99-aaf907dc8dd6","previous":null}}

List Investigations

List Endgame investigations.

Parameters

ParameterTypeDefault ValueDescription
OSStringSolaris,Windows,MacOs,LinuxSpecify for which OS you want to list investigations. Parameter can takemultiple values as a comma-separated string.
Fetch investigations for the last X hoursIntN/AReturn investigations created for the specified timeframe in hours.
Max Investigation to ReturnIntN/ASpecify how many investigation you want to query.

Use cases

Investigations are used to hunt different objects of the endpoints, for example,processes, IP addresses, and files. This action allows the user to listinvestigations. Analysts may use this action to make sure that all of therequired investigations are being performed on the system.

Run on

This action runs on all entities.

Action results

Script result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON result
{"data":[{"created_by_chat":false,"name":"Example User + 2020-01-08T13:47:51.334336_utc","core_os":"windows","created_at":"2020-01-08T13:47:51.340497+00:00","task_completion":{"completed_tasks":1,"total_tasks":1},"archived":false,"created_by":{"username":"admin","last_name":"User","is_active":true,"is_editable":true,"is_ldap":false,"is_removable":false,"timezone":null,"id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","first_name":"Example","last_viewed_alert":"2020-01-07T09:24:22.925000","is_sso":false,"is_superuser":true,"role":{"role":"Admin","id":"37e9e54e-0bb8-5058-9bd4-50a0d0fbea35","permissions":{"endpoints.scan":true,"sensor.admin.view":true,"sensor.admin.update":true,"endpoints.delete":true,"endpoints.respond":true,"search.search":true,"sensor.admin.create":true,"alerts.admin.forwardalerts":true,"endpoints.tag":true,"user.delete":true,"endpoints.deploy":true,"user.update":true,"search.save":true,"investigation.create":true,"endpoints.view":true,"user.view":true,"sensor.admin.download":true,"alerts.view":true,"alerts.update":true,"search.delete":true,"sensor.admin.delete":true,"endpoints.uninstall":true,"investigation.view":true,"admin":true,"investigation.update":true,"endpoints.changeconfiguration":true,"user.create":true}},"type":"Local","email":null},"updated_at":"2020-01-08T13:47:51.379966+00:00","created_by_user_display_name":"Example User","canceled_by_user_id":null,"version":2,"endpoint_count":1,"assigned_to":{"username":"admin","last_name":"User","is_active":true,"is_editable":true,"is_ldap":false,"is_removable":false,"timezone":null,"id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","first_name":"Example","last_viewed_alert":"2020-01-07T09:24:22.925000","is_sso":false,"is_superuser":true,"role":{"role":"Admin","id":"37e9e54e-0bb8-5058-9bd4-50a0d0fbea35","permissions":{"endpoints.scan":true,"sensor.admin.view":true,"sensor.admin.update":true,"endpoints.delete":true,"endpoints.respond":true,"search.search":true,"sensor.admin.create":true,"alerts.admin.forwardalerts":true,"endpoints.tag":true,"user.delete":true,"endpoints.deploy":true,"user.update":true,"search.save":true,"investigation.create":true,"endpoints.view":true,"user.view":true,"sensor.admin.download":true,"alerts.view":true,"alerts.update":true,"search.delete":true,"sensor.admin.delete":true,"endpoints.uninstall":true,"investigation.view":true,"admin":true,"investigation.update":true,"endpoints.changeconfiguration":true,"user.create":true}},"type":"Local","email":null},"id":"e0ad7613-daf6-435f-98f6-ce40eae01acc","canceled_by_user_display_name":null,"user_display_name":"Example User","hunt_count":1,"is_canceled":false}],"metadata":{"count":46,"previous_url":null,"timestamp":"2020-01-08T16:02:09.251511","next":2,"per_page":1,"next_url":"/api/v1/investigations/?per_page=1&page=2","previous":null}}

Get Investigation Details

Get information on a specific Endgame investigation.

Parameters

ParameterTypeDefault ValueDescription
Investigation IDStringN/ASpecify Endgame investigation ID to search for.

Use cases

Investigations are used to hunt different objects of the endpoints, for example,processes, IP addresses, and files. This action allows the user to get moreinformation about specific investigations. Analysts may use this action to makesure that all of the required tasks were performed on the system.

Run on

This action runs on all entities.

Action Results

Script result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON result
{"data":{"tasks":["6500673c-d246-41a3-882d-d3a339f28497"],"user_display_name":"Example User","task_types":["Process Survey"],"task_completion":{"completed_tasks":1,"total_tasks":1},"updated_at":"2020-01-06T13:30:33.851816+00:00","created_by_user_display_name":"Example User","id":"54caeedc-d6b0-4ca0-8f64-8798d1c34d54","task_completions_by_type":{"Process Survey":{"completed_tasks":1,"task_type_id":"2fbf0c36-5160-5c31-99ec-0fa5880c6bd1","total_tasks":1}},"archived":false,"user_id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","is_canceled":false,"created_by":{"username":"admin","last_name":"User","is_active":true,"is_editable":true,"is_ldap":false,"is_removable":false,"timezone":null,"id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","first_name":"Example","last_viewed_alert":"2020-01-06T09:27:04.097000","is_sso":false,"is_superuser":true,"role":{"role":"Admin","id":"37e9e54e-0bb8-5058-9bd4-50a0d0fbea35","permissions":{"endpoints.scan":true,"sensor.admin.view":true,"sensor.admin.update":true,"endpoints.delete":true,"endpoints.respond":true,"search.search":true,"sensor.admin.create":true,"alerts.admin.forwardalerts":true,"endpoints.tag":true,"user.delete":true,"endpoints.deploy":true,"user.update":true,"search.save":true,"investigation.create":true,"endpoints.view":true,"user.view":true,"sensor.admin.download":true,"alerts.view":true,"alerts.update":true,"search.delete":true,"sensor.admin.delete":true,"endpoints.uninstall":true,"investigation.view":true,"admin":true,"investigation.update":true,"endpoints.changeconfiguration":true,"user.create":true}},"type":"Local","email":null},"hunt_count":1,"canceled_by_user_id":null,"version":2,"endpoint_count":1,"canceled_by_user_display_name":null,"created_by_user_id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","account_id":"c374bb8a-9a98-4823-b280-68e74c170a0e","created_by_chat":false,"sensors":["8eef6873-6db7-58ab-a1ca-68dc19b54117"],"name":"Example User + 2020-01-06T13:30:33.808543_utc","core_os":"windows","created_at":"2020-01-06T13:30:33.813747+00:00","assigned_to":{"username":"admin","last_name":"User","is_active":true,"is_editable":true,"is_ldap":false,"is_removable":false,"timezone":null,"id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","first_name":"Example","last_viewed_alert":"2020-01-06T09:27:04.097000","is_sso":false,"is_superuser":true,"role":{"role":"Admin","id":"37e9e54e-0bb8-5058-9bd4-50a0d0fbea35","permissions":{"endpoints.scan":true,"sensor.admin.view":true,"sensor.admin.update":true,"endpoints.delete":true,"endpoints.respond":true,"search.search":true,"sensor.admin.create":true,"alerts.admin.forwardalerts":true,"endpoints.tag":true,"user.delete":true,"endpoints.deploy":true,"user.update":true,"search.save":true,"investigation.create":true,"endpoints.view":true,"user.view":true,"sensor.admin.download":true,"alerts.view":true,"alerts.update":true,"search.delete":true,"sensor.admin.delete":true,"endpoints.uninstall":true,"investigation.view":true,"admin":true,"investigation.update":true,"endpoints.changeconfiguration":true,"user.create":true}},"type":"Local","email":null},"endpoints":["b23c8a14-69e0-4966-b78a-c9fba4fdd934"]},"metadata":{"timestamp":"2020-01-06T14:00:53.716517"}}

Get Host Isolation Config

Get host isolation config defined in Endgame.

Parameters

N/A

Use cases

This action is used to get information about host isolation config. This configallows isolated hosts to connect to the IP addresses listed there. Analysts mayuse this action to verify that all of the required IP addresses are in the hostisolation config.

Run on

This action runs on all entities.

Action results

Script result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON result
{"data":[{"id":"47999eeb-f076-5aca-a7cc-56bf7ac2b647","comments":[{"comment":"Testing API","entity_id":"47999eeb-f076-5aca-a7cc-56bf7ac2b647","user_id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","account_id":"c374bb8a-9a98-4823-b280-68e74c170a0e","entity_type":"whitelisted_ip","created_at":"2020-01-07T15:59:56Z","updated_at":"2020-01-07T15:59:56Z","id":547,"activity_type":"comment"}],"addr":"192.0.2.1/30"},{"id":"6ab5575c-718e-5e24-bd4d-77e0694ad6fc","comments":[{"comment":"Testing API","entity_id":"6ab5575c-718e-5e24-bd4d-77e0694ad6fc","user_id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","account_id":"c374bb8a-9a98-4823-b280-68e74c170a0e","entity_type":"whitelisted_ip","created_at":"2020-01-07T15:58:29Z","updated_at":"2020-01-07T15:58:29Z","id":545,"activity_type":"comment"}],"addr":"192.0.2.11/32"},{"id":"72bdf5d2-4cc6-5ccf-9787-a539fae9c517","comments":[{"comment":"CIDR Test","entity_id":"72bdf5d2-4cc6-5ccf-9787-a539fae9c517","user_id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","account_id":"c374bb8a-9a98-4823-b280-68e74c170a0e","entity_type":"whitelisted_ip","created_at":"2020-01-07T15:58:04Z","updated_at":"2020-01-07T15:58:04Z","id":543,"activity_type":"comment"}],"addr":"198.51.100.1/32"},{"id":"5aa89c8f-a535-5876-840c-af33a7ec1419","comments":[{"comment":"Testing API","entity_id":"5aa89c8f-a535-5876-840c-af33a7ec1419","user_id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","account_id":"c374bb8a-9a98-4823-b280-68e74c170a0e","entity_type":"whitelisted_ip","created_at":"2020-01-07T15:57:24Z","updated_at":"2020-01-07T15:57:24Z","id":541,"activity_type":"comment"}],"addr":"198.51.100.10"},{"id":"06461575-700b-596d-8662-7ea0aff28e9c","comments":[{"comment":"Test Isolation","entity_id":"06461575-700b-596d-8662-7ea0aff28e9c","user_id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","account_id":"c374bb8a-9a98-4823-b280-68e74c170a0e","entity_type":"whitelisted_ip","created_at":"2020-01-07T15:55:21Z","updated_at":"2020-01-07T15:55:21Z","id":539,"activity_type":"comment"}],"addr":"203.0.113.1"}],"metadata":{"count":5,"previous_url":null,"timestamp":"2020-01-07T16:00:19.754687","next":null,"per_page":10,"next_url":null,"previous":null}}

Add IP Subnet to Host Isolation Config

Add an IP subnet to host isolation config defined in Endgame.

Parameters

ParameterTypeDefault ValueDescription
IP SubnetStringN/AEnter the IPv4 Subnet that you want to add to Host Isolation Config.
DescriptionStringN/AEnter the description to the IP Subnet.
Create InsightCheckboxuncheckedIf enabled, creates Insight after successful execution of this action.

Use cases

This action is used to get information about host isolation config. This configallows isolated hosts to connect to the IP subnets listed there. Analysts mayuse this action to add required IP subnets to the host isolation config.

Run On

This action runs on all entities.

Action Results

Insights

If an IP subnet was added to the host isolation config using Endgame, thencreate an insight to indicate this.

Script result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False

Remove IP Subnet From Host Isolation Config

Remove an IP subnet from host isolation config defined in Endgame.

Parameters

ParameterTypeDefault ValueDescription
IP SubnetStringN/AEnter the IPv4 Subnet that you want to add to Host Isolation Config.
Create InsightCheckboxuncheckedIf enabled, creates Insight after successful execution of this action.

Use cases

This action is used to get information about host isolation config. This configallows isolated hosts to connect to the IP subnets listed there. Analysts mayuse this action to remove IP subnets that are no longer required from the hostisolation config.

Run on

This action runs on all entities.

Action results

Insights

If an IP subnet was removed from the host isolation config using Endgame, thencreate an insight to indicate this.

Script result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False

Collect Autoruns (Windows Only)

Collect autoruns from the Endgame endpoint.

Parameters

Parameter Display NameTypeDefault ValueDescription
Max Items to ReturnInteger1000

Specify how many autoruns to return.

Category "All"CheckboxCheckedIf enabled, search for all autorun categories.
Category "Network Provider"CheckboxUncheckedIf enabled, search for "Network Provider" autorun category.
Category "Office"CheckboxUncheckedIf enabled, search for "Office" autorun category .
Category "Driver"CheckboxUncheckedIf enabled, search for "Driver" autorun category.
Category "App Init"CheckboxUncheckedIf enabled, search for "App Init" autorun category.
Category "Winlogon"CheckboxUncheckedIf enabled, search for "Winlogon" autorun category.
Category "Print Monitor"CheckboxUncheckedIf enabled, search for "Print Monitor" autorun category.
Category "Ease of Access"CheckboxUncheckedIf enabled, search for "Ease of Access" autorun category.
Category "WMI"CheckboxUncheckedIf enabled, search for "WMI" autorun category.
Category "LSA Provider"CheckboxUncheckedIf enabled, search for "LSA Provider" autorun category.
Category "Service"CheckboxUncheckedIf enabled, search for "Service" autorun category.
Category "Bits"CheckboxUncheckedIf enabled, search for "Bits" autorun category.
Category "Known dll"CheckboxUncheckedIf enabled, search for "Known dll" autorun category.
Category "Print Provider"CheckboxUncheckedIf enabled, search for "Print Provider" autorun category.
Category "Image Hijack"CheckboxUncheckedIf enabled, search for "Image Hijack" autorun category.
Category "Startup Folder"CheckboxUncheckedIf enabled, search for "Startup Folder" autorun category.
Category "Internet Explorer"CheckboxUncheckedIf enabled, search for "Internet Explorer" autorun category.
Category "Codec"CheckboxUncheckedIf enabled, search for "Codec" autorun category.
Category "Logon"CheckboxUncheckedIf enabled, search for "Logon" autorun category.
Category "Search Order Hijack"CheckboxUncheckedIf enabled, search for "Search Order Hijack" autorun category.
Category "Winsock Provider"CheckboxUncheckedIf enabled, search for "Winsock Provider" autorun category .
Category "Boot Execute'CheckboxUncheckedIf enabled, search for "Boot Execute" autorun category.
Category "Phantom dll"CheckboxUncheckedIf enabled, search for "Phantom dll" autorun category.
Category "Com Hijack"CheckboxUncheckedIf enabled, search for "Com Hijack" autorun category.
Category "Explorer"CheckboxUncheckedIf enabled, search for "Explorer" autorun category.
Category "Scheduled Task"CheckboxUncheckedIf enabled, search for "Scheduled Task" autorun category.
Include All MetadataCheckboxCheckedIf enabled, provides all available data.
Include Malware Classification MetadataCheckboxUncheckedIf enabled, provides information about MalwareScore.
Include Authenticode MetadataCheckboxUncheckedIf enabled, provides Signer Information.
Include MD5 HashCheckboxUncheckedIf enabled, provides MD5 hash in the response.
Include SHA-1 HashCheckboxUncheckedIf enabled, provides SHA-1 hash in the response.
Include SHA-256 HashCheckboxUncheckedIf enabled, provides SHA-256 hash in the response.

Use cases

This action can be used to gather information about autoruns on the endpoint.This data can assist analysts to perform triage and remediation processes.

Run on

This action runs on the following entities:

  • Host
  • IP Address

Action results

Script result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON result
{"data":{"count":1,"per_page":50,"previous":null,"tasks":[{"user_id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","data":{"category_option":{"category_network_provider":true,"category_office":false,"category_driver":false,"category_app_init":false,"category_winlogon":false,"category_print_monitor":false,"category_ease_of_access":false,"category_wmi":false,"category_lsa_provider":false,"category_service":false,"category_bits":false,"category_known_dll":false,"category_print_provider":false,"category_image_hijack":false,"category_startup_folder":false,"category_internet_explorer":false,"category_codec":false,"category_logon":false,"category_all":false,"category_search_order_hijack":false,"category_winsock_provider":false,"category_boot_execute":false,"category_phantom_dll":false,"category_com_hijack":false,"category_explorer":false,"category_scheduled_task":false},"metadata_option":{"metadata_all":true,"metadata_malware_classification":false,"metadata_sha1":false,"metadata_sha256":false,"metadata_authenticode":false,"metadata_md5":false}},"account_id":"c374bb8a-9a98-4823-b280-68e74c170a0e","metadata":{"sensor_id":"8eef6873-6db7-58ab-a1ca-68dc19b54117","investigation_id":"0b043f77-531f-4109-93b1-e01019ad0980","task_id":"e667b0c3-39de-4862-9baf-d6697db79721","echo":"","endpoint_id":"b23c8a14-69e0-4966-b78a-c9fba4fdd934","destination_plugin":"autoruns","key":"collectAutoRunsRequest","semantic_version":"3.52.\\d+","collection_id":"2393f424-bf57-40af-81e6-91b95acf5409"}}],"next":null},"metadata":{"timestamp":"2020-01-08T13:15:37.238341"}}

Isolate Host

Isolate Endgame endpoint. This action supports only Windows and macOS systems.

Parameters

ParameterTypeDefault ValueDescription
Create InsightCheckboxUncheckedIf enabled, creates an Insight after successful execution of this action.

Use cases

This action is used to get information about host isolation config. This configallows isolated hosts to connect to the IP subnets listed there. Analysts mayuse this action to add required IP subnets to the host isolation config.

Run on

This action runs on the following entities:

  • Host
  • IP Address

Action results

Entity enrichment

N/A

Insights

If the endpoint was isolated using Endgame agent, then create an insight toindicate this.

Script result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON result
{"data":{"valid":true,"bulk_task_id":"a6ccc2f7-39a7-42e7-b646-41b281316b1d","error_messages":[]},"metadata":{"timestamp":"2020-01-08T15:09:22.474963"}}

Unisolate Host

Unisolate an Endgame endpoint. This action supports only Windows and macOSsystems.

Parameters

Parameter Display NameTypeDefault ValueDescription
Create InsightCheckboxUncheckedIf enabled, creates an Insight after successful execution of this action.

Run on

This action runs on the following entities:

  • Host
  • IP Address

Action Results

Insights

If the endpoint was unisolated using Endgame agent, then create an insight toindicate this.

Script result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON result
{"data":{"domain":"InstallerInitiated","updated_at":"2020-01-08T08:16:26.063394+00:00","id":"b23c8a14-69e0-4966-b78a-c9fba4fdd934","display_operating_system":"Windows 10 (v1511)","hostname":"example","mac_address":"01:23:45:ab:cd:ef","upgrade_status":"","base_image":false,"isolation_updated_at":"2020-01-08T15:09:24.665367+00:00","status":"monitored","ad_distinguished_name":"CN=EXAMPLE,CN=Computers,DC=example,DC=com","ad_hostname":"example.com","tags":[],"isolation_request_status":null,"alert_count":0,"groups":[{"is_dynamic":false,"count":2,"id":"d9de26c9-ee63-4d38-9997-7418bd13c45e","name":"Demo: APT28"}],"sensors":[{"status":"monitored","sensor_version":"3.52.12","policy_status":"successful","policy_name":"Lab (Detect-Only with Streaming)","sensor_type":"hunt","id":"8eef6873-6db7-58ab-a1ca-68dc19b54117","policy_id":"07b7a44f-25f3-4e5c-977b-2915de8160c5"}],"ip_address":"192.0.2.3","is_isolated":false,"operating_system":"Windows 10.0","name":"example","status_changed_at":"2020-01-08T12:30:48.704802+00:00","core_os":"windows","created_at":"2019-11-01T06:31:32.519640+00:00","error":null,"machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8"},"metadata":{"timestamp":"2020-01-08T15:16:34.303701"}}

Download file

Download a file from a specific Endgame endpoint.

Parameters

Parameter Display NameTypeDefault ValueDescription
Full File PathStringN/AIf enabled, creates an Insight after successful execution of this action.
Full Download Folder PathStringN/AEnter the path to the folder, where you want to store this file.
Expected SHA-256 HashStringN/AEnter the expected SHA-256 hash.

Use cases

You can use this action to access the files from endpoints. Files shouldsometimes be processed manually, and this activity helps users to access therequired files.

Run on

This action runs on the following entities:

  • Host
  • IP Address

Action results

Insights

If the endpoint was unisolated using the Endgame agent, then create an insightto indicate this.

Script result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON result

If status issuccess, the JSON result is as follows:

{"data":{"status":"success","doc_type":"collection","endpoint":{"domain":"InstallerInitiated","updated_at":"2019-11-01T05:41:10.150817+00:00","id":"a3cdc174-3af0-400a-85c3-bbb1435a6b61","display_operating_system":"Ubuntu 18.04.1","hostname":"example","mac_address":"01:23:45:ab:cd:ef","base_image":false,"isolation_updated_at":null,"status":"monitored","ad_distinguished_name":"","ad_hostname":"","tags":[{"id":"fc2dfcc8-9329-4f33-86a2-877bfb27575e","name":"CORE ENV"}],"isolation_request_status":null,"upgrade_status":"","groups":[{"is_dynamic":false,"count":1,"id":"e453d4f6-95c9-4dc5-bc41-2f4cae423e19","name":"Demo: Bad Admin"}],"sensors":[{"status":"A","sensor_version":"3.52.12","sensor_type":"hunt","id":"c7347a4b-3e71-5514-980f-90bdbab758cf"}],"ip_address":"192.0.2.1","is_isolated":false,"operating_system":"Linux 4.15.0-29-generic","name":"example","status_changed_at":"2020-01-07T08:16:46.895105+00:00","core_os":"linux","created_at":"2019-03-19T04:25:06.953312+00:00","error":null,"machine_id":"b389c979-2fb1-6a8c-63bc-5547b3c26d1d"},"task_id":"0854ae75-47ca-438a-8731-615defac44ac","family":"response","data":{"results":[{"size":1731,"endpoint":{"status":"monitored","ad_distinguished_name":"","ad_hostname":"","operating_system":"Linux 4.15.0-29-generic","name":"example","display_operating_system":"Ubuntu 18.04.1","hostname":"example","updated_at":"2020-01-07T08:16:44Z","mac_address":"01:23:45:ab:cd:ef","ip_address":"192.0.2.1","id":"a3cdc174-3af0-400a-85c3-bbb1435a6b61"},"user_id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","account_id":"c374bb8a-9a98-4823-b280-68e74c170a0e","investigation_id":null,"filepath":"/home/a-arobinson/Downloads/bad_admin.sh","bulk_task_id":null,"created_by":"a-arobinson","file_uuid":"4c45cc36-b6ca-412a-ae0b-ed214a9c7187","correlation_id":"13dfca7b-9e75-4115-be93-e6684dbfc7c8","user":{"username":"admin","first_name":"Example","last_name":"User","id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1"},"chunk_size":26214400,"existing_path":"/home/a-arobinson/Downloads/bad_admin.sh","sha256":"8066b309db13bae560c15c35f42247a0f778786f0056d326ff3e6dffd1eac4f8","origination_task_id":"0854ae75-47ca-438a-8731-615defac44ac","md5":"6441b8f58feddb5a5f6fcd81c117ecb8"}]},"created_at":"2020-01-07T11:28:02.826397Z","os_type":"linux","machine_id":"b389c979-2fb1-6a8c-63bc-5547b3c26d1d","type":"downloadFileResponse","id":"d6fb3bf3-afea-44e0-8472-389f4e7e0002"},"metadata":{"count":1,"previous_url":null,"timestamp":"2020-01-07T11:41:56.750788","next":null,"per_page":50,"next_url":null,"previous":null}}

If the status isfailure, the JSON result is as follows:

{"data":{"status":"failure","doc_type":"collection","endpoint":{"domain":"InstallerInitiated","updated_at":"2019-11-01T05:42:09.150756+00:00","id":"12c3530d-657f-4ccd-835e-6df9affeed3d","display_operating_system":"Ubuntu 18.04.3","hostname":"example","mac_address":"01:23:45:ab:cd:ef","base_image":false,"isolation_updated_at":null,"status":"monitored","ad_distinguished_name":"","ad_hostname":"","tags":[],"isolation_request_status":null,"upgrade_status":"","groups":[{"is_dynamic":false,"count":4,"id":"c1af3cd6-2638-4144-842d-adc9cfb67fb9","name":"SOC"}],"sensors":[{"status":"A","sensor_version":"3.52.12","sensor_type":"hunt","id":"dc2e35cc-0c87-5a60-8fc8-de23ef747d02"}],"ip_address":"192.0.2.1","is_isolated":false,"operating_system":"Linux 4.15.0-72-generic","name":"example","status_changed_at":"2020-01-19T11:05:16.765186+00:00","core_os":"linux","created_at":"2019-09-20T21:34:51.966863+00:00","error":null,"machine_id":"5ae8ddd9-9339-ae4b-ccf7-5ed68f38b3a9"},"task_id":"85148460-c868-4fe5-a3e6-0d90784fadd1","family":"response","data":{"results":[{"endpoint":{"status":"monitored","ad_distinguished_name":"","ad_hostname":"","operating_system":"Linux 4.15.0-72-generic","name":"example","display_operating_system":"Ubuntu 18.04.3","hostname":"example","updated_at":"2020-01-16T14:04:22Z","mac_address":"01:23:45:ab:cd:ef","ip_address":"192.0.2.1","id":"12c3530d-657f-4ccd-835e-6df9affeed3d"},"user_id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1","account_id":"c374bb8a-9a98-4823-b280-68e74c170a0e","investigation_id":null,"expected_sha256":"123","bulk_task_id":null,"correlation_id":"a7dc04c8-932c-4056-9477-8095b1fa15d8","user":{"username":"admin","first_name":"Example","last_name":"User","id":"5ed3c5d7-f450-489d-8b5f-9430b18da4c1"},"chunk_size":26214400,"existing_path":"/home/example/Downloads/bad_admin.sh","origination_task_id":"85148460-c868-4fe5-a3e6-0d90784fadd1"}]},"created_at":"2020-01-19T12:19:57Z","os_type":"linux","machine_id":"5ae8ddd9-9339-ae4b-ccf7-5ed68f38b3a9","type":"downloadFileResponse","id":"8eb6b538-d480-4210-92fb-df08a3a4dfb9"},"metadata":{"count":1,"previous_url":null,"timestamp":"2020-01-19T12:23:23.623961","next":null,"per_page":50,"next_url":null,"previous":null}}

Delete file

Delete a file from an Endgame endpoint.

Parameters

Parameter Display NameTypeDefault ValueDescription
File PathStringN/AEnter the path to the file.

Use cases

This action is used to delete files from the endpoint. For example, it can beused when malware was found and an analyst wants to remove it.

Run on

This action runs on the following entities:

  • Host
  • IP Address

Action results

Insights

If the endpoint was unisolated using the Endgame agent, then create an insightto indicate this.

Script result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON result

(status = success)

{"data":[{"status":"success","doc_type":"collection","endpoint":{"domain":"InstallerInitiated","updated_at":"2019-11-01T05:41:10.150817+00:00","id":"a3cdc174-3af0-400a-85c3-bbb1435a6b61","display_operating_system":"Ubuntu 18.04.1","hostname":"08203s-lubu1804","mac_address":"01:23:45:ab:cd:ef","upgrade_status":"","base_image":false,"isolation_updated_at":null,"status":"monitored","ad_distinguished_name":"","ad_hostname":"","tags":[{"id":"fc2dfcc8-9329-4f33-86a2-877bfb27575e","name":"CORE ENV"}],"isolation_request_status":null,"groups":[{"is_dynamic":false,"count":1,"id":"e453d4f6-95c9-4dc5-bc41-2f4cae423e19","name":"Demo: Bad Admin"}],"sensors":[{"status":"monitored","sensor_version":"3.52.12","policy_status":"successful","policy_name":"Lab (Detect-Only with Streaming)","sensor_type":"hunt","id":"c7347a4b-3e71-5514-980f-90bdbab758cf","policy_id":"07b7a44f-25f3-4e5c-977b-2915de8160c5"}],"ip_address":"192.0.2.1","is_isolated":false,"operating_system":"Linux 4.15.0-29-generic","name":"08203s-lubu1804","status_changed_at":"2020-01-20T07:25:02.633331+00:00","core_os":"linux","created_at":"2019-03-19T04:25:06.953312+00:00","error":null,"machine_id":"b389c979-2fb1-6a8c-63bc-5547b3c26d1d"},"task_id":"bfb82b8d-71a0-4e5f-9cfe-bd573ea32b25","family":"response","created_at":"2020-01-20T07:31:37Z","local_msg":"Success","system_msg":null,"system_code":null,"local_code":0,"os_type":"linux","machine_id":"b389c979-2fb1-6a8c-63bc-5547b3c26d1d","type":"deleteFileResponse","id":"eb50fe9c-1059-42d4-9f5f-52e5af4ae64d"}],"metadata":{"count":1,"previous_url":null,"timestamp":"2020-01-20T07:32:04.425044","next":null,"per_page":50,"next_url":null,"previous":null}}

(status = failure) local_msg and system_msg will be used.

{"data":[{"status":"failure","doc_type":"collection","endpoint":{"domain":"InstallerInitiated","updated_at":"2019-11-01T05:41:10.150817+00:00","id":"a3cdc174-3af0-400a-85c3-bbb1435a6b61","display_operating_system":"Ubuntu 18.04.1","hostname":"08203s-lubu1804","mac_address":"01:23:45:ab:cd:ef","upgrade_status":"","base_image":false,"isolation_updated_at":null,"status":"monitored","ad_distinguished_name":"","ad_hostname":"","tags":[{"id":"fc2dfcc8-9329-4f33-86a2-877bfb27575e","name":"CORE ENV"}],"isolation_request_status":null,"groups":[{"is_dynamic":false,"count":1,"id":"e453d4f6-95c9-4dc5-bc41-2f4cae423e19","name":"Demo: Bad Admin"}],"sensors":[{"status":"monitored","sensor_version":"3.52.12","policy_status":"successful","policy_name":"Lab (Detect-Only with Streaming)","sensor_type":"hunt","id":"c7347a4b-3e71-5514-980f-90bdbab758cf","policy_id":"07b7a44f-25f3-4e5c-977b-2915de8160c5"}],"ip_address":"192.0.2.1","is_isolated":false,"operating_system":"Linux 4.15.0-29-generic","name":"08203s-lubu1804","status_changed_at":"2020-01-07T08:16:46.895105+00:00","core_os":"linux","created_at":"2019-03-19T04:25:06.953312+00:00","error":null,"machine_id":"b389c979-2fb1-6a8c-63bc-5547b3c26d1d"},"task_id":"5da277fe-503d-468a-822b-8801d9671cde","family":"response","created_at":"2020-01-07T13:10:50Z","local_msg":"Not found","system_msg":null,"system_code":null,"local_code":-7,"os_type":"linux","machine_id":"b389c979-2fb1-6a8c-63bc-5547b3c26d1d","type":"deleteFileResponse","id":"6f3e6148-6801-4cb8-8a5d-25f75ea93555"}],"metadata":{"count":1,"previous_url":null,"timestamp":"2020-01-07T13:16:18.834163","next":null,"per_page":5,"next_url":null,"previous":null}}

Drivers Survey (Windows only)

Get the information on drivers from a specific Endgame endpoint.

Parameters

ParameterTypeDefault ValueDescription
Max Items to ReturnString50Specify how many items to return.

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
driver_basenameReturns if it exists in JSON result
driver_filenameReturns if it exists in JSON result
date_modifiedReturns if it exists in JSON result
driver_file_versionReturns if it exists in JSON result
driver_load_addressReturns if it exists in JSON result
collection_idReturns if it exists in JSON result
hashesReturns if it exists in JSON result
machine_idReturns if it exists in JSON result
driver_product_versionReturns if it exists in JSON result
driver_descriptionReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"EntityResult":[{"driver_basename":"test.exe","driver_filename":"C:\\\\Windows\\\\system32\\\\test.exe","date_modified":1446189483.0185645,"driver_file_version":"10.0.10586.0 (th2_release.151029-1700)","driver_load_address":"12345678","collection_id":"a9925cf1-6d4c-4bea-b13d-12345678","hashes":{"sha256":"9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08","md5":"098f6bcd4621d373cade4e832627b4f6","sha1":"a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"},"machine_id":"5dc677fd-6b47-7df9-f7f4-12345678","driver_product_version":"10.0.10586.0","driver_description":"Test"}],"Entity":"PC-01"}]

Firewall Survey (Windows only)

Get information about the firewall rules on a specific Endgame endpoint.

Parameters

ParameterTypeDefault ValueDescription
Max Items to ReturnString50Specify how many items to return.

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
directionReturns if it exists in JSON result
machine_idReturns if it exists in JSON result
descriptionReturns if it exists in JSON result
remote_addressesReturns if it exists in JSON result
protocol_numberReturns if it exists in JSON result
enabledReturns if it exists in JSON result
edge_traversalReturns if it exists in JSON result
profilesReturns if it exists in JSON result
interface_typesReturns if it exists in JSON result
rule_nameReturns if it exists in JSON result
icmp_and_type_codesReturns if it exists in JSON result
local_addressesReturns if it exists in JSON result
application_nameReturns if it exists in JSON result
collection_idReturns if it exists in JSON result
remote_portsReturns if it exists in JSON result
actionReturns if it exists in JSON result
local_portsReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"EntityResult":[{"direction":"in","machine_id":"870499c3-d6bf-8edd-972d-12345678","description":"Inbound rule for Google Chrome to allow mDNS traffic.","remote_addresses":"*","protocol_number":17,"enabled":true,"edge_traversal":false,"profiles":["domain","public","private"],"interface_types":"All","rule_name":"Google Chrome (mDNS-In)","icmp_and_type_codes":"","local_addresses":"*","application_name":"C:\\\\Program Files (x86)\\\\Google\\\\Chrome\\\\Application\\\\chrome.exe","collection_id":"0925eea5-c61f-464a-ba61-12345678","remote_ports":"*","action":"allow","local_ports":"1234"}],"Entity":"PC-01"}]

Get Endpoints

List all endpoints.

Parameters

N/A

Run on

This action runs on all entities.

Action results

Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"domain":"","updated_at":"2019-05-30T01:40:21.126499+00:00","id":"db33d864-7d58-4d85-9d2d-1a98a101995d","display_operating_system":"Windows 7 (SP1)","hostname":"ip-AC170169","mac_address":"01:23:45:ab:cd:ef","isolation_updated_at":"","status":"monitored","ad_distinguished_name":"","ad_hostname":"","tags":[],"isolation_request_status":"","alert_count":72,"investigation_count":0,"groups":[],"sensors":[{"status":"monitored","sensor_version":"3.51.10","policy_status":"successful","policy_name":"POC-Lab","sensor_type":"hunt","id":"ec17f7bb-1d63-536a-b694-ca066cc2572e","policy_id":"d31f0192-b8e2-49ae-ae54-041376183b7f"}],"ip_address":"192.0.2.1","is_isolated":"false","operating_system":"Windows 6.1 Service Pack 1","name":"ip-AC170169","status_changed_at":"2019-05-30T01:40:18.200770+00:00","core_os":"windows","created_at":"2019-05-30T01:36:43.761600+00:00","error":[{"msg":"Installer failure - Execution failed for (http://192.0.2.1:5985/wsman)\\n","deployment_id":"90C2BAA6-B38B-4037-9A9E-7C8628E8D7D6","code":1001,"ts":1559180421.125456}],"machine_id":"4f1adabb-17c4-e39e-caa7-7900562d0b51"}]

Hunt File

Searches for running files.

Parameters

ParameterTypeDefault ValueDescription
Endpoints Core OSStringwindowsSelect an operating system (for example, Windows, Linux, or Mac) to filterthe Endpoints list. Note: You can only create a single investigation forendpoints that run on the same operating system.
MD5 HashesStringN/AADVANCED CONFIGURATION for this hunt. Enter MD5 Hashes, separated by comma.
SHA1 HashesStringN/AADVANCED CONFIGURATION for this hunt. Enter SHA-1 Hashes, separated by comma.
SHA256 HashesStringN/AADVANCED CONFIGURATION for this hunt. Enter SHA256 Hashes, separated by comma.
DirectoryStringN/AThe starting directory path Example C:\windows\system32
Find FileStringN/AEnter the filename(s) to search. Enter a regular expression to narrow searchresults.

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
meta_dataReturns if it exists in JSON result
file_pathReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"meta_data":{"hashes":{"sha256":"4705ba6793dc93c1bbe2a9e790e9e22778d217531b1750471206fd5c52bbd2b5","md5":"6383522c180badc4e1d5c30a5c4f4913","sha1":"62a30e96459b694f7b22d730c460a65cd2ebaaca"},"file_name_timestamps":{"accessed":1468675289.0711532,"entry_modified":0,"modified":1468675289.0711532,"created":1468675404.0330572},"file_attributes":38,"file_size":174},"file_path":"C:\\\\Program Files\\\\desktop.ini"},{"meta_data":{"hashes":{"sha256":"44fe5eebd80e46f903d68c07bcf06d187a3698bf3953bc58bb578465e2e0fe6c","md5":"6bd5fb46283aa48e638bef47510c47da","sha1":"c38d46ec6c9bc8baece4a459b617f44d10af973c"},"file_name_timestamps":{"accessed":1468675289.0024028,"entry_modified":0,"modified":1468675289.0024028,"created":1468675404.0111823},"file_attributes":38,"file_size":645},"file_path":"C:\\\\Program Files\\\\Common Files\\\\microsoft shared\\\\Stationery\\\\Desktop.ini"}]

Hunt IP

Searches for network connections.

Parameters

ParameterTypeDefault ValueDescription
Endpoints Core OSStringwindowsSelect an operating system (for example, Windows, Linux, or Mac) to filterthe Endpoints list. Note: You can only create a single investigation forendpoints that run on the same operating system.
Remote IP AddressStringN/Aremote IP address - separated by comma
Local IP AddressStringN/Aseparated by comma
StateStringN/AEnter state to return. Example: ANY
ProtocolStringN/AExample: ANY, UDP, TCP
Network PortStringN/AN/A
Network RemoteStringN/ANetwork Remote or Local.

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
parent_nameReturns if it exists in JSON result
domainReturns if it exists in JSON result
exeReturns if it exists in JSON result
nameReturns if it exists in JSON result
has_unbacked_execute_memoryReturns if it exists in JSON result
pidReturns if it exists in JSON result
up_timeReturns if it exists in JSON result
is_sensorReturns if it exists in JSON result
cmdlineReturns if it exists in JSON result
parent_exeReturns if it exists in JSON result
unbacked_execute_byte_countReturns if it exists in JSON result
create_timeReturns if it exists in JSON result
userReturns if it exists in JSON result
sidReturns if it exists in JSON result
threadsReturns if it exists in JSON result
ppidReturns if it exists in JSON result
unbacked_execute_region_countReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"parent_name":"System Idle Process","domain":"NT AUTHORITY","exe":"","name":"System","has_unbacked_execute_memory":false,"pid":4,"up_time":2384701,"is_sensor":false,"cmdline":"","parent_exe":"","unbacked_execute_byte_count":0,"create_time":1559179903,"user":"SYSTEM","sid":"S-1-5-18","threads":[{"thread_id":8},{"thread_id":12,"up_time":13206038203,"create_time":-11644473599},{"thread_id":16,"up_time":13206038203,"create_time":-11644473599}],"ppid":0,"unbacked_execute_region_count":0}]

Hunt Process

Searches for running processes.

Parameters

ParameterTypeDefault ValueDescription
Endpoints Core OSStringwindowsSelect an operating system (i.e., Windows, Linux, or Mac) to filter theEndpoints list. Note: You can only create a single investigation for endpointsthat run on the same operating system.
MD5 HashesStringN/AADVANCED CONFIGURATION for this hunt. Enter MD5 Hashes, separated by comma.
SHA1 HashesStringN/AADVANCED CONFIGURATION for this hunt. Enter SHA-1 Hashes, separated by comma.
SHA256 HashesStringN/AADVANCED CONFIGURATION for this hunt. Enter SHA256 Hashes, separated by comma.
Process NameStringN/AADVANCED CONFIGURATION for this hunt. Enter Process Name ex. iss.exe*

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
parent_nameReturns if it exists in JSON result
domainReturns if it exists in JSON result
exeReturns if it exists in JSON result
nameReturns if it exists in JSON result
has_unbacked_execute_memoryReturns if it exists in JSON result
pidReturns if it exists in JSON result
up_timeReturns if it exists in JSON result
is_sensorReturns if it exists in JSON result
cmdlineReturns if it exists in JSON result
parent_exeReturns if it exists in JSON result
unbacked_execute_byte_countReturns if it exists in JSON result
create_timeReturns if it exists in JSON result
userReturns if it exists in JSON result
sidReturns if it exists in JSON result
threadsReturns if it exists in JSON result
ppidReturns if it exists in JSON result
unbacked_execute_region_countReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"parent_name":"System Idle Process","domain":"NT AUTHORITY","exe":"","name":"System","has_unbacked_execute_memory":false,"pid":4,"up_time":2384701,"is_sensor":false,"cmdline":"","parent_exe":"","unbacked_execute_byte_count":0,"create_time":1559179903,"user":"SYSTEM","sid":"S-1-5-18","threads":[{"thread_id":8},{"thread_id":12,"up_time":13206038203,"create_time":-11644473599},{"thread_id":16,"up_time":13206038203,"create_time":-11644473599}],"ppid":0,"unbacked_execute_region_count":0}]

Hunt Registry

Searches for a registry key or value name.

Parameters

ParameterTypeDefault ValueDescription
HiveStringALLOne of the following: HKEY_CLASSES_ROOT, HKEY_CURRENT_CONFIG, HKEY_USERS,HKEY_LOCAL_MACHINE, ALL.
KeysStringN/ARegistry Key or Value Name.
Min SizeStringN/AMin byte size.
Max SizeStringN/AMax byte size.
Endpoints Core OSStringwindowsSelect an operating system (i.e., Windows, Linux, or Mac) to filter theEndpoints list. Note: You can only create a single investigation for endpointsthat run on the same operating system.

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
parent_nameReturns if it exists in JSON result
domainReturns if it exists in JSON result
exeReturns if it exists in JSON result
nameReturns if it exists in JSON result
up_timeReturns if it exists in JSON result
is_sensorReturns if it exists in JSON result
cmdlineReturns if it exists in JSON result
parent_exeReturns if it exists in JSON result
unbacked_execute_byte_countReturns if it exists in JSON result
create_timeReturns if it exists in JSON result
userReturns if it exists in JSON result
sidReturns if it exists in JSON result
threadsReturns if it exists in JSON result
ppidReturns if it exists in JSON result
unbacked_execute_region_countReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"parent_name":"System Idle Process","domain":"NT AUTHORITY","exe":"","name":"System","has_unbacked_execute_memory":false,"pid":4,"up_time":2384701,"is_sensor":false,"cmdline":"","parent_exe":"","unbacked_execute_byte_count":0,"create_time":1559179903,"user":"SYSTEM","sid":"S-1-5-18","threads":[{"thread_id":8},{"thread_id":12,"up_time":13206038203,"create_time":-11644473599},{"thread_id":16,"up_time":13206038203,"create_time":-11644473599}],"ppid":0,"unbacked_execute_region_count":0}]

Hunt User

Searches the network for logged in users.

Parameters

ParameterTypeDefault ValueDescription
Endpoints Core OSStringwindowsSelect an operating system (i.e., Windows, Linux, or Mac) to filter theEndpoints list. Note: You can only create a single investigation for endpointsthat run on the same operating system.
Find UsernameStringN/AADVANCED CONFIGURATION for this hunt. Enter username(s), separate multipleentries with a semicolon.
Domain NameStringN/AADVANCED CONFIGURATION for this hunt. Enter Domain Name.

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
parent_nameReturns if it exists in JSON result
domainReturns if it exists in JSON result
exeReturns if it exists in JSON result
nameReturns if it exists in JSON result
has_unbacked_execute_memoryReturns if it exists in JSON result
pidReturns if it exists in JSON result
up_timeReturns if it exists in JSON result
is_sensorReturns if it exists in JSON result
cmdlineReturns if it exists in JSON result
parent_exeReturns if it exists in JSON result
unbacked_execute_byte_countReturns if it exists in JSON result
create_timeReturns if it exists in JSON result
userReturns if it exists in JSON result
sidReturns if it exists in JSON result
threadsReturns if it exists in JSON result
ppidReturns if it exists in JSON result
unbacked_execute_region_countReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"parent_name":"System Idle Process","domain":"NT AUTHORITY","exe":"","name":"System","has_unbacked_execute_memory":false,"pid":4,"up_time":2384701,"is_sensor":false,"Cmdline":"","parent_exe":"","unbacked_execute_byte_count":0,"create_time":1559179903,"user":"SYSTEM","sid":"S-1-5-18","threads":[{"thread_id":8},{"thread_id":12,"up_time":13206038203,"create_time":-11644473599},{"thread_id":16,"up_time":13206038203,"create_time":-11644473599}],"ppid":0,"unbacked_execute_region_count":0}]

Kill Process

Kill a process in a specific Endgame endpoint.

Parameters

ParameterTypeDefault ValueDescription
Process NameStringN/AEnter the process name
PIDStringN/AEnter ID of the process.

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False

Network Survey

Get information about connections, DNS cache, NetBIOS, ARP, and Route tablesfrom a specific Endgame endpoint.

Parameters

ParameterTypeDefault ValueDescription
Max Items to ReturnString50Specify how many autoruns to return.
Include Route Entries InformationCheckboxCheckedSpecify to get information about the Route Entries.
Include Net Bios InformationCheckboxCheckedSpecify to get information about Net Bios.
Include DNS Cache InformationCheckboxCheckedSpecify to get information about the DNS Cache.
Include ARP Table InformationCheckboxCheckedSpecify to get information about the ARP table.

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
connectionsReturns if it exists in JSON result
netbios_infoReturns if it exists in JSON result
arp_tableReturns if it exists in JSON result
route_tableReturns if it exists in JSON result
dns_cacheReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"EntityResult":{"connections":[{"connection_type":"SOCK_STREAM","collection_id":"50e74bd2-1cd4-412c-a7fc-24cf1456e883","exe":"C:\\\\Windows\\\\System32\\\\test.exe","connection_status":"LISTEN","name":"test.exe","family":"ipv4","local_port":111,"remote_port":0,"pid":700,"remote_address":"0.0.0.0","create_time":1583314664,"connection_timestamp":1583314664.0117714,"local_address":"0.0.0.0","protocol":"tcp","hashes":{"sha256":"5d00bbeb147e0c838a622fc42c543b2913d57eaca4e69d9a37ed61e98c819347","md5":"8497852ed44aff902d502015792d315d","sha1":"800a4c2e524fc392c45748eae1691fa01d24ea4c"},"machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8"}],"netbios_info":[{"comment":"","name":"PC-01","version_major":10,"netbios_neighbor_type":8392747,"platform":"WINDOWS NT","version_minor":0}],"arp_table":[{"connection_type":"SOCK_STREAM","collection_id":"50e74bd2-1cd4-412c-a7fc-24cf1456e883","exe":"C:\\\\Windows\\\\System32\\\\test.exe","connection_status":"LISTEN","name":"test.exe","family":"ipv4","local_port":111,"remote_port":0,"pid":700,"remote_address":"0.0.0.0","create_time":1583314664,"connection_timestamp":1583314664.0117714,"local_address":"0.0.0.0","protocol":"tcp","hashes":{"sha256":"5d00bbeb147e0c838a622fc42c543b2913d57eaca4e69d9a37ed61e98c819347","md5":"8497852ed44aff902d502015792d315d","sha1":"800a4c2e524fc392c45748eae1691fa01d24ea4c"},"machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8"}],"route_table":[{"machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8","family":"ipv4","destination":"0.0.0.0","netmask":"0.0.0.0","collection_id":"50e74bd2-1cd4-412c-a7fc-24cf1456e883","interface_name":"Ethernet0","gateway":"1.1.1.1"}],"dns_cache":[{"name":"test.ms","dns_record_type":"A","ttl":0,"collection_id":"50e74bd2-1cd4-412c-a7fc-24cf1456e883","machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8","query_error":9701}]},"Entity":"PC-01"}]

Ping

Test connectivity to the Endgame server.

Parameters

N/A

Run on

This action runs on all entities.

Action results

Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False

Process Survey

Get information about running processes on a specific Endgame endpoint.

Parameters

ParameterTypeDefault VauleDescription
Max Items to ReturnString50Specify how many items to return.
Detect Fileless Attacks (Windows Only)CheckboxUncheckedSpecify to detect fileless attacks. Windows Only.
Detect Malware With MalwareScore (Windows Only)CheckboxUncheckedSpecify to detect malware processes with MalwareScore. Windows Only.
Collect Process ThreadsCheckboxUncheckedSpecify to include information about the amount of process threads in the response.
Return Only Suspicious ProcessesCheckboxCheckedSpecify to return only suspicious processes from the endpoint. By the Endgame definition: Suspicious processes are unbacked executable processes.

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
domainReturns if it exists in JSON result
name_suspiciousReturns if it exists in JSON result
pidReturns if it exists in JSON result
name_uncommon_pathReturns if it exists in JSON result
repeat_offenderReturns if it exists in JSON result
cmdlineReturns if it exists in JSON result
create_timeReturns if it exists in JSON result
parent_nameReturns if it exists in JSON result
has_unbacked_execute_memoryReturns if it exists in JSON result
sidReturns if it exists in JSON result
ppidReturns if it exists in JSON result
up_timeReturns if it exists in JSON result
unbacked_execute_region_countReturns if it exists in JSON result
is_sensorReturns if it exists in JSON result
threadsReturns if it exists in JSON result
userReturns if it exists in JSON result
collection_idReturns if it exists in JSON result
parent_exeReturns if it exists in JSON result
exeReturns if it exists in JSON result
nameReturns if it exists in JSON result
unbacked_execute_byte_countReturns if it exists in JSON result
machine_idReturns if it exists in JSON result
unbacked_execute_region_countReturns if it exists in JSON result
tty_device_minor_numberReturns if it exists in JSON result
uidReturns if it exists in JSON result
name_suspiciousReturns if it exists in JSON result
phys_memory_bytesReturns if it exists in JSON result
pidReturns if it exists in JSON result
env_variablesReturns if it exists in JSON result
repeat_offenderReturns if it exists in JSON result
cmdlineReturns if it exists in JSON result
create_timeReturns if it exists in JSON result
tty_device_major_numberReturns if it exists in JSON result
parent_nameReturns if it exists in JSON result
groupReturns if it exists in JSON result
cpu_percentReturns if it exists in JSON result
has_unbacked_execute_memoryReturns if it exists in JSON result
gidReturns if it exists in JSON result
sha256Returns if it exists in JSON result
cwdReturns if it exists in JSON result
exeReturns if it exists in JSON result
up_timeReturns if it exists in JSON result
short_nameReturns if it exists in JSON result
tty_device_nameReturns if it exists in JSON result
is_sensorReturns if it exists in JSON result
sha1Returns if it exists in JSON result
threadsReturns if it exists in JSON result
name_uncommon_pathReturns if it exists in JSON result
collection_idReturns if it exists in JSON result
md5Returns if it exists in JSON result
argv_listReturns if it exists in JSON result
num_threadsReturns if it exists in JSON result
userReturns if it exists in JSON result
virt_memory_bytesReturns if it exists in JSON result
nameReturns if it exists in JSON result
session_idReturns if it exists in JSON result
memory_percentReturns if it exists in JSON result
machine_idReturns if it exists in JSON result
unbacked_execute_byte_countReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"EntityResult":[{"domain":"NT AUTHORITY","name_suspicious":false,"pid":4,"name_uncommon_path":false,"repeat_offender":false,"cmdline":"","create_time":1583314654,"parent_name":"System Idle Process","has_unbacked_execute_memory":false,"sid":"S-1-5-18","ppid":0,"up_time":342643,"unbacked_execute_region_count":0,"is_sensor":false,"threads":[{"thread_id":12,"up_time":13228130896,"create_time":-11644473599},{"thread_id":16,"up_time":13228130896,"create_time":-11644473599}],"user":"SYSTEM","collection_id":"ac1fb296-db5a-4426-b32e-292e4a50188d","parent_exe":"","exe":"","name":"System","unbacked_execute_byte_count":0,"machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8"}],"Entity":"PC-01"},{"EntityResult":[{"unbacked_execute_region_count":0,"tty_device_minor_number":0,"uid":0,"name_suspicious":false,"phys_memory_bytes":8900608,"pid":1,"env_variables":["HOME=/","init=/sbin/init","NETWORK_SKIP_ENSLAVED=","recovery=","TERM=linux","drop_caps=","BOOT_IMAGE=/vmlinuz-4.15.0-88-generic","PATH=/sbin:/usr/sbin:/bin:/usr/bin","PWD=/","rootmnt=/root"],"repeat_offender":false,"cmdline":"/sbin/init maybe-ubiquity","create_time":1583632302,"tty_device_major_number":0,"parent_name":"","group":"root","cpu_percent":0,"has_unbacked_execute_memory":false,"gid":0,"sha256":"3a14ff4b18505543eda4dccb054aa5860478a95ed0cac76da392f3472da3ad67","cwd":"/","exe":"/lib/systemd/systemd","up_time":24942,"short_name":"systemd","tty_device_name":"","is_sensor":false,"sha1":"e016f80b87101a74b52d15ce2726560a6e128b60","threads":[{"thread_id":1}],"name_uncommon_path":false,"collection_id":"bcb6b33a-0ffb-4e72-818a-1731024dfd79","md5":"ca563cf817f03ed7d01a6462818a5791","argv_list":["/sbin/init","maybe-ubiquity"],"num_threads":1,"ppid":0,"virt_memory_bytes":79818752,"name":"systemd","session_id":1,"memory_percent":0.21517109870910645,"parent_exe":"","unbacked_execute_byte_count":0,"machine_id":"5ae8ddd9-9339-ae4b-ccf7-5ed68f38b3a9","user":"root"}],"Entity":"PC-202"}]

Removable Media Survey (Windows only)

DGet information about removable media from a specific Endgame endpoint.

Parameters

ParameterTypeDefault ValueDescription
Max Items to ReturnString50Specify how many items to return.

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
nameReturns if it exists in JSON result
is_storage_deviceReturns if it exists in JSON result
vendor_idReturns if it exists in JSON result
collection_idReturns if it exists in JSON result
last_connect_timeReturns if it exists in JSON result
serial_numberReturns if it exists in JSON result
machine_idReturns if it exists in JSON result
is_connectedReturns if it exists in JSON result
product_idReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"EntityResult":[{"name":"USB Composite Device","is_storage_device":false,"vendor_id":"0E0F","collection_id":"fbe61b16-e6b2-4595-8409-abf4ce15fa85","last_connect_time":1552596043.0610971,"serial_number":"6&35D1F50B&0&1","machine_id":"a4c05d5a-7ebc-c3ab-1beb-f1fe517768d8","is_connected":false,"product_id":"0003"}],"Entity":"PC-01"}]

Software Survey (Windows only)

Get information about an installed software on a specific Endgame endpoint.

Parameters

ParameterTypeDefault ValueDescription
Max Items to ReturnString50Specify how many items to return.

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
publisherReturns if it exists in JSON result
machine_idReturns if it exists in JSON result
packageReturns if it exists in JSON result
install_dateReturns if it exists in JSON result
versionReturns if it exists in JSON result
collection_idReturns if it exists in JSON result
installed_forReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"EntityResult":[{"publisher":"John Doe","machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8","package":"Test","install_date":"20191008","version":"18.06","collection_id":"fc079e17-8a2e-40d9-94c9-b974e5534e58","installed_for":"allUsers"}],"Entity":"PC-01"}]

System Survey

Get system information on a single endgame endpoint, such as memory use, dns,and OS.

Parameters

ParameterTypeDefault ValueDescription
Max Items to ReturnString50Specify how many items to return.
Include Security Product Information (Windows only)CheckboxCheckedSpecify to get information about the security products installed on the endpoint (Windows only).
Include Patch Information (Windows only)CheckboxCheckedSpecify to get information about patches (Windows only).
Include Disk InformationCheckboxCheckedSpecify to get information about Disks.
Include Network Interface InformationCheckboxCheckedSpecify to get information about network interfaces.

Run on

This action runs on the following entities:

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
patches_infoReturns if it exists in JSON result
Disks_infoReturns if it exists in JSON result
network_interfacesReturns if it exists in JSON result
Os_infoReturns if it exists in JSON result
installed_security_productsReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"EntityResult":{"patches_info":[{"collection_id":"f7d a62bb-318d-40c1-a490-85979c0c9ede","installed_on":"2/3/2018","hotfix_id":"KB4049065","machine_id":"870499c3-d6bf-8edd-972d-f2f6621dd971"}],"Disks_info":[{"disk_id":"\\\\Device\\\\HarddiskVolume2","fstype":"NTFS","disk_total":15579738112,"disk_free":1219571712,"collection_id":"a27ebace-32ec-4257-ab4f-7da49f02a9d4","device":"\\\\Device\\\\HarddiskVolume2","path":"C:\\\\","machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8"}],"network_interfaces":[{"machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8","mac_address":"01:23:45:ab:cd:ef","ipv4_addresses":["1.1.1.1"],"ipv6_addresses":["1111::1111:1111:1111:1111"],"collection_id":"a27ebace-32ec-4257-ab4f-7da49f02a9d4","smp_interface":true,"interface_name":"Ethernet0"}],"Os_info":[{"memory":{"ram_free":1240039424,"page_percent_used":36.89334358507761,"page_total":2818101248,"ram_percent_used":42.24349594504104,"ram_total":2147012608,"ram_used":906973184,"page_used":1039691776,"page_free":1778409472},"doc_type":"collection","domain":"PC-01.test.com","endpoint":{"status":"unmonitored","ad_distinguished_name":"CN=PC_01,OU=TESTOU,OU=Organization,DC=test,DC=com","ad_hostname":"test.com","operating_system":"Windows 10.0 ","name":"PC-01","display_operating_system":"Windows 10 (v1511)","hostname":"PC-01","updated_at":"2020-03-08T08:27:22.919880+00:00","mac_address":"01:23:45:ab:cd:ef","machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8","ip_address":"1.1.1.1","id":"b23c8a14-69e0-4966-b78a-c9fba4fdd934"},"investigation_id":"85cff906-8b39-4a37-aa05-84950c9b2a02","hostname":"PC-01","bulk_task_id":null,"original_machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8","os_version":{"os_minor":0,"os_is_server":false,"os_major":10,"os_build_number":10586,"os_service_pack":""},"correlation_id":"7e17de5a-abcb-4de0-a510-7ca79bfdc345","architecture":"x64","sensor_info":{"malware_feature_version":"3.0.0","sensor_build_time":"1581375786","sensor_commit_sha":"80af56b6b295de785e502d82f39deac34973b2dd","sensor_build_number":48,"sensor_version":"3.53.9"},"time":{"tz_observes_dst":true,"tz_currently_in_dst":false,"tz_name":"Pacific Standard Time","tz_offset_minutes":480},"os_type":"windows","ad_info":{"distinguished_name":"CN=PC-01,OU=TESTOU,OU=Organization,DC=test,DC=com","domain_hostname":"test.com"},"origination_task_id":"d3d67012-cfb1-47d0-8ec9-bf7ffb68a019"}],"installed_security_products":[{"security_product_type":"AntiVirus","collection_id":"a27ebace-32ec-4257-ab4f-7da49f02a9d4","machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8","enabled":false,"name":"Windows Defender"}]},"Entity":"PC-01"}]

User Sessions Survey

Get information about an active user sessions on a specific Endgame endpoint.

Parameters

ParameterTypeDefault ValueDescription
Max Items to ReturnString50Specify how many items to return.

Run on

  • Hostname
  • IP Address

Action results

Entity enrichment
Enrichment Field NameLogic-When to apply
usernameReturns if it exists in JSON result
shellReturns if it exists in JSON result
uidReturns if it exists in JSON result
startedReturns if it exists in JSON result
hostnameReturns if it exists in JSON result
host_ipReturns if it exists in JSON result
session_idReturns if it exists in JSON result
session_countReturns if it exists in JSON result
terminalReturns if it exists in JSON result
endedReturns if it exists in JSON result
gidReturns if it exists in JSON result
collection_idReturns if it exists in JSON result
machine_idReturns if it exists in JSON result
startedReturns if it exists in JSON result
password_last_setReturns if it exists in JSON result
logon_typeReturns if it exists in JSON result
sidReturns if it exists in JSON result
Script result
Script Result NameValue optionsExample
is_successTrue/Falseis_success:False
JSON result
[{"EntityResult":[{"username":"endgame","shell":"/opt/endgame/bin/console","uid":1000,"started":1582554802.55514,"hostname":"","host_ip":"","session_id":887,"session_count":1,"terminal":"tty1","ended":0,"gid":1000,"collection_id":"1aebade8-9f7b-4237-8c43-2aed8729511e","machine_id":"827255f4-53a2-1823-cac0-7c0f7730ca26"}],"Entity":"PC-01"},{"EntityResult":[{"username":"example","domain":"3B","started":1580205134.001,"session_count":1,"ended":0,"password_last_set":0,"logon_type":"interactive","sid":"","collection_id":"88b876b1-5063-40a8-b40e-440df5eb8952","machine_id":"5dc677fd-6b47-7df9-f7f4-d45434c8d0f8"}],"Entity":"PC-02"}

Connectors

For detailed instructions on how to configure a connector inGoogle SecOps, seeConfiguring theconnector.

Endgame Connector

Use the following parameters to configure the connector:

ParameterTypeDefault ValueDescription
DeviceProductFieldStringdevice_productThe field name used to determine the device product.
EventClassIdStringevent_nameThe field name used to determine the event name (sub-type)
PythonProcessTimeoutString30The timeout limit (in seconds) for the python process running current script
API RootStringN/AN/A
UsernameStringN/AN/A
PasswordPasswordN/AN/A
Verify SSLCheckboxUncheckedN/A
Max Days BackwardsStringN/AN/A
Environment Field NameStringN/AIf defined, the connector extracts the environment from the specified eventfield. You can manipulate the field data using the regular expression patternfield to extract a specific string.
Alerts Count LimitStringN/AN/A
Proxy Server AddressStringN/AThe address of the proxy server to use.
Proxy UsernameStringN/AThe proxy username to authenticate with.
Proxy PasswordPasswordN/AThe proxy password to authenticate with.

Connector rules

  • The connector supports proxy.

  • The connector supports the dynamic list.

Need more help?Get answers from Community members and Google SecOps professionals.

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-19 UTC.