
The list of location IDs belonging to a cloud group assigned to this policy. The ID of the cloud group of the locations assigned to this policy. The list of location IDs assigned to this policy. The ID of the group of the locations assigned to this policy. There are no input arguments for this command. !sep-client-content Copy Human Readable Output # The hostname that is mapped to this IP address. The hardware key of the client to be moved. A wild card search can be done using '*' at the end of the query. The name of the group to which the endpoint belongs. The number of results to include on each page. Possible values are: CentOs, Debian, Fedora, MacOSX, Oracle, OSX, RedHat, SUSE, Ubuntu, Win10, Win2K, Win7, Win8, WinEmb7, WinEmb8, WinEmb81, WinFundamental, WinNT, Win2K3, Win2K8, Win2K8R2, WinVista, WinXP, WinXPEmb, WinXPProf64. The default is "0", which returns all results. Indicates when a computer's status was last updated. Base Command #įilters by the host name of the computer. You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook.Īfter you successfully execute a command, a DBot message appears in the War Room with the command details. ParameterĬlick Test to validate the URLs, token, and connection. Search for Symantec Endpoint Protection V2.Ĭlick Add instance to create and configure a new integration instance. Navigate to Settings > Integrations > Servers & Services. The following role is required to use the Symantec Endpoint Protection API:Ĭonfigure Symantec Endpoint Protection V2 on Cortex XSOAR # Scan/Quarantine/content-update an endpoint.

Query the Symantec Endpoint Protection Manager using the official REST API. This Integration is part of the Symantec Endpoint Protection Pack.
