Skip to main content
Skip table of contents

Abnormal Security‎

LAST UPDATED: DEC. 30, 2024

Overview

The Abnormal cloud-native email security platform utilizes behavioral AI to identify and stop never-before-seen attacks that evade traditional security tools. Where legacy email security solutions rely on rules and policies to identify attacks, Abnormal delivers a fundamentally-different approach that precisely detects and then automatically remediates email threats.

D3 SOAR is providing REST operations to function with Abnormal Security.

Abnormal Security is available for use in:

D3 SOAR

V16.0+

Category

Email Security

Deployment Options

Option II, Option IV

Connection

To connect to Abnormal Security from D3 SOAR, follow this part to collect the required information below:

Parameter

Description

Example

Server URL

The base server URL.

https://api.abnormalplatform.com

Access Token

The Access Token obtained from the Abnormal portal.

*****

API Version

The API version to use for the connection.

v1

Configuring Abnormal Security to Work with D3 SOAR

  1. Sign in to the Abnormal Security portal and click on Abnormal REST API.

  2. Copy and save the authentication token in the Abnormal portal. This will be used for the vSOC connection. Refer to step 3j sub-step 2 in Configuring D3 SOAR to Work with Abnormal Security.

  3. Enable IP allowlisting in the Abnormal portal by entering the specific IPv4 or IPv6 addresses, or a range of IP addresses using a CIDR block.

READER NOTE

Ensure that API access is only possible from IP addresses belonging to your organization. This keeps your data safe by preventing users from unauthorized networks from accessing your Abnormal SOAR data.

Configuring D3 SOAR to Work with Abnormal Security

  1. Log in to D3 SOAR.

  2. Find the Abnormal Security integration.

    1. Navigate to Configuration on the top header menu.

    2. Click on the Integration icon on the left sidebar.

    3. Type Abnormal Security in the search box, then press Enter.

    4. Click + Connection, on the right side of the Connections section. A new connection window will appear.

  3. Configure the following fields to create a connection to Abnormal Security.

    1. Connection Name: The desired name for the connection.

    2. Site: Specifies the site to use the integration connection. Use the drop-down menu to select the site. The Share to Internal Sites option enables all sites defined as internal sites to use the connection. Selecting a specific site will only enable that site to use the connection.

    3. Recipient site for events from connections Shared to Internal Sites: This field appears if you selected Share to Internal Sites for Site to let you select the internal site to deploy the integration connection.

    4. Agent Name (Optional): Specifies the proxy agent required to build the connection. Use the dropdown menu to select the proxy agent from a list of previously configured proxy agents.

    5. Description (Optional): Add your desired description for the connection.

    6. Tenant (Optional): When configuring the connection from a master tenant site, you have the option to choose the specific tenant sites you want to share the connection with. Once you enable this setting, you can filter and select the desired tenant sites from the dropdowns to share the connection.

    7. Active: Tick the checkbox to ensure the connection is available for use.

    8. Privileged: Applicable for custom commands. Select this checkbox, along with the Privileged checkbox in custom commands, to secure integration usage. These privileged options are managed through the Privileged Commands and Privileged Secured Integration configuration modules, accessible under Organization Management > Roles.

    9. Configure User Permissions: Defines which users have access to the connection.

    10. System: This section contains the parameters defined specifically for the integration. These parameters must be configured to create the integration connection.
      1. Input the Server URL. The default value is https://api.abnormalplatform.com.
      2. Copy the Access Token from the Abnormal Security platform. Refer to step 2 in Configuring Abnormal Security to Work with D3 SOAR.
      3. Input the API Version. The default value is v1.

    11. Enable Password Vault: An optional feature that allows users to take the stored credentials from their own password vault. Refer to the password vault connection guide if needed.

    12. Connection Health Check: Updates the connection status you have created. A connection health check is done by scheduling the Test Connection command of this integration. This can only be done when the connection is active.
      To set up a connection health check, check the Connection Health Check tick box. You can customize the interval (minutes) for scheduling the health check. An email notification can be set up after a specified number of failed connection attempts.

  4. Test the connection.

    1. Click Test Connection to verify the account credentials and network connection. If the Test Connection Passed alert window appears, the test connection is successful. You will see Passed with a green checkmark appear beside the Test Connection button. If the test connection fails, check your connection parameters and try again.

    2. Click OK to close the alert window.

    3. Click + Add to create and add the configured connection.

Commands

Abnormal Security includes the following executable commands for users to set up schedules or create playbook workflows. With the Test Command, you can execute these commands independently for playbook troubleshooting.

Integration API Note

For more information about the Abnormal Security API, refer to the Abnormal Security API reference.

Note for Time-related parameters

The input format of time-related parameters may vary based on your account settings. As a result, the sample data provided in our commands is different from what you see. To set your preferred time format, follow these steps:

  1. Navigate to Configuration > Application Settings. Select Date/Time Format.

  2. Choose your desired date and time format.

After that, you will be able to view your preferred time format when configuring the DateTime input parameters for commands.

Fetch Event

Retrieves Abuse Mailbox campaigns or Abnormal Cases from Abnormal Security as events, based on the specified criteria.

READER NOTE

D3 recommends ticking the Initiate the buffer time of the Data Reacquire for [x] minutes after completing the event fetch checkbox instead of using the tolerance scope when setting up a new data ingestion schedule.

Input

Input Parameter

Required/Optional

Description

Example

Start Time

Required

Abuse Mailbox campaign event type

  • Returns emails last reported after this time (in UTC).

Abnormal Cases event type

  • Returns cases last modified after this time (in UTC).

2023-01-01 00:00

End Time

Required

Abused Mailbox campaigns event type

  • Returns emails last reported before this time (in UTC).

Abnormal Cases event type

  • Returns cases last modified before this time (in UTC).

2023-03-01 00:00

Number of Event(s) Fetched

Optional

The maximum number of events to fetch. By default, all emails last reported between Start Time to End Time and matching the search criteria will be returned.

10

Email Sender

Optional

Filters threats by the name or email address of the sender. This parameter only applies to the Abused Mailbox campaigns event type.

*****@*****.***

Email Recipient

Optional

Filters threats by the name or email address of the recipient. This parameter only applies to the Abused Mailbox campaigns event type.

*****@*****.***

Email Subject

Optional

Filters threats by the email subject. This parameter only applies to the Abused Mailbox campaigns event type.

SUBJECT

Attack Type

Optional

Filters threats by the attack type. Available options are:

  • Internal-to-Internal Attacks (Email Account Takeover)

  • Spam

  • Reconnaissance

  • Scam

  • Social Engineering (BEC)

  • Phishing: Credential

  • Invoice/Payment Fraud (BEC)

  • Malware

  • Extortion

  • Phishing: Sensitive Data

  • Other

This parameter only applies to the Abused Mailbox campaigns event type.

Malware

Email Reporter

Optional

Filters threats by the name or email address of the reporter. This parameter only applies to the Abused Mailbox campaigns event type.

*****@*****.***

Threat Type

Optional

Filters threats by the threat type. Available options are:

  • All

  • Malicious

  • Safe

  • Spam

This parameter only applies to the Abused Mailbox campaigns event type.

Malicious

Tolerance Scope

Optional

Note: Instead of using tolerance scope, it is recommended to check the Initiate the buffer time of the Data Reacquire for [x] minutes after completing the event fetch checkbox when setting up a new Data Ingestion schedule.

A time window (in minutes) that extends the time range for fetching events by subtracting from the specified start time. Tolerance scope helps prevent data loss by accounting for API response delays caused by temporary server-side data unavailability—arising from processing and synchronization—from the vendor. With the tolerance scope applied, events will be fetched within the range of (Start Time - Tolerance Scope) to End Time. By default, the tolerance scope is set to 0.

10

Event Type

Optional

The type of events to fetch. Available options are:

  • Abuse Mailbox campaigns

  • Abnormal Cases

By default, the value is Abuse Mailbox campaigns.

Abnormal Cases

Output

To view the sample output data for all commands, refer to this article.

Fetch Event Field Mapping

Note that Fetch Event commands require event field mapping. Field mapping plays a key role in the data normalization process part of the event pipeline. Field mapping converts the original data fields from the different providers to the D3 fields which are standardized by the D3 Model. Refer to Event and Incident Intake Field Mapping for details.

If you require a custom field mapping, click + Add Field to add a custom field mapping. You can also remove built-in field mappings by clicking x. Note that two underscore characters will automatically prefix the defined Field Name as the System Name for a custom field mapping. Additionally, if an input Field Name contains any spaces, they will automatically be replaced with underscores for the corresponding System Name.

The Abnormal Security integration in D3 SOAR has some pre-configured field mappings for the Abuse Mailbox campaigns and Abnormal Cases, which correspond to the Event Source for Abuse Mailbox Campaign and Event Source for Abnormal Case mappings:

  • Default Event Source
    The Default Event Source is the default set of field mappings that are applied when this fetch event command is executed. For out-of-the-box integrations, you will find a set of field mapping provided by the system. Default event source provides field mappings for common fields from the fetched data. The default event source has a "Main Event JSON Path" (i.e. $) that is used to extract a batch of events from the response raw data. View the "Main Event JSON Path" by clicking on the Edit Main JSON Path button.

    • Main Event JSON Path: $
      The Main Event JSON Path determines the root path where the system starts parsing raw response data into D3 event data. The JSON path begins with $, representing the root element. The path is formed by appending a sequence of child elements to $, each separated by a dot (.). Square brackets with nested quotation marks ([‘...’]) should be used to separate child elements in JSON arrays.
      For example, the root node of a JSON Path is $. The child node denoting the Event Type field would be attackType. Putting it together, the JSON Path expression to extract the Event Type is $.attackType.

  • Event Source for Abuse Mailbox Campaign

Configures the field mapping which are specific to the Abuse Mailbox campaign-related events. If a source field in the field mapping is not found, the corresponding field mapping will be ignored. As the data of the Abuse Mailbox campaign-related events have a character that the value of the Type field is AbuseCampaign, the Abuse Mailbox campaign-related events can be defined by the Search String: {$.Type}=AbuseCampaign. Click on Edit Event Source to view the Search String.

Note: The Event Source for Abuse Mailbox Campaign field mapping will be applied in addition to the Default Event Source field mapping for Abuse Mailbox campaign-related events.

  • Event Source for Abnormal Case

Configures the field mapping which are specific to the Abnormal Case-related events. If a source field in the field mapping is not found, the corresponding field mapping will be ignored. As the data of the Abnormal Case-related events have a character that the value of the Type field is AbnormalCase, the Abnormal Case-related events can be defined by the Search String: {$.Type}=AbnormalCase. Click on Edit Event Source to view the Search String.

Note: The Event Source for Abnormal Case field mapping will be applied in addition to the Default Event Source field mapping for Abnormal Case-related events.

The pre-configured field mappings are detailed below:

Field Name

Source Field

Default Event Source (Main Event JSON Path: $)

Unique Event Key

.abxMessageId

Start Time

.sentTime

Email subject

.subject

Event Type

.attackType

Attack Strategy

.attackStrategy

Status

.remediationStatus

Sender

.fromName

Sender Email

.fromAddress

Sender Domain

.senderDomain

toRecipients

.toAddresses

Recipient

.recipientAddress

Receipt time

.receivedTime

Message ID

.internetMessageId

Return address

.returnPath

Sender IP Address

.senderIpAddress

CcRecipients

.ccEmails

Reply To Emails

.replyToEmails

Impersonated Party

.impersonatedParty

Attack Vector

.attackVector

Attachment Names

.attachmentNames

URL

.urls

Summary Insights

.summaryInsights

Remediation Time

.remediationTimestamp

Attacked Party

.attackedParty

Auto Remediated

.autoRemediated

Post Remediated

.postRemediated

Event Source for Abuse Mailbox Campaign (Search String: {$.Type}=AbuseCampaign)

The search string format is {jsonpath}=value. If the value of the Type key is AbuseCampaign in the event object under raw data, then the Abuse Mailbox Campaign-related events will use the field mapping below.

Unique Event Key

.campaignId

Internal message ID

.messageId

First Reported Time

.firstReported

Last Reported Time

.lastReported

Email subject

.subject

Sender

.fromName

Sender Email

.fromAddress

Original Recipient

.recipientName

Recipient

.recipientAddress

Status

.overallStatus

Judgement Status

.judgementStatus

Event Type

.attackType

Start Time

.firstReported

Event Source for Abnormal Case (Search String: {$.Type}=AbnormalCase)

The search string format is {jsonpath}=value. If the value of the Type key is AbnormalCase in the event object under raw data, then the Abnormal Case-related events will use the field mapping below.

Unique Event Key

.caseId

Start Time

.firstObserved

Severity

.severity

Affected Employee

.affectedEmployee

Threat IDs

.threatIds

Error Handling

If the Return Data displays Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Fetch Event failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Abnormal Security portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Server URL, Access Token, API Version are all required.

Error Sample Data

Fetch Event failed.

Status Code: 400.

Message: Server URL, Access Token, API Version are all required.

Fetch Incident

Retrieves threat logs from Abnormal Security based on the specified criteria.

READER NOTE

  • [December 2023]: The 200 response code example for the /threats/{threatId}/links API endpoint contains an error. The top-level JSON path field is incorrectly specified as $.threats; it should be $.links.

  • D3 recommends ticking the Initiate the buffer time of the Data Reacquire for [x] minutes after completing the event fetch checkbox instead of using the tolerance scope when setting up a new data ingestion schedule.

Input

Input Parameter

Required/Optional

Description

Example

Start Time

Required

Returns threats received after this time.

2023-01-01 00:00

End Time

Required

Returns threats received before this time.

2023-03-01 00:00

Number of Incident(s) Fetched

Optional

The number of most recently received threats to return. By default, all incidents matching the search criteria will be returned.

10

Detection Source

Optional

Filters threats by the detection source. Available options are:

  • All

  • Advanced

By default, the value is All.

All

Email Sender

Optional

Filters threats by the name or email address of the sender.

*****@*****.***

Email Recipient

Optional

Filters threats by the name or email address of the recipient.

*****@*****.***

Email Subject

Optional

Filters threats by the email subject.

SUBJECT

Topic

Optional

Filters threats by the topic of the email content. Available options are:

  • Billing Account Update

  • Covid-19 Related Attack

  • Cryptocurrency

  • Invoice

  • Invoice Inquiry

Invoice

Attack Type

Optional

Filters threats by the attack type. Available options are:

  • Internal-to-Internal Attacks (Email Account Takeover)

  • Spam

  • Reconnaissance

  • Scam

  • Social Engineering (BEC)

  • Phishing: Credential

  • Invoice/Payment Fraud (BEC)

  • Malware

  • Extortion

  • Phishing: Sensitive Data

  • Other

Malware

Attack Vector

Optional

Filters threats by the attack vector. Available options are:

  • Link

  • Attachment

  • Text

  • Others

  • Attachment with Zipped File

Link

Attack Strategy

Optional

Filters threats by the attack strategy. Available options are:

  • Name Impersonation

  • Internal Compromised Email Account

  • External Compromised Email Account

  • Spoofed Email

  • Unknown Sender

  • Covid 19 Related Attack

Name Impersonation

Impersonated Party

Optional

Filters threats by the impersonated party. Available options are:

  • VIP

  • Assistants

  • Employee (other)

  • Brand

  • Known Partners

  • Automated System (Internal)

  • Automated System (External)

  • Unknown Partner

  • None / Others

VIP

Tolerance Scope

Optional

Note: Instead of using tolerance scope, it is recommended to check the Initiate the buffer time of the Data Reacquire for [x] minutes after completing the event fetch checkbox when setting up a new Data Ingestion schedule.

A time window (in minutes) that extends the time range for fetching events by subtracting from the specified start time. Tolerance scope helps prevent data loss by accounting for API response delays caused by temporary server-side data unavailability—arising from processing and synchronization—from the vendor. With the tolerance scope applied, events will be fetched within the range of (Start Time - Tolerance Scope) to End Time. By default, the tolerance scope is set to 0.

10

Get Threat Links

Optional

Whether to ingest threat links. Available options are:

  • True

  • False

By default, the value is False.

True

Incident Field Mapping

For this integration, the default incident fields in D3 SOAR are fixed with no built-in source fields. Users can specify the source fields as needed.

Event and Incident Intake Field Mapping

Incident field mapping is mandatory for the Fetch Incident command, while event field mapping is optional for the same command. Users can edit the provided mappings or create custom mappings as needed. See Event and Incident Intake Field Mapping for more details.

Incident Main JSON Path: $

Field Name

Source Field

Title

User defined

Description

User defined

Severity

User defined

Incident Type

User defined

Incident Creator

User defined

Incident Owner

User defined

Incident Playbook

User defined

Due In Date

User defined

Unique Key

User defined

Tactics

User defined

Techniques

User defined

Event Field Mapping

Main Event JSON Path

  • $.messages

The event field mapping used in the Fetch Incident command is identical to the one used in the Fetch Event command.

Output

To view the sample output data for all commands, refer to this article.

Error Handling

If the Return Data displays Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Fetch Incident failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Abnormal Security portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Server URL, Access Token, API Version are all required.

Error Sample Data

Fetch Incident failed.

Status Code: 400.

Message: Server URL, Access Token, API Version are all required.

Report Email

Reports a missed attack or a false positive judgment by Abnormal Security.

READER NOTE

Portal Link is an optional parameter to run this command.

  • Run the Fetch Incident command to obtain the Portal Link. Portal Links can be found in the raw data at the path $[*].messages[*].abxPortalUrl.

Input

Input Parameter

Required/Optional

Description

Example

Report Type

Optional

The report type. Available options are:

  • False Negative

  • False Positive

By default, the value is False Negative.

False negative indicates that a missed attack has been reported. False positive indicates that a false positive judgment has been reported.

False Negative

Subject

Optional

The subject of the email to report. This parameter only applies to the False Negative report type.

Test Phishing Email

Recipient Email

Optional

The email address of the recipient who has received a potentially malicious email. This parameter only applies to the False Negative report type.

*****@*****.***

Sender Email

Optional

The email address that may be potentially malicious. This parameter only applies to the False Negative report type.

*****@*****.***

Received Date

Optional

When the email was received in the YYYY-MM-DD format (in UTC).

2023-03-01

Description

Optional

A description providing context for the issue.

Alice reported this phishing email was missing from their inbox.

Portal Link

Optional

The link of the portal for a False Positive threat. Portal Links can be obtained using the Fetch Incident command. This parameter only applies to the False Positive report type.

https://portal.abnormalsecurity.com/home/threat-center/remediation-history/*****

Output

To view the sample output data for all commands, refer to this article.

Error Handling

If the Return Data displays Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Report Email failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Abnormal Security portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Server URL, Access Token, API Version are all required.

Error Sample Data

Report Email failed.

Status Code: 400.

Message: Server URL, Access Token, API Version are all required.

Search Emails

Retrieves Abuse Mailbox campaign details based on the search conditions. A maximum of 100 campaigns can be returned.

Input

Input Parameter

Required/Optional

Description

Example

Email Sender

Optional

Filters threats by the name or email address of the sender.

*****@*****.***

Email Recipient

Optional

Filters threats by the name or email address of the recipient.

*****@*****.***

Email Subject

Optional

Filters threats by the email subject.

SUBJECT

Attack Type

Optional

Filters threats by the attack type. Available options are:

  • Internal-to-Internal Attacks (Email Account Takeover)

  • Spam

  • Reconnaissance

  • Scam

  • Social Engineering (BEC)

  • Phishing: Credential

  • Invoice/Payment Fraud (BEC)

  • Malware

  • Extortion

  • Phishing: Sensitive Data

  • Other

Malware

Email Reporter

Optional

Filters threats by the name or email address of the reporter.

*****@*****.***

Threat Type

Optional

Filters threats by the threat type. Available options are:

  • All

  • Malicious

  • Safe

  • Spam

Malicious

Output

To view the sample output data for all commands, refer to this article.

Error Handling

If the Return Data displays Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Search Emails failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Abnormal Security portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Server URL, Access Token, API Version are all required.

Error Sample Data

Search Emails failed.

Status Code: 400.

Message: Server URL, Access Token, API Version are all required.

Take Action To Threats

Takes action to remediate or un-remediate the specified threats.

READER NOTE

Threat IDs is a required parameter to run this command.

  • Run the Fetch Incident command to obtain the Threat IDs. Threat IDs can be found in the raw data at the path $[*].threatId.

Input

Input Parameter

Required/Optional

Description

Example

Threat IDs

Required

The IDs of the threats against which to take action. Threat IDs can be obtained using the Fetch Incident command.

[ "*****" ]

Action

Required

The action to take against the specified threats. Available options are:

Remediate

Unremediate

Remediate

Output

To view the sample output data for all commands, refer to this article.

Error Handling

If the Return Data displays Partially Successful or Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Take Action To Threats failed.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Abnormal Security portal. Refer to the HTTP Status Code Registry for details.

Status Code: 400.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Server URL, Access Token, API Version are all required.

Error Sample Data

Take Action To Threats failed.

Status Code: 400.

Message: Server URL, Access Token, API Version are all required.

Test Connection

Allows you to perform a health check on an integration connection. You can schedule a periodic health check by selecting Connection Health Check when editing an integration connection.

Input

N/A

Output

Output Type

Description

Return Data Type

Return Data

Indicates one of the possible command execution states: Successful or Failed.

The Failed state can be triggered by any of the following errors:

- A connection issue with the integration

- The API returned an error message

- No response from the API

You can view more details about an error in the Error tab.

String

Error Handling

If the Return Data displays Failed, an Error tab will appear in the Test Result window.

The error tab contains the details responded from D3 SOAR or third-party API calls, including Failure Indicator, Status Code, and Message. This can help you locate the root cause of a command failure.

Parts in Error

Description

Example

Failure Indicator

Indicates the command failure that happened at a specific input and/or API call.

Test Connection failed. Failed to check the connector.

Status Code

The response code issued by the third-party API server or the D3 SOAR system that can be used to locate the corresponding error category. For example, if the returned status code is 401, the selected connection is unauthorized to run the command. The user or system support would need to check the permission setting in the Abnormal Security portal. Refer to the HTTP Status Code Registry for details.

Status Code: 401.

Message

The raw data or captured key error message from the integration API server about the API request failure.

Message: Unauthorized.

Error Sample Data

Test Connection failed. Failed to check the connector.

Status Code: 401.

Message: Unauthorized.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.