Table of Contents
The following is a list of actions available for selection in Cyberm8 latest version.
This table is updated periodically and may not reflect the most recent actions available.
For more information, please contact Cyberm8 team at info@cyberm8.com.
Vendor Name | Product Name | Action Name |
Accellion | Kiteworks | File DLP Unlock |
Accellion | Kiteworks | Get File Info |
Accellion | Kiteworks | Get Folder Info |
Accellion | Kiteworks | Get User Info |
Amazon | AWS-EC2 | Add Network ACL |
Amazon | AWS-EC2 | Start Instance |
Check Point | Check Point SmartCenter | Add Threat Indicator |
Check Point | Check Point Capsule | Get Certificate About to Expire |
Check Point | Check Point User and Device Management | Generate New Remote Access Certificate |
Check Point | Check Point SmartCenter | Enable / Disable Rule |
Check Point | Check Point SmartCenter | Login |
Check Point | Check Point SmartCenter | Create Network Object |
Check Point | Check Point SmartCenter | Publish |
Check Point | Check Point SmartCenter | Install Policy |
Check Point | Check Point SmartCenter | Add Object to Network Group |
Check Point | Check Point SmartCenter | Get version |
Check Point | Check Point SmartCenter | Remove Object from Network Group |
Check Point | Check Point SmartCenter | Logout |
Check Point | Check Point SmartCenter | Create Service Object |
Check Point | Check Point SmartCenter | Create Network Group Object |
Check Point | Check Point SmartCenter | Create Service Group Object |
Check Point | Check Point SmartCenter | Add Object to Service Group |
Check Point | Check Point SmartCenter | Create Access Rule |
Check Point | Check Point SmartCenter | Modify Group Details |
Check Point | Check Point SmartCenter | Discard |
Check Point | Check Point SmartCenter | Remove Threat Indicator |
Check Point | Check Point SmartCenter | Set Group |
Check Point | Check Point SmartCenter | Remove address from a group |
Check Point | Check Point SmartCenter | Create address and add it to a group |
Check Point | Check Point SmartCenter | Create IP object |
Cisco | Ironport Email Security | Add Term to dictionary |
Cisco | Identity Services Engine | Re-authenticate MAC |
Cisco | Cisco IOS | Get Cisco IOS type |
Cisco | Ironport Email Security | Undo Add Term to dictionary |
Cisco | Firepower Management Center | Create Network Object |
Cisco | Firepower Management Center | Get Network Object |
Cisco | Firepower Management Center | Get Network Group |
Cisco | Firepower Management Center | Create Network Group |
Cisco | Firepower Management Center | Modify Network Group |
Cisco | Firepower Management Center | Get Device Records |
Cisco | Firepower Management Center | Deploy Policy |
Cyberm8 | Network Utilities | Parse IP Address |
Cyberm8 | Network Utilities | DNS lookup |
Cyberm8 | Network Utilities | Ping |
Cyberm8 | Network Utilities | SNMP Walk |
Cyberm8 | Network Utilities | Send HTTP request |
Cyberm8 | Miscellaneous | Delete Incident Details |
Cyberm8 | Miscellaneous | Variable Assign – List |
Cyberm8 | Miscellaneous | Request User Intervention |
Cyberm8 | Miscellaneous | Run another task |
Cyberm8 | Miscellaneous | Conditional Variable Assign |
Cyberm8 | Miscellaneous | Sleep |
Cyberm8 | Miscellaneous | Collection |
Cyberm8 | Text Utilities | Replace |
Cyberm8 | Text Utilities | Change MAC Address Format |
Cyberm8 | Text Utilities | Parse JSON |
Cyberm8 | Text Utilities | Match Regex |
Cyberm8 | SSH | Execute SSH commands |
Cyberm8 | Telnet | Execute telnet commands |
Cyberm8 | Nmap | Nmap Scan |
Cymulate | Cymulate | Get Latest Technical Report |
Cynet | Cynet Security Platform | Add value to whitelist |
ESET | ESET Antivirus | Block hash |
F5 | Big-IP | Create virtual server |
F5 | Big-IP | Disable virtual server |
F5 | Big-IP | Add record to datagroup |
F5 | Big-IP | Add member to pool |
F5 | Big-IP | Remove record from datagroup |
F5 | Big-IP | Enable virtual server |
F5 | Big-IP | Add iRule to virtual server |
F5 | Big-IP | Remove iRule from virtual server |
F5 | Big-IP | Create Pool |
F5 | Big-IP | Delete Pool |
F5 | Big-IP | Add Security Policy to Virtual Server |
F5 | Big-IP | Create Security Policy from Templates |
Forcepoint | Forcepoint Policy API Server | Add URL to Category |
Forcepoint | Forcepoint Triton | Add URL to Exception |
Forcepoint | Forcepoint Triton | Create URL Exception |
Forcepoint | Forcepoint Triton | Remove URL from Exception |
Forcepoint | Forcepoint Web Security Content Gateway | Set URL to SSL Bypass |
Forcepoint | Forcepoint Web Security Content Gateway | Delete URL from SSL Bypass |
Forescout | CounterACT | Modify Property |
Forescout | CounterACT | Update External MAC List |
Forescout | CounterACT | Replace External MAC List |
Forescout | CounterACT | FTP External Classifier |
Fortinet | FortiManager | Login |
Fortinet | FortiManager | Return All Firewall Addresses |
Fortinet | FortiManager | Logout |
Fortinet | FortiManager | Create New Address |
Fortinet | FortiManager | Get Address |
Fortinet | FortiManager | Create New Address Group |
Fortinet | FortiManager | Get Group |
Fortinet | FortiManager | Update Group Members |
Fortinet | FortiManager | Get Service |
Fortinet | FortiManager | Create New Service |
Generic | SMTP Server | Send email |
Generic | SMTP Server | Request Approval by Mail |
Generic | Syslog | Send syslog |
Generic | Email – IMAP | Receive emails |
Generic | Generic Linux | Execute Remote Command on Multiple Servers |
Infoblox | Infoblox DDI | Get Details By MAC Address |
Juniper | Juniper Switch | Get mac address interface |
Microsoft | Microsoft Powershell | Get Installed KB |
Microsoft | Microsoft Powershell | List Running Processes |
Microsoft | Microsoft Powershell | Run Powershell Command |
Microsoft | Active Directory | Add User to Group |
Microsoft | Active Directory | Remove User from Group |
Microsoft | Active Directory | Enable User |
Microsoft | Active Directory | Disable User |
Microsoft | Active Directory | Check Group Membership |
Microsoft | Active Directory | Check if User is Enabled |
Microsoft | Active Directory | Unlock User |
Microsoft | Active Directory | AD Query |
Microsoft | Active Directory | Modify LDAP Attribute |
Microsoft | Active Directory | Delete computer from domain |
Microsoft | Exchange Web Services | Receive emails |
Microsoft | Microsoft Remote Management | Run Remote Command |
Microsoft | Office 365 | Get Office 365 IP Address and URL |
Microsoft | Microsoft SQL Server | SQL Query |
One Identity | Safeguard for Privileged Sessions | Login |
One Identity | Safeguard for Privileged Sessions | Open Transaction |
One Identity | Safeguard for Privileged Sessions | Commit Transaction |
One Identity | Safeguard for Privileged Sessions | Delete Transaction |
One Identity | Safeguard for Privileged Sessions | Create RDP Channel Policy |
Oracle | Oracle Database | SQL Query |
Palo Alto | Secdo | Add host to isolation |
Palo Alto | Palo Alto FW | Show High-Availability State |
Palo Alto | Palo Alto FW | Create address and add it to a group |
Palo Alto | Palo Alto FW | Remove address from a group |
Portnox | Portnox Core | Add New NAS Device |
Portnox | Portnox Core | Add voucher for device |
Portnox | Portnox Core | Add device to group |
Portnox | Portnox Core | Create New Managed Switch |
Portnox | Portnox Core | Remove Managed Switch |
Pulse Secure | Pulse Secure Connect | Create New Realm |
Pulse Secure | Pulse Secure Connect | Modify Existing Realm |
Pulse Secure | Pulse Secure Connect | Modify Realm Authentication Policy |
Pulse Secure | Pulse Secure Connect | Modify Realm Source IP Restriction |
Pulse Secure | Pulse Secure Connect | Modify Realm Browser Restriction |
Pulse Secure | Pulse Secure Connect | Modify Realm Certificate Restriction |
Pulse Secure | Pulse Secure Connect | Modify Realm Password Policy |
Pulse Secure | Pulse Secure Connect | Modify Realm Host Checker Policy |
Pulse Secure | Pulse Secure Connect | Modify Realm Limits Policy |
Pulse Secure | Pulse Secure Connect | Modify Realm Role Mapping Settings |
Pulse Secure | Pulse Secure Connect | Create New Role |
Pulse Secure | Pulse Secure Connect | Modify Existing Role |
Pulse Secure | Pulse Secure Connect | Modify Role Access Features |
Pulse Secure | Pulse Secure Connect | Modify Role Browser Restriction |
Pulse Secure | Pulse Secure Connect | Modify Role Source IP Restriction |
Pulse Secure | Pulse Secure Connect | Modify Role Certificate Restriction |
Pulse Secure | Pulse Secure Connect | Modify Role Host Checker Policy |
Pulse Secure | Pulse Secure Connect | Modify Role Mobile Restrictions Policy |
Pulse Secure | Pulse Secure Connect | Modify Role Vlan/Source IP |
Pulse Secure | Pulse Secure Connect | Modify Role Session Options |
Pulse Secure | Pulse Secure Connect | Create VPN Access Control Resource Policy |
Pulse Secure | Pulse Secure Connect | Modify VPN Access Control Resource Policy |
Pulse Secure | Pulse Secure Connect | Create VPN Connection Profile |
Pulse Secure | Pulse Secure Connect | Modify VPN Connection Profile |
Pulse Secure | Pulse Secure Connect | Modify Role VPN Settings |
Pulse Secure | Pulse Secure Connect | Create VPN Split Tunnel Resource Policy |
Pulse Secure | Pulse Secure Connect | Modify VPN Split Tunnel Resource Policy |
Pulse Secure | Pulse Secure Connect | Create Users Sign-in URL |
Pulse Secure | Pulse Secure Connect | Modify Realm Secondary Authentication |
Pulse Secure | Pulse Secure Connect | Modify Realm Dynamic Policy |
Pulse Secure | Pulse Secure Connect | Modify VPN Access Control Role Assignment |
Pulse Secure | Pulse Secure Connect | Modify VPN Connection Profile Role Assignment |
Pulse Secure | Pulse Secure Connect | Modify VPN Split Tunnel Role Assignment |
Pulse Secure | Pulse Secure Connect | Modify Realm Role Mapping Rules |
Pulse Secure | Pulse Secure Connect | Create Group in Authentication Server |
Pulse Secure | Pulse Secure Connect | Reset TOTP User |
Slack | Slack API | Send Message |
Slack | Slack API | Request Approval |
Solarwinds | Orion | Get devices list |
Solarwinds | Orion | Get Devices By Filter |
Symantec | Endpoint Protection | Add client to quarantine list |
Symantec | Endpoint Protection | Add File Hash to Fingerprint list |
Symantec | Endpoint Protection | Scan Now |
Symantec | Endpoint Protection | Release Client from Quarantine |
Symantec | Endpoint Protection | Move Client to Group |
Symantec | Symantec CAS | Add hash to black list |
Symantec | Symantec Messaging Gateway | Add Local Bad Sender Domain |
Symantec | Symantec Messaging Gateway | Add Local Bad Sender IP |
Symantec | Symantec Messaging Gateway | Remove Local Bad Sender Domain |
Symantec | Symantec Messaging Gateway | Remove Local Bad Sender IP |
Symantec | Symantec Messaging Gateway | Query Message Log |
Symantec | ProxySG | Add URL list to a category |
Trend Micro | Deep Discovery Analyzer | Get MD5 by SHA1 |
Trend Micro | Deep Discovery Analyzer | Get Sandbox Report |
Trend Micro | Officescan | Scan Now |
Trend Micro | Control Manager | Get Suspicious Objects |
Trend Micro | Control Manager | Add User Defined Suspicious Objects |
Trend Micro | Control Manager | Delete User Defined Suspicious Objects |
Trend Micro | Deep Discovery Analyzer | Submit File To Sandbox |
Trend Micro | Scanmail for Microsoft Exchange | Run Search and Destroy |
Trend Micro | Scanmail for Microsoft Exchange | Delete Search and Destroy Matches |
Tufin | SecureTrack | Add F5 BIG-IP Devices to SecureTrack |
Tufin | SecureTrack | Add Cisco L3 Switch Device to SecureTrack |
Tufin | SecureTrack | Add Juniper M/MX Device to SecureTrack |
Tufin | SecureTrack | Remove Device from Monitoring – By Display Name |
Tufin | SecureTrack | Remove Device from Monitoring – By IP |
Tufin | SecureTrack | Check import managed devices – By Display Name |
Tufin | SecureTrack | Migrate Device SecureTrack Server – By IP Address |
Tufin | SecureTrack | Migrate Device SecureTrack Server – By Display Name |
Tufin | SecureTrack | Migrate Bulk Devices SecureTrack Server – By File IP List |
Tufin | SecureTrack | Add Cisco Nexus to SecureTrack |
Tufin | SecureTrack | Add Cisco Router to SecureTrack |
Tufin | SecureTrack | Add Cisco ASA to SecureTrack |
Tufin | SecureChange | Get Network Objects |
Tufin | SecureChange | Get Multiple Selection |
Tufin | SecureChange | Modify Access Request Fields |
Tufin | SecureChange | Modify Ticket Step Status |
Virus Total | Virus Total Web API | Get File Hash Info |
Webroot | Threat Intelligence Web API | Get IP Reputation |