Looking for a way to query LDAP using a custom action similar to Splunk SOAR's ldap query but do not see a current integration action that supports this. Is this functionality supported? If so, what would be the best way to create this query if our AD integration is properly configured?
Hi,
Between the two different integrations from SecOps and Splunk - what are the differences in the results of the queries. What do you get from Splunk that you need here?
I believe this would be some python code and a little bit of tinkering with the pieces you want or a feature request to get into the product/integration.
They have a supported action: run query: Query Active Directory LDAP in their LDAP integration. https://splunkbase.splunk.com/app/5755. That query does not appear to be currently supported by SecOps
If you can tell us what the LDAP query is exactly we may be able to modify the existing code within the SOAR IDE and use that to pull the data.
There is a component that is currently configured within the integration called "search active directory" that runs some kind of LDAP query - so it's certainly something that can be done - it just needs some custom configuration.
I have done this, if I understand what you are trying to do.
I copied the Search Active Directory and then modified it for the query that I wanted to run. I also set it to handle multiple entities. And I am sure there is a cleaner way to do it. but it's what I could do.