Skip to main content

Who is this article for?

Incydr Professional, Enterprise, Gov F2, and Horizon
Incydr Basic, Advanced, and Gov F1

Find your product plan in the Code42 console on the Account menu.
Not an Incydr customer? For CrashPlan articles, search or browse.

Instructor, no.

Incydr Professional, Enterprise, Gov F2, and Horizon, yes.

Incydr Basic, Advanced, and Gov F1, yes.

CrashPlan Cloud, no.

Retired product plans, no.

CrashPlan for Small Business, no.

Code42 Support

Install and manage the Code42 app for Cortex XSOAR


This article describes how to integrate Code42 with Cortex XSOAR (previously Demisto). Cortex XSOAR is a security orchestration, automation, and response (SOAR) solution. Using the Code42 content packs for Cortrex XSOAR, you can view and search Code42 data in Cortex XSOAR, manage employees on watchlists, and accomplish other tasks from Cortex XSOAR. 

Use cases

Depending on your use case, the free Code42 content pack may meet your needs. The Code42 Insider Threat Remediation paid content pack offers additional preset triggers to help streamline certain insider threat incident response processes.


Use the commands included in the free Code42 content pack to: 

  • Ingest alerts from Code42
  • View and manage employees on watchlists
  • Search file events and metadata
  • Download files from Code42 
  • Manage Code42 users
    • Create users
    • Block or unblock users
    • Deactivate or reactivate users 
  • Manage Code42 legal hold custodians

For full information, see the Code42 integration documentation within Cortex XSOAR.

Code42 Insider Threat Remediation 

Use the Code42 Insider Threat Remediation paid content pack to to scale, standardize and automate certain insider threat incident response processes based on preset triggers within Cortex XSOAR: 

  • Search activity and automatically send to the data owner for review
  • Automate generating departing employees from ticketing systems
  • Automate attaching files from exposure-activity to ticketing systems
  • Take actions on employees when activity is reported as suspicious, for example, block the user or add them to legal hold

The Code42 free content pack is required to use this paid content pack. 


  • To use the Code42 app for Cortex XSOAR, you must enable endpoint monitoring in the Code42 console. (Does not apply to Incydr Professional, Enterprise, and Horizon) 
  • This functionality is available only when supported by your product plan. Contact your Customer Success Manager (CSM) for assistance with licensing, or to upgrade to an Incydr product plan. If you do not know your CSM, please contact our Customer Champions.

Create a user in Code42

Prepare a user account in your Code42 environment for configuring the Code42 app for Cortex XSOAR. This user account is used to authenticate and access data in your Code42 environment.

  • Permissions: The Code42 app for Cortex XSOAR returns data based on the roles assigned to this user. To ensure that the user's rights are not too permissive, create a user with the lowest level of privilege necessary. Assign the roles in our use case for managing a security application integrated with Code42. After assigning roles, you should test to confirm that the user can access the right data.   
  • Licensing: As a best practice, create a user in your Code42 environment that is exclusively used to configure the Code42 app for Cortex XSOAR. 
  • Authentication: Your Code42 credentials must rely on local authentication. SSO or authentication through any third-party provider do not work.

Configure the Code42 app for Cortex XSOAR 

  1. Sign in to your Cortex XSOAR environment. 
  2. Select Settings
  3. Select Integrations > Servers & Services.
  4. Search for Code42. 
    Demisto app
  5. From the Code42 row, click Add instance to create and configure a new integration instance. In the Code42 window: 
    1. Enter a name for your integration instance.
    2. Select Fetches incidents.  
    3. Enter the URL of your Code42 environment
    4. Enter the credentials for the user you created.
    5. Select the Incident type to which you'd like to map Code42 alerts. 
      (Optional) Select the Code42 Security Alert incident type. 
    6. (Optional) Select one or more alert severity levels to limit the Code42 alerts you'd like to ingest.
    7. Enter the First fetch time range to determine how far back to go to retrieve alerts. 
    8. Enter the number of alerts to fetch and process per run. 
    9. Check Include the list of files in returned incidents to include the file events associated with the alert.
    10. Select Test to validate the connection.  
    11. Click Done
  • Was this article helpful?