Arcsight Soar Integration Guide 5
Arcsight Soar Integration Guide 5
Arcsight Soar Integration Guide 5
Integration Guides
Legal Notices
Micro Focus
The Lawn
22-30 Old Bath Road
Newbury, Berkshire RG14 1QN
UK
https://www.microfocus.com
Copyright Notice
© Copyright 2023 Micro Focus or one of its affiliates
Confidential computer software. Valid license from Micro Focus required for possession, use or copying. The
information contained herein is subject to change without notice.
The only warranties for Micro Focus products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.
Micro Focus shall not be liable for technical or editorial errors or omissions contained herein.
No portion of this product's documentation may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose other
than the purchaser's internal use, without the express written permission of Micro Focus.
Notwithstanding anything to the contrary in your license agreement for Micro Focus ArcSight software, you may
reverse engineer and modify certain open source components of the software in accordance with the license terms for
those particular components. See below for the applicable terms.
U.S. Governmental Rights. For purposes of your license to Micro Focus ArcSight software, “commercial computer
software” is defined at FAR 2.101. If acquired by or on behalf of a civilian agency, the U.S. Government acquires this
commercial computer software and/or commercial computer software documentation and other technical data subject
to the terms of the Agreement as specified in 48 C.F.R. 12.212 (Computer Software) and 12.211 (Technical Data) of the
Federal Acquisition Regulation (“FAR”) and its successors. If acquired by or on behalf of any agency within the
Department of Defense (“DOD”), the U.S. Government acquires this commercial computer software and/or commercial
computer software documentation subject to the terms of the Agreement as specified in 48 C.F.R. 227.7202-3 of the
DOD FAR Supplement (“DFARS”) and its successors. This U.S. Government Rights Section 18.11 is in lieu of, and
supersedes, any other FAR, DFARS, or other clause or provision that addresses government rights in computer software
or technical data.
For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,
U.S.Government rights, patent policy, and FIPS compliance, see https://www.microfocus.com/about/legal/.
Trademark Notices
Adobe™ is a trademark of Adobe Systems Incorporated.
Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation.
UNIX® is a registered trademark of The Open Group.
Documentation Updates
The title page of this document contains the following identifying information:
l Software Version number
l Document Release Date, which changes each time the document is updated
l Software Release Date, which indicates the release date of this version of the software
To check for recent updates or to verify that you are using the most recent edition of a document, go to:
https://www.microfocus.com/support-and-services/documentation
Contents
Integration Guide for AbuseIPDB 22
Integration Overview 22
Integration Capabilities 22
Prerequisites 22
Configuration 22
Configuring AbuseIPDB 22
Configuring SOAR 22
Capabilities 23
Integration Guide for AlientVault OTX 25
Integration Overview 25
Integration Capabilities 25
Configuration 25
Integration Guide for Amazon EC2 29
Integration Overview 29
Integration Capabilities 29
Configuration 29
Integration Guide for Amazon IAM 36
Integration Overview 36
Integration Capabilities 36
Configuration 37
Configuring SOAR 37
Capabilities 38
Integration Guide for Amazon AWS Lambda 55
Integration Overview 55
Integration Capabilities 55
Prerequisites 55
Configuring Amazon AWS Lambda 56
Configuring SOAR 57
Capabilities 57
Integration Guide for Amazon S3 60
Integration Overview 60
Integration Capabilities 60
Prerequisites 60
Configuration 61
Configuring SOAR 61
Capabilities 62
Integration Guide for APIVoid 65
Integration Overview 65
Integration Capabilities 65
Prerequisites 65
Configuration 66
Configuring APIVoid 66
Configuring SOAR 66
Capabilities 66
Integration Guide for Anomali ThreatStream 78
Integration Overview 78
Integration Capabilities 78
Configuration 79
Additoinal Notes 81
Integration Guide for Arbor Networks APS 83
Integration Overview 83
Integration Capabilities 83
Configuration 83
Prerequisites 83
Configuring Arbor Networks APS 83
Configuring SOAR 84
Integration Guide for AWS Network Firewall 85
Integration Overview 85
Integration Capabilities 85
Prerequisites 85
Configuration 86
Configuring AWS Network Firewall 86
Configuring SOAR 87
Capabilities 88
Integration Guide for Azure Network Security Groups 95
Integration Overview 95
Integration Capabilities 95
Prerequisites 95
Configuration 96
Prerequisites 140
Configuring CyberArk Application Identity Manager 140
Configuring SOAR 141
Additional Notes 142
Integration Guide for CYMRU Malware Hash Registry Query 143
Integration Overview 143
Integration Capabilities 143
Configuration 143
Configuring CYMRU Malware Hash Registry Query 143
Configuring SOAR 143
CyberRes Galaxy Threat Acclerator 144
Integration Overview 144
Integration Capabilities 145
Prerequisites 145
Configuring CyberRes Galaxy Threat Accelerator 145
Configuring SOAR 145
Capabilities 146
Integration Guide for CyThreat Threat Intelligence 148
Integration Overview 148
Integration Capabilities 148
Alert Source Capability 148
Prerequisites 148
Configuration 149
Configuring SOAR 149
Configuring CyThreat as an Alert Source 150
Integration Capabilities 151
Integration Guide for EmailRep 153
Integration Overview 153
Integration Capabilities 153
Prerequisite 153
Capabilities 154
Integration Guide for DNS Service 156
Integration Overview 156
Integration Capabilities 156
Configuration 156
Prerequisites 156
Configuration 196
Prerequisites 196
Configuring FortiMail 196
Configuring SOAR 198
Additional Notes 200
Integration Guide for Fortinet FortiManager 201
Integration Overview 201
Integration Capabilities 201
Prerequisites 201
Configuring FortiManager 202
Configuring SOAR 203
Additional Notes 204
Integration Guide for Fortinet FortiSandbox 205
Integration Overview 205
Integration Capabilities 205
Configuration 205
Prerequisites 205
Configuring Fortinet Sandbox 205
Configuring SOAR 207
Integration Guide for FraudGuard 209
Integration Capabilities 209
Prerequisites 209
Configuring FraudGuard 209
Configuring SOAR 210
Capabilities 211
Integration Guide for FTP Server 215
Integration Overview 215
Integration Capabilities 215
Configuration 215
Prerequisites 215
Configuring SOAR 215
Integration Guide for Have I Been Pwned 218
Integration Overview 218
Integration Capabilities 218
Prerequisites 218
Configuration 218
Capabilities 219
Integration Guide for Generic HTTP SMS Gateway 222
Integration Overview 222
Integration Capabilities 222
Configuration 222
Configuring Generic HTTP SMS Gateway 222
Configuring SOAR 222
Integration Guide for HTTP Proxy 224
Integration Overview 224
Configuration 224
Prerequisites 224
Configuring HTTP Proxy 224
Configuring SOAR 224
Integration Guide for IBM Security X-Force 226
Integration Overview 226
Integration Capabilities 226
Configuration 226
Prerequisites 226
Configuring IBM X-Force Exchange 227
Configuring SOAR 227
Integration Guide for Infoblox DNS Firewall 230
Integration Overview 230
Integration Capabilities 230
Configuration 230
Prerequisites 230
Configuring Infoblox DNS Firewall 230
Configuring SOAR 231
Integration Guide for Intezer 233
Integration Overview 233
Integration Capabilities 234
Prerequisites 234
Configuration 234
Configuring Intezer 234
Configuring SOAR 234
Capabilities 235
Integration Guide for Invictus USTA ThreatIntelligence 239
Configuration 319
Configuring Micro Focus IT Service Manager 319
Configuring SOAR 320
Capabilities 321
Integration Guide for Micro Focus UCMDB 323
Integration Overview 323
Integration Capabilities 323
Prerequisites 323
Configuration 323
Configuring Micro Focus UCMDB 323
Configuring SOAR 324
Capabilities 325
Integration Guide for Microsoft Exchange 328
Prerequisites 328
Configuration on Microsoft Exchange 328
Configuration on SOAR 329
Additional Notes 330
Integration Guide for Microsoft Office365 Exchange EWS 331
Configuration on Microsoft Exchange 332
Using OAuth2 with Microsoft Exchange online Integrtations 332
Configuring SOAR 333
Additional Notes 334
Integration Guide for Microsoft Windows DNS Server 336
Configuration on Microsoft Windows DNS Server 336
Configuring ATAR 336
Integration Guide for Microsoft Windows Services (WinRM) 338
Configuring SOAR 338
Integration Guide for Microsoft Graph Security 340
Integration Overview 340
Integration Capabilities 340
Prerequisites 340
Configuration 341
Configuring Microsoft Azure 341
Configuring SOAR 341
Capabilities 342
Integration Guide for MISP 352
Prerequisites 383
Configuration on Recorded Future 384
Configuring SOAR 384
Integration Guide for Robtex Lookup 386
Configuration on Robtex Lookup 386
Configuring SOAR 386
Integration Guide for Roksit DNS Firewall 388
Prerequisites 388
Configuration on Roksit DNS Firewall 388
Configuring SOAR 388
Integration Guide for RSA Security Analytics 390
Prerequisites 390
Configuration on RSA Security Analytics Suite 391
Configuring SOAR 391
Integration Guide for ServiceNow 393
Integration Overview 393
Integration Capabilities 393
Prerequisites 393
Configuration 393
Configuring ServiceNow 393
Configuring SOAR 399
Capabilities 400
Integration Guide for SMTP Mail Server 402
Prerequisites 402
Configuring SOAR 402
Additional Notes 403
Integration Guide for Sophos XG Firewall 405
Prerequisites 405
Configuration on Sophos XG Firewall 405
Integration Guide for SORBS Query 408
Configuration on SORBS Query 408
Configuring SOAR 408
foIntegration Guide for Symantec Advanced Threat Protection 410
Configuring Symantec Advanced Threat Protection 410
410
Configuring SOAR 410
Integration Guide for Symantec Bluecoat Malware Analysis Appliance (MAA) 412
Prerequisites 412
Configuring SOAR 412
Integration Guide for Symantec BlueCoat Proxy SG 414
Prerequisites 414
Configuring Symantec BlueCoat Proxy SG 415
Configuring SOAR 415
Integration Guide for Symantec Bluecoat Site Review 419
Configuration on Bluecoat Site Review 419
Configuring SOAR 419
Integration Guide for Symantec Data Loss Prevention (DLP) 420
Integration Capabilities 420
Prerequisites 420
Configuring Symantec DLP 420
Configuring SOAR 421
Integration Guide for Symantec DeepSight Intelligence 423
Prerequisites 423
Configuring Symantec DeepSight Intelligence 424
Configuring SOAR 424
Configuring Symantec DeepSight Intelligence as Alert Source 425
Configuring Symentec DeepSight Intelligence as Integration 425
Integration Guide for Symantec Endpoint Protection Manager 427
Prerequisites 427
Configuring Symantec Endpoint Protection Manager 428
Configuring SOAR 428
Integration Guide for Symantec Managed Security Services (MSS) 431
Configuring Symantec MSS 432
Configuring SOAR 432
Configuring Credentials 432
Configuring Symantec MSS as Alert Source 433
Configuring Symantec MSS as an Integration 435
Additional Notes 435
Integration Guide for Symantec Messaging Gateway 437
Prerequisites 437
Configuring Symantec Messaging Gateway 437
Configuring SOAR 438
Integration Overview
Abuse Intelligence Production Data Base ( Abuse IPDB) is a project dedicated to help
combating the spread of hackers, spammers, and abusive activity on the internet.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with AbuseIPDB:
l Check IP
l Report IP
Prerequisites
You must have access to HTTPS as the ArcSight SOAR connects to AbuseIPDB API through this
service.
Configuration
Configuring AbuseIPDB
1. Navigate to AbuseIPDB create an account.
2. Click API tab and create an API key.
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor:
Type Name Username Password Private
Key
Type AbuseIPDB
Address https://api.abuseipdb.com
cache.reusing.duration configure how far (in minutes) into the past this
enrichment will look. For example,
cache.reusing.duration=20
Credential Credential that has been defined for this integration in the Credentials menu.
Trust Invalid SSL Select this option if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capabilities
1. Check IP
Enrichment capability for getting details about the IP.
The following table presents the Check IP capability details:
Output:
Case Scope:
Action Type Category/ Value
2. Report IP
Action capability for reporting an IP address:
Rollback : No
Duplicate Check: No
The following table provides the Report IP action capability details:
Input Description Type Scope Rescticted Required
Parameter (Yes/No) (Yes/No)
Output:
Case Scope:
Action Type Category/ Value
Integration Overview
AlienVault OTX is an open threat exchange platform supported by AlienVault and the
community.
Adding a new line to Test.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with AlienVault OTX:
l IP Indicator
l Hash Indicator
l URL Indicator
l Domain Indicator
l Hostname Indicator
Configuration
Prerequisites
l SOAR connects to AlienVault OTX API via HTTPS. Typically it runs on 443/tcp port. So access
to this service is required.
l A user account is required for SOAR to connect to AlienVault OTX. It can be created from
the following link:
https://otx.alienvault.com
Configuring SOAR
1. Click Configuration > Credentials > Create Credential
2. Fill in the Credential Editor form with the following information:
Type Name Username Password Private Key
Internal Display name of credential set (i.e., Empty Empty API Key
Credential AlienVault OTX Credentials) retrieved
from the
AlienVault
OTX
Parameter Value
Credential Name of the credential set you’ve just created on step 2. (i.e., AlienVault OTX Credentials).
Trust Invalid Select this if Engine’s certificate is self-signed or not recognized by browsers. Not selected.
SSL Certificates
Additional Notes
l AlienVault OTX integration on SOAR is an Advanced Action Script, and the content of the
default script is accessible under Configuration > Customization Library.
l While defining the integration for the first time, you will encounter the following warning
message, which is expected behavior for this type of integration.
Integration Overview
Amazon EC2 (Elastic Compute Cloud) forms a central part of Amazon.com’s cloud-computing
platform, Amazon Web Services, by allowing users to establish virtual networks and rent virtual
computers on which they can run their own applications. Amazon EC2 REST-API supports the
following Amazon Web Services:
l Amazon EC2
l Amazon EBS
l Amazon VPC
l AWS VPN
Please note that this integration is in Beta.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Amazon EC2:
l Add Network ACL Entry (VPC)
l Delete Network ACL Entry (VPC)
Use Case: Blocking Attackers
SOAR when integrated with Amazon EC2, blocks the attacker's IP addresses while responding
to a cyber-attack. The blocking can be performed automatically within a playbook or manually
by an analyst.
Configuration
Prerequisites
l SOAR connects to Amazon EC2 API via HTTPS. Access to https://ec2.amazonaws.com
(443/tcp port) is required.
l AWS Access Key and AWS Access Key Secret are required for SOAR to connect
Amazon Web Services.
2. To add an IAM(identity and access management) user, click Access Management > Users >
Add User. While adding new user account, it is important to select Access Type as
Programmatic Access.
3. You can skip the next steps in the Add User process until Access Key and Access Key Secret
are displayed.
Note: Download the credentials as the Access Key Secret is never displayed post this step.
4. To arrange access policy, click > Access Management > Policies, and search for the required
policy in previously defined policies list.
For example, the following image shows the policy AmazonVPCFullAccess.
6. You can verify if the permission is successful for the user account that you’ve created on
the Policy Usage page.
Configuring on SOAR
1. Click Configuration > Credentials > Create Credential.
2. Fill the Credential Editor form with the following information:
a. Internal Credential:
Type Name Username: Password Private
Key
Internal Display name of credential set Access Key of IAM user you have Secret of Empty
credential (i.e., Amazon AWS Credentials) created Access Key
of IAM user
you have
created
b. Credential Store:
Type Name
External credential Name of the credential with full path of the safe on store
3. Click Configuration > Integrations > Create Integration. Fill the Configuration form with
the following information:
Parameter Value
Parameter Value
Require Approval From Select user(s) from list to ask her/his approval before
executing actions on this integration
Additional Notes
l Amazon EC2 integration on SOAR is an Advanced Script, and the content of the default
script is accessible under Configuration > Customization Library.
l While defining the integration for the first time, you might encounter the following
warning message, which is the expected behavior for this type of integration.
Integration Overview
Amazon AWS Identity and Access Management (IAM) enables you to manage access to AWS
services and resources securely. Using IAM, you can create and manage AWS users and groups,
and use permissions to allow and deny their access to AWS resources.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with amazon IAM:
l Add User to Group
l Create Group
l Deactivate MFA Device
l Delete Access Key
l Delete All Access Keys
l Delete All SSH Public Keys
l Delete All Service Specific Credentials
l Delete Group
l Delete Login Profile
l Delete SSH Public Key
l Delete Service Specific Credential
l Delete User Policy
l Delete Virtual MFA Device
l Detach User Policy
l Get Access Key Last Used
l Get Group (List Group Members)
l Get Policy
l Get User Policy
l Get User
l List Access Keys
l List Attached User Policies
Configuration
Prerequisites
l You must have access to HTTPS as the ArcSight SOAR connects to amazon iam API through
this service.
l Access key is required to access this service.
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor form:
Type Name Username Password Private
Key
Internal Display name of credential set (for example,Amazon Empty Access Key Secret
credential IAM Credential). Key
Parameter Value
proxy.id ID of the proxy integration if you access amazon web services through
a web proxy device. For example: proxy.id = 12345 .
Credential Credential that has been defined for this integration in the Credentials menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capabilities
1. Add User to Group
Action capability for adding a user to given group.
l Rollback: Yes
l Duplicate Control: No
The following table presents the Add User to Group action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
2. Create Group
Action capability for creating a user group.
l Rollback: No
l Duplicate Control: False
The following table presents theCreate Group action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
3. Deactivate MFA
Action capability for deactivating user’s multi factor authentication device.
l Rollback: No
l Duplicate Control: Yes
The following table presents the Deactivate MFA action capability details:
Output:
Case Scope: N/A
Human Readable Output: N/A
4. Delete Access Key
Action capability for deleting user’s access key.
l Rollback: No
l Duplicate Control: Yes
The following table presents the Delete Access Key action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
Output:
Case Scope: No
Human Readable Output: No
Output:
Case Scope: N/A
Human Readable Output: N/A
Output:
Case Scope: N/A
Human Readable Output: N/A
8. Delete Group
Action capability for deleting group.
l Rollback: No
l Duplicate Control: No
The following table presents the Delete Group action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
Output:
Case Scope: N/A
Human Readable Output: N/A
Output:
Case Scope: N/A
Human Readable Output: N/A
Output:
Case Scope: N/A
Human Readable Output: N/A
Output:
Case Scope: N/A
Human Readable Output: No/A
Output:
Case Scope: N/A
Human Readable Output: N/A
Output:
Case Scope: N/A
Human Readable Output: N/A
Output:
Case Scope:
Enrichment Type Category Value
Output:
Case Scope:
Enrichment Type Category Value
Output:
Case Scope:
Enrichment Type Category Value
Output:
Case Scope:
Enrichment Type Category Value
Output:
Case Scope:
Enrichment Type Category Value
Output:
Case Scope:
Output:
Case Scope:
Enrichment Type Category Value
Output:
Case Scope:
Output:
Case Scope:
Enrichment Type Category Value
Output:
Case Scope:
Enrichment Type Category Value
Output:
Case Scope:
Enrichment Type Category Value
The following table presents the List Service Specific Credentials action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Output:
Case Scope:
Enrichment Type Category Value
Output:
Case Scope:
Enrichment Type Category Value
Output:
Case Scope:
Enrichment Type Category Value
Output:
Case Scope:
Output:
Case Scope:
Enrichment Type Category Value
Output:
Case Scope: N/A
Human Readable Output: N/A
Integration Overview
AWS Lambda is an event-driven, server-less computing platform provided by Amazon as a part
of Amazon Web Services. It is a computing service that runs code in response to events and
automatically manages the computing resources required by that code.
Integration Capabilities
l Get Function
l List Function
l Invoke Function
Prerequisites
l ArcSight SOAR connects to lambda.region.api.aws APIs through HTTPS. Access to this
service is required.
l Access key ID and Secret Access key are required for ArcSight SOAR to connect to Amazon
AWS Lambda.
6. Add the following action permissions if you require admin permissions for this service or
contact your AWS cloud support:
{
"Version": “2012-18-17",
"Statement": [
{
"Sid”: "VisualEditore0”,
"Effect": “Allow”,
"Action": [
"lambda:ListFunctions”,
"lambda: InvokeFunction”,
"lambda:GetFunction"
],
"Resource": "*"
}
]
}
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor:
Type Name Username Password Private
Key
Internal Display name of credential set ( for Empty Access Key Secret
Credential example, Amazon AWS Lambda Key
Credentials).
Credential Credential that has been defined for this integration under the Credentials
menu
Trust Invalid SSL Certificates Select this option if the firewall’s web certificate is self-signed or if it is not
recognized by browsers
Require Approval From Select user(s) from list who can provide approval before executing actions
on this integration
Notify Select user(s) from the list who can provide approval when SOAR performs
an action on this integration
Capabilities
1. Get Function
Enrichment capability for creating Lambda function.
Output:
Case Scope
N/A
Human Readable Output
2. List Functions
Enrichment capability for retrieving list of Lambda Functions
Input Description Type Scope Restricted Required
Parameter (Yes/No) (Yes/No)
Case Scope
N/A
Human Readable Output
3. Invoke Action
Action capability for invoking Lambda function.
Input Description Type Scope Restricted Required
Parameter (Yes/No) (Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
Integration Overview
Amazon S3 service is offered by Amazon Web Services which provides object storage through a
web service framework.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Amazon S3:
l Create Bucket
l Delete Bucket
l Download File From Bucket
l List Bucket Objects
l List Buckets
l Get Bucket Location
These capabilities can be performed automatically within a playbook or manually by an analyst.
Prerequisites
l You must have access to HTTPS as the ArcSight SOAR connects to Amazon S3 API through
this service.
l Access Key ID and Secret Access Key is also required for integration.
Configuration
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor form.
Type Name Username Password Private Key
Internal Display name of credential set (for Access Key ID should Secret key should
credential example, Amazon S3 Credential). be filled in this field. be filled in this
field.
Type Amazon S3
region Default region name that has to be used while working on buckets. For
example, proxy.id = 12345.
Credential Credential that has been defined for this integration in the Credentials menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capabilities
1. Create Bucket
Action capability for creating a bucket in Amazon S3.
The following table presents the Create Bucket action capability details:
Input Description Type Scope Restricted Required (Yes/
Parameter (Yes/ No) No)
Bucket Name of the Amazon S3 Bucket that would String N/A Yes
Name be created.
Output:
Case Scope: N/A
Human Readable Output: N/A
2. Delete Bucket
Action capability for deleting a bucket in Amazon S3.
The following table presents the Delete Bucket action capability details:
Input Description Type Scope Restricted Required (Yes/
Parameter (Yes/ No) No)
Bucket Name of the Amazon S3 Bucket that would String N/A Yes
Name be deleted.
Output:
Case Scope: N/A
Human Readable Output: N/A
3. Download File From Bucket
Enrichment capability for downloading a file from bucket.
The following table presents the Download File From Bucket enrichment capability details:
Input Description Type Scope Restricted Required
Parameter (Yes/ No) (Yes/ No)
Bucket Name of the bucket that contains the file. String N/A Yes
Name
Do not Use SOAR does not use cached results if this Boolean N/A No
Cache box is checked.
Output:
Case Scope:
Enrichment Type Category/ Value
Bucket Name of the bucket that contains the file. String N/A Yes
Name
Do not Use SOAR does not use cached results if this Boolean N/A No
Cache box is checked.
Output:
Case Scope: N/A
Human Readable Output:
5. List Buckets
Enrichment capability for listing a buckets in Amazon S3.
The following table presents the List Bucketsenrichment capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Human Readable Output:
Output:
Case Scope: N/A
Human Readable Output:
Integration Overview
APIVoid is an API service for threat analysis and threat detection and prevention.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with APIVoid:
l IP Reputation
l ThreatLog Domain Query
l Domain Reputation
l URL Screenshot
l URL Reputation
l Domain Age
l Site Trustworthiness
l Parked Domain
l URL Status
l HTTP Tracker
l Email Verify
l DNS Lookup
l DNS Propagation
l SSL Info
l URL to HTML
l URL to PDF
Prerequisites
l You must have the network access through APIVoid
l You must have the APIVoid API key.
Configuration
Configuring APIVoid
1. Register to APIVoid. After logging, the API key is available.
2. Click My API Keys and copy the API key.
Configuring SOAR
1. Click Configuration > Integration > Create Integration.
2. Click Create. In Configuration Editor specify following values to create a credential:
Type Name Username Password Private Key
Internal Display name of credential set (for API Key that you copied
credential example, APIVoid Credential). from APIVoid portal.
Capabilities
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Output:
Case Scope: N/A
Human Readable Output
3. Domain Reputation
Enrichment capability to retrieve Domain Reputation.
Following table presents the Domain Reputation enrichment capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Human Readable Output:
4. URL Screenshot
Enrichment capability to take a screenshot for given URL by APIVoid.
Following table presents the URL Screenshot enrichment capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Human Readable Output:
5. URL Reputation
Enrichment capability to retrieve URL reputation.
Following table presents the URL Reputation enrichment capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Human Readable Output:
6. Domain Age
Enrichment capability to retrieve domain age information.
Following table presents the Domain Age enrichment details:
Output:
Case Scope: N/A
Human Readable Output:
7. Site Trustworthiness
Enrichment capability to retrieve site trustworthiness score / information
Following table presents the Site Trustworthiness enrichment capability details:
Input Description Type Scope Restricted Required (Yes/
Parameter (Yes/ No) No)
Output:
Case Scope: N/A
Human Readable Output:
8. Parked Domain
Enrichment capability to retrieve information for parked domain.
Following table presents the Parked Domain enrichment capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Human Readable Output:
9. URL Status
Enrichment capability to retrieve URL Status information.
Following table presents the URL Status enrichment capability details:
Output:
Case Scope: N/A
Human Readable Output:
Output:
Case Scope: N/A
Human Readable Output:
Output:
Case Scope: N/A
Human Readable Output:
Lookup Type DNS Lookup type. Can be one of the following: ENUM No Yes
"dns-a", "dns-aaaa", "dns-mx", "dns-ns", "dns-
dmark", "dns-ptr", "dns-txt", "dns-any","dns-
cname", "dns-soa", "dns-srv", "dns-caa" .
Output:
Case Scope: N/A
Human Readable Output:
Lookup Type DNS Lookup type. Can be one of the following: ENUM No Yes
"A", "AAAA", "NS", "MX", "TXT", "SRV", "PTR",
"SOA", "CNAME", "SPF", "CAA" .
Output:
Case Scope: N/A
Human Readable Output:
Output:
Case Scope: N/A
Human Readable Output:
Output:
Case Scope: N/A
Output:
Case Scope: N/A
Human Readable Output:
Integration Overview
Anomali ThreatStream is a Threat Intelligence Platform that enables businesses to integrate
security products and leverage threat data to defend against cyber threats.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Anomali ThreatStream:
l Domain Reputation
l Email Reputation
l File Reputation
l Get Incident Details
l Get Intelligence
l Get Investigation Details
l IP Reputation
l List Incidents
l List Investigations
l Report Indicator
l Create Investigation
l Close Investigation
l Update Investigation
Configuration
Prerequisites
l SOAR connects to Anomali ThreatStream API via HTTPS. Access
tohttps://api.threatstream.com/(443/tcp port) is required.
l An API key is required for SOAR to connect to Anomali ThreatStream Service.
Note: This key is required by SOAR to access the platform for queries.
Configuring SOAR
Name Display name of credential set (For example, Anomali ThreatStream Credentials)
b. Credential Store:
Parameter Value
Name Name of the credential with full path of the safe on store
Credential Name of the credential set you have just created on step 2. (For
example, Anomali ThreatStream Credentials)
Trust Invalid SSL No selection required
Certificates
Require Approval Select user(s) from list to ask her/his approval before executing actions on this
integration.
From
Notify Select user(s) from the list to notify when SOAR performs an action on
this integration.
Additoinal Notes
l Anomali ThreatStream integration on SOAR is an Advanced Script and content of the
default script is accessible under Configuration > Customization Library.
l While defining the integration for the first time, you might encounter the following
warning message, which is the expected behavior for this type of integration.
Integration Overview
Arbor Networks APS is an in-line Distributed Denial of Service(DDoS) protection solution.
Integration Capabilities
ArcSight has the following integration capabilities with Arbor Networks APS:
l Block IP
l Block access to IP
Use Case: Blocking malicious IP on peripheral
ArcSight SOAR integrates with Arbor Networks APS to block malicious IP addresses detected
while responding to an incident. SOAR can block both the incoming and outgoing traffic either
automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l SOAR connects to Arbor Networks APS’ API via HTTPS. By default, the API interface works
on 443/tcp port. So access permission to this port is required.
l An API access token needs to be created for SOAR to connect to Arbor Networks APS.
Note: SOAR uses the generated token as the credential password and user name as admin.
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Fill the Credential Editor form with the following parameter values:
a. Internal Credential:
Parameter Value
Name Display name of the credential set (For example, Arbor APS Credential)
Username admin
Password API Token you have created for SOAR on Arbor Networks APS device
Private Key Empty
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
5. Click Test.The following pop up will be displayed if your credential and address are valid.
6. Click Save to complete integration.
Integration Overview
AWS Network Firewall is a managed service that makes it easy to deploy essential network
protections for all of your Amazon Virtual Private Clouds (VPCs). AWS Network Firewall’s
flexible rules engine allows you to define firewall rules that provide fine-grained control over
network traffic, such as blocking outbound Server Message Block (SMB) requests to prevent
the spread of malicious activity. AWS Network Firewall’s stateful firewall can incorporate
context from traffic flows, like tracking connections and protocol identification, to enforce
policies such as preventing your VPCs from accessing domains using an unauthorized protocol.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with AWS Network Firewall:
l Create Stateful Rule Group
l Create Stateless Rule Group
l Add Stateful Rule
l Add Stateless Rule
l Delete Rule Group
l Delete Stateful Rule
l Delete Stateless Rule
l List Firewalls
l List Rule Groups
l List Firewall Policies
l Get Firewall Policies
l Get Firewall Rule Group
Prerequisites
l ArcSight SOAR connects to AWS Network Firewall API using HTTPS. Access to
https://aws.amazon.com/network-firewall is required.
l Access key ID and Secret Access key are required for ArcSight SOAR to connect to AWS
Network Firewall.
Configuration
Download the credentials as the Secret Access Key is not displayed post this step.
6. Add the following action permissions if you require admin permissions for this service or
contact your AWS cloud support:
[
"network-firewall:ListTagsForResource",
"network-firewall:DeleteRuleGroup",
"network-firewall:DescribeLoggingConfiguration",
"network-firewall:CreateRuleGroup",
"network-firewall:DescribeRuleGroupMetadata",
"network-firewall:DescribeFirewall",
"network-firewall:UpdateRuleGroup",
"network-firewall:ListRuleGroups",
"network-firewall:DescribeRuleGroup",
"network-firewall:DescribeFirewallPolicy",
"network-firewall:ListFirewalls",
"network-firewall:TagResource",
"network-firewall:DescribeResourcePolicy",
"network-firewall:DeleteFirewall",
"network-firewall:ListFirewallPolicies"
]
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor:
Type Name Username Password Private
Key
Internal Display name of credential set ( for Empty Access Key Secret
Credential example, Amazon Network Firewall Key
Credentials).
Credential Credential that has been defined for this integration under the Credentials
menu
Trust Invalid SSL Certificates Select this option if the firewall’s web certificate is self-signed or if it is not
recognized by browsers
Require Approval From Select user(s) from list who can provide approval before executing actions on
this integration
Notify Select user(s) from the list who can provide approval when SOAR performs
an action on this integration
5. Click Save.
6. Navigate to Configuration > Customization Library and edit Amazon Network Firewall
Advanced Action Script Default Script Template.
7. Select the integration that you have created in step 4 from the Integrations drop-down
menu and click Save.
8. Click Test, an Integration Successful message is displayed if the credential and address are
valid.
Capabilities
1. Create Stateful Rule Group
Action capability for creating a Stateful Rule Group for blocking IP address.
• Rollback: No
• Duplicate Control: No
The following table presents the Create Stateful Rule Group action capabilities details:
Input Parameter Description Type Scope Restricted Required
(Yes/No) (Yes/No)
Output:
N/A
Human Readable Output
N/A
2. Create Stateless Rule Group
Action capability for creating a Stateless Rule Group for blocking IP address.
• Rollback: No
• Duplicate Control: No
The following table presents the Create Stateless Rule Group action capabilities details:
Input Parameter Description Type Scope Required
Rescticted (Yes/No)
(Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
3. Add Stateful Rule
Action capability for adding a Stateful rule to an existing Rule Group for blocking IP
address.
• Rollback: Yes
• Duplicate Control: Yes
The following table presents the Add Stateful Rule action capabilities details:
Output:
Case Scope
N/A
Human Readable Output
N/A
4. Add Stateless Rule
Action capability for adding a Stateless Rule to an existing Rule Group for blocking IP
address.
• Rollback: Yes
• Duplicate Control: Yes
The following table presents the Add Stateless Rule action capabilities details:
Output:
Case Scope
N/A
Human Readable Output
N/A
5. Delete Rule Group
Action capability for deleting Rule Group from existing Rule Group.
• Rollback: No
• Duplicate Control: Yes
The following table presents the Delete Rule Group action capabilities details:
Input Parameter Description Type Scope Restricted Required
(Yes/No) (Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
6. Delete Stateful Rule
Action capability for deleting a Stateful Rule from an existing Rule Group .
• Rollback: No
• Duplicate Control: No
The following table presents the Delete Stateful Group action capabilities details:
Input Description Type Scope Restricted Required
Parameter (Yes/No) (Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
7. Delete Stateless Rule
Action capability for deleting a Stateless Rule from an existing Rule Group.
• Rollback: No
• Duplicate Control: No
The following table presents the Delete Stateless Group action capabilities details:
Input Description Type Scope Restricted Required
Parameter (Yes/No) (Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
8. List Firewalls
Enrichment capability for retrieving a list of firewall for the specified VPC identifiers.
Input Parameter Description Type Scope Restricted Required
(Yes/No) (Yes/No)
Output:
Case Scope
N/A
Human Readable Output
9. List Rule Groups
Enrichment capability for retrieving a list of rule groups.
Input Description Type Scope Restricted Required
Parameter (Yes/No) (Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
10. List Firewall Policies
Enrichment capability for retrieving a list of firewall policies.
Output:
Case Scope
N/A
Human Readable Output
N/A
11. Get Firewall Policy
Enrichment capability for retrieving the details of a firewall policy.
Input Parameter Description Type Scope Restricted Required
(Yes/No) (Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
12. Get Firewall Rule Group
Enrichment capability for retrieving the details of a firewall rule group.
Input Description Type Scope Restricted Required
Parameter (Yes/No) (Yes/No)
Output:
Case Scope
N/A
Integration Overview
Azure Network Security Groups is a service that is used to filter network traffic to and from
Azure resources in an Azure virtual networks. A network security group contains security rules
that allow or deny inbound network traffic to, or outbound network traffic from, several types
of Azure resources. For each rule, you can specify source and destination, port, and protocol.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Azure Network Security Groups:
l Get Network Security Group
l List All Network Security Group
l List Network Security Group in Resource Group
l Create Network Security Group
l Create Network Security Group Rule
l Add Network Security Group Tag
l Remove Network Security Group Tag
Prerequisites
ArcSight SOAR connects to Microsoft Azure Network Security API using HTTPS. Access to Azure
Portal (https://login.live.com) is required.
Configuration
3. Select your application and Click Add a certificate or secret > New Client Secret. Add a
description and specify the expiry period as 24 months.
Note down the Secret Key along with Client ID as you may need it later.
a. Click API Permissions > Add a Permission and select Azure Service Management API.
b. Add the user_impersonation as a permission.
4. Navigate to Home > Subscriptions and note down the subscription ID.
5. Navigate to Home > Resource groups > IAM > Add Role to add role level permissions.
6. Grant following permissions to the users:
Permissions Description
Microsoft.Network/networkSecurityGroups/write Creates a
network security
group or updates
an existing
network security
groupAction
Permissions Description
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor:
Type Name Password Private Key
Internal Display name of credential set Client ID of the user that Client secret key of the users
Credential ( for example, Microsoft you have created for that you have created for
Azure Network Security). SOAR on Microsoft Azure SOAR on Microsoft Azure
Network Security. Network Security.
Parameter Value
Credential Credential that has been defined for this integration under Credential
menu.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
5. Click Save.
6. Navigate to Configuration > Customization Library and edit Amazon Network Firewall
Advanced Action Script Default Script Template.
7. Select the integration that you have created in step 4 from the Integrations drop-down
menu and click Save.
8. Click Test, and Integration Successful message is displayed if the credential and address
are valid.
Capabilities
1. Get Network Security Group
Enrichment capability for retrieving a network security group in a resource group.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Resource Group Name Resource group of the user that String N/A Yes
you have created in Microsoft
Azure Network Security Group
Output:
Case Scope
N/A
Human Readable Output
N/A
2. List All Network Security Group
Enrichment capability for retrieving all network security groups from a resource group.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Network Security Group Name Name of the network security String N/A Yes
group
Resource Group Name Resource group of the user in String N/A Yes
Microsoft Azure Network
Security Group
Output:
Case Scope
N/A
Human Readable Output
N/A
3. List Network Security Group in Resource Group
Enrichment capability for listing all network security group in a particular resource group.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Network Security Name of the network security group String N/A Yes
Group Name
Resource Group Resource group of the user in Microsoft String N/A Yes
Name Azure Network Security Group
Output:
Case Scope
N/A
Human Readable Output
Resource groups Resource group of the users in Microsoft String N/A Yes
Name Azure Network Security Group.
Output:
Case Scope
N/A
Human Readable Output
N/A
5. Create Network Security Group Rule
Action capability for creating a network security group rule in resource group.
Input Description Type Scope Required
Parameter Restricted (Yes/No)
(Yes/No)
Network Name of the network security group name String N/A Yes
Security
Group Name
Resource Resource group of the users in Microsoft Azure Network String N/A Yes
Group Name Security Group.
Protocol TCP, UDP, ICMP, ESP, AH, or Any String N/A Yes
Source “*” for all default or 0.0.0.0/0 or AzureLoadBalancer String N/A Yes
Address
Prefix
Destination “*” for all default or 0.0.0.0/0 or AzureLoadBalancer String N/A Yes
Address
Prefix
Priority A number in the range 100-4096 to assign a priority. String N/A Yes
Rules are processed in priority order, with lower
numbers processed before higher numbers
Direction Whether the rule applies to inbound, or outbound traffic String N/A Yes
Output:
Case Scope
N/A
Human Readable Output
N/A
6. Add Network Security Group Tags
Action capability for updating a network security group tag in the specified resource group.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Resource group Resource group of the user in Microsoft Azure String N/A Yes
Name Network Security Group.
Output:
Case Scope
N/A
Human Readable Output
N/A
7. Remove Network Security Group Tags
Action capability for Updating network security group tag in the specified resource group.
Resource group Resource group of the user in Microsoft Azure String N/A Yes
Name Network Security Group.
Output:
Case Scope
N/A
Human Readable Output
N/A
Integration Overview
ArcSight SOAR uses BIND DNS servers to block malicious domains using incident scope.
Integration Capabilities
Action
l Block
Configuration
Prerequisites
l You must enable the DNS Zone Transfer on the server as SOAR uses DNS Zone Transfer
Protocol to connect to the BIND DNS server.
l Remote Name Daemon Control (RNDC)
Configuring SOAR
1. To create the integration, navigate to Configuration > Integrations.
2. Specify the following parameter values in the Integration Editor window:
Parameter Value
Parameter Value
Credential Specify the Credential that was defined for this integration under the Credentials
menu
Trust Invalid SSL Select this if Engine’s certificate is self-signed or is not recognized by browsers.
Certificates
Require Approval Select users from list who can provide approval before executing
From action on this integration
Notify Select user(s) from the list to notify when SOAR performs an action on this integration
3. Click Test. The following pop up will be displayed if your credential and address are valid.
4. Click Save to complete integration.
Integration Overview
Carbon Black Response (EDR)is a next-generation antivirus and end point detection response
application. It's sophisticated detection combines custom and cloud-delivered threat intel,
automated watchlists, and integrations with other platforms to efficiently scale hunt across the
enterprise. It consolidates threat intelligence for your environment to automatically detect
suspicious behavior.
Integration Capabilities
l Block Hash
l Unblock Hash
l Quarantine
l Unquarantine
l Computer Info
l Download Binary
l Get Binary Metadata
l List Process Connections
l Process Event Details
l Search Binaries
l Search Processes
Use Case: Investigating and Blocking Malware Spread
ArcSight SOAR integrates with Carbon Black Response (EDR), to help investigation and
mitigation of malware attacks. When a suspicious file or malware is detected, SOAR lets you to
search malware across endpoints, isolates PCs from network, and blocks relevant hashes. This
investigation can either be performed automatically within a playbook or manually by an
analyst.
Integration Guide for Carbon Black Response (EDR) Page 106 of 482
Integration Guides
Configuration
Prerequisites
l Access to port 443/tcp as SOAR connects to Carbon Black Response(EDR) API through
HTTPS.
l An API key is required for SOAR to connect to Carbon Black Response(EDR).
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the Crenetial Editor form with the following parameter values:
a. Internal credential:
Parameter Value
Name Display name of the credential set (For example, Carbon Black Credential)
Username Empty
Password Empty
Private Key API Key obtained from Carbon Black Response (EDR).
b. Credential Store:
Parameter Value
Name Name of the credential with full path of the safe on store.
Credential Name of the credential set created on step 2. (For example, Carbon Black Credentials)
Require Approval Select users from list who can provide approval before executing actions on this
From integration.
Notify Select users from the list to notify when SOAR performs an action on this integration
5. Navigate to Configuration > Customization Library and edit Carbon Black Response
Advanced Action Script Default Template.
6. Select the integration that you have added to Integrations menu.
7. Click Save to complete the integration.
8. Click Test, an Integration Successful message is displayed if the credential and address are
valid.
Additional Notes
l Carbon Black Response integration on SOAR is an Advanced Script, and the content of
default script is accessible under Configuration > Customization Library.
l While defining the integration for the first time, you will encounter the following warning
message, which is expected behavior for this type of integration.
Integration Overview
Check Point R80 is an integrated solution for advanced threat prevention and security
management.
This integration was tested with Check Point R80.20.
Integration Capabilities
l Block Email Sender
l Block Hash
l Block Host
l Block IP
l Block URL
Prerequisites
You must have access to HTTPS as the ArcSight SOAR connects to Check Point Smart Console
API through this service.
Configuration
Configuring Check Point R80
1. Login to Management Console and navigate to Manage & Settings > Blades >
Management API Advanced Settings and select All IP addresses that can be used for GUI
clients in the Access Settings section.
2. Restart the API service by executing the following command in the command prompt:
api restart
3. SOAR requires standard read/write access for the necessary policy and objects. To install
policy automatically, the user must have the rights in its permission profile. You must
4. Create an Object Group to be used by SOAR. The ArcSight SOAR adds the objects that you
want to block in the Object Group.
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following values in the Credential Editor:
Parameter Value
Name Display name of credential set, for example, Check Point R80 Credentials.
Username User that you have created for SOAR on Check Point R80
Password Password of the user you have created for SOAR on Check Point R80
Parameter Value
group.name = SOAR
products Possible values are AV (Anti Virus) for external threats and AB (Anti Bot) for
internal threats. Please put “|” separator for more than one product. For
example:
Product = AV|AB
install.policy If you would like to install policy automatically, set this variable true:
install.policy = true
policy.package = standard
targets Name of the target gateways. Required if install.policy is true. Please use “|”
as separator if you have more than one target. For example:
targets = CP_Cluster
access = true
threat.prevention Required for blocking indicators on Threat Prevention policy (Domain, Email,
Hash, URL). Required if install.policy is true.
threat.prevention = true
proxy.id ID of the Proxy integration if you access Check Point R80 through a web
proxy device. For example:
proxy.id = 12345
Credentials Credential that has been defined for this integration under the Credentials menu.
Trust Invalid SSL Select this if Engine’s certificate is self-signed or is not recognized by browsers.
Certificates
Require Approval From Select user(s) from list to ask her/his approval before executing actions on this
integration
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration
5. Click Show Additional Parameters checkbox and select the frequency of policy install in
Maintenance dropdown.
As the firewall might get overloaded, in case of frequent attacks or misconfiguration, thus,
SOAR does not install the policy after every action. Instead, you can define the frequency of
the policy install in Maintenance menu by either selecting pre-defined values or by defining
a custom Cron expression for scheduling.
The ArcSight SOAR uses spring-framework’s Cron expression format. For the format and
similar example, refer to the Spring Framework-Cron Expression
6. Click Test. An Integration Successful message is displayed if your credential and address
are valid.
7. Click Save to complete the integration.
Capabilities
1. Block Email Sender
Action capability for blocking malicious email addresses.
l Rollback: Yes
l Duplicate Control: Yes
Output:
Case Scope: N/A
Human Readable Output: N/A
2. Block Hash
Action capability for blocking hash values of malicious files.
l Rollback: Yes
l Duplicate Control: Yes
Output:
Case Scope: N/A
Human Readable Output: N/A
3. Block Host
Action capability for blocking malicious hosts.
l Rollback: Yes
l Duplicate Control: Yes
Output:
Case Scope: N/A
Human Readable Output: N/A
4. Block IP
Action capability for blocking malicious IP addresses.
l Rollback: Yes
l Duplicate Control: Yes
Output:
Case Scope: N/A
Human Readable Output: N/A
5. Block URL
Action capability for blocking URLs.
l Rollback: Yes
l Duplicate Control: Yes
Output:
Case Scope: N/A
Human Readable Output: N/A
Integration Overview
Check Point SandBlast provides advanced threat protection against known threats, zero-day
malware, and sophisticated attacks.
Integration Capabilities
Threat Emulation capability prevents infections from undiscovered exploits, zero-day and
targeted attacks by inspecting files, and running them in a virtual sandbox to discover malicious
behavior.
ArcSight SOAR has the following integration capabilities with Check Point SandBlast:
l Threat Emulation & AV Scan
Use Case: Investigating suspicious file
With Check Point SandBlast integration, during the investigation of an incident, SOAR can send
a suspicious file to Check Point SandBlast to emulate threats and run an anti virus scan for the
file. This investigation can either be performed automatically within a playbook or manually by
an analyst.
Configuration
Prerequisites
l Make sure you have access to 443/tcp port as SOAR connects to Check Point SandBlast’s
API through HTTPS. If cloud-based threat emulation service is used, the API interface works
on https://te.checkpoint.com/api/bla/bla
l If a local gateway is used, typically access permission to 18194/tcp port is required.
l An API key is required for SOAR to connect to Check Point SandBlast.
2. If you are using local gateway, the following link provides you with the document for
creating API key:
http://supportcontent.checkpoint.com/solutions?id=sk113599
Configuring SOAR
1. Configuration > Integrations > Create Integration.
2. Fill the Credential Editor form with the following parameter values:
a. Internal Credential:
Parameter Value
Name Display name of credential set (For example, Check Point SandBlast Credential)
Username Empty
Password Empty
Private Key API key you have created for SOAR on local gateway or you have obtained from
Check Point.
b. Credential Store:
Parameter Value
Name Name of the credential with full path of the safe on store
Credential Name of the credential set you have just created on step 2. (For example, Check Point
SandBlast Credential).
Trust Invalid Select this if Engine’s certificate is self-signed or is not recognized by browsers.
SSL Certificates
Parameter Value
Require Select user(s) from list to ask her/his approval before executing actions on this s.
Approval Form
Notify Select user(s) from the list to notify when SOAR performs an action on this integration.
5. Click Test. The following pop up will be displayed if your credential and address are valid.
6. Click Save to complete integration.
Integration Capabilities
l Block Host
l Block IP
Prerequisites
l You must have access to 443/tcp port for HTTPS as the ArcSight SOAR connects to Cisco
ASA Firewall REST-API interface through this service.
l SOAR must have a user account to connect to Cisco ASA Firewall.
Configuration
# configure terminal
# rest-api image
# rest-api agent
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor form.
Type Name Username Password Private
Key
Internal Display name of credential set User you have Password of the user you Empty.
credential (for example, Cisco ASA created for SOAR on have created for SOAR on
Firewall Credential). Cisco ASA Firewall. Cisco ASA Firewal.
Credential Credential that has been defined for this integration in the Credentials menu.
Trust Invalid SSL Select this if firewall's web certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
7. Select the integration that you have added in the Integrations menu.
8. Click Save to complete the integration.
Capabilities
1. Block Host
Action capability for blocking malicious host.
l Rollback: Yes
l Duplicate Control: Yes
Output:
Case Scope: N/A
Human Readable Output: N/A
2. Block IP
Action capability for blocking malicious IP addresses.
l Rollback: Yes
l Duplicate Control: Yes
Output:
Case Scope: N/A
Human Readable Output: N/A
Integration Overview
Cisco Firepower Management Center (formerly Sourcefire Firepower Management Center) is
an administrative center node of the Firepower Threat Defense systems and manages critical
Cisco network security solutions. It provides complete and unified management over firewalls,
application control, intrusion prevention, URL filtering, and advanced malware protection.
This integration is tested with Cisco Firepower Management Center version 6.3.0 (build83).
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Cisco Firepower Management
Center:
l Block IP
l Block URL
Prerequisites
You must have access to HTTPS as the ArcSight SOAR connects to Cisco Firepower
Management Center REST API through this service.
Configuration
Integration Guide for Cisco Firepower Management Center Page 123 of 482
Integration Guides
3. Navigate to System > Users > Users and create a new user account with user role that you
have created in the previous step.
4. Navigate to Objects > Object Management and create two object groups with the
following configurations.
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor form.
Type Name Username Password Private
Key
Internal Display name of User you have created Password of the user that you
credential credential set (for for SOAR on Cisco have created for SOAR on Cisco
example, Cisco FMC Firepower Management Firepower Management Center.
Credential). Center.
Credential Credential that has been defined for this integration under the Credentials
menu.
Parameter Value
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
5. Click Show Additional Parameters checkbox and select the frequency of policy install in
Maintenance dropdown.
As the devices managed by Cisco Firepower Management Center might get overloaded, in
case of frequent attacks or misconfiguration, thus, SOAR does not deploy the changes after
every action. Instead, you can define the frequency of the deployments in Maintenance
menu by either selecting pre-defined values or by defining a custom Cron expression for
scheduling.
The ArcSight SOAR uses spring-framework’s Cron expression format. For the format and
similar example, refer to the Spring Framework-Cron Expression.
Capabilities
1. Block IP
Action capability for adding an IP to given object group.
l Rollback: Yes
l Duplicate Control: No
This table presents the Block IP action capability details:
Output:
Case Scope: N/A
Human Readable Output: N/A
2. Block URL
Action capability for adding an URL to given object group.
l Rollback: Yes
l Duplicate Control: No
This table presents the Block URL action capability details:
Input Description Type Scope Restricted Required (Yes/
Parameter (Yes/ No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
Integration Overview
The Cisco Identity Services Engine (ISE) offers a network-based approach for adaptable, trusted
access everywhere, based on the context. It provides intelligent, integrated protection through
intent-based policy and compliance solutions.This integration has been tested with Cisco
Identity Services Engine 2.3.0.238 version.
Integration Capabilities
ArcSight SOAR has the following integration capability with Cisco Identity Services Engine:
Action:
l Block MAC Address
Configuration
Prerequisites
Make sure to check the following prerequisites:
l Access to 443/tcpport as SOAR connects to Identity Services Engine API through HTTPS.
l An user account for SOAR to connect to Identity Services Engine
Configuring SOAR
1. Click Configuration > Credentials > Create Credential
2. Fill the Credential Editor form with following parameter values:
Integration Guide for Cisco Identity Service Engine Page 128 of 482
Integration Guides
a. Internal Credential:
Parameter Value
Name Display name of credential set (For example, Cisco ISE credentials)
Username User you have created for SOAR on Cisco Identity Services Engine
Password Password of the user that you have created for SOAR on Cisco Identity
Services Engine.
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store.
Credential Name of the credential set you have just created on step 2 (For example, Cisco
ISE Credentials)
Trust Invalid SSL Certificates Select this if Firewall’s certificate is self-signed or is not recognized by browsers
serverHost =
Require Approval From Select user(s) from list to ask her/his approval before executing actions on this
integration
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
5. Click Test. The following pop up will be displayed if your credential and address are valid.
6. Click Save to complete integration.
Integration Overview
Cisco Ironport Email Security is one of Cisco Ironport products to prevent phishing, business e-
mail compromise, ransomeware and spam. This integration has been tested with Cisco
Ironport Email Security 11.0.0-264 version.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Cisco Ironport Email Security:
l Block sender IP/Host
l Block email that includes a keyword
l Block sender email
Use Case: Stopping phishing campaigns
With this integration, SOAR can block emails based on sender, IP address or a keyword while
responding to cyber-attacks. Blocking can be either performed automatically within a playbook
or manually by an analyst.
Configuration
Prerequisites
Make sure to check the following prerequisites:.
l Access to 22/tcp port as SOAR connects to Cisco Ironport Email Security via SSH.
l A user account for SOAR to connect to Cisco Ironport Email Security.
Integration Guide for Cisco Ironport Email Security Page 130 of 482
Integration Guides
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Fill the Credential Editor form with the following parameter values:
a. Internal Credential:
Parameter Value
Name Display name of credential set (For example, Cisco Firepower Management
Credentials)
Username User you have created for SOAR on on Cisco Firepower Management Center
Password Password of the user that you have created for SOAR on Cisco Firepower
Management Center.
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store.
Credential Name of the credential set you have just created on step 2 (For example, Cisco
Ironport Credentials)
Require Approval From Select user(s) from list to ask her/his approval before executing actions on this
integration
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Additional Notes
l Cisco Ironport Email Security integration on SOAR is an Advanced Action Script, and you
can access the content of the default script under Configuration > Customization Library.
l While defining integration for the first time, you might encounter the following warning
message, which is the expected behavior for this type of integration.
Integration Overview
Crowdstrike is a cloud based cybersecurity tool that allows organizations to leverage its
lightweight agent. The agent is an all-encompassing EDR and antivirus software.
Integration Capabilities
l Isolate Machine
l Unisolate Machine
l Add Comment to Detection
l Update Detection Status
l Assign Detection
l Get IOC Details
l Get Hosts by IOC
l Get Process by IOC
l List Host Vulnerabilities
l Get Host Details
Prerequisites
l ArcSight SOAR connects to https://falcon.crowdstrike.com/login/ APIs through HTTPS.
Access to this service is required.
l CrowdStrike requires an API key for access.
Configuration
Configuring Crowdstrike
l CrowdStrike requires a Client ID and Client secret for access.
l Users with the Falcon Administrator role can create a Client ID and Client secret from
https://falcon.crowdstrike.com/ after logging in with valid credentials.
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor:
Type Name Username Password Private Key
Internal Display name of credential set Empty Client ID created Client Secret for the Client
credential (for example, Crowdstrke on CrowdStrike ID created on CrowdStrike
Falcon). Falcon Falcon
Parameter Value
Credential Credential that has been defined for this integration under Credential menu.
Trust Invalid Select this if Engine’s certificate is self-signed or not recognized by browsers. Not selected.
SSL
Certificates
Require Select user(s) from the list to ask their approval before executing enrichments on this
Approval integration.
From
Notify Select user(s) from the list to notify when SOAR performs an action on this integration.
5. Select the integration that you have added in the Integrations menu.
6. Click Save to complete the integration.
7. Click Test, an Integration Successful message is displayed if the credential and address are
valid.
Capabilities
1. Isolate Machine
Action capability for isolating a machine.
l Rollback: Yes
l Duplicate Control: Yes
Output:
Case Scope
N/A
Human Readable Output
N/A
2. Unisolate Machine
Action capability to unisolate a machine.
l Rollback: Yes
l Duplicate Control: Yes
Output:
Case Scope
N/A
Human Readable Output
N/A
3. Add Comment to Detection
Action capability for adding a comment to a detection.
l Rollback: No
l Duplicate Control: No
Output:
Case Scope
N/A
Human Readable Output
N/A
4. Update Detection Status
Action capability for updating detection status.
l Rollback: No
l Duplicate Control: No
Status Status from the following drop down menu options: String No Yes
New, In Progress, Closed, True Positive, False Positive,
Ignored.
Output:
Case Scope
N/A
Human Readable Output
N/A
5. Assign Detection
Action capability for assigning a detection to a user.
l Rollback: No
l Duplicate Control: No
Output:
Case Scope
N/A
Human Readable Output
N/A
6. Get IOC Details
Enrichment capability used to get the details of an IOC.
Do not Use SOAR does not use cached results if this Boolean N/A No
Cache box is checked.
Output:
Case Scope
Action Type Category/Value
Do not Use SOAR does not use cached results if this Boolean N/A No
Cache box is checked.
Output:
Case Scope
Action Type Category/Value
Do not Use SOAR does not use cached results if this Boolean N/A No
Cache box is checked.
Output:
Case Scope
Status Status from the following options: All, Open, String No Yes
Closed, Reopen, Expired
Do not Use SOAR does not use cached results if this box is Boolean N/A No
Cache checked.
Output:
Case Scope
Action Type Category/Value
Do not use SOAR does not use cached results if this Boolean N/A No
cache box is checked.
Output:
Case Scope
Action Type Category/Value
Integration Overview
CyberArk Application Identity Manager is a central credential provider that stores passwords
and other credentials used by systems, applications, and scripts by eliminating embedded
credentials. SOAR might use encrypted credentials stored on its database and CyberArk AIM
vault to connect to other systems and applications while investigating and responding to an
incident.
Configuration
Prerequisites
l Make sure to check the access to CyberArk Application Identity Manager API as SOAR
connects to it through HTTPS.
l Define a new application for SOAR on CyberArk’s PVWA (Password Vault Web Access)
Interface.
Description Specify a short description of the application (For example, Application for
Automated Threat Analysis&Response)
Business Owner Specify contact information about the application’s Business owner
Integration Guide for Cyberark Central Credential Provider Page 140 of 482
Integration Guides
4. To specify unlimited number of machines and Windows OS users for a single application,
select Allow extended authentication restrictions.
5. Navigate to Allowed Machines and specify the application’s Allowed Machines.
Note: This information enables the Credential Provider to check only applications that run
from specified machines can access their passwords.
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Fill the Credential Editor form with the following parameter values:
a. Internal Credential:
Parameter Value
Name Display name of credential set (For example, CyberArk AIM Credential)
Username Application Name you have created on CyberArk Password Vault Web Access
Password Empty
Credential Name of the credential set you have just created on step 2 (For example,
CyberArk AIM Credential).
Trust Invalid SSL Select this if device’s certificate is self-signed or is not recognized by browsers
Certificates
Require Approval From Select user(s) from list to ask her/his approval before executing actions on this
integration
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration
Additional Notes
Following are the steps to use CyberArk AIM as central credential store:
1. Navigate to Configuraiton > Parameters.
2. Modify the ExternalCredentialStoreIntegrationID parameter value to ID of the CyberArk
AIM integration that you have defined in the above procedure.
3. To define the new name for a credential:
a. Navigate to Configuration > Credentials.
b. Select External Credential from the drop down and it automatically uses CyberArk AIM
integration.
Note: The name of the credential must be the same as the account name defined in
CyberArk. Make sure to follow the naming convention of SOAR as Safe and Folder
separated by | character. Else, SOAR automatically searches all Safes for the given
credential name.
Integration Overview
CYMRU is a look-up service that checks if the hash code is malware. If the hashcode belongs to
malware, then the latest timestamp of the malware and the rough antivirus package detection
rate is returned. ArcSight SOAR uses CYMRU Malware Hash Registry Query to query computed
MD5 or SHA-1 hash of a file to check for malware.
Integration Capabilities
Action
l Hash registry query
Configuration
Configuring CYMRU Malware Hash Registry Query
1. Make sure SOAR has access to CYMRU Malware Hash Registry Query integration’s API as it
connects to it through HTTPS.
Configuring SOAR
1. To create the integration, navigate to Configuration > Integrations.
2. Specify the following parameter values in the Integrations Editor:
Parameter Value
Integration Guide for CYMRU Malware Hash Registry Query Page 143 of 482
Integration Guides
Parameter Value
Trust Invalid SSL Select this if Engine’s certificate is self-signed or is not recognized by browsers.
Certificates
Require Approval From Select users from the list who can provide approval before executing actions on
this integration
Notify Select users from the list to notify when SOAR performs an action on this
integration.
Integration Overview
CyberRes Galaxy Threat Accelerator Program (GTAP) Plus is a Threat Intelligence feed, available
as a subscription service from Micro Focus CyberRes. Please talk to your Sales Representative
to request a 60-day evaluation license or purchase an annual subscription. The license key
provided will be the MISP API key that will be used in the CyberRes Galaxy Threat Accelerator
(GTAP) Plus integration.
Integration Capabilities
l Domain Reputation
l File Reputation
l IP Reputation
l URL Reputation
Prerequisites
ArcSight SOAR connects to “https://threatfeed.cyberres.com” APIs through HTTPS. Access to
this service is required.
Configuring SOAR
1. Click Configuration > Integration > Upload Plugin and upload the plugin zip file.
2. Edit the configuration to modify the name in the Configuration Form.
3. Click Configuration > Credentials and edit the credential .
Type Internal credential
Name Display name of credential set (i.e CyberRes Galaxy Threat Accelerator Credentials)
Username Empty
Password Empty
4. Click Configuration > Scope Item Property and Create 2 new scope item property
definitions with the following properties:
Property Visible Name Data Type
Capabilities
1. Domain Reputation
Enrichment capability for retrieving details of domain reputation.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
Action Type Category/value
Do not use SOAR does not use cached results if this box Boolean N/A No
cache is checked.
Output:
Case Scope:
Action Type Category/value
3. IP Reputation
Enrichment capability for retrieving IP Address details and reputation.
Input Description Type Scope Restricted Required
Parameter (Yes/No) (Yes/No)
Do not use SOAR does not use cached results if this box Boolean N/A No
cache is checked.
Output:
Case Scope
Action Type Category/value
Do not use SOAR does not use cached results if this Boolean N/A No
cache box is checked.
Output:
Case Scope
Action Type Category/value
Integration Overview
CyThreat provides cyber threat intelligence data. These data feeds are enriched with subject
and event-based reports as compiled by STM analysts.
CyThreat collects data from various open and commercial sources (deep/dark web, social
media, blogs, forums, etc.) automatically. This allows the detection of the activities of the
threat actors, proactive prevention of cyber-attacks before they occur and also allows
applications to take preventive measures.
SOAR can seek benefit from CyThreat intelligence from both Integration and as Alert Source.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with CyThreat Threat Intelligence:
l Domain Query
l Hash Query
l IP Query
Prerequisites
l You must have access to HTTPS as the ArcSight SOAR connects to CyThreat API through this
service.
l API token and password to connect to CyThreat Threat Intelligence API.
Configuration
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameters in the Credential Editor form:
Type Name Username Password Private Key
Internal Display name of credential Empty API password that you API token that you have
credential set (for example, CyThreat have received from received from the
Credentials). CyThreat service. CyThreat service.
Type CyThreat
Credential Credential that has been defined for this integration under the Credentials menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by browsers.
Certificates The SSL certificate of CyThreat service is going to known by SOAR, so you do not
need to check this box.
Require Approval Select user(s) from list to ask the approval before executing actions on this
From integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Note: Steps 7-9 are required only for Advanced Action Script Default Templates.
Address https://cti.stm.com.tr/api/
ip.min.risk SOAR is not going to create case if risk level of the incoming alarm is
below of the value.
domain.min.risk SOAR is not going to create case if risk level of the incoming alarm is
below of the value.
hash.min.risk SOAR is not going to create case if risk level of the incoming alarm is
below of the value.
days.to.look.back.at.initial.sync How far (in days) into the past SOAR will look for remote incidents at the
initial sync task.
Credential Name of the credential set created on step 2 Configuring SOAR part (For
example, CyThreat Credentials).
Visible Alert Fields Field names from the alert if you want to show them on case.
Trust Invalid SSL Certificates The SSL certificate of CyThreat service is going to known by SOAR, so you
do not need to check this box.
3. Click Test. The Alert Source tested successfully message is displayed if your credentials are
valid.
4. Click Save.
Integration Capabilities
1. Domain Query
Enrichment capability for retrieving domain information.
The following table presents the Domain Query action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Output:
Case Scope: N/A
Human Readable Output: Yes
2. Hash Query
Enrichment capability for retrieving hash information.
The following table presents the Hash Query action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Output:
Case Scope: N/A
Human Readable Output: Yes
3. IP Query
Enrichment capability for retrieving domain information.
The following table presents the IP Query action capability details:
Output:
Case Scope: N/A
Human Readable Output: Yes
Integration Overview
EmailRep consists of crawlers, scanners and enrichment services that collect data from email
addresses, domains, and internet personas.
EmailRep uses hundreds of data points from social media profiles, professional networking
sites, dark web credential leaks, data breaches, phishing kits, phishing emails, spam lists, open
mail relays, domain age and reputation, and deliverability to predict the risk on an email
address.
This integration enables ArcSight SOAR to report and query an email address.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with EmailRep:
l Email Query
l Report Email
Prerequisite
l An API key is required for accessing EmailRep.
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor form:
Type Name Username Password Private
Key
Internal Display name of credential set (for example, EmailRep API Key
credential Credentials).
3. Click Configuration > Integration > Create Integrations Specify the following parameter
values in the Configuration form:
Parameter Value
Type EmailRep
proxy.id ID of the Proxy integration if you access EmailRep through a web proxy
device. For example, proxy.id = 12345 .
Credential Credential that has been defined for this integration under the Credentials
menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capabilities
1. Email Query
Enrichment capability for getting reputation of email addresses.
The following table presents the Email Query enrichment capability details:
Input Description Type Scope Restricted Required
Parameter (Yes/ No) (Yes/ No)
Do not Use SOAR does not use cached results if this Checkbox N/A No
Cache box is checked.
Output:
Case Scope:
Action Type Category/ Value
2. Report Email
3. Action capability for reporting malicious email addresses.
l Rollback: No
Integration Overview
DNS Server is used to resolve and translate the IP addresses, host names and queries to various
DNS records.
Integration Capabilities
SOAR has the following integration capabilities with DNS Server.
l DNS Lookup
Configuration
Prerequisites
l Make sure SOAR has access to DNS Server through 53/udp port
Configuring SOAR
1. Click Configuration > Integrations > Create Integrations.
2. Specify the following parameter values in the Configuration form:
Parameter Value
Parameter Value
Require Approval From Select users from the list who can provide approval before executing actions on
this integration. As SOAR only executes enrichment on DNS Server, leave it
empty
Notify Select users from the list to notify when SOAR performs an action on this
integration. As SOAR only executes enrichment on DNS Server, leave it empty
3. Click Test. The following pop up will be displayed if your credential and address are valid.
4. Click Save to complete integration.
Credential Credential defined for this alert source under the Credentials menu
3. Click Test. The following pop up will be displayed if your credential and address are valid.
4. Click Save to complete integration.
Integration Overview
Big IP AFM protects the network against incoming threats, even the most massive and complex
DDoS attacks.
Big IP AFM keeps bad traffic away from some specific network addresses and protects the data
center against DDoS attacks, and other network or application attacks. It also brings visibility
and control to SSH, and SSL connections, providing against back door threats that use the SSH
channel for data breaches and app attacks.
Integration Capabilities
Action
l Add address to specific address list
Configuration
Configuring F5 Big-IP Advanced Firewall Manager
l Make sure SOAR has access to F5 Big-IP Advanced Firewall Manager integration’s API as it
connects to it using HTTPS.
Configuring SOAR
1. To create the integration, navigate to Configuration > Integrations.
2. Specify the following parameter values in the Integrations Editor form.
Parameter Value
Integration Guide for F5 Big-IP Advanced Firewall Manager Page 160 of 482
Integration Guides
Parameter Value
Credential Credential that was defined for this integration under the Credentials menu
Trust Invalid SSL Certificates Select this if device’s certificate is self-signed or is not recognized by browsers
Require Approval From Select users from the list who can provide approval before executing actions on
this integration
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration
3. Click Test. The following pop up will be displayed if your credential and address are valid.
4. Click Save to complete integration.
Integration Overview
FireEye HX is an endpoint threat detection and prevention solution. ArcSight SOAR integrates
with FireEye HX through REST API to give enrichment and action capabilities to the users.
Integration Capabilities
Enrichment
l IoC Scan: HX can scan a given scope item in a target system and return information.
l Detailed System Information: HX can gather a target system information.
l Script Execution: HX supports different forensic data gathering scripts. These are XML
formatted files that exist on HX installation. If customer wishes, they can import these
script like files into Customization Library and then execute them through SOAR.
Action
Quarantine: HX quarantines a target system and reverts the quarantine if required.
Configuration
Configuring FireEye HX
l Make sure API services are enabled and create a api_admin user.To enable the service,
please see product documentation
l Access to the port number defined in the HX during installation as SOAR connects to
FireEye HX.
l Define required access control rules if SOAR and FireEye HX are segregated.
Configuring SOAR
SOAR configuration is standard and users need to specify Name, Address and Credential fields.
Rest of the fields can be changed as required.
Type FireEye HX
Require Approval From Select users from the list who can provide approval before executing actions on
this integration
Notify Select users from the list to notify when SOAR performs an action on this
integration
Integration Overview
SOAR works with Forcepoint Cloud Services to report uncategorized sites.
Integration Capabilities
Action
l Report
Configuration
Configuring Forcepoint Cloud Services
l Make sure SOAR has access to HTTPS as it connects to Forcepoint Cloud Services URL
https://www.websense.com).
l A user account on Forcepoint/WebSense to use the Sitelookup tool.
Configuring SOAR
1. To create the integration, navigate to Configuration > Integrations.
2. Specify the following parameter values in the Integrations Editor.
Parameter Value
Credential Credential defined for this integration under the Credentials menu.
Parameter Value
Trust Invalid SSL Certificates Select this if device’s certificate is self-signed or is not
recognized by browsers
Require Approval From Select users from the list who can provide approval before executing actions on
this integration
Notify Select users from the list to notify when SOAR performs an action on this
integration
Integration Overview
Forcepoint Web Content Gateway is a web proxy and cache that analyzes HTTP(S) requests in
real-time and passes the traffic to Filtering Service for policy enforcement.
Integration Capabilities
ArcSight SOAR has the following integration capability with Forcepoint Web Content Gateway:
l Block Access to IP Addresses, URLs and Hostnames
Use Case: Blocking Phishing Domains
SOAR checks the inbox of user's email, for phishing reports and automatically creates an
incident record on the service desk. During the investigation, SOAR extracts the malicious IP
addresses, domains, and URLs in the message body and blocks access to Forcepoint Web
Content Gateway. This can either be performed automatically within a playbook or manually
by an analyst.
Also, SOAR uses threat intelligence (TI) feeds as an Alert Source and automatically blocks
malicious domains/IP addresses reported by TI source on Forcepoint Web Content Gateway
before any attack occurs.
Configuration
Prerequisites
l Current version of Forcepoint Web Content Gateway.
l Access to HTTPS as SOAR connects to Forcepoint Web Content Gateway Policy API
l Access to 15873/tcp port
Installation Guide.
2. After installing Management API components, use the Forcepoint Security Manager to
configure the account used for authentication. To enable the communication, see Enabling
communication between Management API clients and servers in the Management API
Installation Guide.
Configuring SOAR
1. Click Configurtion > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor form:
a. Internal credential:
Parameter Value
Name Display name of the credential set (For example, Forcepoint WCG Credentials)
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store.
Parameter Value
Credential Name of the credential set created on step 2. (For example, Forcepoint WCG Credentials)
Trust Invalid Select this if Engine’s certificate is self-signed or is not recognized by browsers.
SSL Cerificates
Require Select users from the list who can provide approval before executing actions on this
Approval From integration.
Notify Select users from the list to notify when SOAR performs an action on this integration
5. Click Test. The following pop up will be displayed if your credentials and address are valid.
6. Click Save to complete integration.
Additional Notes
l The categoryName you provide in the Configuration section is API-Managed but not
managed by UI. If the category does not exist on the device, SOAR creates it automatically.
Integration Overview
ForeScout CounterACT NAC provides virtual insight into any device connected across the
enterprise and gives a single-pane-of-glass perspective. ForeScout discovers devices in real-
time, then classifies, assesses, and monitors these devices. Also, this platform provides agent-
less control and continuous monitoring across heterogeneous environments. Enables to trigger
actions to notify, monitor, and remediation.
Integration Capabilities
SOAR has the following integration capability with ForeScout CounterACT NAC:
Action Capabilities
l Assign Policy to Host
Enrichment Capabilities
l Host information query by Network Address
l Host information query by Username
l Host information query by MAC Address
l Host information query by Computer Name
Use Case: Isolating Mal-behaving PC
SOAR integrates with ForeScout CounterACT NAC, while responding to an incident it applies a
policy to mal-behaving computers and prevents further spread of the attack. A policy to the
host can either be applied automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l Current version of ForeScout CounterACT NAC
l Access to SSH protocol(22/tcp port) as SOAR connects to ForeScout CounterACT NAC using
SSH protocol.
l Access to 443/tcp port as enrichment plugin connects to ForeScout CounterACT NAC server
l A shell user account needs to be created for SOAR to connect to ForeScout
CounterACT NAC
3. To allow new user to execute fstool command without the need to enter the password,
add the following line to sudo configuration (/etc/sudoers)
soar ALL=(root) NOPASSWD: /usr/local/forescout/bin/fstool
4. To use enrichment capabilities, add or use an existing web management user with the
following permission:
7. Navigate to Policy and edit one of the existing policies or create a new one.
8. To edit condition of a rule, add “SIEM Message” as Criteria and select desired action.
Note: Make a note or save the SIEM message to use while configuring SOAR.
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor form:
a. Internal Credential
Parameter Value
Name Display name of credential set (For example, ForeScout CounterACT NAC
Credential)
Password Password of the user that was created for SOAR on ForeScout CounterACT
NAC
b. Internal Credential
Parameter Value
Name Display name of credential set (For example, ForeScout CounterACT NAC
Credential)
Username Username created for SOAR on ForeScout CounterACT NAC for web
management user (2.2.3).
Password Password of the user you have created for SOAR on ForeScout for web
management user (2.2.3).
Note: Make a note or save the credential ID to use it in device configuration (2.3.4).
c. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store.
Parameter Value
Credential Name of the credential set created on step 2. (For example, ForeScout CounterACT NAC
Credential)
Parameter Value
Require Select users from the list who can provide approval before executing actions on this integration
Approval
from
Notify Select users from the list to notify when SOAR performs an action on this integration.
Additional Notes
l ForeScout CounterACT NAC integration is an Advanced Script, and the content of the
default script is accessible under Configuration > Customization Library.
l While defining the integration for the first time, you might encounter the following
warning message, which is the expected behavior for this type of integration.
Integration Overview
FortiManager is a management tool for Fortify Firewalls. It can manage multiple firewalls in a
row from its central user interface.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Forti Manager:
l Add to Address Group
l List Devices
l List Firewall Address Groups
l List Firewall Addresses
Prerequisites
l You must have access to HTTPS as the ArcSight SOAR connects to Forti Manager IP through
this service.
l You must have a super user credentials.
Configuration
Configuring SOAR
1. Click Configuration > Integration > Create Integration.
2. In Configuration Editor, select FortiManager in the Type list.
3. Click Create to create a new credential and specify the following parameters in the
Credential Editor form:
Type Name Username Password Private
Key
Internal Display name of credential set (for example, FortiManager FortiManager Empty
credential Fortin Manager Credentials). Username Password
Capabilities
1. Add To Address Group
2. Adds Ip address to given group for specified ADOM.
The following table presents the Add To Address Group action capability details:
Output:
Case Scope: N/A
Human Readable Output: N/A
3. List Firewall Address Groups
4. List of firewall address groups on FortiManager.
The following table presents the List Firewall Address Groups action capability details:
Input Parameter Description Type Scope Restricted (Yes/ Required (Yes/
No) No)
Output:
Case Scope: N/A
Human Readable Output:
Output:
Case Scope: N/A
Human Readable Output:
Integration Overview
ArcSight SOAR uses Fortinet FortiGate Firewall to block IP addresses on the network perimeter
and terminates sessions using the incident scope.
Integration Capabilities
l Action
l Block
l Disconnect
l Custom Script
Configuration
Configuring FortiGate Firewall
l Make sure SOAR has access to SSH as it connects to FortiGate Firewall integration using it
l A user’s credential with admin role
l An empty rule to be used by SOAR to block offending IP addresses
Configuring SOAR
1. To create the integration, navigate to Configuration > Integrations.
2. Specify the following parameter values in the Integrations editor:
Parameter Value
Parameter Value
Trust Invalid SSL Certificates Select this if device’s certificate is self-signed or is not
recognized by browsers
Require Approval From Select users from the list who can provide approval before executing actions on
this integration
Notify Select users from the list to notify when SOAR performs an action on this
integration
Additional Notes
You might have to review the actions that are defined and executed using the Fortigate
Firewall custom scripts for SOAR. To access these custom scripts, navigate to Configuration >
Custom Scripts.
The following custom scripts are specific to this device:
l FortiGate Firewall SSH Device Action (Block) Default Template
l FortiGate Firewall Availability Check Default Template
Integration Overview
Fortinet FortiAnalyzer is a central log collection and analysis tool for Fortinet products. SOAR
can query FortiAnalyzer (FAZ) for scope items to enrich incident data and to search the past
events for emerging threats.
Integration Capabilities
ArcSight SOAR has the following enrichment capabilities with Fortinet FortiAnalyzer:
l Accepted Traffic Logs : This query returns accepted traffic logs to or from the selected
scope item and the time frame might be between 1 hour to 12 hours.
l URL Access Logs : This query returns the events that record access to the selected URL and
the time frame might be between 1 hour to 12 hours.
Note: This user profile requires access to Log View/FortiView/NOC - SOC component and
ADOM’s SOAR.
Configuring SOAR
1. Click Configurtion > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor form:
a. Internal credential:
Parameter Value
Name Display name of the credential set (For example, Fortinet FortiAnalyzer)
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Credential Name of the credential set created on step 2 (for example, Fortinet FortiAnalyzer
Credentials)
Require Approval Select users from the list who can provide approval before executing actions on this
From integration
Notify Select users from the list to notify when SOAR performs an action on this integration
Integration Overview
FortiDDoS is a network behavior anomaly (NBA) prevention system that detects and blocks
attacks that intend to disrupt network service (distributed denial of service (DDoS) attacks) by
over utilizing server resources.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with FortiDDoS:
l Block IP and Hostname
Use Case: Blocking malicious IP on peripheral
SOAR integrates with FortiDDoS to block malicious IP addresses detected while responding tp
an incident. Blocking can be performed automatically within a playbook or manually by an
analyst.
Configuration
Prerequisites
l FortiDDoS version 4.7 and 5.1
l Access to tcp port 443 as SOAR connects to FortiDDoS’ API using HTTPS
l An administrator user account for SOAR to connect to FortiDDoS
Configuring FortiDDoS
1. To add a new SOAR user with the required access profile permissions, navigate to System >
Admin > Access Profile.
2. In the Access profile form, select Global Settings and Protection profileswith Read &
Write permissions.
3. Navigate to System > Admin > Administrator.
4. To add an administrator with the profile created in the previous step, select Enable for
Allow API Access.
5. (Optional) To specify Remote Authentication and Idle timeout values, navigate to
Centralized Management > Admin.
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the Credential Editor with the following parameter values:
a. Internal Credential
Parameter Value
Password Password of the user that was created for SOAR on FortiMail
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Type FortiDDoS
Credential Name of the credential set created on step 2 (For example, FortiDDoS Credentials)
Trust Invalid SSL Select this if Integrations’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select users from the list who can provide approval before executing actions on this
integration
Notify Select users from the list to notify when SOAR performs an action on this
integration
Integration Overview
Fortinet FortiGate is an industry leading next generation security platform.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Fortinet FortiGate API:
l Action
l Block IP
l Block FQDN
l Block URL
Use Case: Blocking malicious artifacts detected through alerts
SOAR automatically executes playbooks and blocks malicious artifacts on FortiGate
platform. The artifacts IP, Domain and URL can be blocked using SOAR.
Configuration
Prerequisites
l Access to tcp port 443 as SOAR connects to Fortinet FortiGate API using HTTPS
l A user account with necessary permissions on the FortiGate platform
Note: Use the IP address that SOAR uses and 0.0.0.0/0 must not be used as an IP address.
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the Credential Editor with the following parameter values:
a. Internal Credential
Parameter Value
Name Display name of credential set (For example, Fortinet FortiGate Credentials)
Username Empty
Password Empty
Note:Fortinet FortiGate requires private key and External Credential is not used.
Credential Name of the credential set that was created on step 2 (For example, Fortinet
FortiGate Credentials)
Trust Invalid SSL Certificates Select this if Integrations’s certificate is self-signed or is not recognized by
browsers
Require Approval From Select users from the list who can provide approval before executing actions
on this integration
Additional Notes
l The API Key to work properly requires access to HTTPS and for security reasons as well.
l If you have multiple policies on the integration configuration and if one of the policy's URL
filter is disabled, SOAR with Fortinet integration displays no specific error message. In such
case, you might encounter the following error message:
None of policy names in t he configuration are present in the Fortinet FortiGate server.
Integration Overview
Fortinet FortiMail secure email gateway utilizes the latest technologies and security services
from FortiGuard Labs to protect from common and advanced threats while integrating robust
data protection capabilities to avoid data loss.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with FortiMail:
l Add to Block List
l Block
Configuration
Prerequisites
l FortiMail version 6.2.2(GA) and later
l Access to tcp port 443 as SOAR connects to FortiMail API using it
l An administrator user account for SOAR to connect to FortiMail
Configuring FortiMail
1. By default, REST-API service is disabled on FortiMail. To enable it, use the following CLI
command:
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the Credential Editor with the following parameter values:
a. Internal Credential
Parameter Value
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Parameter Value
Type FortiMail
Credential Name of the credential set created on step 2 (For example, FortiMail
Credentials)
Trust Invalid SSL Certificates Select this if Integrations’s certificate is self-signed or is not recognized by
browsers.
Require Approval From Select users from the list who can provide approval before executing actions on
this integration
Notify Select users from the list to notify when SOAR performs an action on this
integration
Additional Notes
Add to Block List capability uses the Security > System > Blocklist, whereas Block capability
uses the Policy > Access Control.
Integration Overview
Fortinet FortiManager is a centralized management unit for Fortinet family devices. It provides
best compliance practices and workflow automation. This integration has been tested with
Fortinet FortiManager v5.6.2-build1631 180124 (GA) firmware version.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with FortiManager:
l Block file on an connected Fortinet family device (For example, Fortinet NGFW, Fortinet
FortiMail, etc)
l Block IP address on an connected Fortinet family device (For example, Fortinet NGFW,
Fortinet FortiMail, etc)
l Block username on an connected Fortinet family device (For example, Fortinet NGFW)
l Block email on an connected Fortinet family device (For example, Fortinet FortiMail)
Use case: Mitigating Compromised Account Cases
SIEM, with the help of intelligence sources, creates an alarm. It compromises the suspected
email accounts of the employees. SOAR integrates with Fortinet FortiManager and
automatically blocks the outgoing emails and the incoming and outgoing traffic. This blocking
can either be performed automatically within a playbook or manually by an analyst.
Prerequisites
l Access to tcp port 443 as SOAR connects to Fortinet FortiManager using HTTPS
l A user account for SOAR to connect to Forti Manager
Configuration
Configuring FortiManager
1. Navigate to System Settings > Admin > Administrators.
2. To create a profile with Super_User account, specify the following values in the New
Administrator form:
l Username: <SOAR username>
l Admin Type: Local
l New Password: <Specify the password>
l Confirm Password:< Confirm the password entered in the Password field>
l Admin Profile: Super_User
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
a. Internal Credential
Parameter Value
Name Display name of credential set (For example, Forti Manager Credentials)
Password Password of the user that was created for SOAR on Forti Manager
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Parameter Value
Credential Name of the credential set created on step 2 (For example, Forti Manager
Credentials)
Trust Invalid SSL Certificates Select this if Forti Manager’s certificate is self signed or is not recognized by
browsers
Require Approval From Select users from the list who can provide approval before executing actions on
this integration
Notify Select users from the list to notify when SOAR performs an action on this
integration
Additional Notes
Commands to be run on Forti Gate firewall devices are defined as Advanced Action Script. To
access the default scripts navigate to Configuration > Customization Library.
Integration Overview
Fortinet Sandbox is a zero-day malware behavior analysis system. It enables organizations to
defend against advanced threats such as ransomware by integrating various Fortinet
technologies and other security products. Or is used as an extension to their on-premise
security architectures to leverage complete control. This integration has been tested with
Fortinet FortiSandbox 3.1.0 version.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Fortinet Sandbox:
l Query File Hash
l Analyze File
l Analyze URL
Use Case: Investigating Suspicious Files
During the investigation of a suspicious endpoint behavior, SOAR integrated with Fortinet
Sandbox analyzes the behavior of potential malware and hashes and URLs detected on
suspicious network traffic. This investigation can either be performed automatically within a
playbook or manually by an analyst.
Configuration
Prerequisites
l Access to tcp port 443 as SOAR connects to Fortinet Sandbox API using HTTPS
l A user account is required for SOAR to connect to Fortinet Sandbox
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
a. Internal Credential
Parameter Value
Name Display name of credential set (For example, Fortinet Sandbox Credentials)
Password Password of the user that was created for SOAR on Fortinet Sandbox
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Parameter Value
Credential Name of the credential set created on step 2 (For example, Fortinet Sandbox
Credentials)
Trust Invalid SSL Certificates Select this if Web UI’s certificate certificate is self-signed or is not recognized
by browsers
Require Approval From Select users from the list who can provide approval before executing actions
on this integration
Additional Notes
Fortinet Sandbox supports the following compressed file types:
.tar, .z, .xz, .gz, .tar.gz, .tgz, .zip, .bz2, .tar.bz2, .tar.Z, .7z, .rar, .lzh, .ace
Integration Capabilities
l Geo Lookup
l Get Host Reputation
l Get IP Reputation
l Add to Custom Blacklist
l Add to Custom Whitelist
l Delete From Custom Blacklist
l Delete From Custom Whitelist
Prerequisites
You must have access to HTTPS as the ArcSight SOAR connects to FraudGuard API through this
service.
Configuring FraudGuard
1. Navigate to https://api.fraudguard.io.
2. Create a user account by setting your username and password.
Configuring SOAR
1. Click Configurations > Credentials > Create crendentials.
2. Specify the following parameter values in the Credential Editor:
l Internal Credential
Parameter Value
Type FraudGuard
Address https://api.fraudguard.io
Capabilities
1. Geo Lookup
Enrichment capability for lookup of IP address.
Input Description Type Scope Restricted(Yes/No) Required
Parameter (Yes/No)
Output:
Case Scope
N/A
Human Readable Output
Yes
2. Get Host Reputation
Enrichment capability for get host reputation and details.
Input Description Type Scope Restricted(Yes/No) Required
Parameter (Yes/No)
Output:
Case Scope
N/A
Human Readable Output
Yes
3. Get IP Reputation
Enrichment capability for Getting IP details from fraudguard.
Output:
Case Scope
N/A
Human Readable Output
Yes
4. Add to Custom Blacklist
Action capability for Adding an IP to blacklist.
l Rollback: Yes
Output:
Case Scope
N/A
Human Readable Output
N/A
5. Add to Custom Whitelist
Action capability for Adding an IP to whitelist.
l Rollback: Yes
Output:
Case Scope
N/A
Human Readable Output
N/A
6. Delete From Custom Blacklist
Action capability for Deleting an IP from blacklist.
l Rollback: Yes
Output:
Case Scope
N/A
Human Readable Output
N/A
7. Delete From Custom Whitelist
a. Action capability for Deleting an IP from whitelist.
l Rollback: Yes
Output:
Case Scope
N/A
Human Readable Output
N/A
Integration Overview
ArcSight SOAR uses FTP Servers to put or transfer files to remote machines using incident
scope.
Integration Capabilities
Action
l Put File
Configuration
Prerequisites
l Access to File Transfer Protocol or SFTP as SOAR connects to FTP Server using it
l A user’s credential
Configuring SOAR
1. To create the integration, navigate to Configuration > Integrations.
2. Specify the following parameter values in the Integrations Editor form.
Parameter Value
Parameter Value
Credential Credential that was defined for this integration under the Credentials menu
Trust Invalid SSL Select this if device’s certificate is self-signed or is not recognized by browsers
Certificates
Require Approval Select users from the list who can provide approval before executing actions on this
From integration
Notify Select users from the list to notify when SOAR performs an action on this integration
Integration Overview
Have I Been Pwned is a web service that allows to check if the emails/usernames are exposed
as part of previous data breaches.
This integration supports Have I Been Pwned API v3.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Have I Been Pwned:
l Check Pwned Accounts
l Check Pwned Pastes
l Check Pwned Domains
Prerequisites
Have I Been Pwned requires an API key for access.
Configuration
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor form:
Type Name Username Password Private
Key
Internal Display name of credential set (i.e., Have I Been API Key
credential Pwned Credentials)
proxy.id Access the ID of the Proxy integration Have I Been Pwned through a web
proxy device. For example: proxy.id = 12345
Credential Credential that has been defined for this integration under the Credentials
menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Since there is no action capability in this plugin, please leave it empty.
Notify Since there is no action capability in this plugin, please leave it empty.
Capabilities
1. Check Pwned Accounts
Enrichment capability for gathering pwned account details.
The following table presents the Check Pwned Accounts action capability details:
Input Description Type Scope Required
Parameter Restricted (Yes/ (Yes/ No)
No)
Output:
Case Scope: N/A
Human Readable Output:
Do not Use SOAR does not use cached results if Checkbox N/A No
Cache this box is checked
Output:
Output:
Human Readable Output:
Integration Overview
ArcSight SOAR uses Generic HTTP SMS (Short Message Service) Gateway to send SMS.
Integration Capabilities
l None
Configuration
Configuring Generic HTTP SMS Gateway
l Access to File HTTPS service as SOAR uses it to connect to Generic HTTP SMS Gateway
l A SOAR user account
Configuring SOAR
1. To create the integration, navigate to Configuration > Integrations.
2. Specify the following parameter values in the Integrations Editor form.
Parameter Value
Address Address of the integration (in the following format: 1.1.1.1 or abc.example.com)
Integration Guide for Generic HTTP SMS Gateway Page 222 of 482
Integration Guides
Parameter Value
http.method = POST
http.auth.enabled = false
params.jobID = ${credential.privateKey}
params.url = http://dev.swh.soarlabs.io/atar/
params.username = ${credential.username}
params.text = ${text}
params.gsmNumber = ${recipient}
http.header.User-Agent = SOAR
http.header.Content-Type = application/x-www-form-urlencode
sms.stripCountryCode = +90
Credential Credential that was defined for this integration under the Credentials menu
Trust Invalid SSL Select this if device’s certificate is self-signed or is not recognized by browsers
Certificates
Require Approval From Select users from the list who can provide approval before executing actions on this
integration
Notify Select users from the list to notify when SOAR performs an action on this integration
Integration Overview
ArcSight SOAR uses HTTP proxies to access HTTP services. Some integration plugins are capable
of accessing resources on the Internet or other networks through a proxy device configuration.
See the respective integration guides for configuring the proxy.
Configuration
Prerequisites
l Access to proxy service for SOAR
l A user account to connect to proxy if proxy authentication enabled
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
Internal Credential
Parameter Value
Name Display name of credential set (for example, HTTP Proxy Credentials)
Username User that was created on HTTP proxy software for SOAR
Password Password of the user that was created on HTTP proxy software for SOAR
Credential Name of the credential set created on step 2 (For example, HTTP Proxy
Credentials)
Trust Invalid SSL Select this if Web UI’s certificate certificate is self-signed or is not recognized by
Certificates browsers
Require Approval From Select users from the list who can provide approval before executing actions on
this integration
Notify Select users from the list to notify when SOAR performs an action on this
integration
Additional Notes
For SOAR to perform Automatic Update Checks, navigate to Configuration > Parameters and
set ProxyIntegrationIdForAutomaticUpdateCheck.
Integration Overview
IBM X-Force Exchange is a cloud-based threat intelligence platform that enables users to
research security threats, search attack indicators, aggregate actionable intelligence, and
collaborate with peers.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with IBM X-Force Exchange:
l DNS Records
l IP Report
l Malware for File Hash
l Send File for Analysis
l URL Report
Use Case: Investigating Phishing Campaigns
SOAR follows the user’s email inbox for phishing reports and automatically creates an incident
record on its service desk. While investigating the attack, SOAR extracts the sender address, IP
address, URLs in the message body, files in the attachment, and checks with IBM X-Force
Exchange if these attacks are previously analyzed. This investigation can either be performed
automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l Access to https://api.xforce.ibmcloud.com (443/tcp port) for SOAR to connect to IBM X-
Force Exchange API
l An API key for SOAR to connect to IBM X-Force Exchange
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
a. Internal Credential
Parameter Value
Name Display name of credential set (For example, IBM X-Force Exchange
Credentials)
Password API Password for the key created on IBM X-Force Exchange
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Credential Name of the credential set created on step 2 (For example, IBM XForce
Exchange Credentials)
Trust Invalid SSL Select this if Web UI’s certificate is self-signed or is not recognized by browsers
Certificates
Require Approval From Select users from the list who can provide approval before executing actions on
this integration
Notify Select users from the list to notify when SOAR performs an action on this
integration
Integration Overview
Infoblox DNS Firewall defends DNS servers from the comprehensive range of DNS-based
attacks while maintaining service availability and business continuity. The Grid Manager web
interface provides access to the appliance for network and IP address management.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Infoblox DNS Firewall:
l Block IP address (No Data)
l Block IP Address (No Such Domain)
l Block Host (No Data)
l Block Host (No Such Domain)
l Substitute DNS A Record
Use Case: Blocking malicious IP addresses on DNS
SOAR integrates with Infoblox DNS firewall to block malicious IP addresses and hosts on DNS
firewall to stop malware attacks and protect users. These actions can either be performed
automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l Infoblox NIOS 8.4 version
l Access to tcp port 443 as SOAR connects to Infoblox DNS Firewall API
l A SOAR user account to connect Infoblox DNS Firewall
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
a. Internal Credential
Parameter Value
Name Display name of credential set (For example, Infoblox DNS FW Credentials)
Password API Password for the key created for SOAR on Infoblox DNS FW
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Credential Name of the credential set created on step 2 (For example, Infoblox DNS FW
Credentials)
Trust Invalid SSL Select this if Web UI’s certificate is self-signed or is not recognized by browsers
Certificates
Require Approval From Select users from the list who can provide approval before executing actions on
this integration
Notify Select users from the list to notify when SOAR performs an action on this
integration.
Additional Notes
Infoblox DNS Firewall allows blocking IP and host with only one rule type (either No Data or No
Such Domain). If you try to block an IP or host that already got blocked with another rule type,
you might get an error.
Integration Overview
Intezer is a malware analysis tool that automates alert triage, incident response and threat
hunting.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Intezer:
l Analyze Hash
l Get Sub-Analyses
l Get File Metadata
l Code Reuse Families
l Get Related Files
Prerequisites
l ArcSight SOAR connects to the https://analyze.intezer.com/ API through HTTPS. Access to
this service is required.
l Intezer requires an API key for access.
Configuration
Configuring Intezer
l Intezer requires an API key for access.
l Users can obtain an API key from intezer.com after logging in with valid credentials.
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor:
Type Name Username Password Private
Key
Type Intezer.
Credential Name of the credential set created in step 2. (i.e. Intezer Credentials).
Trust Invalid Select this if Engine’s certificate is self-signed or not recognized by browsers. Not selected.
SSL
Certificates
Require Select user(s) from list to ask the approval before executing actions on this integration.
Approval
From
Notify Select user(s) from the list to notify when SOAR performs an action on this integration.
5. Click Save.
6. Navigate to Configuration > Customization Library and edit Intezer Advanced Action
Script Default Script Template.
7. Select the integration that you have created in step 4 from the Integrations drop-down
menu and click Save.
8. Click Test, an Integration Successful message is displayed if the credential and address are
valid.
Capabilities
1. Analyze Hash
Enrichment capability for retrieving details of a file hash.
Input Description Type Scope Restricted Required
Parameter (Yes/No) (Yes/No)
Do not Use SOAR does not use cached results if this Boolean N/A No
Cache box is checked.
Output:
Case Scope
Action Type Category/Value
Analysis ID Intezer analysis ID. Can be retrieved from the String No Yes
human readable output of the 'Analyze Hash'
enrichment.
Do not Use SOAR does not use cached results if this box is Boolean N/A No
Cache checked.
Output:
Case Scope
N/A
Human Readable Output
3. Get File Metadata
Enrichment capability for retrieving the file metadata for an Intezer analysis ID and sub-
analysis ID.
Analysis ID Intezer analysis ID. Can be retrieved from the String No Yes
human readable output of the 'Analyze Hash'
enrichment.
Sub-Analysis Intezer sub-analysis ID. Can be retrieved from the String No Yes
ID human readable output of the 'Get Sub-Analyses'
enrichment.
Do not Use SOAR does not use cached results if this box is Boolean N/A No
Cache checked.
Output:
Case Scope
Action Type Category/Value
Analysis ID Intezer analysis ID. Can be retrieved from the String No Yes
human readable output of the 'Analyze Hash'
enrichment.
Sub-Analysis Intezer sub-analysis ID. Can be retrieved from the String No Yes
ID human readable output of the 'Get Sub-Analyses'
enrichment.
Output:
Case Scope
Action Type Category/Value
Analysis ID Intezer analysis ID. Can be retrieved from the String No Yes
human readable output of the 'Analyze Hash'
enrichment.
Sub-Analysis Intezer sub-analysis ID. Can be retrieved from the String No Yes
ID human readable output of the 'Get Sub-Analyses'
enrichment.
Family ID Intezer family ID. Can be retrieved from the human String No Yes
readable output of the 'Code Reuse Families'
enrichment.
Output:
Case Scope
N/A
Human Readable Output
Integration Overview
Invictus USTA is a threat intelligence service which delivers cyber-threat insights in real time.
Integration Capabilities
l Ingest Threat Intelligence Feed as Alert
l Check Identity Leak
l Check Stolen Client Account
l Check Domain Info
l Check Hash Info
l Check IP Info
l Check URL Info
l Submit Bad Sender
l Submit Referer URL
Use Case: Blocking malicious URLs and IPs before they harm
ArcSight SOAR integrates with USTA intelligence feed to block malicious entities on your
perimeter protection before they harm.
Use Case #2: Investigating Fraud and ID Theft
SOAR integrates with USTA Threat Intelligence to investigate fraud cases, possible ID theft, and
cases of client account compromises.
Configuration
Prerequisites
l Access to https://usta01.invictuseurope.com/api/ (443/tcp port) for SOAR to connect to
USTA API
l An API Key for SOAR to connect to Invictus USTA API
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
a. Internal Credential
Parameter Value
Username Empty
Password Empty
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Type USTA
Parameter Value
Credential Name of the credential set just created. (For example, Invictus USTA Credentials)
Trust Invalid SSL Select this if Web UI’s certificate is self-signed or is not recognized by browsers
Certificates
Visible Alert Fields Define the alarm fields to be displayed on Incident Management Service Desk
Type USTA
Credential Name of the credential set created on step 2 (For example, Invictus USTA Credentials)
Trust Invalid SSL Select this if Web UI’s certificate is self-signed or is not recognized by browsers
Certificates
Require Approval Select users from the list who can provide approval before executing actions on this
From integration
Notify Select users from the list to notify when SOAR performs an action on this integration.
Additional Notes
USTA permits connection requests from specific network addresses for each customer. Hence,
make sure to check the access permission by USTA before integration.
Integration Overview
IPinfo is a solution for IP data which offers both free and paid API tokens to put IP geolocation,
ASN, IP to company, mobile carrier, and many more.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with IPinfo:
l IP Query
Configuration
Prerequisites
l You must have access to HTTPS as ArcSight SOAR connects to IPinfo through this service.
l IPinfo requires an API key for access.
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor form:
Type Name Username Password Private
Key
Type IPinfo.io
Parameter Value
Credential Credential that has been defined for this integration under the Credentials
menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capabilities
a. IP Query
Enrichment capability for retrieving information regarding an IP.
The following table presents the IP Query enrichment capability details:
Input Description Type Scope Restricted Required
Parameter (Yes/ No) (Yes/ No)
Do not Use SOAR does not use cached results if Boolean N/A No
Cache this box is checked.
Output:
Case Scope:
Integration Overview
Jira is an ITSM service that provides issue management to users.
Unlike our other plugins, this plugin consists of two modules. One was developed as a custom
script in SOAR to perform actions on Jira, and the other as an add-on in Jira to perform actions
on the SOAR product. We aimed that both products keep each other informed of certain
changes on each other. SOAR is using Jira API to perform operations on Jira, and Jira is using
our newly developed SOAR API to perform operations on SOAR through the add-on we
developed. Issue creation must be initiated with SOAR, so we can mark the issue and track it
both sides.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Jira:
l Create Issue
l Send Comment
l Update Issue
l Update Issue Status
Prerequisites
You must have access to HTTPS as the ArcSight SOAR connects to Jira API through this service
and Jira connects to SOAR through this service.
Configuration
Configuring SOAR
1. Navigate to ITOM Management and click the Three dots button for deployment and select
Reconfigure.
2. Click SOAR tab. On the REST API fields, specify values for one of them and keep a note of
it, as shown in the following figure:
Note: You can note down the Client Id Suffix and Client Secret values to be used later.
3. Click Save
4. Navigate to SOAR application and click Configuration > Credentials > Create Credential.
5. Specify the following parameter values in the Credential Editor:
Parameter Value
Private Key
6. Click Save.
7. Click Configuration > Lists > Create List. Give the list a name (for example, jiraLookup).
Note: SOAR is going to map SOAR cases and Jira issues on this list for both sides.
8. Click Save
9. Click Configuration > Integration > Create Integration
10. Specify the following parameter values in the Configuration Form:
Parameter Value
Type Jira
proxy.id ID of the Proxy integration if accessing the jira service through a web proxy device. For
Example: proxy.id = 12345.
list.name Parameter must be equal to list name that is given at step 8. (for example,
list.name=jiraLookup).
Parameter Value
Credential Name of the credential set created on step 5(for example, Jira Credentials).
Trust Invalid SSL Select this if service’s certificate is self-signed or is not recognized by browsers.
Certificates
Required Approval Select users from the list who can provide approval before executing actions on this
From integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Configuring Jira
1. Navigate to Jira Administration<Manage apps.
2. Click Upload app and choose the Jira add-on jar file that is provided. After the installation
completion, the plugin is visible in the User-installed apps.
Note:You can also download the Jira add-on jar file from Marketplace.
3. Click Configure. Specify the values for Base URL, Client ID, Client Secret (as noted during
creating an API user in Configuring SOAR part) and SOAR username (SOAR needs a JIRA
user to access Jira service).
4. Click Save.
Note: Now you can start creating issue on Jira by Create Issue capability on SOAR.
Capabilities
1. Create Issue
Action capability for creating issue on Jira.
The following table presents the Create Issue action capability details:
Project Key Key of the project that you want to create Text No Yes
issue in it.
Output:
Case Scope: N/A
Human Readable Output: N/A
2. Send Comment
Action capability for sending comment to related issue.
The following table presents the Send Comment action capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
3. Update Issue
Action capability for updating attributes of the issue
The following table presents the Update Issue action capability details:
Input Parameter Description Type Scope Restricted (Yes/ No) Required (Yes/ No)
Output:
Case Scope: N/A
Human Readable Output: N/A
4. Update Issue Status
Action capability for updating status of the issue.
The following table presents the Update Issue Status action capability details:
Output:
Case Scope: N/A
Human Readable Output: N/A
Note: We are supporting Update Status, Update Severity, Update Description, Update
Subject and Add Comment capabilities through SOAR application. If the Jira user changes
any of the related items in the Jira issue, and if that issue description contains SoarCaseId
then the prepared API requests are sent to SOAR.
SOAR then adds the SOAR CaseId into description-field during the creation of the Jira Issue.
The Add-On uses this SoarCaseId for SOAR API requests.
Integration Capabilities
ArcSight SOAR has the following integration capability with database servers:
l JDBC Query
Use Case: Querying HR Database
With this integration, while investigating an incident SOAR can run a query on HR database to
see if they are logged on the user on a suspicious endpoint. This can either be performed
automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l A database listener or service for SOAR to access.
l Create a DB user account for SOAR to run the SQL queries.
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
a. Internal Credential
Parameter Value
Password Password for user account that was configured on database server
b. Credential Store
Parameter Value
Name Name of the credential with pull path of the safe on store.
Credential Name of the credential set created on step 2. (For example, Database Server Credentials).
Trust Invalid Select this if device’s certificate is self-signed or is not recognized by browsers
SSL
Certificates
Require Select users from the list who can provide approval before executing actions on this
Approval from integration
Notify Select users from the list to notify when SOAR performs an action on this integration.
5. Click Test. The following pop up will be displayed if your credential and address are valid.
6. Click Save to complete integration.
Integration Overview
SOAR uses Juniper SRX Firewall to block IP addresses on the network perimeter using the
incident scopes.
Integration Capabilities
Action
l Block
l Custom Script
Configuration
Configuring Juniper SRX Firewall
l Access to SSH as SOAR connects to Juniper SRX Firewall integration using SSH
l A SOAR user with admin role
Configuring SOAR
1. Click Configuration > Integrations > Create Integration.
2. Specify the following parameter values in the Configuration form:
Parameter Value
Credential Name of the credential set created on step 2 (For example, FortiMail
Credentials)
Parameter Value
Trust Invalid SSL Certificates Select this if Integrations’s certificate is self-signed or is not recognized by
browsers.
Require Approval From Select users from the list who can provide approval before executing actions
on this integration
Notify Select users from the list to notify when SOAR performs an action on this
integration
Note: You might have to review the integration actions defined and executed through the
Juniper SRX Firewall related custom scripts in SOAR.
3. To find the following custom scripts, navigate to Configuration > Custom Scripts.
l Juniper SRX Firewall Availability Check Default Template
l Juniper SRX Firewall SSH Device Action (Block) Default Template
Integration Overview
Kannel is an open source SMS Gateway which is used widely for sending in either single or bulk
SMS(Short Message Service). Kannel links HTTP based services to various SMS centers using
various protocols.
Integration Capabilities
Supported Action Capabilities
Kannel SMS Gateway allows user notifications using SMS messages which was set when
creating the Playbook involving this integration.
Configuration
Configuring Kannel SMS Gateway
l Configure the integration to send SMS messages.
Configuring SOAR
Following are the steps to create the integration:
1. Navigate to Configuration > Parameters.
2. Configure SMS Device to be used as the ID of Kannel SMS Gateway integration.
3. To configure the integration, navigate to Configuration > Integrations.
4. Specify the following parameter values in the Integration Editor:
Parameter Value
Parameter Value
Trust Invalid SSL Certificates Select this if Integrations’s certificate is self-signed or is not recognized by
browsers.
Require Approval From Select users from the list who can provide approval before executing actions
on this integration
Notify Select users from the list to notify when SOAR performs an action on this
integration
Integration Overview
ArcSight SOAR is capable of communicating with Kaspersky Security Center through WinRM
and Powershell to block hashes, add tags to hosts, run tasks, move hosts to groups and retrieve
information about various management objects.
Integration Capabilities
l Block (blacklist) SHA-256 or MD5 hash, with rollback support
l Add tag to host, with rollback support
l Move host to group
l Run task
l Retrieve host information
Configuration
Configuration on Kaspersky Security Center
l To define a Kaspersky Security Center installation as an integration on your
SOAR, following integration specific configuration should be performed.
l SOAR should be able to access the server with Kaspersky Security Center through WinRM
on the network; usually with TCP port 5985 or 5986 (if SSL is enabled on WinRM). See
WinRM Integration Guide for details on how to configure WinRM access.
l A local or domain administrator user account is required execute various capabilities.
l 32-bit version of Windows Scripting Host (which is available on a default Windows
installation) is required to execute built-in scripts, which is usually located at
C:\Windows\SYSWOW64\cscript.exe.
Configuring SOAR
l While creating this integration via Integrations tab of Configuration menu:
l Name: Display name of the integration.
l Address: Address of the integration. Format of the address should be
IP, IP:port, dns.hostname.localnet, or dns.hostname.localnet:port for HTTP;
or prefixed with https:// if HTTPS/SSL listener was enabled on WinRM.
l Credential: Credential that has been defined for this integration under the Credentials
menu.
Optional configuration
l blockhash.categoryname: Category name to add block hashes into; if unspecified
defaults to SOAR. If specified category name doesn’t exist, it will be automatically created.
l path.cscriptexe: Location of the 32-bits version of the cscript.exe on server.
If unspecified, defaults to "C:\\Windows\\SysWOW64\\cscript.exe".
enrichment.gettagnames Retrieve names of tags available for Add tag to host capability
Important points
l When these parameters are specified, built-in scripts will be ignored and the customization
with specified ID will be used instead as the script. All scripts should target Windows
Scripting Host with Javascript language, unless a different/compatible interpreter is
specified in path.cscriptexe parameter in integration configuration. See
[https://support.kaspersky.com/9291](Kaspersky Enterprise Security Administration Kit
Automation10) for reference on using its COM/ActiveX API.
l SOAR’s implementation is sensitive to the expected output of these scripts; overriding a
capability with a script that doesn’t write expected output to stdout may break existing
functionality.
l Scripts are automatically evaluated as StringTemplate and various parameters are injected
into the template for block hash, run task, move host into group, add tag and host
information capabilities. See built-in scripts below for example usage and
[http://www.stringtemplate.org](String Template Website) for more details on how to
make use of the ST engine.
Example:
# 4214 is the ID of the customization to override this capability.
execute.runtask=4214
Built-in Tasks
Get Task Names
function obj(name) {
return new ActiveXObject("klakaut.KlAk" + name);
}
try {
var oConnectProps = obj("Params"), oAdmServer = obj("Proxy"),
oSrvView = obj("SrvView"),
oTasks = obj("Tasks2"), item, enumObj;
oConnectProps.Add("Address", "127.0.0.1:13291");
oAdmServer.Connect(oConnectProps);
function obj(name) {
return new ActiveXObject("klakaut.KlAk" + name);
}
function EnumerateGroups(oSubgroupsEnum) {
var enumObj = new Enumerator(oSubgroupsEnum);
for (;!enumObj.atEnd();enumObj.moveNext()) {
var oObj = enumObj.item();
WScript.Echo(oObj.Item("id") + '=' + oObj.Item("name"));
if (oObj.Check("groups")) {
EnumerateGroups(oObj.Item("groups"));
}
}
}
try {
var oConnectProps = obj("Params"), oAdmServer = obj("Proxy"),
oGroups = obj("Groups");
oConnectProps.Add("Address", "127.0.0.1:13291");
oAdmServer.Connect(oConnectProps);
oGroups.AdmServer = oAdmServer;
WScript.Echo('[OK] [BEGIN]');
EnumerateGroups(oGroups.GetSubgroups(oGroups.GroupIdGroups, 0));
WScript.Echo('[END]');
} catch (e) {
WScript.Echo("[Error] " + e.number + " occured !!! " + e.description);
ret.SetSize(len);
for (var i=0; i<len; i++) {
ret.SetAt(i, (arguments.length == 1 ? "KLHST_WKS_" : "") + args[i]);
}
return ret;
}
function g(a, e) {
var r = e.item('KLHST_WKS_' + a);
if (r === undefined) {
r = '';
}
return r;
}
var rtpState = ["Unknown", "Stopped", "Suspended", "Starting", "Running",
"Running (Maximum protection)", "Running (Maximum speed)",
"Running (Recommended settings)", "Running (Custom settings)",
"Failure"];
function getStatus(v) {
var r = [];
if ((v & 1) == 1) {
r.push("Visible");
}
if ((v & 4) == 4) {
r.push("Agent:Installed");
}
if ((v & 8) == 8) {
r.push("Agent:Alive");
}
if ((v & 16) == 16) {
r.push("Real-Time-Protection:Installed");
return r.join(",");
}
try {
var oConnectProps = obj("Params"), oAdmServer = obj("Proxy"),
oHosts = obj("Hosts"), c=0;
oConnectProps.Add("Address", "127.0.0.1:13291");
oAdmServer.Connect(oConnectProps);
oHosts.AdmServer = oAdmServer;
var fieldsToReturn = "LAST_VISIBLE|STATUS|RTP_STATE|LAST_UPDATE|LAST_
FULLSCAN|
WINHOSTNAME|WINDOMAIN|OS_NAME|OS_VER_MAJOR|OS_VER_MINOR|IP_LONG|PRODUCT_TAG_
NAME";
var ftr = fieldsToReturn.split('|');
var enumObj = new Enumerator(oHosts.FindHosts("(KLHST_WKS_IP_LONG=" +
ip2long('%host%') + ")", coll(fieldsToReturn), coll()));
WScript.Echo('[OK]');
for (; !enumObj.atEnd(); enumObj.moveNext()) {
var e = enumObj.item();
WScript.Echo('[' + c++ + ']' +
'LAST_VISIBLE=' + Date.parse(g('LAST_VISIBLE', e)) +
'|LAST_UPDATE=' + Date.parse(g('LAST_UPDATE', e)) +
'|LAST_FULLSCAN=' + Date.parse(g('LAST_FULLSCAN', e)) +
'|WINHOSTNAME=' + g('WINHOSTNAME', e) +
'|WINDOMAIN=' + g('WINDOMAIN', e) +
'|OS=' + g('OS_NAME', e) + ' (' + g('OS_VER_MAJOR', e) + '.' +
g('OS_VER_MINOR', e) + ')' +
'|IP=' + long2ip(g('IP_LONG', e)) +
'|RTP_STATE=' + rtpState[g('RTP_STATE', e)] +
'|STATUS=' + getStatus(g('STATUS', e)) +
'|PRODUCT_TAG_NAME=' + g('PRODUCT_TAG_NAME', e)
);
}
WScript.Echo("[END] Retrieved information for " + c + " hosts.");
} catch (e) {
WScript.Echo("[Error] " + e.number + " occured !!! " + e.description);
}
}
var oCatToAdd, oInclProps, i, oCatProps = obj("Params"), oCatData = catFound
?
oCategory.getCategory(catFound) : null, oInclusions = catFound ?
oCatData.Item('inclusions') : obj("Collection");
for (i=0; i<hashes.length; i++) {
oInclProps = obj("Params");
oInclProps.Add('ex_type', 3);
oInclProps.Add(hashes[i].length == 32 ? 'str' : 'str2', hashes[i]);
oInclProps.Add('str_op', 0);
oInclusions.SetSize(oInclusions.Count + 1);
oInclusions.setAt(oInclusions.Count - 1, oInclProps);
}
if (!catFound) {
oCatProps.Add('name', '%categoryname%');
oCatProps.Add('CategoryType', 0);
oCatProps.Add('inclusions', oInclusions);
oCatToAdd = oCategory.CreateCategory(oCatProps);
WScript.Echo("[OK] [CREATED] Added " + hashes.length +
' hashes to newly created category: %categoryname%');
} else {
oCategory.UpdateCategory(catFound, oCatData);
WScript.Echo("[OK] [UPDATED] Added " + hashes.length +
' hashes to existing category: %categoryname% its current size is: '
+ oInclusions.Count);
}
} catch (e) {
WScript.Echo("[Error] " + e.number + " occured !!! " + e.description);
}
try {
var oConnectProps = obj("Params"), oAdmServer = obj("Proxy"),
oTagsControl = obj("TagsControl"), oHosts = obj("Hosts"),
oFields2Return = obj("Collection"), enumObj, taggedHosts = 0;
oConnectProps.Add("Address", "127.0.0.1:13291");
oAdmServer.Connect(oConnectProps);
oTagsControl.Prop("ListName") = "HostsTags";
oTagsControl.AdmServer = oHosts.AdmServer = oAdmServer;
oFields2Return.SetSize(1);
oFields2Return.SetAt(0, "KLHST_WKS_HOSTNAME");
enumObj = new Enumerator(oHosts.FindHosts("(KLHST_WKS_IP_LONG=" +
ip2long('%host%') +
")", oFields2Return, obj("Collection")));
for (; !enumObj.atEnd(); enumObj.moveNext()) {
var oTagArrayItem = obj("Params");
oTagArrayItem.Add("KLTAGS_VALUE", "%tag%");
oTagArrayItem.Add("KLTAGS_SET", true);
var oTagArray = obj("Collection");
oTagArray.SetSize(1);
oTagArray.SetAt(0, oTagArrayItem);
var oHostsArrayItem = obj("Params");
oHostsArrayItem.Add("KLTAGS_ITEM_ID", enumObj.item().item('KLHST_
WKS_HOSTNAME'));
oHostsArrayItem.Add("KLTAGS_TAGS", oTagArray);
var oHostsArray = obj("Collection");
oHostsArray.SetSize(1);
oHostsArray.SetAt(0, oHostsArrayItem);
var oSetTagsCallProps = obj("Params");
oSetTagsCallProps.Add("KLTAGS_FULL_REPLACE", false);
oTagsControl.SetTags(oHostsArray, oSetTagsCallProps);
taggedHosts++;
}
WScript.Echo("[OK] Added '%tag%' to " + taggedHosts + " hosts.");
} catch (e) {
WScript.Echo("[Error] " + e.number + " occured !!! " + e.description);
}
}
try {
var oConnectProps = obj("Params"), oAdmServer = obj("Proxy"),
oTagsControl = obj("TagsControl"), oHosts = obj("Hosts"),
oFields2Return = obj("Collection"), enumObj, tagRemovedHosts = 0,
removedTagCount;
oConnectProps.Add("Address", "127.0.0.1:13291");
oAdmServer.Connect(oConnectProps);
oTagsControl.Prop("ListName") = "HostsTags";
oTagsControl.AdmServer = oHosts.AdmServer = oAdmServer;
oFields2Return.SetSize(1);
oFields2Return.SetAt(0, "KLHST_WKS_HOSTNAME");
enumObj = new Enumerator(oHosts.FindHosts("(KLHST_WKS_IP_LONG=" +
ip2long('%host%') + ")", oFields2Return, obj("Collection")));
for (; !enumObj.atEnd(); enumObj.moveNext()) {
var hostId = enumObj.item().item('KLHST_WKS_HOSTNAME');
var oHostIds = obj("Collection");
oHostIds.setSize(1);
oHostIds.SetAt(0, hostId);
var oExistingTagArray = oTagsControl.GetTags(oHostIds, obj("Params"));
var oTagArray = obj("Collection");
removedTagCount = 0;
for (var i = 0; i < oExistingTagArray.Count; i++) {
var oTagEntry = oExistingTagArray.Item(i);
var oTagValues = oTagEntry.Item("KLTAGS_TAGS");
for (var j = 0; j < oTagValues.Count; j++) {
var tag = oTagValues.Item(j);
if (tag != '%tag%') {
oTagArray.SetSize(oTagArray.Count + 1);
var oTagArrayItem = obj("Params");
oTagArrayItem.Add("KLTAGS_VALUE", tag);
oTagArrayItem.Add("KLTAGS_SET", true);
oTagArray.SetAt(oTagArray.Count - 1, oTagArrayItem);
} else {
removedTagCount++;
}
}
}
var oHostsArrayItem = obj("Params");
oHostsArrayItem.Add("KLTAGS_ITEM_ID", hostId);
oHostsArrayItem.Add("KLTAGS_TAGS", oTagArray);
var oHostsArray = obj("Collection");
oHostsArray.SetSize(1);
oHostsArray.SetAt(0, oHostsArrayItem);
var oSetTagsCallProps = obj("Params");
oSetTagsCallProps.Add("KLTAGS_FULL_REPLACE", true);
oTagsControl.SetTags(oHostsArray, oSetTagsCallProps);
if (removedTagCount > 0) {
tagRemovedHosts++;
}
}
WScript.Echo("[OK] Removed '%tag%' from " + tagRemovedHosts + "
hosts.");
} catch (e) {
WScript.Echo("[Error] " + e.number + " occured !!! " + e.description);
}
Integration Overview
MAY Siber Scop NET is a NAC platform that provides visibility to any connected device across
the network by integrating switches, routers and firewalls. This integration has been tested
with MAY Siber Scop NET 7.1.17 version.
Integration Capabilities
ArcSight SOAR has the following integration capability with MAY Siber Scop NET:
Block
Use Case: Isolating Mal-behaving PC
With MAY Siber Scop NET integration, while responding an incident ATAR may block
malbehaving computers’ network access in order to contain the attack and prevent further
spread of the attack. Blocking the host can be performed automatically within a playbook or
manually by an analyst.
Configuration
Prerequisites
l SOAR connects to MAY Siber Scop NET API via HTTPS. Typically it runs on 443/tcp port. So
access to this service is required.
l An API key is required for SOAR to connect to MAY Siber Scop NET.
Configuring SOAR
1. Navigate to Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form as follows:
Integration Guide for MAY Siber Scop NET Page 271 of 482
Integration Guides
a. Internal Credential:
Type Name Username Password Private
Key
Internal Display name of credential Empty. Web Service Key you Empty.
credential. set (i.e., MAY Siber Scop NET have created for ATAR
Credential). on MAY Siber Scop
NET.
b. Credential Store:
Type Name
External credential. Name of the credential with pull path of the safe on store.
Credential: Name of the credential set you’ve just created on step 2. (i.e., MAY Siber Scop NET
Credential).
Trust Invalid Select this if Engine’s certificate is self-signed or not recognized by browsers. Not selected.
SSL Certificates:
Require Select user(s) from list to ask her/his approval before executing actions on this integration.
Approval From:
Notify: Select user(s) from the list to notify when ATAR performs an action on this integration.
Integration Overview
McAfee ePolicy Orchestrator (ePO) is a management server for McAfee products which are
used to protect endpoints from malware and network threats. It provides a centralized
management console to simplify and accelerate the security effectiveness with visibility and
control from device to cloud. This integration has been tested with McAfee ePolicy
Orchestrator NET 5.10 version.
Integration Capabilities
l SOAR has the following integration capabilities with McAfee ePolicy Orchestrator:
l Assign Policy
l Apply Tag
l Host Information
l Move Host
l Run Task
l Set TIE Reputation
Use Case: Examining suspicious endpoint
With this integration, during the investigation of an incident SOARmay start an on-demand
scan on a suspicious endpoint and may force new policy or move host to other place in system
tree regarding scan result. This can be performed automatically within a playbook or manually
by an analyst.
Configuration
Prerequisites
l SOAR connects to McAfee ePolicy Orchestrator API through HTTPS. Typically it runs on
8443/tcp port. So access to this service is required.
l An user account is required for SOAR to connect McAfee ePolicy Orchestrator.
2. View and change policy settings for the products that you want SOAR to chance policies for
(for example: Endpoint Security Threat Prevention, Endpoint Security Firewall, Active
Response, etc.)
3. Navigate User Management > Users and create a user with permission set you in previous
step.
Configuring SOAR
1. Navigate to Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form as follows:
a. Internal Credential:
Type Name: Username: Password: Private
Key:
Internal Display name of credential set Username you have Password for the user Empty.
credential. (i.e., McAfee ePO Credentials). configured on you have configured
McAfee ePolicy on McAfee ePolicy
Orchestrator. Orchestrator.
b. Credential Store:
Type: Name:
External credential. Name of the credential with pull path of the safe on store.
system.move.autoSort=false
clienttask.run.retryAttempts =
clienttask.run.retryIntervalInSeconds =
clienttask.run.abortAfterMinutes =
clienttask.run.useAllAgentHandlers =
clienttask.run.stopAfterMinutes=
clienttask.run.randomizationInterval =
policy.assignToSystem.resetInheritance=
Trust Invalid SSL Certificates Select this if Engine’s certificate is self-signed ornot
recognized by browsers.
Require Approval From Select user(s) from list to ask her/his approval
beforeexecuting actions on this integration.
Integration Overview
McAfee Network Security Platform is an intrusion prevention system (IPS) to identify malicious
network traffic and stops never-before-seen attacks for which no signatures exist. This
integration has been tested with McAfee Network Security Platform 9.2.7.22 version.
Integration Capabilities
SOAR has the following integration capabilities with McAfee Network Security Platform:
l Blacklist MD5 Hash
l Quarantine IP address
Configuration
Prerequisites
l SOAR connects to McAfee Network Security Platform’s API via HTTPS. By default McAfee
Network Security Platform REST-API interface works on 443/tcp port. So access permission
to this port is required.
l A user account is required for SOAR to connect McAfee Network Security Platform.
Configuring SOAR
1. Navigate Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form as follows:
a. Internal Credential:
Integration Guide for McAfee Network Security Platform (IPS) Page 276 of 482
Integration Guides
Internal Display name of credential set User you have created Password of the user Empty.
credential. (i.e., McAfee NSP Credentials). for SOAR on McAfee you have created for
Network Security SOAR on McAfee
Platform. Network Security
Platform.
b. Credential Store:
Type Name
External credential. Name of the credential with pull path of the safe on store.
Credential Name of the credential set you’ve just created on step 2. (i.e., McAfee NSP Credentials).
Require Select user(s) from list to ask her/his approval before executing actions on this integration.
Approval
From
Notify Select user(s) from the list to notify when SOAR performs an action on this integration.
Integration Overview
McAfee Web Gateway is a web filtering solution which utilizes both reputation and
categorybased filtering and protection against zero-day malware as well. This integration has
been tested with McAfee Web Gateway 7.7.2.8.0 version.
Integration Capabilities
SOAR has the following integration capability with McAfee Web Gateway:
l Block URL
Use Case: Blocking access to malicious URL
SOAR can integrate with McAfee Web Gateway to block malicious URLs detected while
responding an incident. Blocking can be performed automatically within a playbook or
manually by an analyst.
Configuration
Prerequisites
l SOAR connects to McAfee Web Gateway’s API through HTTPS. By default McAfee Web
Gateway REST-API interface works on 4712/tcp port. So access permission to this port is
required.
l A user account for SOAR to connect to McAfee Web Gateway.
4. Create a new rule and enable it under Policy > Rule Sets > URL Filtering menu to use list
created in previous step. Rule criteria should be:
URL.Host matches in list ATARBlock
5. Save changes.
Configuration on SOAR
1. Navigate Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form as follows:
a. Internal Credential:
Type Name Username Password Private
Key
Internal Display name of credential User you have created Password of the user Empty.
credential. set (i.e., McAfee Web GW for SOAR on McAfee you have created for
Credential). Web Gateway. SOAR on McAfee Web
Gateway.
b. Credential Store:
Type Name
External credential. Name of the credential with pull path of the safe on store.
Credential Name of the credential set you’ve just created on step 2. (i.e., McAfeeWeb GW
Credential).
Parameter Value
Trust Invalid SSL Select this if Engine’s certificate is self-signed ornot recognized by browsers.
Certificates
Require Approval Select user(s) from list to ask her/his approval before executing actions on this
From integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Integration Overview
McAfee Web Gateway is a web filtering solution which utilizes both reputation and
categorybased filtering and protection against zero-day malware as well.
Integration Capabilities
SOAR has the following integration capability with McAfee Web Gateway v2:
l Add Entry to List
l Remove Entry from List
l Get List Entries
l Get List Entry Details
l Get Lists
Configuration
Configuring SOAR
1. Navigate Configuration > Credentials and click Create Credential.
2. Specify the following parameter values in the Credential Editor form:
Parameter Value
Username <Username>
Password <password>
Address https://{base_url:port}
Parameter Value
# ArcSight SOAR will use the specified list name when no List parameter is
specified
default.list.name=ATARBlockList
#proxy.id=123
#max.result.count=100
Credential Name of the credential set you’ve just created on step 2. (i.e., McAfeeWebGateway v2
Credentials).
Trust Invalid Select this if Engine’s certificate is self-signed ornot recognized by browsers.Not selected
SSL
Certificates
Require Select user(s) from list to ask her/his approval before executing actions on this integration.
Approval
From
Notify Select user(s) from the list to notify when SOAR performs an action on this integration.
Batch Size 1
Connection Limit 1
6. Click Test, an Integration Successful message is displayed if the credential and address are
valid.
7. Click Save to complete the integration.
Capabilities
1. Add Entry to List
Action capability to take the List name/ID to be added, Value to be added, and Description
of the entry being added, and adds entry to the list. An asterisk can be added to the
beginning and/or end of the value.
Input Description Type Scope Required
Parameter Restricted (Yes/ No)
(Yes/ No)
Value Entry value to add to the list Network Address, Yes Yes
Host, URL, Keyword,
Unknown
Output:
Case Scope
N/A
Human Readable Input
N/A
2. Remove Entry from list
Action capability that takes the List name/ID and the Value of the entry to remove, then
removes the entry from the list. An asterisk can be added to the beginning and/or end of
the value.
Output:
Case Scope:
N/A
Human Readable Output
N/A
3. Get List Entries
Takes the List name and returns the entries
Input Description Type Scope Required
Parameter Restricted (Yes/ No)
(Yes/ No)
List Name or ID of the list. If not specified, the default list String No No
in the configuration will be used.
Output:
Case Scope
Value Entry value to fetch details for. Network Address, Yes Yes
Host, URL, Keyword,
Unknown
Output:
Case Scope
Action Type Category/Value
5. Get Lists
Enrichment capability that takes the list types and retrieves all available lists for the list
type specified.
Input Description Type Scope Restricted Required
Parameter (Yes/ No) (Yes/ No)
Type Type of the list Type of the list such as All, IP, IP Range, No Yes
Number, Regex, String
Output:
Case Scope:
Action Type Category/Value
Integration Guide for Micro Focus Arcsight ESM Page 287 of 482
Integration Guides
Integration Guide for Micro Focus ArcSight Intelligence Page 288 of 482
Integration Guides
Integration Overview
ArcSight Logger is a log management solution for compliance, efficient log search, and secure
storage.
Integration Capabilities
ArcSight SOAR has the following integration capability with Micro Focus ArcSight Logger:
l Search Query
Use Case: Investigating Cyber-attacks
Integrated with Micro Focus ArcSight Logger, ATAR queires logs collected from various
enterprise systems to enrich incident ticket, and improve analyst’s understanding of incident.
Configuration
Prereqisites
l Currently SOAR supports Micro Focus ArcSight Logger version 6.3.1.7874.0 and later.SOAR
connects to Micro Focus ArcSight Logger API using HTTPS. By default REST-API interface
works on 443/tcp port. So access permission to this port is required.
l A user account is required for ATAR to connect Micro Focus ArcSight Logger.
Configuring SOAR
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
Integration Guide for Micro Focus ArcSight Logger Page 289 of 482
Integration Guides
a. Internal Credential
Parameter Value
Name Display name of credential set (For example, ArcSight Logger Credentials)
Username User you have created for ATAR on Micro Focus ArcSight Logger.
Password Password of the user you have created for ATAR on Micro Focus ArcSight
Logger.
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
events.pageLength=10000
# configure how far (in minutes) into the past this enrichment will look.
#cache.reusing.duration=20
# local search enabling parameter for Search Query capability.
# If this is set false, ATAR will perform searches on all nodes.
#local.search.enabled=false
# use master session while fetching events from peers for Search Query.
# If this is set true, ATAR will use the same session ID while performing
# searches on the other nodes.
#reuse.master.session=false
# peers credential list (if master session won't be shared)
# peer address and credential ID values must be separated with :
# additional peer-credential pairs must be separated with |
#peer.credential.list=1.1.1.1:CredentialId|2.2.2.2:CredentialId
Credential Name of the credential set created on step 2 (For example, ArcSight Logger Credentials)
Trust Invalid Select this if Engine's certificate is self-signed or is not recognized by browsers
SSL Certificates
Additional Notes
l In order to execute queries on Micro Focus ArcSight Logger, you should create query
scripts with ArcSight Logger Query type under Configuration -> Customization Library.
l SOAR extracts scope items on columns defined as Artifact in the query script. For example,
// Artifact: deviceCustomNumber1Label | KEYWORD | RELATED
Integration Overview
Microsoft Active Directory is an umbrella title for directory-based identity related services that
Microsoft developed for the Windows domain networks.
ArcSight SOAR has the following integration capabilities with Microsoft Active Directory:
l Add user to a group
l Remove user from a group
l Lock user acoount
l Get user information
l Get user’s groups
l Get group list
l Get group information
l Get computer information
l List computers on domain
l Fetch a domain object
Use Case: Compromised user account
During the investigation of the attack SOAR can ask Microsoft Active Directory the details of
theuser account suspicious to be compromised, check the groups account belongs to, locks the
account, fetches her/his manager’s information and send a notification e-mail to manager if
needed.
This can be performed automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l SOAR connects to Microsoft Active Directory using LDAPS protocols. Access to 636/tcp
l port is required.
l A domain user account is required for SOAR to connect Microsoft Active Directory.
Configuring SOAR
1. Navigate Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form as follows:
a. Internal Credential:
Type Name: Username Password Private
Key
Internal Display name of credential User you have created for Password of the Empty.
credential. set (i.e., Microsoft AD SOAR on Microsoft Active user you have
Credentials). Directory (the format should created for SOAR
be username@domain). on Microsoft
ActiveDirectory.
b. Credential Store:
Type Name
External credential. Name of the credential with pull path of the safe on store.
Parameter Value
cache.reusing.duration=30
Credential Name of the credential set you’ve just created on step 2. (i.e., Microsoft AD Credentials).
Trust Invalid Select this if Engine’s certificate is self-signed or not recognized by browsers.
SSL Certificates
Require Select user(s) from list to ask her/his approval before executing actions on this integration.
Approval From
Notify Select user(s) from the list to notify when SOAR performs an action on this integration.
Integration Overview
Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management
service, that helps users to sign-in and access both external and internal resources, for example
Microsoft 365, Azure portal, SaaS applications and many more.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Azure Active Directory:
l Add User to Group
l Disable User
l Enable User
l Get User Details
l Get User’s Manager
l List Groups
l List User’s Groups
l List Users
l Remove User from Group
l Revoke Sessions
l Create Group
l Delete Group
l List Delegated Permissions
Prerequisites
You must have access to HTTPS as the ArcSight SOAR connects to Azure Active Directory API
through this service.
Integration Guide for Microsoft Azure Active Directory Page 295 of 482
Integration Guides
Configuration
3. Click Add a certificate or secret and create a new Client secret. Add ArcSight SOAR as
description and specify the expiry period as 24 months.
4. Note the Secret Key value and Client ID.
5. Navigate to API Permissions and add the following permissions:
Permission Type Permission Description
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor form.
Type Name Username Password Private
Key
Credential Credential that has been defined for this integration under the Credentials
menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capabilities
1. Add User to Group
Action capability for adding a user to given AD group.
• Rollback: Yes
• Duplicate Control: No
The following table provides the Add User to Group action capability details
Output:
Case Scope: N/A
Human Readable Output: N/A
2. Disable User
Action capability for disabling user account by blocking the sign-in procedure.
• Rollback: Yes
• Duplicate Control: No
The following table provides the Disable User action capability details:
Parameter Description Type Scope Restricted Required
(Yes/ No) (Yes/ No)
Output:
Case Scope: N/A
Human Readable Output: N/A
3. Enable User
Action capability for enabling user account by removing sign-in block.
• Rollback: Yes
• Duplicate Control: No
The following table provides the Enable User action capability details:
Parameter Description Type Scope Restricted Required
(Yes/ No) (Yes/ No)
Output:
Case Scope: N/A
Human Readable Output: N/A
4. Get User Details
Enrichment capability for retrieving user details.
The following table provides the Get User Details enrichment capability details:
Parameter Description Type Scope Restricted (Yes/ Required (Yes/
No) No)
Output:
Case Scope:
Action Type Category/ Value
Output:
Case Scope:
Action Type Category/ Value
6. List Groups
Enrichment capability for retrieving AD group list.
The following table provides the List Groups enrichment capability details:
Parameter Description Type Scope Restricted (Yes/ Required (Yes/
No) No)
Output:
Case Scope:
Action Type Category/ Value
Output:
Case Scope:
Action Type Category/ Value
8. List Users
Enrichment capability for retrieving list of users.
The following table provides the List Users enrichment capability details:
Output:
Case Scope:
Action Type Category/ Value
Output:
Case Scope: N/A
Human Readable Output: N/A
Output:
Case Scope: N/A
Human Readable Output: N/A
11. Create Group
Action capability for creating a new group from a given AD.
• Rollback: No
• Duplicate Control: No
The following table provides the Create Group action capability details:
Parameter Description Type Scope Required
Restricted (Yes/ No)
(Yes/ No)
Group The mail alias for the group, unique for Microsoft String No Yes
Nickname 365 groups in the organization.
Maximum length is 64 characters.
This property can contain only characters in the
ASCII character set 0 - 127 except the following: @
() \ [] " ; : . <> , SPACE.
Group Name The name to display in the address book for the String No Yes
group.
Maximum length: 256 characters
Output:
Case Scope: N/A
Human Readable Output: N/A
12. Delete Group
Action capability to delete a group from a given AD.
• Rollback: No
• Duplicate Control: Yes
The following table provides the Delete Group action capability details:
Parameter Description Type Scope Restricted Required
(Yes/ No) (Yes/ No)
Output:
Case Scope: N/A
Human Readable Output: N/A
13. List Delegated Permissions
Enrichment capability to list delegated permissions.
The following table represents the List Delegated Permissions enrichment capabilities
details:
Output:
Case Scope: N/A
Human Readable Output:
Integration Overview
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help
enterprise networks prevent , detect, investigate, and respond to advanced threats.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Micro Focus ArcSight Intelligence:
l Get Alert by ID
l Get Domain Statistics
l Get File Information
l Get File Related Machines
l Get File Statistics
l Get Installed Software
l Get IP Statistics
Prerequisites
ArcSight SOAR connects to Microsoft Defender API using HTTPS. Access to Microsoft portal
login.microsoft.com is required.
2. Click App Registration > New Registration. Complete the ArcSight SOAR application
registration by specifying the following parameter values in the Register an application
form:
3. Select your application and Click Add a certificate or secret > New Client Secret. Add a
description and specify the expiry period as 24 months.
Note down the Secret Key value along with Client ID and tenant ID.
4. Click API Permissions > Add a Permission and select Windows Defender API. Add the
following permissions from WindowsDefender ATP:
Permission Permission Description
Type
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Configuration Form:
Parameter Value
Username Empty
Password client_id of the application created above for SOAR on Azure portal.
Private Key Secret key of the application created above for SOAR on Azure portal.
Parameter Value
cache.reusing.duration Configure how far (in minutes) into the past this
enrichment will look.
Credential Credential that has been defined for this integration under the Credentials menu
Notify Select user(s) from the list to notify when SOAR performs an action on this integration
5. Click Save.
6. Navigate to Configuration > Customization Library and edit Microsoft Defender for
Endpoint Advanced Action Script Default Template
7. Select the integration that you have created in step 4 from the Integrations drop-down
menu and click Save.
8. Click Test, and Integration Successful message is displayed if the credential and address
are valid.
Capabilities
1. Get Alert by ID
Enrichment capability for getting details of an alert by Alert ID.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
2. Get Domain Statistics
Enrichment capability for retrieving statistics on a domain.
Output:
Case Scope
N/A
Human Readable Output
N/A
3. Get File Information
Enrichment Capability for getting file details
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
File Hash SHA1 & SHA256 file hash String Yes Yes
from case scope
Output:
Case Scope
Human Readable Output
4. Get File Related Machines
Enrichment capability for Retrieving a collection of machines related to a given file hash
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
File Hash SHA1 file hash from case String Yes Yes
scope
Output:
Case Scope
Human Readable Output
N/A
5. Get File Statistics
Enrichment capability for Retrieving the statistics for given file.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
File Hash SHA1 file hash from case String Yes Yes
scope
Output:
Case Scope
Human Readable Output
N/A
6. Get Installed Software
Enrichment capability for Retrieving a collection of installed software related to a given
device ID.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
Human Readable Output
N/A
7. Get IP Statistics
Enrichment capability for Retrieving the statistics for given IP.
Input Description Type Scope Restricted Required
Parameter (Yes/No) (Yes/No)
Output:
Case Scope
Human Readable Output
N/A
8. Get Logon Users
Enrichment capability for Retrieving collection of logged on users on a specific device
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
Human Readable Output
N/A
9. Get Machine Details
Enrichment capability for retrieving machine details for given IP address.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
Human Readable Output
N/A
10. List Alerts
Enrichment capability for retrieving a collection of alerts in a given time-range.
Output:
Case Scope
N/A
Human Readable Output
N/A
11. List Alerts by Severity
Enrichment Capability for retrieving a collection of alerts for a given severity value in a
given time-range.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
12. List Alerts by Status
Enrichment Capability for retrieving a collection of alerts for a given status value in a given
time-range.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
13. List File Related Alerts
Enrichment capability for retrieving a collection of alerts related to a given file hash.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
Human Readable Output
N/A
14. List Machines
Enrichment capability for retrieving a list of machines that have communicated with
Microsoft
Defender for Endpoint cloud.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
15. List User Related Alerts
Enrichment capability for retrieving a collection of alerts related to a given username.
Output:
Case Scope
Human Readable Output
N/A
16. List Machines By Tag
Enrichment capability for finding machines by a given tag.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
Human Readable Output
N/A
17. Add Machine Tag
Action capability for adding a tag to specific machine.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
Human Readable Output
N/A
18. Assign Alert
Action capability for assigning an alert.
Output:
Case Scope
N/A
Human Readable Output
N/A
19. Isolate Machine
Action capability for isolating device from accessing external network.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
Human Readable Output
N/A
20. Remove Machine Tag
Action capability for removing a tag from a specific machine.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
Human Readable Output
N/A
21. Restrict Code Execution
Action capability for restricting execution of all applications on the device except a
predefined set.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
Human Readable Output
N/A
22. Stop & Quarantine File
Action capability for stopping execution of a file on a device and deleting it.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
File Hash (SHA1) File Hash (SHA1) from String Yes Yes
case scope
Output:
Case Scope
N/A
Human Readable Output
N/A
23. Unisolate Machine
Action capability for releasing machine from isolation.
Input Parameter Description Type Scope Required
Restricted (Yes/No)
(Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
Output:
Case Scope
N/A
Human Readable Output
N/A
25. Update Alert Classification
Action capability for updating alert classification.
Input Parameter Description Type Scope Restricted Required
(Yes/No) (Yes/No)
Output:
Case Scope
Human Readable Output
N/A
26. Update Alert Comment
Action capability for adding comment to an alert.
Input Parameter Description Type Scope Restricted Required
(Yes/No) (Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
Output:
Case Scope
N/A
Human Readable Output
N/A
28. Update Alert Status
Action capability for updating alert status.
Input Parameter Description Type Scope Restricted Required
(Yes/No) (Yes/No)
Output:
Case Scope
N/A
Human Readable Output
N/A
Integration Overview
Micro Focus Service Manager is an IT Service Management (ITSM) Tool that uses the
Information Technology Infrastructure Library (ITIL) framework to provide a web interface for
corporate changes, releases and interactions (request fulfillment) that is supported by a service
catalog and Configuration Management Database (CMDB).
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Micro Focus IT Service Manager:
l Close Incident
l Create Incident
l Update Incident
Prerequisites
You must have access to HTTPS as the ArcSight SOAR connects to Micro Focus IT Service
Manager API through this service.
Configuration
Integration Guide for Micro Focus IT Service Manager Page 319 of 482
Integration Guides
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor form.
Type Name Username Password Private
Key
3. Click Configuration > Lists > Create List. The list must have two columns with the type
keyword. Add a name to the list and save it. The name of the list is used during integration
configuration.
4. Click Configuration > Integrations > Create Integration.
5. Specify the following parameter values in the Configuration form.
Parameter Value
Address URL of the Micro Focus IT Service Manager integration (for example,
http://15.113.165.82:13080).
list.name List name that is used for mapping ArcSight SOAR cases to Micro Focus
IT Service Manager incidents. For example, list.name=mfitsmMapList
proxy.id ID of the Proxy integration if you access Micro Focus IT Service Manager
through a web proxy device. For example, proxy.id = 12345 .
Credential Credential that has been defined for this integration under the Credentials menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by browsers.
Certificates
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capabilities
1. Create Incident
Action capability for creating incident on Micro Focus IT Service Manager
Rollback : No
Duplicate Check: Yes
The following table presents the Create Incident action capability details:
Input Parameter Description Type Scope Restricted (Yes/ Required (Yes/
No) No)
2. Close Incident
Action capability for closing incident on Micro Focus IT Service Manager.
Rollback : No
Duplicate Check: Yes
The following table presents the Close Incident action capability details:
Input Parameter Description Type Scope Restricted (Yes/ No) Required (Yes/ No)
3. Update Incident
Action capability for updating incident on Micro Focus IT Service Manager.
Rollback : No
Duplicate Check: No
The following table presents the update incident action capability details:
Input Parameter Description Type Scope Restricted (Yes/ Required (Yes/
No) No)
Integration Overview
Micro Focus Universal Configuration Management Database (UCMDB) generates and
maintains a Configuration Management Database of information technology items. It includes
a mechanism for automated discovery of IT infrastructure components, such as computers and
network devices.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Micro Focus UCMDB:
l Expose CI Information
l Get CI
l Get Related CIs
Prerequisites
You must have access to HTTPS as the ArcSight SOAR connects to Micro Focus UCMDB API
through this service.
Configuration
Configuring SOAR
1. Click Configuration > Credential > Create Credential
2. Specify the following parameter values in the Credential Editor form:
Type Name Username Password Private
Key
Internal Display name of credential set (for example, Micro Username Password
credential Focus UCMDB Credentials).
cache.reusing.duration Configure how far (in minutes) into the past this
enrichment will look. For example,
cache.reusing.duration=20 .
max.result.count Maximum result count for Get Observed Attack Techniques
capability.For example: max.result.count=200
Credential Credential that has been defined for this integration under the Credentials
menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
9. Click Test, an Integration Successful message is displayed if the credential and address are
valid.
Capabilities
1. Expose CI Information
Enrichment capability for information related to the CIs of a certain type.
The following table presents the CI Enrichment capability details:
Input Description Type Scope Required
Parameter Restricted (Yes/ (Yes/ No)
No)
Type The CI Type. For example, node, sqlserver, unix. Text No Yes
Output:
Case Scope:
Action Type Category/ Value
2. Get CI
Enrichment capability for returning details of a CI.
Output:
Case Scope:
Action Type Category/ Value
ID CI id. If provided this value will be used no matter Keyword Yes Yes
type or ip provided or not.
Type The string that represents the name of a valid Text No Yes
configuration item type from the UCMDB. The name
of the CI Type can be found inside the CI Type
Manager.
Output:
Case Scope:
Action Type Category/ Value
Integration Overview
Exchange Server is a mail server developed by Microsoft.
SOAR has the following integration capabilities with Microsoft Exchange Server :
l Delete email
l Mark email
l Quarantine email
Use Case: Deleting already delivered phishing emails
SOAR can follow email inboxes for user’s phishing reports and automatically creates an
incident record on its service desk. During the investigation of the attack SOAR can extract the
sender address and subject and using these values performs a search on Microsoft Exchange
Server to mark or delete already delivered malicious messages. This can be performed
automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l SOAR connects to Microsoft Exchange Web Service API via HTTPS. So access to 443/tcp
port is required.
l A user account with impersonation role is required for SOAR to connect Microsoft
Exchange.
New-ManagementRoleAssignment \
-Name:<impersonation Assignment Name> \
-Role:ApplicationImpersonation \
-User:<account name>
Configuration on SOAR
1. Navigate Configuration > Credentials and click Create Credential.
2. Specify the parameter values in the Credential Editor form as follows:
a. Internal Credential:
Type Name Username Password Private Key
Internal Display name of User you have configured Password of the user Empty
credential credential set (i.e., SOAR on Microsoft Exchange you have configured
Microsoft Exchange (the format should be for SOAR on
Credentials). username@domain). Microsoft Exchange.
b. Credential Store:
Type: External credential.
Name: Name of the credential with pull path of the safe on store.
3. Navigate toConfiguration -> Integrations and click Create Integration.
4. Specify the parameter values in the Configuration form as follows:
Address Configura Credenti Trust Invalid SSL Certificated Require Notify Require Notify
tion al Approval Approv
from al from
Display Microsoft Address You need to specify the Name of Select Select Select
name of Exchange of the following configuration the this if user(s) user(s)
Microso integrati parameters credenti certifica from list from the
ft on (the al set te used to ask list to
Exchang format requests.impersonation.d you’ve on her/his notify
isable=false
e should be just Exchan approva when
integrat 192.168. requests.cookies.enable= created ge l before SOAR
ion on 2.8). true on step Server executi perform
SOAR. 2. (i.e., is self- ng s an
mail.store.protocol=exch Microsof signed actions action
ange t or not on this on this
Exchange recogni integrat integrati
mail.incoming.pollerperi
Credenti zed by ion on.
od=10000
als). browse
mail.incoming.folder=Inb rs.
ox
Additional Notes
l To customize warning messages for Quarantine and Mark actions, edit the following
parameters under Configuration > Parameters:
o MSExchangeMarkWarningText
o MSExchangeQuarantineWarningText
l To customize the mail folder to be used for Quarantine actions, edit the following
parameter under Configuration > Parameters:
o MSExchangeQuarantineEMailBox
l In some environments with multiple CAS deployments Exchange uses a request cookie to
track the environment. The requests.cookies.enable configuration can help track the
cookie so that SOAR won’t have any mismatch and Subscription was not found error. It is
by default true and should stay that way in most environments.
Integration Overview
Exchange Server EWS provide access to mailbox data stored in Exchange Online, Exchange
Online as part of Office 365, and on-premises versions of Exchange starting with Exchange
Server 2007, and enable you to manage that information according to the requirements of
your organization.
Note: This is the new version of Microsoft Exchange integration and old one will be phased out.
Configuration
Prerequisites
l SOAR connects to Microsoft Exchange Web Service API using HTTPS. So access to 443/tcp
port is required.
l A user account with the following permissions is required for SOAR to connect MS
Exchange EWS Server:
Integration Guide for Microsoft Office365 Exchange EWS Page 331 of 482
Integration Guides
Configuring SOAR
1. Navigate Configuration > Credentials and click Create Credential.
Fill the Credential Editor form as follows:
a. Internal Credential:
Type Internal credential.
Username Application(client) ID value that has been copied from the application.
Password Client Credentialsvalue that has been copied from the application.
Private Key: Directory(tenant) IDvalue that has been copied from the application.
b. Credential Store:
Type External credential.
Name Name of the credential with pull path of the safe on store.
Credential Select newly created OAuth2 credential for credential field. (i.e., Microsoft Exchange
Credentials).
Trust Select this if certificate used on Exchange Server is self-signed or not recognized by browsers.
Invalid SSL
Certificates
Require Select user(s) from list to ask approval before executing actions on this integration
Approval
From:
Notify Select user(s) from the list to notify when ATAR performs an action on this integration.
Additional Notes
For Delete capability, at least one of the following parameters should be given:
l Email From
l Email Subject
l Email ID
l Attachment ID
And there are 3 deletion methods:
l Hard Delete: Deletes permanently (default)
l Move To Trash: Moves to trash folder (such as Deleted Items folder)
l Soft Delete: Moves to dumpster if it is enabled.
Integration Overview
ArcSight SOAR uses Microsoft Windows DNS Server to redirect IP address to another IP
address.
SOAR checks connection.secure parameter to connect via WinRM over http or https protocol.
Integration Capabilities
l Action
l Block
Configuration
Configuration on Microsoft Windows DNS Server
l SOAR connects to Microsoft Windows DNS Server’s integration API via WinRM services.
Therefore SOAR should be able to connect this service.
l WinRM credential is required.
Configuring ATAR
1. While creating this integration via Integrations tab of Configuration menu:
Name: Display name of the integration.
Type: Microsoft Windows DNS Server.
Address: Address of the integration (the format should be http[s]://1.1.1.1:1234).
Credential: WinRM credential is required. Credential that has been defined for this
integration under the Credentials menu.
Configuration: You need to specify the following configuration parameters.
Integration Guide for Microsoft Windows DNS Server Page 336 of 482
Integration Guides
Integration Overview
Integration Capabilities
l Action
l None
Configuration
Configuration on Microsoft Windows Services
l SOAR connects to Microsoft Windows Service’s integration API via WinRM services.
l Therefore SOAR should be able to connect this service.
l WinRM credential is required.
Configuring SOAR
1. While creating this integration via Integrations tab of Configuration menu:
Name: Display name of the integration.
Type: Microsft Windows Services.
Address: Address of the integration (the format should be 1.1.1.1 or abc.example.com).
Configuration: You need to specify the following configuration parameters.
putfile.generateuuid =
putfile.defaultfolder =
connection.secure = true
Credential: Credential that has been defined for this integration under the Credentials
menu.
Trust Invalid SSL Certificates: Select this if certificate used for the service is selfsigned or
not recognized by browsers.
Require Approval From: Select user(s) from list to ask her/his approval before executing
actions on this integration.
Integration Guide for Microsoft Windows Services (WinRM) Page 338 of 482
Integration Guides
Notify: Select user(s) from the list to notify when SOAR performs an action on this
integration.
2. Click the Test button.
3. Click Save to complete integration.
Integration Overview
Microsoft Graph Security is an intermediary service (or broker) that provides a single
programmatic interface to connect multiple Microsoft Graph Security providers such as Azure
Security Center, Microsoft Defender APT, Microsoft Cloud App. Security, etc. Microsoft Graph
Security integration lets you to search and manage security alerts created by those providers.
This integration supports Microsoft Graph API v1.0.
Integration Capabilities
l Assign Alert
l Get Alert by ID
l List Alerts
l List Alerts by Category
l List Alerts by Destination
l List Alerts by Provider
l List Alerts by Severity
l List Alerts by Source IP
l List Alerts by Status
l Update Alert Comment
l Update Alert Feedback
l Update Alert Status
Prerequisites
ArcSight SOAR connects to ”login.microsoft.com” and “graph.microsoft.com” APIs through
HTTPS. Access to these services is required
.
Configuration
ArcSight Accounts in this organizational directory only (Default Directory only - (Web)
SOAR Single tenant) https://localhost/soar
3. Click Add a certificate or secret link and create a new client secret. Specify the description
and expiry period as 24 months.
4. Note the created Secret Key value along with Client ID.
5. Navigate to API Permissions and add the following permissions from Microsoft Graph:
Permission Type Permission Description
Application SecurityEvents, ReadWrite, All. Read and update your organization’s security events.
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor form:
Type Name Username Password Private
Key
Internal Display name of credential set Client ID of the application (for Secret
credential (for example, Azure AD example, ArcSight SOAR) that is Key
Credential). registered on Azure Portal.
Parameter Value
Credential Credential that has been defined for this integration under the Credentials
menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capabilities
1. Assign Alert
Action capability for assigning security alert to a person on Azure Security Center.
• Rollback: No
• Duplicate Control: No
The following table presents the assign alert action capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
2. Get Alert by ID
Enrichment capability for querying & retrieving security alert details by alert ID.
The following table presents the get alert ID enrichment capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope:
Action Type Category/ Value
3. List Alerts
Enrichment capability for getting list of security alerts created in given time range. Results
are based on the alerts creation time, displayed in newest to oldest manner..
The following table presents thelist alerts enrichment capability details:
Time Range Time range filter Time range. Relative: e.g. Last 5 days Absolute: N/A Yes
for query. For example, 2021-08-14 15:10 – 2021-08-14
15:32
Output:
Case Scope:
Action Type Category/ Value
Time Range Time range filter Time range. Relative: e.g. Last 5 days Absolute: N/A Yes
for query. For example, 2021-08-14 15:10 – 2021-08-14
15:32
Output:
Case Scope:
Action Type Category/ Value
Time Range Time range filter Time range. Relative: e.g. Last 5 days Absolute: N/A Yes
for query. For example, 2021-08-14 15:10 – 2021-08-14
15:32
Output:
Case Scope:
Action Type Category/ Value
Time Range Time range filter Time range. Relative: For example, Last 5 days N/A Yes
for query. Absolute: For example, 2021-08-14 15:10 –
2021-08-14 15:32
Output:
Case Scope:
Action Type Category/ Value
Time Range Time range filter Time range. Relative: For example, Last 5 days N/A Yes
for query. Absolute: For example, 2021-08-14 15:10 –
2021-08-14 15:32
Output:
Case Scope:
Action Type Category/ Value
Time Range Time range Time range. Relative: For example, Last 5 days N/A Yes
filter for query. Absolute: For example, 2021-08-14 15:10 – 2021-
08-14 15:32
Output:
Case Scope:
Action Type Category/ Value
Time Range Time range Time range. Relative: For example, Last 5 days N/A Yes
filter for query. Absolute: For example, 2021-08-14 15:10 – 2021-
08-14 15:32
Output:
Case Scope:
Action Type Category/ Value
The following table presents the update alert comments action capability details:
Input Description Type Scope Restricted Required
Parameter (Yes/ No) (Yes/ No)
Output:
Case Scope: N/A
Human Readable Output: N/A
11. Update Alert Feedback
Action capability for adding/updating feedback feild of the security alert.
l Rollback: No
l Duplicate Control: No
The following table presents the update alert feedback action capability details:
Input Description Type Scope Restricted Required (Yes/
Parameter (Yes/ No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
12. Update Alert Status
Action capability for updating status of the security alert.
l Rollback: No
l Duplicate Control: No
The following table presents the update alert status action capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
Integration Overview
The MISP threat sharing platform is a free and open source software helping information
sharing of threat intelligence including cyber security indicators.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with MISP.
l File Reputation
l IP Reputation
l URL Reputation
l Get Event
l Add Attribute to Event
l Add Tag to Event
l Create Event
l Create Event with Attribute
l Remove Attribute from Event
l Remove Tag from Event
ArcSight SOAR integrates with MISP to gather, store threat information and can query to IoCs.
The capabilities can either be performed automatically within a playbook or manually by an
analyst.
Configuration
Prerequisites
• Access to tcp port 443 as SOAR connects to MISP using HTTPS
• An API key for SOAR to connect to MISP
Note: To gather the API key for SOAR, navigate to MISP Interface > Event Actions > Automation.
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor form:
a. Internal Credential
Parameter Value
Username Empty
Password Empty
Type MISP
Credential Name of the credential set created in the previous step(For example, MISP
Credentials)
Parameter Value
Require Approval From Select users from the list who can provide approval before executing
enrichments on the integration
Notify Select users from the list to notify when SOAR performs an enrichment on the
integration
Integration Overview
MxToolBox is a service that helps customers to make a query for domains and run the lookups.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with MxToolBox:
l Domain Blacklist Check
l Domain MX Check
Prerequisites
You must have access to HTTPS as the ArcSight SOAR connects to MxToolBox API through this
service.
Configuration
Configuring MxToolBox
1. Login to MxToolBox and navigate to Settings, as shown in the following figure:
2. Click Automation API Access Settings in the Setting and add a new application.
3. Click API Tab and note the API Key to use on SOAR as shown in the following figure:
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor
Type Name Username Password Private Key
Internal Display name of credential set (for API Key that is noted
credential example, MxToolBox Credential). from the service
Type MxToolBox
Address https://mxtoolbox.com
proxy.id ID of the Proxy integration if you access mxtoolbox.com through a web proxy device.
For Example: proxy.id = 12345.
Credential Name of the credential set created on step 2(For example, MxToolBox Credentials).
Parameter Value
Trust Invalid SSL The SSL certificate of MxToolBox service is going to known by SOAR, so you do not
Certificates need to check this box.
Required Approval Select users from the list who can provide approval before executing actions on this
From integration.
Notify Select users from the list to notify when SOAR performs an action on this integration.
Capabilities
1. Domain Blacklist Check
Enrichment capability for retrieving blacklist domain information.
The following table provides the Domain Blacklist Check enrichment capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Human Readable Output: Yes
2. Domain MX Check
Enrichment capability for retrieving MX record information.
The following table provides the Domain MX Check enrichment capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Integration Overview
Okta provides cloud software that helps organizations to manage and secure user
authentication into applications.
This integration supports Okta API v1.0.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Okta:
l Activate User
l Add User Into Group
l Clear User Sessions
l Deactivate User
l Expire Password
l Get Group Members
l Get Groups For User
l Get User Details
l Get User Logs
l List Groups
l Remove User From Group
l Reset Password
l Set Temporary Password
l Suspend User
l Unlock User
l Unsuspend User
l List Devices
l Get Device Details
l Suspend Device
l Unsuspend Device
Prerequisites
l You must have access to HTTPS as the ArcSight SOAR connects to Okta API through this
service.
l API Token is needed to access Okta REST API.
Configuration
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameters in the Credential Editor form:
Type Name Username Password Private Key
Note : The API token must be specified in the Private Key field by adding SSWS term
(SSWS<space><apitoken>).
Type Okta
proxy.id ID of the Proxy integration if you access Okta through a web proxy
device. For example: proxy.id = 12345 .
Credential Credential that has been defined for this integration under the Credentials
menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capabilities
1. Activate User
Action capability for activating an inactive user account.
l Rollback: Yes
l Duplicate Control: Yes
The following table presents the Activate User action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
2. Add User into Group
Action capability for adding user account into a group.
l Rollback: Yes
l Duplicate Control: Yes
The following table presents the Add User into Group action capability details:
Output:
Case Scope: N/A
Human Readable Output: N/A
3. Clear User Session
Action capability for clearing user’s active sessions.
l Rollback: No
l Duplicate Control: No
The following table presents the Clear User Session action capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
4. Deactivate User
Action capability for deactivating a user account.
l Rollback: Yes
l Duplicate Control: Yes
The following table presents the Deactivate User action capability details:
Output:
Case Scope: N/A
Human Readable Output: N/A
5. Expire Password
Action capability for expiring user’s password.
l Rollback: No
l Duplicate Control: No
The following table presents the Expire Password action capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
6. Get Groups Members
Enrichment capability for retrieving list of users belong to a group.
The following table presents the Get Groups Members action capability details:
Input Description Type Scope Restricted Required
Parameter (Yes/ No) (Yes/ No)
Output:
Case Scope
Action Type Category/ Value
Output:
Case Scope:
Action Type Category/ Value
Case Scope
Action Type Category/ Value
Output:
Case Scope:
Output:
Case Scope:
Action Type Category/ Value
Output:
Case Scope: N/A
Human Readable Output: N/A
12. Reset Password
Action capability for resetting user’s password. A password reset mail is sent to user by
Okta.
l Rollback: No
l Duplicate Control: No
The following table presents the Reset Password action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
13. Set Temporary Password
Action capability for expiring user’s password. This capabiliry sets tempPassword value of
the user as true.
l Rollback: No
l Duplicate Control: No
The following table presents the Set Temporary Password enrichment capability details:
Input Description Type Scope Required
Parameter Restricted (Yes/ No)
(Yes/ No)
Username User whose password will be expired and Username Yes Yes
“tempPassword” will be set to “True”. Email Address
Output:
Output:
Case Scope: N/A
Human Readable Output: N/A
15. Unlock User
Action capability for unlocking user account.
l Rollback: No
l Duplicate Control: No
The following table presents the Unlock User enrichment capability details:
Input Description Type Scope Restricted (Yes/ Required (Yes/
Parameter No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
16. Unsuspended User
Action capability for unsuspending user account.
l Rollback: Yes
l Duplicate Control: Yes
The following table presents the Unlock User enrichment capability details:
Input Description Type Scope Restricted Required (Yes/
Parameter (Yes/ No) No)
Output:
Case Scope: N/A
Human Readable Output: N/A
17. List Devices
Action capability for listing devices.
Input Description Type Scope Required
Parameter Restricted (Yes/ No)
(Yes/ No)
Last Starting date to filter the device's last updated date. String No No
Updated It can be absolute (format yyyy-mm-dd HH:MM:SS)
From or relative (ex: 1d, 2h, 3m)
Last Starting date to filter the device's last updated date. String No No
Updated To It can be absolute (format yyyy-mm-dd HH:MM:SS)
or relative (ex: 1d, 2h, 3m)
Output:
Case Scope: N/A
Human Readable Output:
Output:
Case Scope:
Type/Role Category/Property Value
Device Display name or Device ID of the Computer Name, Host, Yes Yes
device to suspend Keyword, Unknown
Output:
Case Scope: N/A
20. Unsuspend Device
Action capability to unsuspend the user.
Device Display name or Device ID of the Computer Name, Host, Yes Yes
device to unsuspend Keyword, Unknown
Output:
Case Scope: N/A
Integration Overview
Ones BioAffix is a biometric single sign on (Biometric SSO) and biometric identity verification
solution which lets organizations to manage their physical security and access. This integration
has been tested with Ones BioAffix 4.20.10.1 version.
Integration Capabilities
ArcSight SOAR has the following integration capability with Ones BioAffix:
l Change User Status (Block & Unblock)
l User Details (Info & Logs)
Use Case: Blocking Suspicious Employees
Integrated with Ones BioAffix ATAR lets users to investigate suspicious employee traffic
through building and block access if needed. This can be performed automatically within a
playbook or manually by an analyst.
Configuration
Prerequisites
l SOAR connects to Ones BioAffix API via HTTPS. Typically it runs on 8443/tcp* port. So
access to this service is required.
l Credentials of administrator is required for SOAR to connect Ones BioAffix.
Configuring SOAR
1. Navigate Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form as follows:
a. Internal Credential:
Additional Notes
Due to API behaviour of Ones BioAffix integration, “Date of Birth”, “Phone” and “Profile Photo”
of users should be set to execute actions.
Integration Overview
Palo Alto Networks AutoFocus is a threat intelligence platform which allows to search attack
indicators and access to details of them. AutoFocus provides the intelligence, analytics, and
context required to understand which attacks require immediate response and take decisive
action to prevent future attacks.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Palo Alto Networks AutoFocus:
l Search Email Address
l Search File Hash
l Search File Name
l Search IP Address
l Search URL
Use Case: Investigating Phishing Campaigns
SOAR integrates with Palo Alto Networks AutoFocus to search attack indicators. SOAR can
follow email inboxes for user’s phishing reports and automatically creates an incident record
on its service desk. During the investigation of the attack SOAR can extract the sender address,
IP address, files in the attachment and ask these indicators to Palo Alto Networks AutoFocus if
this is a known attack and previously analyzed. This can be performed automatically within a
playbook or manually by an analyst.
Configuration
Prerequisites
l SOAR connects to Palo Alto Networks AutoFocus API via HTTPS. Access
(https://autofocus.paloaltonetworks.com (443/tcp port) is required.
l An API key is required for SOAR to connect Palo Alto Networks AutoFocus.
Integration Guide for Palo Alto Networks AutoFocus Page 375 of 482
Integration Guides
Configuring SOAR
1. Navigate Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form as follows:
a. Internal Credential:
Type: Internal credential.
Name: Display name of credential set (i.e., PAN AutoFocus Credential).
Username: Empty.
Password: API Key.
Private Key: Empty.
b. Credential Store:
Type: External Credential.
Name: Name of the credential with pull path of the safe on store.
3. Navigate Configuration > Integrations and click Create Integration.
4. Fill the configuration form as follows:
Name: Display name of Palo Alto Networks AutoFocus integration on SOAR.
Type: Palo Alto Networks AutoFocus.
Address: Address of the integration (https://autofocus.paloaltonetworks.com).
Credential: Name of the credential set you’ve just created on step 2. (i.e., PAN AutoFocus
Credential).
Configuration: You need to specify the following configuration parameters
Trust Invalid SSL Certificates: Select this if Engine’s certificate is self-signed or not
recognized by browsers.
Require Approval From: Select user(s) from list to ask approval before executing actions
on this integration.
Notify: Select user(s) from the list to notify when SOAR performs an action on this
integration.
5. The EnrichmentFixedDelay configuration parameter value must be set to less than 120
seconds because of AutoFocus’ requirement. Otherwise AutoFocus API cookie will be
expired.
6. Click the Test button.
7. Click Save to complete integration.
Integration Overview
Palo Alto Networks Next Generation Firewall is a security technology that combines firewall,
antivirus, intrusion prevention, and virtual private network (VPN) capabilities to provide
proactive threat defense that stops attacks before they spread through the network. This
integration has been tested with Palo Alto Networks NGFW 9.0.1 version.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Palo Alto Firewall (API):
l Block IP
l Block Host
l Block URL
l Disconnect
Use Case: Blocking access to malicious IP addresses and hosts
Integrated with Palo Alto Networks NGFW, SOAR blocks malicious IP addresses and hosts on
perimeter while responding cyber-attacks. Blocking can be performed automatically within a
playbook or manually by an analyst.
Integration Guide for Palo Alto Networks Firewall Page 377 of 482
Integration Guides
Configuration
Prerequisites
l SOAR connects to Palo Alto Networks NGFW API via HTTPS. Access to 443/tcp port is
required.
l An API key is required for SOAR to connect Palo Alto Networks Firewall.
Configuring SOAR
1. Navigate Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form as follows:
a. Internal Credential:
Type: Internal credential.
Name: Display name of credential set (i.e., Palo Alto Firewall Credential).
Username: User you have created for SOAR on Palo Alto NGFW.
Password: Password of the user you have created for SOAR on Palo Alto NGFW.
Require Approval From: Select user(s) from list to ask her/his approval before executing
actions on this integration.
Notify: Select user(s) from the list to notify when SOAR performs an action on this
integration.
5. Click on the Test button.
6. Click Save to complete integration.
Additional Notes
Palo Alto Networks NGFW integration supports multiple “vsys”. If your firewall has more than
one “vsys” SOAR will ask you to choose one while taking action.
Integration Overview
The Panorama management server provides centralized monitoring and management of
multiple Palo Alto Networks next-generation firewalls and of WildFire appliances and appliance
clusters. This integration has been tested with Palo Alto Network Panorama 8.1.0 version.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Palo Alto Networks Panorama:
l Block IP address
l Block Host
l Block URL
Use Case: Blocking malicious IP addresses on multiple firewall appliances
With this integration, SOAR can block malicious IP addresses, hosts and URL addresses on
multiple firewall devices simultaneously while responding cyber-attacks. This can be performed
automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l SOAR connects to Palo Alto Networks Panorama API using HTTPS. Access to 443/tcp port is
required.
l An API key is required for SOAR to connect Palo Alto Networks Panorama.
l If users want to use multiple devicegroup, they should write devicegroup names comma
separated, for ex: Ankara, Istanbul, Izmir
Integration Guide for Palo Alto Networks Panorama Page 380 of 482
Integration Guides
restricted to only specific XML API operations. Only required permissions are:
"Configuration", "Operational Requests" and "Commit". Do not forget to disable all Web UI
and Command Line permissions since they are unnecessary.
2. Create an Administrator account with Custom Panorama Admin type and SOAR API Role
you have created in first step.
3. Commit all changes.
4. In order to obtain API key run the following request from command line.
Configuration on SOAR
1. Navigate Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form as follows:
a. Internal Credential:
Type: Internal credential.
Name: Display name of credential set (i.e., PAN Panorama Credential).
Username: Empty.
Password: Empty.
Private Key: API Key you have created for SOAR.
b. Credential Store:
Type: External credential.
Name: Name of the credential with pull path of the safe on store.
3. Navigate Configuration > Integrations and click Create Integration.
4. Fill the configuration form as follows:
Name: Display name of Palo Alto Networks Panorama integration on SOAR.
Type: Palo Alto Networks Panorama.
Address: Address of the integration (https://10.0.2.254).
Credential: Name of the credential set you’ve just created on step 2. (i.e., PAN Panorama
Credential).
Trust Invalid SSL Certificates: Select this if Engine’s certificate is self-signed or not
recognized by browsers.
Configuration: You need to specify the following configuration parameters.
Require Approval From: Select user(s) from list to ask her/his approval before executing
actions on this integration.
Notify: Select user(s) from the list to notify when SOAR performs an action on
thisintegration.
5. Click the Test button.
6. Click Save to complete integration.
Integration Overview
Recorded Future is a threat intelligence service which collects and analyzes vast amounts of
data to deliver relevant cyber threat insights in real time.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Recorded Future:
l Lookup Domain
l Lookup Hash
l Lookup IP Address
l Lookup URL
l Lookup Vulnerability
l Search Entity Lists
l Search Malware
Use Case: Investigating Phishing Campaigns
SOAR is integrated with Recorded Future, to help investigation and mitigation of phishing
campaigns. When a phishing report email comes from user, SOAR extracts the indicators such
as IP address, URLs and attachments in message and a new incident is created on SOAR’s own
Incident Management Service Desk. SOAR then asks these indicators to Recorded Future if this
is a known attack and previously analyzed. This can be performed automatically within a
playbook or manually by an analyst.
Configuration
Prerequisites
l SOAR connects to Recorded Future API via HTTPS. Access to
https://api.recordedfuture.com/v2/ (443/tcp port) is required.
l An API key is required for SOAR to connect Recorded Future service.
Configuring SOAR
1. Navigate Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form as follows:
a. Internal Credential:
Type: Internal credential.
Name: Display name of credential set (i.e., Recorded Future Credentials).
Username: API Key you have created on Recorded Future.
Password: API Password for the key you have created on Recorded Future.
Private Key: Empty.
b. Credential Store:
Type: External credential.
Name: Name of the credential with full path of the safe on store.
3. Navigate Configuration > Integrations and click Create Integration.
4. Fill the configuration form as follows:
Name: Display name of Recorded Future integration on SOAR.
Type: Recorded Future.
Address: Address of the integration (https://api.recordedfuture.com/v2/).
Configuration: You need to specify the following configuration parameters.
Credential: Name of the credential set you’ve just created on step 2. (i.e., Recorded Future
Credentials)
Trust Invalid SSL Certificates: No need to select.
Require Approval From: Select user(s) from list to ask her/his approval before executing
actions on this integration. Since SOAR only executes enrichments on Recorded Future,
leave it empty.
Notify: Select user(s) from the list to notify when SOAR performs an action on this
integration. Since SOAR only executes enrichments on Recorded Future, leave itempty.
5. Click on the Test button.
6. Click Save to complete integration.
1. Integration Overview
Robtex is used for various kinds of research of IP numbers, domain names, etc.
Robtex uses various sources to gather public information about IP numbers, domain names,
host names, Autonomous systems,routes, etc. It indexes the data in a big database and provide
free access for the data
2. Integration Capabilities
Action
Lookup
Configuration
Configuration on Robtex Lookup
SOAR connects to Robtex Lookup integrations via HTTPS. Therefore ATAR should be able to
connect this service.
Configuring SOAR
1. While creating this integration via Integrations tab of Configuration menu:
Name: Display name of Robtex lookup integration on SOAR.
Type: Robtex lookup.
Address: Address of the integration (the address should be https://www.robtex.com).
Configuration: You need to specify the following configuration parameters
# configure how far (in minutes) into the past this enrichment will look.
#cache.reusing.duration=20
Integration Overview
Roksit DNS Firewall is cloud-based cybersecurity service which provides web security and
application control by analyzing DNS traffic.
Integration Capabilities
ArcSight SOAR has the following integration capability with Roksit DNS Firewall:
l Block hostname
Use Case: Blocking malicious hosts on DNS
With this integration, SOAR can block malicious hostnames on Roksit DNS Firewall service while
responding cyber-attacks. This can be performed automatically within a playbook or manually
by an analyst.
Configuration
Prerequisites
l SOAR connects to Roksit DNS Firewall API via HTTPS. So access to https://api.roksit.com
(443/tcp port) is required.
l An API key is required to be created for SOAR to connect to Roksit DNS Firewall. Please
contact to service provider.
Configuring SOAR
1. Navigate to Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form as follows:
a. Internal Credential:
Type: Internal credential.
Additional Notes
l Roksit DNS Firewall integration on SOAR is defined as Advanced Action Script and content
of the default script is accessible under Configuration > Customization Library.
l While defining the integration first time, you get a warning message as follows. For this
type of integration this is the expected behaviour.
Integration Overview
RSA Security Analytics provides real-time visibility into network traffic with full packet
capture—on premises, in the cloud and across virtual infrastructure. It helps to detect threats
as they traverse in the network, monitor the timing and movement of attackers across the
network and reconstruct entire network sessions to support forensic investigations. This
integration has been tested with RSA Security Analytics 11.0.0.0 version.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with RSA Security Analytics:
l Network Packet Capture (Time range)
l Network Packet Capture (Relative time)
Use Case: Investigating suspicious cases using packet captures
SOAR integrates with RSA Security Analytics to collect full packet capture for a given
timeframe.During the investigation of an incident, SOAR can gather packet-capture from RSA
Security Analytics with specified parameters such as offender IP, affected usernames,
suspicious end-user machines, etc and put the related pcap file into incident timeline for
further analysis and keeping evidence purposes. Collecting pcap files can be performed
automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l SOAR connects to RSA Security Analytics Network Concentrator’s API via HTTP/HTTPS.
l By default API interface works on 50105/tcp port. So access permission to this port is
required.
l A user account is required to be created for SOAR to connect to RSA Security Analytics
Network Concentrator API.
Configuring SOAR
1. Navigate Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form as follows:
a. Internal Credential:
Type: Internal credential.
Name: Display name of credential set (i.e., RSA Security Analytics Credential).
Username: Username you have created for SOAR on RSA Security Analytics Suite.
Password: Password of the user you have created for SOAR on RSA Security Analytics
Suite.
Private Key: Empty.
b. Credential Store:
Type: External credential.
Name: Name of the credential with pull path of the safe on store.
3. Navigate Configuration > Integrations and click Create Integration.
4. Fill the configuration form as follows:
Name: Display name of RSA Security Analytics integration on SOAR.
Type: RSA Security.
Address: Address of the integration (the format should be http[s]://192.168.1.10:50105 or
http[s]://abc.example.com:50105).
Credential: Name of the credential set you’ve just created on step 2. (i.e., RSA Security
Analytics Credential)
Trust Invalid SSL Certificates: Select this if device’s certificate is self-signed or not
recognized by browsers.
Require Approval From: Select user(s) from list to ask her/his approval before executing
actions on this integration.
Notify: Select user(s) from the list to notify when SOAR performs an action on
thisintegration.
5. Click the Test button.
6. Click Save to complete integration.
Integration Overview
ServiceNow allows you to manage digital workflows for enterprise operations.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with ServiceNow:
l Close Incident
l Create Incident
l Update Incident
Prerequisites
You must have access to HTTPS as the ArcSight SOAR connects to ServiceNow API through this
service.
Configuration
Configuring ServiceNow
1. Create a REST client on SOAR
a. Login to SOAR platform.
b. Navigate Configurations > REST CLIENTS.
c. Create a new REST client by providing a description.
You must take a note of your Client ID and Client Secret as they would be used as
username and password during configuring authentication later.
2. Create a User
a. Login to ServiceNow platform.
b. Navigate to User Administration > User.
c. Click New to create a new user and specify the required credentials.Note: This
username and password is used during the ArcSight SOAR configuration.
d. Navigate to User Administration > User and edit the user you created newly to assign
an admin role.
3. Create Rest Messages
a. Navigate to System Web Services > Outbound > REST Message.
b. Click New to create message and specify the following details in the form:
Form Fields Values
Endpoint <itom_host_url>/soar-api/api/v1
Authentication tab
Username Client ID
e. Click Submit and select the newly created Basic auth profile.
f. Navigate to System Web Services > Outbound > REST Message and select SOAR REST
API Requests.
g. Click New and create following HTTP Methods within REST Messages:
i. Update Case on SOAR Method
Form Fields Values
Endpoint <itom_host_url>/soar-api/api/v1/case/${serialId}
Authentication Tab
Name Value
Content-Type application/json
Content ${changes}
Endpoint <itom_host_url>/soar-api/api/v1/case-comment
Authentication Tab
Name Value
Content-Type application/json
Content {
"serialid":$(serialid),
"comment":"$(comment)"
}
Table Incident[incident]
Application Global
try {
r = new sn_ws.RESTMessageV2('SOAR REST API Requests',
'Update Case on SOAR');
updated_fields = JSON.parse(event.parm2);
var serialId = updated_fields["serialId"];
if (updated_fields["caseProperties"] != {}) {
r.setStringParameterNoEscape('changes', JSON.stringify
(updated_fields["caseProperties"]));
r.setStringParameterNoEscape('serialId', serialId);
response = r.execute();
responseBody = response.getBody();
httpStatus = response.getStatusCode();
}
if (updated_fields["caseComment"] != {}) {
} catch (ex) {
var message = ex.message;
}
Name soar-rule
Table Incident[incident]
Applic Global
ation
When after
Order 1
Form Values
Fields
Advanced tab
c. Click Submit.
7. Import Certificate (if SOAR has self-signed certificate)
a. Navigate to System Definition > Certificates.
b. Click New to create new certificate entry.
c. Click the attachment icon below to upload your certificate file. Run the following
command to create the certificate
Configuring SOAR
1. Click Configuration > Credential > Create Credential
2. Specify the following parameters in the Credential Editor form:
Type Name Username Password Private
Key
Internal Display name of credential set (for Username of the Password of the Empty
credential example, ServiceNow Credentials). created user on created user on
ServiceNow ServiceNow
Type ServiceNow
proxy.id ID of the Proxy integration if you access ServiceNow through a web proxy
device. For example: proxy.id = 12345 .
list.name List name that is used for mapping ArcSight SOAR cases to ServiceNow incidents. For
example, list.name=servicenowMapList
Credential Credential that has been defined for this integration under the Credentials menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by browsers.
Certificates
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capabilities
1. Create Incident
Action capability for creating incident on ServiceNow.
l Rollback: No
l Duplicate Check: Yes
The following table presents the Create Incident action capability details:
Input Parameter Description Type Scope Restricted Required
(Yes/ No) (Yes/ No)
2. Close Incident
Action capability for closing incident on ServiceNow.
l Rollback: No
l Duplicate Check: No
The following table presents the Close Incident action capability details:
Input Parameter Description Type Scope Restricted (Yes/ No) Required (Yes/ No)
Input Parameter Description Type Scope Restricted (Yes/ No) Required (Yes/ No)
3. Update Incident
Action capability for updating incident on ServiceNow.
The following table presents the Update Incident action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Integration Overview
ArcSight SOAR uses the SMTP Server to send emails and notification messages. ATAR can also
use the same integration to access inboxes to read emails, such as device action approvals if it
is configured as an IMAP server.
Integration Capabilities
l Action
l Send email
Configuration
Prerequisites
l SOAR connects to SMTP Mail Server integration via Simple Mail Transfer
Protocol.Therefore SOAR must be able to connect this service.
l A user’s credential is required for SMTP AUTH. The same credential will be used if IMAP is
configured.
Configuring SOAR
1. Click Configuration > Integrations > Create Integration.
2. Specify the following parameter values in the Configuration form:
Param Value
eter
Trust Select this if Engine's certificate certificate is self-signed or is not recognized by browsers
Invalid
SSL
Certifi
cates
Requir Select users from the list who can provide approval before executing actions on this integration
e
Appro
val
From
Notify Select user(s) from the list to notify when SOAR performs an action on this integration.
Additional Notes
l If a SMTP integration is used without credentials then it can’t be used as incoming e-mail
processor and for approvals.
Integration Overview
Sophos XG Firewall is an integrated security platform featuring next gen firewall capabilities.
Integration Capabilities
ArcSight SOAR has the following integration capability with Sophos XG Firewall:
l Block IP
l Block FQDN
l Block URL
l Block Email Sender
Use Case: Blocking bad actors on firewalls
With this integration, SOAR can block malicious IP addresses, hosts and URL addresses on
firewall devices while responding cyber-attacks. This can be performed automatically within a
playbook or manually by an analyst.
Configuration
Prerequisites
l SOAR connects to Sophos XG Firewall API via management port. So access permission
l to this port is required.
l A user account for SOAR to connect to Sophos XG Firewall.
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Parameter Value
Credential Name of the credential set created on step 2 (For example, Sophos XG
Credentials)
Trust Invalid SSL Select this if Management UI’s certificate certificate is self-signed or is not
Certificates recognized by browsers
Require Approval From Select users from the list who can provide approval before executing actions on
this integration
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration. Since SOAR only executes enrichments on Symantec DLP, leave it
empty
Additional Notes
l IP, FQDN and URL filter groups are automatically created by SOAR if they don’t exist.1. IP,
Host and URL filter groups are automatically created by SOAR if they don’t exist.
l Sophos XG Firewall URL Filtering only accepts URLS with the following format
http://www.example.com. URI paths are not accepted through API. Therefore SOAR
transparently trim the URI part while submitting to Sophos XG Firewall.
l SOAR stores blocked email addresses in a list to keep track. Sophos currently does not
provide a method to get the current list and any update will overwrite the list with the new
address so administrator should only update the MTA Blocked Sender List through SOAR.
Also this list is kept for each different Sophos integration but creating a second integration
for the same device can lead to data inconsistency.
Integration Overview
SORBS Query provides free access to its DNS-based Block List to effectively block mail from
more than 12 million host servers known to disseminate spam, phishing, attacks and other
forms of malicious emails.
Integration Capabilities
l Action
l Check IP
Configuration
Configuration on SORBS Query
l ATAR connects to SORBS integrations’s API via HTTPS. Therefore ATAR should be able to
connect this service.
Configuring SOAR
Configuring SOAR
1. Click Configuration > Integrations > Create Integration.
2. Specify the following parameter values in the Configuration form:
Parameter Value
Parameter Value
Trust Invalid SSL Certificates Select this if Engine’s certificate certificate is self-signed or is not recognized by
browsers
Require Approval From Select users from the list who can provide approval before executing actions on
this integration
Integration Overview
Symantec Advanced Threat Protection is Symantec’s endpoint protection platform closely
works with SEP Manager.
Integration Capabilities
l Action Capabilities
l Quarantine Endpoint (isolate_endpoint and rejoin_endpoint)
l Delete File From Endpoint (delete_endpoint_file)
l Enrichment Capabilities
l Get Events (/events)
Configuration
Configuring Symantec Advanced Threat Protection
Symantec ATP uses https (tcp/443) for API access by default.
1. Click Settings > Data Sharing > OAuth Clients > Add application with custo role to add the
API application.
2. The image in the Privileges section represents how the custom role must be configured.
After creating user, Symantec displays the client secret and client id, which is used in SOAR
configuration modal.
Configuring SOAR
1. Navgate to Configuration > Integrations.
2. Specify the following parameter values in the Integrations Editor:
foIntegration Guide for Symantec Advanced Threat Protection Page 410 of 482
Integration Guides
Parameter Value
#EVENT_RESULT_LIMIT
Credential Name of the credential set created under the Credentials menu. You must use client
id as username and client secret as password.
Trust Invalid SSL Select this if Engine’s certificate is self-signed or is not recognized by browsers
Certificates
Require Approval Select users from list who can provide approval before executing actions on this
From integration
Notify Select users from the list to notify when SOAR performs an action on this integration
Integration Overview
Symantec Bluecoat MAA is a malware analyzer sand-box solution. SOAR uses Symantec
Bluecoat Malware Analysis Appliance to analyze files and URLs.
Integration Capabilities
l Action
l File Analysis
l Hash Analysis
l URL Analysis
Prerequisites
l SOAR connects to Symantec Bluecoat MAA’s Remote API (RAPI) via HTTPS. Therefore,
SOAR should be able to connect this service.
l A user account is required for SOAR to connect to Symantec Bluecoat MAA.
Configuration
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
Internal Credential
Parameter Value
Name Display name of credential set (For example, BlueCoat Malware Analysis
Appliance Credentials)
Integration Guide for Symantec Bluecoat Malware Analysis Appliance (MAA) Page 412 of 482
Integration Guides
Parameter Value
3. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Credential Name of the credential set created under the Credentials menu.
Trust Invalid SSL Select this if Engine’s certificate is self-signed or is not recognized by browsers
Certificates
Require Approval Select users from list who can provide approval before executing actions on this
From integration
Notify Select users from the list to notify when SOAR performs an action on this integration
Integration Overview
BlueCoat Proxy SG is a secure web gateway solution developed by Symantec which controls the
users’ access to web content. This integration has been tested with Symantec BlueCoat Proxy
SG 6.6.4.2 version.
Integration Capabilities
SOAR has the following integration capability with Symantec BlueCoat Proxy SG
l Block
Use Case: Blocking access to malicious URL
SOAR can integrate with Symantec BlueCoat Proxy SG to block malicious URLs detected while
responding an incident. Blocking can be performed automatically within a playbook or
manually by an analyst.
Configuration
Prerequisites
l SOAR connects to Symantec BlueCoat Proxy SG Management UI through HTTPS in order to
download existing copy of local database. As Management Console runs on 8082 /tcp port,
so access to this port is required.
l SOAR connects to Symantec BlueCoat Proxy SG via SSH to immediate update of local
database. So access to 22/tcp port is required.
l Symantec BlueCoat Proxy SG connects back to SOAR API to gather new copy of the local
database. As SOAR API runs on 443/tcp port, so access from BlueCoat Proxy SG to this
service is required.
l Admin user credentials are required for SOAR to connect Symantec BlueCoat Proxy SG
Bluecoat allows maximum of 31 character. Make sure Client ID is within that range.
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
a. Internal Credential
Parameter Value
Name Display name of credential set (For example, BlueCoat Proxy SG Credentials)
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Parameter Value
Credential Name of the credential set created on step 2 (For example, BlueCoat Proxy SG
Credentials)
Trust Invalid SSL Select this if Management Consoles's certificate is self-signed or is not recognized by
Certificates browsers
Require Approval From Select users from the list who can provide approval before executing actions on this
integration
enable
config terminal
content-filter
local
download username <client-id>
download password <client-secret>
Additional Notes
l Due to update mechanism of Blucoat Proxy SG’s Content Filter/Local Database, BlueCoat
Proxy SG retrieves the list of items to be blocked from a URL located on a web server that is
accessible by the Proxy SG. SOAR maintains a copy of Content Filter/Local Database and is
accessible on https://cdf/soar-api/api/bluecoat/list/integrationId}.
l SOAR connects to management console and downloads a copy of the Content Filter/Local
Database before adding new entries. If SOAR is the only place managing Content
Filter/Local Database, you don’t need to provide this access since SOAR always has the
latest copy.
l After updating the list of items to be blocked on itself, SOAR might connect to BlueCoat
Proxy SG via SSH and trigger an immediate download of the Content Filter/ Local Database
file. This operation requires to access privileged-mode. In order to use this method set
forcerefresh.enabled=true on integration configuration. List of commands executed
during this operation can be found under Configuration > Customization Library >
Symantec BlueCoat Proxy SG SSH Integration Action (Block) Default Template.
l If Automatically check for updates is set on Content Filter/Local Database configuration
BlueCoat periodically connects and checks the latest version of the list. If you don’t want
immediate update you may set forcerefresh.enabled=false on integration
configuration and prefer to use automatic updates.
l After the Integration is complete, if you get a certificate related error Server certificate
signed by unknown CA Download failed do the following :
a. Install the missing CA Certificate and restart the database download.
b. Download the CDF external certificate.
c. Click Configuration > SSL > CA Certificates and import the certificate into the ProxySG
appliance CA Certificates and name it as CDF_ca.
d. Click CA Certificate Lists > Browser-trusted and add the certificate to the browser-
trusted list.
e. Apply the configuration changes.
f. Create a block action on SOAR and view the action result to make sure that the
download is working properly.
Click Configuration > SSL > Device Profiles and make sure that the Device Profile is set
to browser-trusted.
l If you get a error for Hostname in server certificate does not match URL hostname then
disable Verify Peer option for default Device Profile on Bluecoat Proxy SG device.
Integration Overview
Bluecoat Site Review is a site to report uncategorized URLs to Symantec/Bluecoat.
Integration Capabilities
l Action
l Report Uncategorized URL (should get URL from scope)
Configuration
Configuration on Bluecoat Site Review
No requirements
Configuring SOAR
l In SOAR Configuration, specify Name, Address and submissionEmailAddress to check
submission result from returning mail.
Integration Guide for Symantec Bluecoat Site Review Page 419 of 482
Integration Guides
Integration Overview
Symantec DLP is a solution to ensure that sensitive data is not lost, misused, or accessed by
unauthorized users. This integration has been tested with Symantec DLP 14.6.0200 version.
Integration Capabilities
SOAR has the following integration capabilities with Symantec DLP:
l Retrieve incidents
Use Case: Investigating Suspicious Behaviour
During investigation of a suspicious behaviour of an employee or an endpoint, SOAR integrated
with Symantec DLP, can get access the related DLP incidents for better understanding of the
case. Investigation can be performed automatically within a playbook or manually by an
analyst.
Configuration
Prerequisites
l SOAR connects to Symantec DLP API via HTTPS. Access to 443/tcp port is required.
l A user account is required for SOAR to connect to Symantec DLP.
Integration Guide for Symantec Data Loss Prevention (DLP) Page 420 of 482
Integration Guides
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
a. Internal Credential
Parameter Value
Name Display name of credential set (For example, Symantec DLP Credentials)
Password Password of the user you have created for SOAR on Symantec DLP
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Parameter Value
# Report id
report.id=221
Credential Name of the credential set created on step 2 (For example, Symantec DLP
Credentials)
Trust Invalid SSL Certificates Select this if Web UI’s certificate certificate is self-signed or is not recognized
by browsers
Require Approval From Select users from the list who can provide approval before executing actions
on this integration
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration. Since SOAR only executes enrichments on Symantec DLP, leave it
empty
Additional Notes
For the details of web service role and report creation please refer to Symantec™ Data Loss
Prevention Incident Reporting and Update API Developers Guide.
Integration Overview
Symantec DeepSight Intelligence is a commercial threat intelligence service which provides
actionable intelligence with context and technical details surrounding a threat so teams can
quickly assess cyber risk and implement proactive controls.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Symantec DeepSight Intelligence
Service:
l Ingest intelligence data as alert
l Domain Query
l File Query
l IP Query
Use Case: Investigating Phishing Campaigns
SOAR is integrated with Symantec DeepSight Intelligence, to help investigation and mitigation
of phishing campaigns. When a phishing report email comes from user, SOAR extracts the
indicators such as IP address, domains and attachments in message and a new incident is
created on SOAR’s own Incident Management Service Desk. SOAR then asks these indicators to
Symantec DeepSight Intelligence if this is a known attack and previously analyzed. This can be
performed automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l SOAR connects to Symantec DeepSight API via HTTPS. Access to
https://deepsightapi.symantec.com/v1/ (443/tcp port) and
https://datafeeds.symantec.com/ (443/tcp port) is required.
l A user account and a certificate-password pair are required for SOAR to connect to
Symantec DeepSight. These will be supplied by Symantec through DeepSight portal.
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
a. Internal Credential
Parameter Value
Username Empty
Password API Key you’ve get from Symantec DeepSight Intelligence platform.
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Credential Name of the credential set created on step 2 (For example, Symantec
DeepSight Credentials)
Trust Invalid Select this if Web UI’s certificate certificate is self-signed or is not recognized by browsers
SSL
Certificates
Require Select users from the list who can provide approval before executing actions on this
Approval integration. Since SOAR only executes enrichment on
From Symantec DeepSight, leave it empty.
Visible Alert You may define which alarm fields will be displayed on Incident Management Service Desk.
Fields
Parameter Value
Credential Name of the credential set created on step 2 (For example, Symantec
DeepSight Credentials)
Trust Invalid Select this if Web UI’s certificate certificate is self-signed or is not recognized by browsers
SSL
Certificates
Require Select users from the list who can provide approval before executing actions on this
Approval integration. Since SOAR only executes enrichment on
From Symantec DeepSight, leave it empty.
Notify Select users from the list to notify when SOAR performs an action on this integration. Since
SOAR only executes enrichment on Symantec DeepSight, leave it empty.
Integration Overview
Symantec Endpoint Protection Manager (SEP Manager) is a management platform for security
software suite, which consists of anti-malware, intrusion prevention and firewall features for
server and desktop computers. This integration has been tested with Symantec Endpoint
Protection Manager 14.2.760 version.
Integration Capabilities
SOAR has the following integration capabilities with Symantec Endpoint Protection Manager:
l Start Scan on Client
l Block File Hash
l Get Client Info
Use Case: Starting scan jobs on suspicious endpoints.
During the course of and investigation or responding a ongoing cyber-attack, it is required to
run scan jobs on suspicious endpoints to validate the threat. SOAR can start scan jobs on
Symantec Endpoint Protection Manager to help on deciding the next course of action.
This can be performed automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l SOAR needs to connect Symantec Endpoint Protection Manager API and Database.
l Access to 8443/tcp, 8446/tcp port for API acceess and 1433/tcp, 1434/udp port for
database access is required.
l User accounts for API access and database access are required for SOAR to connect to
Symantec Endpoint Protection Manager.
Integration Guide for Symantec Endpoint Protection Manager Page 427 of 482
Integration Guides
5. Create a database user that has selected permissions and ensure that the SQL Browser
service is configured and running on MSSQL Server.
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
a. Internal Credential
Parameter Value
Name Display name of credential set (For example, SEP Manager Credentials).
Username Username you have created for SOAR on Symantec Endpoint Protection
Manager
Password Password of the user you have created for ATAR on Symantec Endpoint
Protection Manager.
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
a. Internal Credential
Parameter Value
Name Display name of credential set (For example, SEP Manager DB Credentials).
Username Database username you have created for SOAR on SEP Manager Database.
Password Password of the user you have created for SOAR on SEP Manager Database.
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
client.id=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
client.secret=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
#domainName=
directdbaccess.enabled=true
directdbaccess.jdbcurl=
jdbc:sqlserver://192.168.2.140:1433\\SEPMDB;database=sem5
directdbaccess.credential=33323
# Integration ID of the proxy integration to use when connecting to
# current integration.
# If not provided, ATAR will try to use a direct connection.
#proxy.id=123
Credential Name of the credential set created on step 2 (For example, SEP Manager Credentials).
Trust Invalid SSL Select this if Engine’s certificate is self-signed or is not recognized by browsers
Certificates
Require Approval Select users from the list who can provide approval before executing actions on this
From integration
Notify Select user(s) from the list to notify when ATAR performs an action on this integration.
Additional Notes
Symantec Endpoint Protection Manager Webservice registration works on 8446/tcp port by
default. If it is different than this value, you might configure it using DefaultSEPMRestApiPort
paramater under Configuration > Parameters.
Integration Overview
Symantec Managed Security Services (MSS) provides its customers security monitoring and
real-time security analytics services including strategic insights needed to prioritize and
respond to incidents and build strategies to protect the assets, reputations and viability of their
organizations.
Integration Capabilities
SOAR has the following integration capabilities with Symantec MSS:
l Ingest Incident Records as Alert
l Update MSS incident record
l Close MSS incident
Use Case #1: Investigating and Mitigating Cyber-attacks
Integrated with Symantec MSS, ATAR periodically collects new incidents and update the
statuses of the open incidents as they change in Smyantec MSS system. When an incident
record is created on Symantec MSS, ATAR automatically collects Incident Details such as
Analyst Comment, Signatures that are triggering this alert, Comments that are added to the
incident and possible Attachments inside this alert anc creates a new incident on its own
Incident Management Service Desk.
Configuration
Prerequisites
l SOAR connects to Symantec MSS API via HTTPS. So access permission to https://api.
managedsecurity.com is required.
l A user account and a certificate-password pair are required for ATAR to connect to
Symantec MSS API.
Integration Guide for Symantec Managed Security Services (MSS) Page 431 of 482
Integration Guides
The certificates are enabled by default upon creation, but must be downloaded and
installed before they can be used.
Configuring SOAR
To use the client-side certificate created on Symantec MSS, you must convert it with openssl
command line tool as following:
Configuring Credentials
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
3. Internal Credential
Parameter Value
Name Display name of credential set (For example, Symantec MSS Credentials)).
Username Empty
Password Empty.
Private Key Paste the content of the <output_file>.pem file into the Private Key
area.
The external credential stores can not be used with this integration type.
Para Value
meter
Crede Name of the credential set you have created (For example, Symantec MSS
ntial Credentials).
Viisibl Select alarm fields that has to be displayed on Incident Management Service Desk.
e
Alert
Fields
Notify Select user(s) from the list to notify when ATAR performs an action on this integration.
#proxy.id=5422
Credential Name of the credential set you have created (For example, ArcSight ESM
Credentials).
Trust Invalid SSL Certificates Select this if Engine’s certificate is self-signed or is not recognized by browsers
Require Approval From Select user(s) from list to ask her/his approval before executing
actions on this integration.
Notify Select user(s) from the list to notify when ATAR performs an action on this
integration.
Additional Notes
The following configuration parameters can be used for fine tuning the integration.
Integration Overview
Symantec Messaging Gateway (Brightmail) is an email gateway which is used to filter incoming
and outgoing emails. This integration has been tested with Symantec Messaging Gateway
10.6.5-1 version.
Integration Capabilities
SOAR has the following integration capabilities with Symantec Messaging Gateway:
l Block Sender
l Block in Dictionary
Use Case: Blocking phishing attacks
SOAR can follow the email inboxes for user’s phishing reports and automatically creates an
incident record on its service desk. To stop the phishing campaigns, SOAR can extract the
sender address, IP, e-mail subject and block them on Symantec Messaging Gateway.
This can be performed automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l SOAR connects to Symantec Messaging Gateway via HTTPS. Access to 443/tcp port is
required.
l A user account for SOAR to connect Symantec Messaging Gateway.
3. To block hosts and IP addresses, SOAR uses Local Bad Sender IPs andLocal Bad Sender
Domains.
Configuring SOAR
1. Navigate to Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form with following parameter values:
a. Internal Credential:
Parameter Value
Name Display name of credential set (For example, Symantec Messaging Gateway
Credential)
Password Password of the user you have created of SOAR on Symantec Messaging
Gateway.
b. Credential Store
Parameter Value
Name Name of the credential with full path of the safe on store
Configuration You need to specify the following configuration parameters. You can define
multiple dictionaries by seperating "|", for example, dictionary.name=SOAR
Dictionary 1 | SOAR Dictionary 2
Credential Name of the credential set you’ve just created on step 2 ( for example,
Symantec Messaging Credential.
Parameter Value
Trust Invalid SSL Certificates Select this if Symantec Messaging Gateway’s certificate is self-signed or not
recognized by browserss.
Require Approval From Select user(s) from list to ask her/his approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Integration Overview
Tenable Nessus is a vulnerability scanner used to detect vulnerabilities on the network. SOAR
uses Tenable Nessus to gather vulnerability information to enrich incidents’ context.
Integration Capabilities
l Action
l Get Scan List
l Get All Vulnerabilities on a Scan
Configuration
ConfiguringTenable Nessus
l SOAR connects to Tenable Nessus’ API via HTTPS. Therefore SOAR must be able to connect
this service.
l A user credential is required.
Configuration on SOAR
Configuring SOAR
1. Navigate to Configuration > Integrations.
2. In the Integrations Editor, specify the following parameter values:
Parameter Value
Address Address of the integration (in the following format: http[s]://1.1.1.1:1234 or http
[s]://abc.example.com:1234
Credential Credential defined for the integration under the Credentials menu
Parameter Value
Trust Invalid SSL Select this if Engine’s certificate is self-signed or is not recognized by browsers
Certificates
Require Approval Select users from the list who can provide approval before executing actions on this
From integration
Notify Select users from the list to notify when SOAR performs an action on this integration
Integration Overview
Tenable Security Center (Tenable SC) is a vulnerability management solution that provides
visibility into network by identifying all vulnerabilities, misconfigurations and malware attack
on assets and gives ability to manage and measure your cyber risk.
SOAR has the following integration capabilities with Tenable Security Center:
l Get Assets
l Get Vulnerabilities (System-wide)
l Get Vulnerabilities on IP
.Use Case: Getting vulnerability details of assets
SOAR can integrate with Tenable Security Center to gather additional information about an
asset during incident investigation. Knowing existing vulnerabilities on a system can help SOC
analysts to understand possible root cause of an incident more precisely.
Configuration
Prerequisites
l SOAR connects to Tenable Security Center’s API using HTTPS. Typically an access
permission to 443/tcp port is required.
l A user account for SOAR to connect to Tenable Security Center.
2. Navigate to Users> Groups and add a group to define the objects that SOAR can access.
You must at select atleast one item from Viewable Hosts and Repositories lists.
There is no need to share any object under Share to Group tab.
3. To add user for SOAR access, navigate to Users > Users. Select No Role and SOAR Access
Group in Membership.
Configuring SOAR
1. Navigate to Configuration > Credentials and click Create Credential.
2. Fill the Credential Editor form with following parameter values:
a. Internal Credential:
Parameter Value
Password Password of the user you have created of SOAR on Tenable Security Center.
Credential Name of the credential set you’ve just created on step 2 ( for example, Tenable
SC Credential.
Trust Invalid SSL Select this if Engine’s certificate is self-signed or not recognized by browserss.
Certificates
Require Approval From Select user(s) from list to ask her/his approval before executing actions on this
integration.
Notify elect user(s) from the list to notify when SOAR performs an action on this
integration.
Note: Due to a known issue related to authentication, the integration with Trend Micro Apex
Central fails.
Integration Overview
Trend Micro Apex Central is a web-based console that provides centralized management for
Trend Micro products and services at the gateway, mail server, file server and corporate
desktop levels.
Integration Capabilities
l Quarantine
Prerequisites
l Access to the HTTPS is needed as ArcSight SOAR connects to Trend Micro Apex Central API
through this service.
3. Note down the Application ID and API Key (for your reference later) after saving the
Integration Guide for Trend Micro Apex Central Page 444 of 482
Integration Guides
application as follows:
Configuring SOAR
1. Click Configuration > Credentials > Create Credentials.
2. Specify the following parameter values in the Credential Editor:
Internal Credential:
Parameter Value
Name Display name of credential set (For example, Trend Micro Apex Central
Credentials)
Username Empty
Private Key API Key that you have noted before from the created application.
Credential Name of the credential set that you created on step 2. (For example, Trend Micro
Apex Central Credentials).
Parameter Value
Trust Invalid SSL Select this if Trend Micro Apex Centrals certificate is self signed or it is not
Certificates recognized by browsers.
Require Approval Select user(s) from list who can provide approval before executing actions on this
Form integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capablities
Quarantine
Action capability for quarantine a Hostname, IP address and MAC addresss.
l Rollback: Yes
l Duplicate Control: No
MAC Address / Network MAC Address/Network MAC Address Network Yes Yes
Address / Hostname Address/Hostname to Address Hostname
quarantine
Output:
Case Scope: N/A
Human Readable Output: N/A
Integration Overview
Trend Micro Vision One is a purpose-built threat defense platform that provides added value
and new benefits beyond XDR solutions, allowing you to see more and respond faster.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Trend Micro Vision One:
l Get Observed Attack Techniques
l Query Operating Systems
l Get Exception List
l Get Suspicious Object List
l Add Objects to Suspicious Object List
l Add Objects to Exception List
l Delete Objects from Suspicious Object List
l Delete Objects from Except List
l Prerequisites
You must have access to HTTPS as the ArcSight SOAR connects to Trend Micro Vision One to
API through this service.
Configuration
Integration Guide for Trend Micro Vision One Page 447 of 482
Integration Guides
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor form.
Type Name Username Password Private Key
cache.reusing.duration Configure how far (in minutes) into the past this
enrichment will look. For example:
cache.reusing.duration=20 .
Credential Credential that has been defined for this integration under the Credentials menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capabilities
1. Get Observed Attack Techniques
Enrichment capability for getting observed attack techniques.
The following table presents the Get Observed Attack Techniques action capability details:
Input Description Type Scope Required
Parameter Restricted (Yes/ No)
(Yes/ No)
Time Range Time range for attack times. Time Range No Yes
Output:
Case Scope:
Action Type Category/ Value
Output:
Case Scope:
Action Type Category/ Value
Output:
Case Scope:
Action Type Category/ Value
Output:
Case Scope:
Action Type Category/ Value
Value The value of the suspicious object which will be Host, Network Yes Yes
added. Address, Hash,
URL
Scan Action Suspicious object record scan action, when not Enum No No
set, use system default settings. Risk Level. Type's
scan action.
Risk Level Suspicious object risk level when not set, use Enum No No
default value - high.
Expired Day Suspicious object record expired day, when not Text No No
set, use system default settings. Expired Day.
Output:
Case Scope:
Action Type Category/ Value
Output:
Case Scope:
Action Type Category/ Value
Output:
Case Scope:
Action Type Category/ Value
Output:
Case Scope:
Action Type Category/ Value
Integration Overview
Turkcell Threat Intelligence is a service which lets users to query reputation of Indicators of
Compromise such as data leakage, brand protection, and vulnerability modules.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Turkcell Threat Intelligence:
l Domain Query
l Email Query
l Hash Query
l IP Query
Use Case: Investigating Phishing Campaigns
SOAR integrates with Turkcell Threat Intelligence or Bozok to investigate and mitigate phishing
campaigns. SOAR extracts the indicators such as sender address, IP address, and URLs from a
phishing report email of the user and creates a new incident on the Incident Management
Service Desk. SOAR then checks with Turkcell Threat Intelligence or Bozok if this is a known
attack and previously analyzed. This investigation can either be performed automatically within
a playbook or manually by an analyst.
Configuration
Prerequisites
l Access to https://bozok.turkcell.com.tr (443/tcp port) as SOAR connects to Turkcell Threat
Intelligence/Bozok API through HTTPS
l An API key for SOAR to connect to Turkcell Threat Intelligence/Bozok service
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor form:
a. Internal Credential:
Parameter Value
Name Display name of credential set (For example, Turkcell Threat Intelligence Credentials)
Username Empty
Password Empty
b. Credential Store:
Parameter Value
Name Name of the credential with full path of the safe on store
Credential Name of the credential set created (For example, Turkcell Threat
Intelligence Credentials)
Parameter Value
Require Approval Not applicable as SOAR executes enrichment on Turkcell Threat Intelligence
From
Integration Overview
Udger is a query detection repository service that works for both cloud-based and local
executions. Udger also provides Data Center name of given IP and many more.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with Udger:
l Parse
Prerequisites
l You must have access to HTTPS as the ArcSight SOAR connects to Udger API through this
service.
l API Token is needed to access Udger REST API.
Configuration
Configuring Udger
1. Login to udger and navigate to Products > Cloud Parser.
l Click Subscribe Now.
Configuring SOAR
1. Click Configuration > Integration > Create Integration.
2. In Configuration Editor, select Udger in List of Type.
3. Navigate to Credential and click Create to create new credential. Specify following values
in the Credential Editor:
Type Username Password Private Key Check
Internal Access Key that is copied from Udger web site Clear Text
Credential (navigate to My Account > General tab on Udger Access
UI). checkbox.
Capabilities
1. Parser
Parsing given IP and return JSON detail including Datacenter Name
The following table presents the Parser capability details:
Input Description Type Scope Restricted Required (Yes/
Parameter (Yes/ No) No)
Output:
Case Scope:
Scope Item Property Cloud Name is added to the related scope item. When you click the
related scope item to view its properties, a cloud name result is displayed.
The following table presents the case scope details:
Integration Overview
The URLscan API allows you to submit URLs to scan, retrieve scan results, download Document
Object Model (DOM) snapshots and page screenshots and search existing scans for different
types of indicators.
Integration Capabilities
ArcSight SOAR has the following integration capabilities with urlscan:
l Search Domain
l Search Hash
l Search IP
l Search URL
l Submit URL
Configuration
Prerequisites
l You must have access to HTTPS as the ArcSight SOAR connects to urlscan io API through
this service.
l URLScan requires an API key for access.
Configuring SOAR
1. Click Configuration > Credential > Create Credential.
2. Specify the following parameter values in the Credential Editor form:
Type Name Username Password Private
Key
Internal Display name of credential set (for example, URL Scan Empty Empty Access
credential API Credential). Token
Type Urlscan.io
Credential Credential that has been defined for this integration in the Credentials menu.
Trust Invalid SSL Select this if web server’s certificate is self-signed or is not recognized by
Certificates browsers.
Require Approval From Select user(s) from list to ask the approval before executing actions on this
integration.
Notify Select user(s) from the list to notify when SOAR performs an action on this
integration.
Capabilities
1. Search Domain
Enrichment capability for retrieving domain information for a relative time range.
The following table presents the Search Domain action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Relative Time Specific relative time period that Time unit Hour N/A Yes
Range will be checked. (s) Day(s)
Week(s)
Month(s)
Output:
Case Scope:
Enrichment Type Category Value
2. Search Hash
Enrichment capability for retrieving hash information for a relative time range.
The following table presents the Search Hash action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Relative Time Specific relative time period that Time unit Hour N/A Yes
Range will be checked. (s) Day(s)
Week(s)
Month(s)
Output:
Case Scope:
Enrichment Type Category Value
3. Search IP
Enrichment capability for retrieving IP information for a relative time range.
The following table presents the Search IP action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Relative Time Specific relative time period that Time unit Hour N/A Yes
Range will be checked. (s) Day(s)
Week(s)
Month(s)
Output:
Case Scope:
Enrichment Type Category Value
4. Search URL
Enrichment capability for retrieving URL information for a relative time range..
The following table presents the Search URL action capability details:
Input Parameter Description Type Scope Restricted Required (Yes/
(Yes/ No) No)
Relative Time Specific relative time period that Time unit Hour N/A Yes
Range will be checked. (s) Day(s)
Week(s)
Month(s)
Output:
Case Scope:
Enrichment Type Category Value
5. Submit URL
Enrichment capability for submitting a URL for investigation.
The following table presents the Submit URL action capability details:
Input Description Type Scope Required
Parameter Restricted (Yes/ No)
(Yes/ No)
Visibility Submitting visibility option which could String Public N/A Yes
either be Public, Private or Unlisted Unlisted Private
Do not Use If this option is checked, SOAR does not use Boolean N/A No
Cache cached results.
Output:
Case Scope:
Enrichment Type Category Value
Integration Overview
VirusTotal inspects suspicious files and URLs to detect types of malware with over seventy
antivirus scanners and URLs or domain blacklisting services, in addition to a myriad of tools to
extract signals from the studied content.
Integration Capabilities
SOAR has the following integration capability with VirusTotal:
l Domain Query
l Domain/Downloaded Files Query
l Domain/Subdomains Query
l Domain/URLs Query
l File Query
l Hash Query
l IP Query
l IP/Downloaded Files Query
l IP/Passive DNS Query
l IP/URLs Query
l URL Query
Use Case: Blocking access to malicious URL
During the investigation of an attack, SOAR checks for suspicious IP addresses, URLs, files, and
hash values to VirusTotal if these indicators are known and previously analyzed. According to
returned confidence score, SOAR decides on the next course of action. This investigation can
either be performed automatically within a playbook or manually by an analyst.
Configuration
Prerequisites
l VirusTotal API version 3
Configuring VirusTotal
l No specific configuration is needed on VirusTotal.
l Login to https://www.virustotal.com with your username and make a note of the API key
under Settings> API Key.
Configuring SOAR
1. Click Configuration > Credentials > Create Credential.
2. Specify the following parameter values in the Credential Editor:
a. Internal Credential
Parameter Value
Username Empty
Password Empty
b. Credential Store:
Parameter Value
Name Name of the credential with pull path of the safe on store
Parameter Value
Type VirusTotal
)
scan.query.timeout=3600
# Expiration period of hash scans
# If not provided, ATAR will use 30 days
by default
#scan.result.expiration.period.in.days=30
# VirusTotal APIv3 parameter
# Limits page count for relation queries.
SOAR will use 1 page by default
#scan.result.page.count.max=1
Parameter Value
Additional Notes
l Domain and IP-related queries retrieve results in 40-item batches. For some IOCs, this may
result in too many consecutive queries and long query-times.
l The file queries are limited to 32MB due to limits with VirusTotal API.
l Domain or URLs, Domain or Downloaded Files, IPor URLs, and IP or Downloaded Files only
return the scope items with confidence score greater than 0.
Integration Overview
SOAR uses VMware ESXi(Elastic Sky X integration) to perform some actions on the virtual
machines (VMs).
Integration Capabilities
Action
l Create Snapshot of a VM
l Export VM
l Get Information of All VMs
l Power On VM
l Power Off VM
l Reset VM
l Reboot VM
l Standby VM
l Suspend VM
Configuration
Configuring VMware ESXi
l Access to HTTPs for SOAR to connect to VMware ESXi Server’s SDK
l SOAR account with admin role
Configuring SOAR
1. Navigate to Configuration > Integrations.
2. In the Integrations Editor, specify the following parameter values:
Parameter Value
Credential Credential defined for the integration under the Credentials menu
Trust Invalid SSL Select this if Engine’s certificate is self-signed or is not recognized by browsers
Certificates
Require Approval Select users from the list who can provide approval before executing actions on this
From integration
Notify Select users from the list to notify when SOAR performs an action on this integration
Integration Overview
VxStream Sandbox is an automated malware analysis system that includes the unique Hybrid
Analysis technology. It is available as a standalone software package that is automatically
deployed within your local infrastructure and operates without an external dependency or
callback mechanism. It is possible to execute files on any Windows guest image (For example, a
copy of your local workstation) and has a variety of integration and interface capabilities.
The feature set of VxStream Sandbox is extensive, with hundreds of generic indicators at its
core. It detects unknown threats independent of Anti-Virus signatures. Empowered by Hybrid
Analysis, the entire process memory gets analyzed using multiple timed snapshots, including
the runtime sample. This feature allows the extraction of more indicators (Strings/API calls)
regardless of execution. This approach enables the analysis of dormant code, evasive
conditions, and extracts more valuable IOCs.
Integration Capabilities
Action
l Hash analysis
Configuration
Configuration on VxStream Sandbox
l Access to HTTPs for SOAR to connect to VxStream Sandbox
Configuring SOAR
1. Navigate to Configuration > Integrations.
2. In the Integrations Editor window, specify the following parameter values:
Parameter Value
Parameter Value
Credential Credential defined for the integration under the Credentials menu
Trust Invalid Select this if Engine’s certificate is self-signed or is not recognized by browsers
SSL Certificates
Require Select users from the list who can provide approval before executing actions on this
Approval From integration
Notify Select users from the list to notify when SOAR performs an action on this integration
Integration Overview
This appendix provides a detailed, step-by-step configuration procedure to enable SOAR to
properly work with WinRM.
Configuration On Domain-Controller
l To create a Group Policy object for your domain:
1. Navigate to Start > Control Panel.
2. In the Control Panel, select Administrative Tools > Group Policy Management.
3. From the menu tree, click Domains > [your domain’s name].
4. Right-click and select Create a GPO in this domain, and Link it here.
5. Input WinRM-SOAR.
6. Execute the following command:
LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f
7. Click OK.
Note: After editing the Group Policy Object, three WinRM service settings are enabled.
1. In the Group Policy Management Editor, click Computer Configuration > Policies.
2. Click Administrative Templates: Policy definitions > Network > Network Connections >
Windows Firewall > Domain Profile.
3. Right-click Windows Firewall: Allow inbound remote administration exception and click
Edit.
4. Select Enabled.
5. Enter an asterisk (*) into each field and click Ok.
l To create a new inbound firewall rule and update the network list manager for
unidentified networks:
1. Click Computer Configuration > Windows Settings > Security Settings > Windows Firewall
with Advanced Security > Inbound Rules.
2. Right-click Inbound Rules and click New Rule.
3. Select Predefined.
4. Select Windows Remote Management from the list of services.
5. Click Next.
6. Unselect the entry profile Public and click Next.
7. Click Finish.
8. Right-click the new rule and click Properties.
9. Click the Advanced tab and unselect all and select Private.
10. Click the Scope tab.
11. Check these IP addresses on Remote IP Address and specify IP address of the SOAR
machine and click OK.
12. From the menu tree, click Computer Configuration > Windows Settings > Security Settings
> Network List Manager Policies.
13. Right-click Unidentified Networks and click Properties.
14. Select the Location type to Private and click Ok.
Configuring SOAR
Use the format username|Computer name as WinRM credentials. For example,
localadmin|DEV-EXCHANGE18.
5. In the Certificate Property Window for the new template, navigate to the General Tab.
6. Set Display Name and Template Name to SOARWINRMHTTPS.
Note: Use the same name without spaces. If there is a space that leads to a bug where the
process to enroll a new certificate repeats.
7. In the Subject Name tab, select Build from this Active Directory information.
8. In the Subject name format select Common Name and select DNS name.
9. Click Security > specify the Domain Computers group for the domain. Allow Read, Enroll
and Autoenroll and click OK.
10. In the Certificate Authority management console, right-click Certificate Templates and
select New Template.
11. Double-click SOARWINRMHTTPS and close the window.
12. Navigate to Start > Control Panel.
13. Select Administrative Tools and Group Policy Management.
14. In the Menu tree, click Domains > [your domain’s name].
15. Create a batch script for starting WinRM HTTPS Listener named
SoarWinRMSSLStartupScript.ps1.
16. Copy and paste the following code into AtarWinRMSSLStartupScript.ps1:
Start-Transcript C:\Scripts\transaction.log
$sysinfo = Get-WmiObject -Class Win32_ComputerSystem
$server = “{0}.{1}” -f $sysinfo.Name, $sysinfo.Domain
$LatestThumb = Invoke-Command -ScriptBlock {
Get-ChildItem -Path Cert:\LocalMachine\My |
where {$_.subject -match "CN=$server"}
Sort-Object -Property NotAfter -Descending |
Select-Object -Last 1 -ExpandProperty Thumbprint
} -ErrorAction Stop
#If HTTPS Listener does not exist create Listener with quick config.Else
evaluate
# available certificates ,sort them by expire date , select first
thumbprint
$result=(((Get-ChildItem -Path WSMan:\localhost\Listener).keys) -match
'HTTPS')
if($result.Count -eq 0) {
Set-WSManQuickConfig -UseSSL -Force
} else {
Set-WSManInstance -ResourceURI winrm/config/Listener \
-SelectorSet @{Address="*";Transport="HTTPS"} \
-ValueSet @{CertificateThumbprint=$LatestThumb.Thumbprint[1]}
Restart-Service -Force -Name WinRM
}
Stop-Transcript
Additional Notes
The following patch must be applied to the target computer for WinRM to work without an
error:
https://support.microsoft.com/en-us/kb/2842230
Support
Contact Information
Phone A list of phone numbers is available on the Technical Support
Page: https://softwaresupport.softwaregrp.com/support-contact-information