Integrate LevelBlue USM Anywhere with Google SecOps
This document describes how to integrate LevelBlue Unified Security Management (USM) Anywhere with Google Security Operations (Google SecOps).
Integration version: 31.0
Network access to LevelBlue USM Anywhere
API access from Google SecOps to LevelBlue USM Anywhere: Allow traffic over port 443 (HTTPS).
Integration parameters
Use the following parameters to configure the integration:
Parameter name | Type | Default value | Is mandatory | Description |
---|---|---|---|---|
Instance Name | String | N/A | No | Name of the Instance you intend to configure integration for. |
Description | String | N/A | No | Description of the Instance. |
Api Root | String | N/A | Yes | Address of the LevelBlue USM Anywhere instance. |
ClientID | String | N/A | Yes | The ID of the user. |
Secret | Password | N/A | Yes | The password of the user account. |
Product Version | String | V2 | Yes | Version of the LevelBlue USM Anywhere product. |
Use SSL | Checkbox | Checked | No | If selected, the integration validates the SSL certificate when connecting to the LevelBlue USM Anywhere server. |
Run Remotely | Checkbox | Unchecked | No | Select the checkbox to run the configured integration remotely. Once selected, the option appears to select the remote user (agent). |
For instructions about how to configure an integration in Google SecOps, see Configure integrations.
You can make changes at a later stage, if needed. After you configure an integration instance, you can use it in playbooks. For more information about how to configure and support multiple instances, see Supporting multiple instances.
Actions
For more information about actions, see Respond to pending actions from Your Workdesk and Perform a manual action.
Get Alarm Details
Retrieves details for an alarm by ID.
Parameters
Parameter name | Type | Default value | Is mandatory | Description |
---|---|---|---|---|
Alarm ID | String | N/A | Yes | The alarm ID. Can be obtained by running connector. |
Run on
This action doesn't run on entities.
Action results
Script result
Script result name | Value options | Example |
---|---|---|
is_success | True or False | is_success:False |
Case wall
Result type | Description | Type |
---|---|---|
Output message* | In case of error: "Failed to get details about AlienVault Anywhere alarm! Error is {}. action should fail." Action pass successfully: "Successfully returned AlienVault Anywhere alarm {} details" When Product version parameter is set to V1: "Action should fail with clear message that is supported in V2." |
General |
CSV Table | Columns:
|
General |
List Events
Search for AlienVault events.
Parameters
Parameter name | Type | Default value | Is mandatory | Description |
---|---|---|---|---|
Alarms Limit | String | N/A | No | Maximum number of alarms to return. |
Account Name | String | N/A | No | The account name. |
Event Name | String | N/A | No | The name of the event. |
Start Time | String | N/A | No | Filtered results will include events that occurred after this timestamp. Format: "%d/%m/%Y" |
End Time | String | N/A | No | Filtered results will include events that occurred before this timestamp. Format: "%d/%m/%Y" |
Suppressed | Checkbox | N/A | No | Whether to filter events by the suppressed flag. |
Source Name | String | N/A | No | The source name. |
Run on
This action doesn't run on entities.
Action results
Script result
Script result name | Value options | Example |
---|---|---|
is_success | True or False | is_success:False |
JSON result
{
"rep_device_fqdn": "192.0.2.30",
"sorce_name": "192.0.2.30",
"tag": "pdate-esp-kernelmodle.sh",
"timestamp_occred": "1596541223000",
"destination_address": "198.51.100.130",
"rep_dev_canonical": "192.0.2.30",
"destination_name": "198.51.100.130",
"received_from": "Centos7-001",
"timestamp_occred_iso8601": "2020-08-04T11:40:23.000Z",
"id": "f52dd545-ff14-5576-3b70-47f10f528f53",
"needs_enrichment": True,
"rep_device_asset_id": "256fa9b1-a066-c9eb-561a-c2110035978a",
"timestamp_received": "1596541223152",
"sorce_canonical": "256fa9b1-a066-c9eb-561a-c2110035978a",
"destination_fqdn": "198.51.100.130",
"_links": {
"self": {
"href": "URL"
}
},
"has_alarm": False,
"rep_device_address": "192.0.2.30",
"event_name": "pdate-esp-kernelmodle.sh event",
"sed_hint": False,
"transient": False,
"packet_type": "log",
"was_fzzied": True,
"sppressed": False,
"log": "<13>Ag 4 14:40:23 Centos7-001 pdate-esp-kernelmodle.sh: McAfeeESPFileAccess installed in this system is - 198.51.100.130",
"sorce_asset_id": "256fa9b1-a066-c9eb-561a-c2110035978a",
"timestamp_received_iso8601": "2020-08-04T11:40:23.152Z",
"destination_canonical": "198.51.100.130",
"time_offset": "Z"
}
Case wall
Result type | Description | Type |
---|---|---|
Output message* | In case of general error: "Action didn't complete due to error: {error}", result value should be set to false and the action should fail. If the action is completed successfully: "Successfully returned {len(events)} AlienVault Anywhere events" If the action failed to run: "Failed to list Endgame AlienVault Anywhere events!" When Product version parameter is set to V1: "Action should fail with clear message that is supported in V2." |
General |
CSV Table | Table Title: Events Table Columns:
Values:
|
General |
Ping
Test connectivity.
Parameters
N/A
Run on
This action runs on all entities.
Action results
Script result
Script result name | Value options | Example |
---|---|---|
success | True or False | success:False |
Connectors
For more detail about how to configure connectors in Google SecOps, see Ingest your data (connectors).
AlienVault USM Anywhere Connector
Google SecOps fetches alarms from LevelBlue USM Anywhere in near real-time and forwards them as alerts for cases.
Connector parameters
Use the following parameters to configure the connector:
Parameter name | Type | Default value | Is mandatory | Description |
---|---|---|---|---|
Environment | DDL | N/A | Yes | Select the required environment. For example, "Customer One". If the alert's Environment field is empty, it will be injected into this environment. |
Run Every | Integer | 0:0:0:10 | No | Select the time to run the connection. |
Product Field Name | String | device_product | Yes | The field name used to determine the device product. |
Event Field Name | String | event_name | Yes | The name of the field that determines the event name (subtype). |
Max Days Backwards | Integer | 1 | Yes | The number of days before the first connector iteration to retrieve alerts.
This parameter can apply to the initial connector iteration after you enable the connector for the first time, or the fallback value for an expired connector timestamp. |
Max Alerts Per Cycle | Integer | 10 | Yes | The maximum number of alerts to fetch in each connector's cycle. Limits the number of alerts in every cycle. |
Verify SSL | Checkbox | Unchecked | No | If selected, the integration validates the SSL certificate when connecting to the LevelBlue USM Anywhere server. |
Product Version | String | V2 | Yes | AlienVault Anywhere version - V1, V2. |
Secret | Password | N/A | Yes | The password of the according user. |
ClientID | String | N/A | Yes | ID of the user. |
Api Root | String | N/A | Yes | Example: https://<instance>.alienvault.com |
Script Timeout (Seconds) | String | 60 | Yes | The timeout limit, in seconds, for the Python process that runs the current script. |
Proxy Username | String | N/A | No | The proxy username to authenticate with. |
Proxy Password | Password | N/A | No | The proxy password to authenticate with. |
Proxy Server Address | String | N/A | No | The address of the proxy server to use. |
Rule Method | String | N/A | No | Filter alarms by rule method. The method would provide additional detail on the target of the attack and the particular vulnerability. Example: Firefox - CVE-2008-4064 |
Rule Strategy | String | N/A | No | The strategy of the rule that triggered the alarm. For example, use Client-Side Attack - Known Vulnerability when trying to exploit a known vulnerability in a web browser the attacker. |
Rule Intent | String | N/A | No | Filter alarms by the purpose of the alarm. The intent describes the context of the behavior that is being observed. These are the threat categories: System Compromise, Exploitation & Installation, Delivery & Attack, Reconnaissance & Probing, Environmental Awareness. |
Priority | String | N/A | No | Filter by alarm priority, comma-separated. Valid value: high/medium/low |
Use Suppressed Filter | Checkbox | Unchecked | No | This parameter will be used to determine whether to filter the incoming alerts using the Show Suppressed filter or not. |
Show Suppressed | Checkbox | Checked | No | Whether to include suppressed alarms in the search. |
Padding Period | Integer | 0 | No | Padding period in hours for the connector execution. |
The AlienVault USM Anywhere Connector has two
parameters, allowing smart filtering of the alerts being ingested into
Google SecOps, regarding the suppressed
attribute that those
alerts have:
- Use Suppressed Filter: This parameter determines whether to filter the
incoming alerts using the
Show Suppressed
filter or not. Show Suppressed: This parameter determines whether to include suppressed alarms in the search or not. There are three options in this connector:
- Bring all the AV alerts in, suppressed and not suppressed - clear both boxes.
- Bring only the non-suppressed alarms from AV - select the
Use Suppressed Filter
box and clear theShow Suppressed
box. - Bring only the suppressed alarms from AV but nothing else - select both
the
Use Suppressed Filter
andShow Suppressed
boxes. It's a default option.
For more information on alarm suppression in AlienVault, see Creating Suppression Rules from the Alarms Page.
Connector rules
The connector supports Proxy.
Need more help? Get answers from Community members and Google SecOps professionals.