Integrate LevelBlue USM Appliance with Google SecOps

This document describes how to integrate LevelBlue Unified Security Management (USM) Appliance with Google Security Operations (Google SecOps).

Integration version: 21.0

Integration parameters

Use the following parameters to configure the integration:

Parameter name Type Default value Is mandatory Description
Instance Name String N/A No Name of the Instance you intend to configure integration for.
Description String N/A No Description of the Instance.
Api Root String https://<instance>.alienvault.com Yes Address of the LevelBlue USM Appliance instance.
Username String N/A Yes The user's email address for connecting to the LevelBlue USM Appliance.
Password Password N/A Yes The password of the user account.
Run Remotely Checkbox Unchecked No Select the field to run the configured integration remotely.

For instructions about how to configure an integration in Google SecOps, see Configure integrations.

You can make changes at a later stage, if needed. After you configure an integration instance, you can use it in playbooks. For more information about how to configure and support multiple instances, see Supporting multiple instances.

Actions

For more information about actions, see Respond to pending actions from Your Workdesk and Perform a manual action.

Enrich Assets

Retrieve LevelBlue USM Appliance asset details. Within USM Appliance, an asset operates on the network of the organization as an integrated piece of equipment, which includes an exclusive IP address. An asset can be a PC, printer, firewall, router, server, or multiple devices that are allowed by the network. An asset is supervised by at least one USM Appliance Sensor.

Parameters

N/A

Run on

This action runs on the following entities:

  • IP Address
  • Hostname

Action results

Entity enrichment
Enrichment field name Logic - When to apply
model Returns if it exists in JSON result
descr Returns if it exists in JSON result
hostname Returns if it exists in JSON result
asset_type Returns if it exists in JSON result
fqdn Returns if it exists in JSON result
devices Returns if it exists in JSON result
asset_value Returns if it exists in JSON result
ips Returns if it exists in JSON result
id Returns if it exists in JSON result
sensors Returns if it exists in JSON result
os Returns if it exists in JSON result
networks Returns if it exists in JSON result
icon Returns if it exists in JSON result
Script result
Script result name Value options Example
success True or False success:False
JSON result
[
    {
        "EntityResult": {
            "model": null,
            "descr": " ",
            "hostname": "Hostname",
            "asset_type": "Internal",
            "fqdn": " ",
            "devices": [],
            "asset_value": "2",
            "ips": {
                "3.3.3.3": {
                    "ip": "192.0.2.1",
                    "mac": "01:23:45:AB:CD:EF"
                }},
            "id": "123D37D595B800734550B9D9D6A958C6",
            "sensors": {
                "C221234962EA11E697DE0AF71A09DF3B": {
                    "ip": "192.0.2.1",
                    "ctxs": {
                        "C228355962EA11E697DE0AF71A09DF3B": "AlienVault"
                    },
                    "name": "DA"
                }},
            "os": "Linux",
            "networks": {
                "7E4B12EEFD06A21F898345C2AB46EB10": {
                    "ips": "192.0.2.1/24",
                    "ctx": "C228355962EA11E697DE0AF71A09DF3B",
                    "name": "Pvt_000"
                }},
            "icon": " "
        },
        "Entity": "example.com"
    }
]

Enrich Vulnerabilities

Retrieve vulnerability information from the LevelBlue USM Appliance. The integrated vulnerability scanner on the USM Appliance Sensor can detect vulnerabilities in critical assets. These uncovered vulnerabilities can then be used in cross-correlation rules, enforcement, and audit reporting.

Parameters

N/A

Run on

This action runs on the following entities:

  • IP Address
  • Hostname

Action results

Entity enrichment
Enrichment field name Logic - When to apply
AlientVault_Severity Returns if it exists in JSON result
AlientVault_Service Returns if it exists in JSON result
AlientVault_Vulnerability Returns if it exists in JSON result
AlientVault_Scan Time Returns if it exists in JSON result
AlientVault_Asset Returns if it exists in JSON result
AlientVault_Id Returns if it exists in JSON result
Script result
Script result name Value options Example
success True or False success:False
JSON result
[
    {
        "EntityResult": [{
            "Severity": "High",
            "Service": "general (0/tcp))",
            "Vulnerability": "TCP Sequence Number Approximation Reset Denial of Service Vulnerability",
            "Scan Time": "2014-02-26 02:08:59",
            "Asset": "Hostname (192.0.2.1)",
            "Id": "123456"
        }, {
            "Severity": "High",
            "Service": "https (443/tcp)",
            "Vulnerability": "robot(s).txt exists on the Web Server",
            "Scan Time": "2014-02-26 02:08:59",
            "Asset": "Hostname (192.0.2.1)",
            "Id": "123457"
        }, {
            "Severity": "Medium",
            "Service": "general (0/tcp))",
            "Vulnerability": "TCP timestamps",
            "Scan Time": "2014-02-26 02:08:59",
            "Asset": "Hostname (192.0.2.1)",
            "Id": "123458"
        }],
        "Entity": "test"
    }
]

Fetch Last PCAP Files

Fetch last PCAP files from AlienVault.

Parameters

Parameter name Type Default value Description
Number Of Files To Fetch String N/A Example: 10

Run on

This action runs on all entities.

Action results

Script result
Script result name Value options Example
is_success True or False is_success:False
JSON result
[
    {
        "scan_name": "pcap_file_1545041396_10_192.0.2.1.pcap",
        "creation_time": "2018-12-17 10:09:56",
        "user": null,
        "download_link": "https://www.alienvault.com/ossim/pcap/download.php?scan_name=0000000_10_192.0.2.1.pcap&sensor_ip=192.0.2.1",
        "sensor_ip": "192.0.2.1",
        "duration": "10"
    }, {
        "scan_name": "pcap_file_1545041397_10_192.0.2.1.pcap",
        "creation_time": "2018-12-17 10:09:56",
        "user": null,
        "download_link": "https://www.alienvault.com/ossim/pcap/download.php?scan_name=0000000_10_192.0.2.1.pcap&sensor_ip=192.0.2.1",
        "sensor_ip": "192.0.2.1",
        "duration": "10"
    }, {
        "scan_name": "pcap_file_1545041398_10_192.0.2.1.pcap",
        "creation_time": "2018-12-17 10:09:56",
        "user": null,
        "download_link": "https://www.alienvault.com/ossim/pcap/download.php?scan_name=0000000_10_192.0.2.1.pcap&sensor_ip=192.0.2.1",
        "sensor_ip": "192.0.2.1",
        "duration": "10"
    }
]

Get PCAP Files for Events

Get PCAP files for events in an alert.

Parameters

N/A

Run on

This action runs on all entities.

Action results

Script result
Script result name Value options Example
is_success True or False is_success:False
JSON result
{
    "#0-1B09DN3B0D2011E985730AS799BFE5BC": "obLD1AACAAQAAAAAAAAAAAAABdwAAAABV+kUZQAHyFMAAAXqAAAF6gr3GgnfOwobLz7Y6wgARQAF3Dd3QABnBvvXVduqw6wfLg8MmgG7xmc2dMr3EdxQEAD+OgAAABcDAwdVAAAAAAAAAASEw70Ys0kQbz8wdaj1lsHAAA=="
}

Get Vulnerability Reports

Get environment vulnerability report files.

Parameters

Parameter name Type Default value Description
Number of Files to Fetch string N/A Example: 10

Run on

This action runs on all entities.

Action results

Script result
Script result name Value options Example
is_success True or False is_success:False
JSON result
[
    {
        "creation_time": "2014-02-26 02:08:59",
        "download_link": "https://www.alienvault.com/ossim/vulnmeter/lr_rescsv.php?treport=latest&ipl=192.0.2.1&ctx=C22835597DE0AF71A09DF3B&scantype=M",
        "Address": "Hostname (192.0.2.1)"
    }, {
        "creation_time": "2014-02-26 02:08:59",
        "download_link":
        "https://www.alienvault.com/ossim/vulnmeter/lr_rescsv.php?treport=latest&ipl=192.0.2.1&ctx=C228351E697DE071A09DF3B&scantype=M",
        "Address": "Hostname (192.0.2.1)"
    }, {
        "creation_time": "2014-02-26 02:08:59",
        "download_link": "https://www.alienvault.com/ossim/vulnmeter/lr_rescsv.php?treport=latest&ipl=192.0.2.1&ctx=C22835597DE0AF71A09DF3B&scantype=M",
        "Address": "Hostname (192.0.2.1)"
    }
]

Ping

Test the connectivity.

Parameters

N/A

Run on

This action runs on all entities.

Action results

Script result
Script result name Value options Example
success True or False success:False

Connectors

For more detail about how to configure connectors in Google SecOps, see Ingest your data (connectors).

AlienVault USM Appliance Connector

Use the following parameters to configure the connector:

Parameter name Type Default value Is mandatory Description
Environment DDL N/A Yes

Select the required environment. For example, "Customer One".

If the alert's Environment field is empty, it will be injected into this environment.

Run Every Integer 0:0:0:10 No Select the time to run the connection.
Product Field Name String device_product Yes The field name used to determine the device product.
Event Field Name String event_name Yes

The name of the field that determines the event name (subtype).

Script Timeout (Seconds) String 60 Yes

The timeout limit, in seconds, for the Python process that runs the current script.

Api Root String N/A Yes Address of the LevelBlue USM Appliance instance, such as https://<instance>.alienvault.com
Username String N/A Yes Email of the user.
Password Password N/A Yes The password of the according user.
Max Events Per Alert Integer 10 Yes Limits the number of events per alert.
Max Days Backwards Integer 1 Yes The number of days prior to today to retrieve alerts.

This parameter can apply to the initial connector iteration after you enable the connector for the first time, or the fallback value for an expired connector timestamp.

Max Alerts Per Cycle Integer 10 Yes

The maximum number of alerts to fetch in every connector cycle.

Limits the number of alerts in every cycle.

Server Timezone String UTC Yes The timezone configured in the AlienVault instance, such as UTC Asia/Jerusalem.
Environment Field Name String N/A No

The name of the field where the environment name is stored.

If the environment field is missing, the connector uses the default value.

Proxy Username String N/A No The proxy username to authenticate with.
Proxy Password Password N/A No The proxy password to authenticate with.
Proxy Server Address String N/A No The address of the proxy server to use.

Connector rules

The connector supports Proxy.

Need more help? Get answers from Community members and Google SecOps professionals.