Security Operations SOAR: Step 1 - Configure Integrations

Table of Contents

Below you'll find a table of contents for the Configure Integrations journey.

soar-configure-integrations.png

SecOps SOAR uses integrations to ingest alerts from a variety of data sources into the platform. A connector is one of the items in an integration package which can be downloaded through the Chronicle Marketplace.

Prerequisites

  • Entitlement for Chronicle SOAR on the account and project.
  • Administrative permissions to Chronicle SOAR.
  • Administrative access for any 3rd party applications that will be integrated with Chronicle SOAR.

Actions

soar-configure-integrations-siem-connector.png
SIEM Connector

Connecting SecOps SIEM and SOAR is a critical step in ensuring that your SOC can take full advantage of the power of SecOps planet scale index and search functionality. This provides SOAR access to the Chronicle UDM.

 
Show More
Prerequisites

See the Relevant Links section for more documentation regarding the prerequisites.

  • New or existing Chronicle SIEM instance
Steps
  1. Note: This connector is setup for the customer automatically by google when SOAR is turned on by the account team.

Relevant Links
soar-configure-integrations-additional-connectors.png
 Additional Connectors

SecOps SOAR uses connectors to ingest alerts from a variety of data sources. Connectors are Python based applications which pull alerts from 3rd party products parsing and normalizing them for storage in Chronicle's UDM.

 
Show More
Prerequisites

See the Relevant Links section for more documentation regarding the prerequisites.

  • New or existing SecOps SIEM instance
  • Permissions to add connectors (Read/Write permission for Marketplace, *Allow All)
Steps
  1. Navigate to Chronicle Marketplace > Integrations

  2. Search for and install Email Integrations

  3. Navigate to SOAR Settings > Ingestions > Connectors

  4. Select Settings > Configure Default Instance to open the Email Configure Instance dialog box.

  5. Fill in all of the required fields (this will vary based on the connector you're configuring)

  6. Click Create New Connector

  7. Select the IMAP Email Connector, click Create

  8. Fill in all of the required fields and click Save. Click Yes on the confirmation dialog.

  9. Enable the connector, click Save. This will cause the connector to run periodically to pull in any new emails according to the configuration.

Relevant Links
soar-configure-integrations-define-environments.png
Define Environments

Environment is simply another word for disparate networks, domains, or customers that are managed by a SOC or MSSP. Environments are useful logical segregation to provide services to different networks, customers or business units within the organization.

 
Show More
Prerequisites

See the Relevant Links section for more documentation regarding the prerequisites.

  • New or existing Chronicle SOAR deployment
  • Admin access in Chronicle SOAR
Steps
  1. In Chronicle SOAR, navigate to Settings > Organization > Environments.

  2. Click the "+" icon.

  3. Fill out all of the required information, ensuring to click Append to all Users and API Keys if you want to add this new environment directly to existing users and API Keys.

    1. Note: Make sure to add an alias if the 3rd party integration has a different tenant name defined.

  4. Click Create.

Relevant Links
soar-configure-integrations-configure-webhooks.png
Configure Webhooks

"Webhooks are a lightweight solution for pushing alerts from your organization into the platform. Cases with alerts ingested by webhooks appear in the platform with the same information as cases with alerts ingested using connectors. Note: Crowdstrike is used as an example"

 
Show More
Prerequisites

See the Relevant Links section for more documentation regarding the prerequisites.

  • Existing Chronicle SOAR deployment
  • Admin access in Chronicle SOAR
Steps
  1. Navigate to SOAR Settings > Ingestion > Webhooks.

  2. Click Add incoming webhook from the top left.

    1. For the sake of this example, we will use Crowdstrike as the 3rd party application.

    2. Name the webhook, then click Save.

  3. Copy the webhook URL, you will need this in your source platform as the webhook destination.

    1. Important Note: The webhook is only shown once, copy to a safe location.

  4. In the Data Mapping section, select Upload JSON sample (use the sample taken from Crowdstrike).

  5. Map the Chronicle fields with the corresponding fields in the Crowdstrike JSON data.

  6. Once

    Detections.Last.Format

    appears in the Expression Builder, you can click Run to see the results.

Relevant Links
Contributors
Version history
Last update:
2 weeks ago
Updated by: