Mandiant Managed Defense
This document provides guidance to help you configure and integrate Mandiant Managed Defense with Google Security Operations SOAR.
Integration version: 2.0
Integrate Mandiant Managed Defense with Google SecOps
The integration requires the following parameters:
Parameters | Description |
---|---|
API Root
|
Required
The API root of the Mandiant instance. The default value is |
Client ID
|
Required
The client ID value of the Mandiant Managed Defense account. |
Client Secret
|
Required
The client secret value of the Mandiant Managed Defense account. |
Verify SSL
|
Required
If selected, the integration verifies that the SSL certificate for connecting to the Mandiant server is valid. Selected by default. |
You can make changes at a later stage, if necessary. After you configure instances, you can use them in playbooks. For more information on configuring and supporting multiple instances, see Supporting multiple instances .
For instructions on how to configure an integration in Google SecOps, see Configure integrations .
Actions
The integration includes the following actions:
Ping
Use the Pingaction to test connectivity to Mandiant Managed Defense.
This action doesn't run on entities.
Action inputs
None.
Action outputs
The Pingaction provides the following outputs:
Action output type | Availability |
---|---|
Case wall attachment | Not available |
Case wall link | Not available |
Case wall table | Not available |
Enrichment table | Not available |
JSON result | Not available |
Output messages | Available |
Script result | Available |
Output messages
The Pingaction provides the following output messages:
Output message | Message description |
---|---|
Successfully connected to the Mandiant Managed Defense server
with the provided connection parameters!
|
Action succeeded. |
Failed to connect to the Mandiant Managed Defense server! Error
is ERROR_REASON
|
Action failed. Check the connection to the server, input parameters, or credentials. |
Script result
The following table describes the values for the script result output when using the Pingaction:
Script result name | Value |
---|---|
is_success
|
True
or False
|
Connectors
For more information about how to configure connectors in Google SecOps, see Ingest your data (connectors) .
Mandiant Managed Defense – Investigations Connector
Use the Mandiant Managed Defense – Investigations Connectorto retrieve investigation from Mandiant Managed Defense.
The dynamic list works with the name
parameter.
Connector inputs
The Mandiant Managed Defense – Investigations Connectorrequires the following parameters:
Product Field Name
The name of the field where the product name is stored.
The default value is Product Name
.
Event Field Name
The field name used to determine the event name (subtype).
The default value is type
.
Environment Field Name
The name of the field where the environment name is stored.
If the environment field isn't found, the environment is the default environment.
The default value is ""
.
Environment Regex Pattern
A regular expression pattern to run on the value found in the Environment Field Name
field. This parameter lets you manipulate
the environment field using the regular expression logic.
Use the default value .*
to retrieve the required raw Environment Field Name
value.
If the regular expression pattern is null or empty, or the environment value is null, the final environment result is the default environment.
Script Timeout (Seconds)
The timeout limit for the Python process running the current script.
the default value is 180.
API Root
The API root of the Mandiant instance.
The default value is https://api.services.mandiant.com
.
Client ID
The client ID value of the Mandiant Managed Defense account.
Client Secret
The client secret value of the Mandiant Managed Defense account.
Status Filter
The status filter for the investigations.
If you provide no value, the connector ingests the investigations with all status values.
Possible values are as follows:-
open
-
resolved
-
disputed
-
false-positive
Max Hours Backwards
The number of hours before the first connector iteration to retrieve the incidents from. This parameter applies only once to the initial connector iteration after you enable the connector for the first time.
The default value is 24 hours.
Max Investigations To Fetch
The number of investigations to process in a one connector iteration.
The default value is 100. The maximum value is 100.
Use dynamic list as a blocklist
If selected, the connector uses the dynamic list as a blocklist.
Not selected by default.
Verify SSL
If selected, Google SecOps verifies that the SSL certificate for the connection to the Mandiant server is valid.
Selected by default.
Proxy Server Address
The address of the proxy server to use.
Proxy Username
The proxy username to authenticate with.
Proxy Password
The proxy password to authenticate with.
Disable Overflow
Select to disable an event overflow.
Not selected by default.
Connector rules
The Mandiant Managed Defense – Investigations Connectorsupports proxies.
Connector events
The following is an example of a Mandiant Managed Defense – Investigations Connectorevent in Google SecOps:
{
"id"
:
" TYPE
-investigation--257e976c-2a2e-5b29-9203-387615b8b670"
,
"type"
:
" TYPE
-investigation"
,
"name"
:
"Privilege escalation - testing 2"
,
"description"
:
"\n\n\nMandiant alerted on endpoint activity related to a suspicious `PrivilegeEscalation` event. This event matched the signature **Privilege escalation using token duplication** on the host HOST
.\n\nMicrosoft Defender for Endpoint provided the following description for the detection:\n\n```\nA new process was suspiciously created with a duplicated access token for the SYSTEM account. This activity, often referred to as token impersonation, is used to elevate privileges for existing processes or start processes with elevated privileges.\n\n\n```\n\nFor alert details, see the following link in Microsoft Defender for Endpoint:\n\n* https://security.microsoft.com/alerts/ ALERT_ID
"
,
"investigation_status"
:
"open"
,
"investigation_form"
:
"case"
,
"start_time"
:
"2024-02-23T23:28:10Z"
,
"end_time"
:
""
,
"created"
:
"2024-02-23T23:28:10Z"
,
"modified"
:
"2024-02-23T23:28:10Z"
,
"published"
:
"2024-02-23T23:28:10Z"
,
"x_fireeye_com_severity"
:
"medium"
,
"x_fireeye_com_priority"
:
"3"
,
"assigned_user_email"
:
null
,
"external_references"
:
[
{
"source_name"
:
"FaaS Portal"
,
"external_id"
:
" ID
"
,
"url"
:
"https://md.mandiant.com/investigations/ ID
"
}
]
}
Need more help? Get answers from Community members and Google SecOps professionals.