Carbon Black Defense
Integration version: 9.0
Configure VMware Carbon Black Endpoint Standard (Endpoint Standard) to work with Google Security Operations
API Key
- Log in to the Carbon Black console.
- Navigate to the username in the upper right side of the page and select Profile info.
-
Click API Tokenon the left side of the page to reveal your API token.
If there is no API token displayed, click Resetto create a new one.
Network
Function | Default Port | Direction | Protocol |
---|---|---|---|
API
|
Multivalues | Outbound | apikey |
Configure Carbon Black Defense integration in Google SecOps
For detailed instructions on how to configure an integration in Google SecOps, see Configure integrations .
Integration parameters
Use the following parameters to configure the integration:
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Instance Name
|
String | N/A | No | Name of the Instance you intend to configure integration for. |
Description
|
String | N/A | No | Description of the Instance. |
API Root
|
String | https://{server-addres} | Yes | VMware Carbon Black Endpoint Standard (Endpoint Standard) API Root URL. |
API Secret Key
|
String | N/A | Yes | VMware Carbon Black Endpoint Standard (Endpoint Standard) API Key. |
Run Remotely
|
Checkbox | Unchecked | No | Check the field in order to run the configured integration remotely. Once checked, the option appears to select the remote user (agent). |
Actions
Change Device Status
Description
Change the status of a device.
Parameters
Parameter | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Device Status
|
String | N/A | Yes | The new status. Example: REGISTERED |
Run On
This action runs on the following entities:
- IP Address
- Hostname
Action Results
Entity Enrichment
Enrichment Field Name | Logic - When to apply |
---|---|
cb_defense_deviceId | N/A |
cb_defense_device_status | N/A |
Insights
N/A
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success
|
True/False | is_success:False |
Change Policy
Description
Change the CB Defense policy appointed to each of the queries outcome entities.
Parameters
Parameter | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Policy Name
|
String | N/A | Yes | The new policy name. Example: DFLabs_Policy |
Use cases
N/A
Run On
This action runs on the following entities:
- IP Address
- Hostname
Action Results
Entity Enrichment
Enrichment Field Name | Logic - When to apply |
---|---|
cb_defense_deviceId | N/A |
cb_defense_policy | N/A |
Script Result
Script Result Name | Value Options | Example |
---|---|---|
success
|
True/False | success:False |
Create Policy
Description
Create a new policy on Cb Defense.
Parameters
Parameter | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Policy Name
|
String | N/A | Yes | Name for the policy. |
Policy Description
|
String | N/A | Yes | A description of the policy. |
Priority Level
|
String | LOW | Yes | The priority score associated with sensors assigned to this policy. Example: LOW |
Policy Details
|
String | N/A | Yes | The policy details. |
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
new_policy_id
|
N/A | N/A |
Delete Policy
Description
Delete a policy from Cb Defense.
Parameters
Parameter | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Policy Name
|
String | N/A | Yes | Policy name. |
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success
|
True/False | is_success:False |
Delete Rule From Policy
Description
Remove a rule from an existing policy.
Parameters
Parameter | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Policy Name
|
String | N/A | Yes | Policy name. |
Rule ID
|
String | N/A | Yes | Rule ID. Example: 1 |
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success
|
True/False | is_success:False |
Get Device Info
Description
Get information about a device.
Parameters
N/A
Run On
This action runs on the following entities:
- IP Address
- Hostname
Action Results
Entity Enrichment
Enrichment Field Name | Logic - When to apply |
---|---|
assignedToName | Returns if it exists in JSON result |
macAddress | Returns if it exists in JSON result |
adGroupId | Returns if it exists in JSON result |
avEngine | Returns if it exists in JSON result |
avVdfVersion | Returns if it exists in JSON result |
rootedByAnalyticsTime | Returns if it exists in JSON result |
linuxKernelVersion | Returns if it exists in JSON result |
lastExternalIpAddress | Returns if it exists in JSON result |
lastDevicePolicyRequestedTime | Returns if it exists in JSON result |
activationCodeExpiryTime | Returns if it exists in JSON result |
currentSensorPolicyName | Returns if it exists in JSON result |
organizationName | Returns if it exists in JSON result |
deviceGuid | Returns if it exists in JSON result |
loginUserName | Returns if it exists in JSON result |
lastPolicyUpdatedTime | Returns if it exists in JSON result |
registeredTime | Returns if it exists in JSON result |
deviceSessionId | Returns if it exists in JSON result |
lastDevicePolicyChangedTime | Returns if it exists in JSON result |
windowsPlatform | Returns if it exists in JSON result |
osVersion | Returns if it exists in JSON result |
firstVirusActivityTime | Returns if it exists in JSON result |
avUpdateServers | Returns if it exists in JSON result |
lastReportedTime | Returns if it exists in JSON result |
middleName | Returns if it exists in JSON result |
activationCode | Returns if it exists in JSON result |
deregisteredTime | Returns if it exists in JSON result |
lastResetTime | Returns if it exists in JSON result |
lastInternalIpAddress | Returns if it exists in JSON result |
deviceOwnerId | Returns if it exists in JSON result |
avMaster | Returns if it exists in JSON result |
lastLocation | Returns if it exists in JSON result |
deviceType | Returns if it exists in JSON result |
targetPriorityType | Returns if it exists in JSON result |
encodedActivationCode | Returns if it exists in JSON result |
lastVirusActivityTime | Returns if it exists in JSON result |
avStatus | Returns if it exists in JSON result |
sensorStates | Returns if it exists in JSON result |
Returns if it exists in JSON result | |
virtualizationProvider | Returns if it exists in JSON result |
avPackVersion | Returns if it exists in JSON result |
assignedToId | Returns if it exists in JSON result |
scanStatus | Returns if it exists in JSON result |
name | Returns if it exists in JSON result |
policyName | Returns if it exists in JSON result |
scanLastActionTime | Returns if it exists in JSON result |
vdiBaseDevice | Returns if it exists in JSON result |
rootedByAnalytics | Returns if it exists in JSON result |
testId | Returns if it exists in JSON result |
avProductVersion | Returns if it exists in JSON result |
rootedBySensorTime | Returns if it exists in JSON result |
lastShutdownTime | Returns if it exists in JSON result |
quarantined | Returns if it exists in JSON result |
createTime | Returns if it exists in JSON result |
deviceId | Returns if it exists in JSON result |
sensorVersion | Returns if it exists in JSON result |
passiveMode | Returns if it exists in JSON result |
virtualMachine | Returns if it exists in JSON result |
firstName | Returns if it exists in JSON result |
uninstallCode | Returns if it exists in JSON result |
uninstalledTime | Returns if it exists in JSON result |
messages | Returns if it exists in JSON result |
policyOverride | Returns if it exists in JSON result |
organizationId | Returns if it exists in JSON result |
sensorOutOfDate | Returns if it exists in JSON result |
avAveVersion | Returns if it exists in JSON result |
status | Returns if it exists in JSON result |
policyId | Returns if it exists in JSON result |
deviceMetaDataItemList | Returns if it exists in JSON result |
lastName | Returns if it exists in JSON result |
originEventHash | Returns if it exists in JSON result |
avLastScanTime | Returns if it exists in JSON result |
rootedBySensor | Returns if it exists in JSON result |
scanLastCompleteTime | Returns if it exists in JSON result |
lastContact | Returns if it exists in JSON result |
Script Result
Script Result Name | Value Options | Example |
---|---|---|
success
|
True/False | success:False |
JSON Result
[
{
"EntityResult"
:
{
"assignedToName"
:
null
,
"macAddress"
:
null
,
"adGroupId"
:
0
,
"avEngine"
:
""
,
"avVdfVersion"
:
null
,
"rootedByAnalyticsTime"
:
null
,
"linuxKernelVersion"
:
null
,
"lastExternalIpAddress"
:
"1.1.1.1"
,
"lastDevicePolicyRequestedTime"
:
null
,
"activationCodeExpiryTime"
:
1513776891190
,
"currentSensorPolicyName"
:
null
,
"organizationName"
:
"cb-internal-alliances.com"
,
"deviceGuid"
:
null
,
"loginUserName"
:
null
,
"lastPolicyUpdatedTime"
:
null
,
"registeredTime"
:
1513172091219
,
"deviceSessionId"
:
null
,
"lastDevicePolicyChangedTime"
:
null
,
"windowsPlatform"
:
null
,
"osVersion"
:
"Windows 10 x64"
,
"firstVirusActivityTime"
:
0
,
"avUpdateServers"
:
null
,
"lastReportedTime"
:
1520325064134
,
"middleName"
:
null
,
"activationCode"
:
null
,
"deregisteredTime"
:
null
,
"lastResetTime"
:
0
,
"lastInternalIpAddress"
:
"1.1.1.1"
,
"deviceOwnerId"
:
260377
,
"avMaster"
:
false
,
"lastLocation"
:
"OFFSITE"
,
"deviceType"
:
"WINDOWS"
,
"targetPriorityType"
:
"MEDIUM"
,
"encodedActivationCode"
:
null
,
"lastVirusActivityTime"
:
0
,
"avStatus"
:
[
"AV_BYPASS"
],
"sensorStates"
:
[
"ACTIVE"
,
"LIVE_RESPONSE_NOT_RUNNING"
,
"LIVE_RESPONSE_NOT_KILLED"
],
"email"
:
"ACorona"
,
"virtualizationProvider"
:
null
,
"avPackVersion"
:
null
,
"assignedToId"
:
null
,
"scanStatus"
:
null
,
"name"
:
"HP-01"
,
"policyName"
:
"default"
,
"scanLastActionTime"
:
0
,
"vdiBaseDevice"
:
null
,
"rootedByAnalytics"
:
false
,
"testId"
:
-1
,
"avProductVersion"
:
null
,
"rootedBySensorTime"
:
null
,
"lastShutdownTime"
:
1519811818082
,
"quarantined"
:
false
,
"createTime"
:
null
,
"deviceId"
:
605341
,
"sensorVersion"
:
"1.1.1.1"
,
"passiveMode"
:
false
,
"virtualMachine"
:
false
,
"firstName"
:
null
,
"uninstallCode"
:
null
,
"uninstalledTime"
:
null
,
"messages"
:
null
,
"policyOverride"
:
false
,
"organizationId"
:
1105
,
"sensorOutOfDate"
:
false
,
"avAveVersion"
:
null
,
"status"
:
"REGISTERED"
,
"policyId"
:
6525
,
"deviceMetaDataItemList"
:
null
,
"lastName"
:
null
,
"originEventHash"
:
null
,
"avLastScanTime"
:
0
,
"rootedBySensor"
:
false
,
"scanLastCompleteTime"
:
0
,
"lastContact"
:
1520325053567
},
"Entity"
:
"HP-01"
}
]
Get Events
Description
Get events by entity.
Parameters
Parameter | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Time Frame
|
string | N/A | Yes | Time frame of the search. Example: 3h |
Run On
This action runs on the following entities:
- IP Address
- Hostname
Action Results
Entity Enrichment
Enrichment Field Name | Logic - When to apply |
---|---|
eventId | Returns if it exists in JSON result |
parentApp | Returns if it exists in JSON result |
eventTime | Returns if it exists in JSON result |
selectedApp | Returns if it exists in JSON result |
attackStage | Returns if it exists in JSON result |
processDetails | Returns if it exists in JSON result |
eventType | Returns if it exists in JSON result |
targetAp | Returns if it exists in JSON result |
longDescription | Returns if it exists in JSON result |
threatIndicators | Returns if it exists in JSON result |
securityEventCode | Returns if it exists in JSON result |
registryValue | Returns if it exists in JSON result |
incidentId | Returns if it exists in JSON result |
shortDescription | Returns if it exists in JSON result |
createTime | Returns if it exists in JSON result |
alertScore | Returns if it exists in JSON result |
alertCategory | Returns if it exists in JSON result |
Script Result
Script Result Name | Value Options | Example |
---|---|---|
success
|
True/False | success:False |
JSON Result
[
{
"EntityResult"
:
{
"0"
:
{
"eventId"
:
"1defe38112e911e7b34047d6447797bd"
,
"parentApp"
:
{
"applicationName"
:
"C: \\\\Windows\\\\System32\\\\svchost.exe"
,
"md5Hash"
:
null
,
"reputationProperty"
:
null
,
"effectiveReputation"
:
null
,
"applicationPath"
:
null
,
"virusName"
:
null
,
"effectiveReputationSource"
:
null
,
"virusCategory"
:
null
"sha256Hash"
:
"c7db4ae8175c33a47baa3ddfa089fad17bc8e362f21e835d78ab22c9231fe370"
,
"virusSubCategory"
:
null
},
"eventTime"
:
1490617768036
,
"selectedApp"
:
{
"applicationName"
:
"taskeng.exe"
,
"md5Hash"
:
"a21ac8d41e63cf1aa24ebc165ae82c9a"
,
"reputationProperty"
:
"TRUSTED_WHITE_LIST"
,
"effectiveReputation"
:
null
,
"applicationPath"
:
"C: \\\\Windows\\\\System32\\\\taskeng.exe"
,
"virusName"
:
null
,
"effectiveReputationSource"
:
null
,
"virusCategory"
:
null
,
"sha256Hash"
:
"74b9cf472d5008e00735482f084f886eaa201248d6e87ab6b1990e3670bd6693"
,
"virusSubCategory"
:
null
},
"attackStage"
:
null
,
"processDetails"
:
{
"userName"
:
"SYSTEM"
,
"interpreterHash"
:
null
,
"parentCommandLine"
:
"C: Windows\\\\system32\\\\svchost.exe-knetsvcs"
,
"milisSinceProcessStart"
:
32
,
"name"
:
"taskeng.exe"
,
"parentPid"
:
772
,
"processId"
:
2872
,
"interpreterName"
:
null
,
"commandLine"
:
"taskeng.exe{5267BC82-9B0D-4F0B-A566-E06CDE5602F1}S-1-5-18: NTAUTHORITY\\\\System: Service: "
,
"parentName"
:
"svchost.exe"
,
"parentPrivatePid"
:
"772-1489763380982-18"
,
"targetPrivatePid"
:
"2468-1490617768051-975"
,
"targetPid"
:
2468
,
"targetCommandLine"
:
"C: \\\\ProgramFiles(x86)\\\\Google\\\\Update\\\\GoogleUpdate.exe"
,
"privatePid"
:
"2872-1490617768004-974"
,
"targetName"
:
"GoogleUpdate.exe"
,
"fullUserName"
:
"NTAUTHORITY\\\\SYSTEM"
},
"eventType"
:
"SYSTEM_API_CALL"
,
"targetApp"
:
{
"applicationName"
:
"C: \\\\ProgramFiles(x86)\\\\Google\\\\Update\\\\GoogleUpdate.exe"
,
"md5Hash"
:
null
,
"reputationProperty"
:
"TRUSTED_WHITE_LIST"
,
"effectiveReputation"
:
null
,
"applicationPath"
:
null
,
"virusName"
:
null
,
"effectiveReputationSource"
:
null
,
"virusCategory"
:
null
,
"sha256Hash"
:
"52fc3aa9f704300041e486e57fe863218e4cdf4c8eee05ca6b99a296efee5737"
,
"virusSubCategory"
:
null
},
"longDescription"
:
""
,
"threatIndicators"
:
[
"SUSPENDED_PROCESS"
],
"securityEventCode"
:
null
,
"registryValue"
:
null
,
"incidentId"
:
null
,
"shortDescription"
:
""
,
"createTime"
:
1490617872232
,
"alertScore"
:
0
,
"alertCategory"
:
null
}
},
"Entity"
:
"HP-01"
}
]
Get Processes
Description
List processes by device.
Parameters
Parameter | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Time Frame
|
string | 3h | Yes | Time frame of the search. Example: 3h |
Run On
This action runs on the following entities:
- IP Address
- Hostname
Action Results
Entity Enrichment
Enrichment Field Name | Logic - When to apply |
---|---|
applicationName | Returns if it exists in JSON result |
processId | Returns if it exists in JSON result |
numEvents | Returns if it exists in JSON result |
applicationPath | Returns if it exists in JSON result |
privatePid | Returns if it exists in JSON result |
sha256Hash | Returns if it exists in JSON result |
Script Result
Script Result Name | Value Options | Example |
---|---|---|
success
|
True/False | success:False |
JSON Result
[
{
"EntityResult"
:
{
"0"
:
{
"applicationName"
:
"chrome.exe"
,
"processId"
:
3052
,
"numEvents"
:
252
,
"applicationPath"
:
null
,
"privatePid"
:
"3052-1489181082476-30"
,
"sha256Hash"
:
"c8b01dd0153bbe4527630fb002f9ef8b4e04127bdff212831ff67bd6ab0ea265"
}
},
"Entity"
:
"HP-01"
}
]
Ping
Description
Test Connectivity.
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
success
|
True/False | success:False |
Need more help? Get answers from Community members and Google SecOps professionals.