McAfee NSM

Integration version: 6.0

Overview

Configure McAfee NSM integration in Google Security Operations

For detailed instructions on how to configure an integration in Google SecOps, see Configure integrations .

Integration parameters

Use the following parameters to configure the integration:

Parameter Type Default Value Is Mandatory Description
API Root
String https://x.x.x.x/sdkapi/ True
Username
String N/A True
Password
Password N/A True
Domain ID
String N/A True
Siemplify Policy Name
String N/A True
Sensors Names List Comma Separated
String sensor_name1,sensor_name2,sensor_name3 True

Actions

Block IP

Description

Block IP address.

Parameters

N/A

Run On

This action runs on the IP Address entity.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result Name Value Options Example
is_success
True/False is_success:False
JSON Result
  N 
 / 
 A 
 

Get Alert Info Data

Description

Get alert data by ID.

Parameters

Parameter Type Default Value Is Mandatory Description
Alert ID
String https://x.x.x.x/sdkapi/ True N/A
Sensor Name
String N/A True N/A

Run On

This action runs on all entities.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result Name Value Options Example
alert_json
N/A N/A
JSON Result
  { 
  
 "name" 
 : 
  
 "MALWARE: Blacklisted File Detected" 
 , 
  
 "assignTo" 
 : 
  
 "---" 
 , 
  
 "description" 
 : 
  
 { 
  
 "definition" 
 : 
  
 "A McAfee-maintained blacklist that is dynamically updated with Callback Detectors updates." 
 , 
  
 "signatures" 
 : 
  
 [{ 
  
 "conditions" 
 : 
  
 "null" 
  
 }], 
  
 "componentAttacks" 
 : 
  
 "null" 
 , 
  
 "target" 
 : 
  
 "ServerOrClient" 
 , 
  
 "reference" 
 : 
  
 { 
  
 "cveId" 
 : 
  
 "[]" 
 , 
  
 "certId" 
 : 
  
 "null" 
 , 
  
 "bugtraqId" 
 : 
  
 "[]" 
 , 
  
 "nspId" 
 : 
  
 "0x4840c300" 
 , 
  
 "microsoftId" 
 : 
  
 "[]" 
 , 
  
 "additionInfo" 
 : 
  
 "null" 
 , 
  
 "arachNidsId" 
 : 
  
 "[]" 
  
 }, 
  
 "protocals" 
 : 
  
 "[smtp, ftp, http]" 
 , 
  
 "comments" 
 : 
  
 { 
  
 "availableToChildDomains" 
 : 
  
 "true" 
 , 
  
 "parentDomainComments" 
 : 
  
 "null" 
 , 
  
 "comments" 
 : 
  
 " " 
  
 }, 
  
 "rfSB" 
 : 
  
 "No" 
 , 
  
 "attackCategory" 
 : 
  
 "Malware" 
 , 
  
 "attackSubCategory" 
 : 
  
 "---" 
 , 
  
 "protectionCategory" 
 : 
  
 "[Malware/Bot]" 
 , 
  
 "httpResponseAttack" 
 : 
  
 "No" 
 , 
  
 "btf" 
 : 
  
 "Medium" 
  
 }, 
  
 "summary" 
 : 
  
 { 
  
 "destination" 
 : 
  
 "null" 
 , 
  
 "zoombie" 
 : 
  
 "null" 
 , 
  
 "target" 
 : 
  
 { 
  
 "ipAddrs" 
 : 
  
 "1.1.1.1" 
 , 
  
 "risk" 
 : 
  
 "N/A" 
 , 
  
 "country" 
 : 
  
 "India" 
 , 
  
 "networkObject" 
 : 
  
 "---" 
 , 
  
 "hostName" 
 : 
  
 "null" 
 , 
  
 "vmName" 
 : 
  
 "null" 
 , 
  
 "proxyIP" 
 : 
  
 "1.1.1.1" 
 , 
  
 "user" 
 : 
  
 "Unknown" 
 , 
  
 "os" 
 : 
  
 "---" 
 , 
  
 "port" 
 : 
  
 41128 
  
 }, 
  
 "attacker" 
 : 
  
 { 
  
 "ipAddrs" 
 : 
  
 "1.1.1.1" 
 , 
  
 "risk" 
 : 
  
 "N/A" 
 , 
  
 "country" 
 : 
  
 "India" 
 , 
  
 "networkObject" 
 : 
  
 "---" 
 , 
  
 "hostName" 
 : 
  
 "null" 
 , 
  
 "vmName" 
 : 
  
 "null" 
 , 
  
 "proxyIP" 
 : 
  
 "1.1.1.1" 
 , 
  
 "user" 
 : 
  
 "Unknown" 
 , 
  
 "os" 
 : 
  
 "---" 
 , 
  
 "port" 
 : 
  
 80 
  
 }, 
  
 "cAndcServer" 
 : 
  
 "null" 
 , 
  
 "source" 
 : 
  
 "null" 
 , 
  
 "compromisedEndpoint" 
 : 
  
 "null" 
 , 
  
 "attackedHIPEndpoint" 
 : 
  
 { 
  
 "ipAddrs" 
 : 
  
 "1.1.1.1" 
 , 
  
 "risk" 
 : 
  
 "N/A" 
 , 
  
 "country" 
 : 
  
 "India" 
 , 
  
 "networkObject" 
 : 
  
 "---" 
 , 
  
 "hostName" 
 : 
  
 "null" 
 , 
  
 "vmName" 
 : 
  
 "null" 
 , 
  
 "proxyIP" 
 : 
  
 "1.1.1.1" 
 , 
  
 "user" 
 : 
  
 "Unknown" 
 , 
  
 "os" 
 : 
  
 "---" 
 , 
  
 "port" 
 : 
  
 41128 
  
 }, 
  
 "fastFluxAgent" 
 : 
  
 "null" 
 , 
  
 "event" 
 : 
  
 { 
  
 "domain" 
 : 
  
 "My Company" 
 , 
  
 "protocol" 
 : 
  
 "http" 
 , 
  
 "zone" 
 : 
  
 "null" 
 , 
  
 "alertId" 
 : 
  
 "2246015847757997493" 
 , 
  
 "attackCount" 
 : 
  
 1 
 , 
  
 "vlan" 
 : 
  
 "-11" 
 , 
  
 "direction" 
 : 
  
 "Inbound" 
 , 
  
 "detection" 
 : 
  
 "Signature" 
 , 
  
 "application" 
 : 
  
 "HTTP" 
 , 
  
 "device" 
 : 
  
 "NS9100-50" 
 , 
  
 "result" 
 : 
  
 "Inconclusive" 
 , 
  
 "time" 
 : 
  
 "Jan 04, 2016 09:50:39" 
 , 
  
 "relevance" 
 : 
  
 "Unknown" 
 , 
  
 "matchedPolicy" 
 : 
  
 "CustomFP_Engine_With_AlertOnly" 
 , 
  
 "interface" 
 : 
  
 "G3/1-G3/2" 
  
 }}, 
  
 "details" 
 : 
  
 { 
  
 "malwareFile" 
 : 
  
 { 
  
 "engine" 
 : 
  
 "Manager Blacklist" 
 , 
  
 "fileHash" 
 : 
  
 "3f3f7c3b9722912ddeddf006cff9d9d0" 
 , 
  
 "malwareConfidence" 
 : 
  
 "Very High" 
 , 
  
 "malwareName" 
 : 
  
 "null" 
 , 
  
 "fileName" 
 : 
  
 "/Firewall.cpl" 
 , 
  
 "size" 
 : 
  
 "6144 bytes" 
  
 }, 
  
 "exceededThreshold" 
 : 
  
 "null" 
 , 
  
 "callbackDetectors" 
 : 
  
 "null" 
 , 
  
 "layer7" 
 : 
  
 { 
  
 "httpReturnCode" 
 : 
  
 200 
 , 
  
 "httpURI" 
 : 
  
 "/Firewall.cpl" 
 , 
  
 "httpRequestMethod" 
 : 
  
 "GET" 
 , 
  
 "httpServerType" 
 : 
  
 "Apache/2.2.13 (Fedora) Last - Modified: Wed, 10 Oct 2012 05: 19: 15 GMT" 
 , 
  
 "httpHostHeader" 
 : 
  
 "null" 
 , 
  
 "httpUserAgent" 
 : 
  
 "Wget/1.11.4 (Red Hat modified)" 
  
 }, 
  
 "portScan" 
 : 
  
 "null" 
 , 
  
 "sqlInjection" 
 : 
  
 "null" 
 , 
  
 "triggeredComponentAttacks" 
 : 
  
 "null" 
 , 
  
 "hostSweep" 
 : 
  
 "null" 
 , 
  
 "matchedSignature" 
 : 
  
 "null" 
 , 
  
 "communicationRuleMatch" 
 : 
  
 "null" 
 , 
  
 "fastFlux" 
 : 
  
 "null" 
  
 }, 
  
 "alertState" 
 : 
  
 "UnAcknowledged" 
 , 
  
 "uniqueAlertId" 
 : 
  
 "6245941293374080682" 
 } 
 

Is IP Blocked

Description

Check if an IP address is blocked.

Parameters

N/A

Run On

This action runs on the IP Address entity.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result Name Value Options Example
is_success
True/False is_success:False
JSON Result
  N 
 / 
 A 
 

Ping

Description

Test Connectivity.

Parameters

N/A

Run On

This action runs on all entities.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result Name Value Options Example
is_success
True/False is_success:False
JSON Result
  N 
 / 
 A 
 

Quarantine IP

Description

Quarantine a particular IP address.

Parameters

N/A

Run On

This action runs on the IP Address entity.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result Name Value Options Example
is_success
True/False is_success:False
JSON Result
  N 
 / 
 A 
 

Unblock IP

Description

Unblock a particular IP address.

Parameters

N/A

Run On

This action runs on the IP Address entity.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result Name Value Options Example
is_success
True/False is_success:False
JSON Result
  [{ 
 "EntityResult" 
 : 
 [{ 
 "EPOEvents.ThreatCategory" 
 : 
 "av.detect" 
 , 
 "EPOEvents.TargetUserName" 
 : 
 "VM-EPOAGENTTEST 
 \\\\\\\\ 
 Admin" 
 , 
 "EPOEvents.TargetPort" 
 : 
 "None" 
 , 
 "EPOEvents.TargetFileName" 
 : 
 "C: 
 \\\\\\\\ 
 Users 
 \\\\\\\\ 
 Admin 
 \\\\\\\\ 
 Desktop 
 \\\\\\\\ 
 eicar.txt" 
 , 
 "EPOEvents.TargetIPV4" 
 : 
 - 
 1979711347 
 , 
 "EPOEvents.ThreatName" 
 : 
 "EICAR test file" 
 , 
 "EPOEvents.SourceUserName" 
 : 
 "None" 
 , 
 "EPOEvents.TargetProcessName" 
 : 
 "None" 
 , 
 "EPOEvents.SourceProcessName" 
 : 
 "None" 
 , 
 "EPOEvents.ThreatType" 
 : 
 "test" 
 , 
 "EPOEvents.SourceIPV4" 
 : 
 - 
 1979711347 
 , 
 "EPOEvents.TargetProtocol" 
 : 
 "None" 
 , 
 "VSECustomEvent.MD5" 
 : 
 "44d88612fea8a8f36de82e1278abb02f" 
 , 
 "EPOEvents.SourceURL" 
 : 
 "None" 
 , 
 "EPOEvents.ThreatActionTaken" 
 : 
 "deleted" 
 , 
 "EPOEvents.TargetHostName" 
 : 
 "VM-EPOAGENTTEST" 
 , 
 "EPOEvents.ThreatHandled" 
 : 
 "True" 
 , 
 "EPOEvents.SourceHostName" 
 : 
 "_" 
 }, 
 { 
 "EPOEvents.ThreatCategory" 
 : 
 "av.detect" 
 , 
 "EPOEvents.TargetUserName" 
 : 
 "VM-EPOAGENTTEST 
 \\\\\\\\ 
 Admin" 
 , 
 "EPOEvents.TargetPort" 
 : 
 "None" 
 , 
 "EPOEvents.TargetFileName" 
 : 
 "C: 
 \\\\\\\\ 
 Users 
 \\\\\\\\ 
 Admin 
 \\\\\\\\ 
 Desktop 
 \\\\\\\\ 
 eicar.txt" 
 , 
 "EPOEvents.TargetIPV4" 
 : 
 - 
 1979711347 
 , 
 "EPOEvents.ThreatName" 
 : 
 "EICAR test file" 
 , 
 "EPOEvents.SourceUserName" 
 : 
 "None" 
 , 
 "EPOEvents.TargetProcessName" 
 : 
 "None" 
 , 
 "EPOEvents.SourceProcessName" 
 : 
 "None" 
 , 
 "EPOEvents.ThreatType" 
 : 
 "test" 
 , 
 "EPOEvents.SourceIPV4" 
 : 
 - 
 1979711347 
 , 
 "EPOEvents.TargetProtocol" 
 : 
 "None" 
 , 
 "VSECustomEvent.MD5" 
 : 
 "44d88612fea8a8f36de82e1278abb02f" 
 , 
 "EPOEvents.SourceURL" 
 : 
 "None" 
 , 
 "EPOEvents.ThreatActionTaken" 
 : 
 "deleted" 
 , 
 "EPOEvents.TargetHostName" 
 : 
 "VM-EPOAGENTTEST" 
 , 
 "EPOEvents.ThreatHandled" 
 : 
 "True" 
 , 
 "EPOEvents.SourceHostName" 
 : 
 "_" 
 }], 
 "Entity" 
 : 
 "44d88612fea8a8f36de82e1278abb02f" 
 }] 
 

Need more help? Get answers from Community members and Google SecOps professionals.

Design a Mobile Site
View Site in Mobile | Classic
Share by: