Configuration

Data Model Acceleration and Macros

For optimal performance, it is recommended to enable the data model acceleration for the CIM data models which are being used.

Data Model Data-model Acceleration Time
Endpoint 7 days (Minimum)
Network Traffic 7 day (Minimum)
Cyences_Authentication 1 month (Minimum)
Network Resolution (DNS) 7 day (Minimum)
Cyences_Vulnerabilities 1 month (Minimum)
Cyences_Assets 1 month (Minimum)

alt

Products Setup (Data Source Macros)

Users can use the Products Setup page to customize the dashboards they want to see/hide and the alerts they want to enable/disable. There is a toggle button on the configuration page on each product page to do that. Users can enable or disable it. Showing status as “Unknown” means it’s enabled and dashboards are visible. It’s recommended to move toggle it to either “Enabled” or “Disabled” status.

The Products Setup page allows you to see if the data-source configuration (index macro) is accurate and if your Splunk environment has data for it or not and modify the configuration if required.

Navigate to Cyences Settings > Cyences App Configuration and Products Setup section where you can view and update several macro definitions. Verify that the macro definitions match the data source (index) used in your Splunk environment.

alt

Macro Setup

Navigate to Cyences Settings > Cyences App Configuration > Macro Setup where you can view and update several macro definitions. These macros are used in various alerts, dashboards, searches, and reports.

alt

Honey DB Configuration

We are using an IP block list from HoneyDB to detect malicious IP addresses coming in and out of the firewall. HoneyDB is a paid service that is used to obtain the list of blocked hosts/IPs. We are using API calls to get the most recent lists and then we correlate it with firewall logs.

A scheduled saved search is used to update the blocklist every two hours. Internally, the search query uses custom commands to make API calls to HoneyDB’s API to update the blocked list lookup.

Configuration of API and Secret Key for HoneyDB

The Splunk user has to add the API ID and API key to make HoneyDB API calls to retrieve the blocked IP list. Follow these steps to update the API ID and API key for the Cyences App:

  1. Navigate to the Cyences app and from the navigation bar go to Cyences Settings > Cyences App Configuration.

  2. On the left panel of the dashboard there is a section for HoneyDB Configuration

  3. Update the API ID and API Key for the HoneyDB API.

alt

Configuration of Malicious IP Collector Server

The Splunk user has to add the API URL and Auth token to make API calls to Cyences Malicious IP List server to create malicious IP list and retrieve the latest malicious IP list from the server. Follow these steps to update the same for the Cyences App:

  1. Navigate to the Cyences app and from the navigation bar go to Cyences Settings > Cyences App Configuration.

  2. On the left panel of the dashboard there is a section for MaliciousIP Collector Configuration.

  3. Update the API URL and Auth Token for the Cyences Server API.

alt

Note: Contact the CrossRealms Cyences team to get API URL and Authentication Token.

How to test whether the configuration is functioning correctly?

Run the search below and it should return events with no errors:

    | maliciousiplookupgen update_lookup=False generate_events=True 

alt

Sophos Central API Endpoints Configuration

Refer to the Data Onboarding > Sophos Central Metadata through API section for more information.

Cyences Email Settings for Alerts

The way Splunk currently handles alerts, users are only able to set up email notifications, which is not always optimal as some alerts may generate a lot of false positives. Not every alert needs to be received by email, especially those labeled with lower severity levels.

Cyences 3.0.0 contains two new email settings to reduce noise:

1. Regular Alert Digest Email

  • Sends notifications about triggered notable events in the last twenty-four hours for each Cyences alert in a single email.
  • By default, this will include both high and medium severity notable events, but users can adjust the severity level as needed.
  • This configuration can be edited from the Cyences Action - Send Digest Email alert action inside of the Cyences Digest Email alert. alt
  • The alert digest email will be sent once a day.
  • Users may receive multiple digest emails as there is a limit of ten alerts per digest email and each alert will be limited to fifteen notable events for the total result count information.

2. Critical Alert Email

  • Sends an email immediately after an alert gets triggered if the notable event has been labeled with a critical severity level (default setting). Users can customize the severity level for this email setting as needed.
  • Users will receive an immediate notification about important items within the email.
  • Users will no longer have to manually configure their email for every Cyences alert. Users can add their email address to each alert from a single source. Navigate to Cyences Settings > Cyences App Configuration > Cyences Email Action Configuration.
    alt
  • Users have an option to exclude themselves from specific alerts, to include their email addresses for specific alerts, or to disable an email altogether. This configuration can be done at the alert level by editing the Cyences Action - Send Email alert action for a particular alert. alt
  • To override the email setting for a particular alert, go to the individual alert and remove the email address from the Exclude Recipients section.
  • Add an email address to the Include Additional Recipients section if you only want to receive emails for a specific alert.

Note Users can continue to use Splunk’s default email functionality as desired for any alert and independently of the aforementioned Cyences email settings.

Device Inventory

The Device Inventory Table is generated based on live data coming into Splunk. View the Device Inventory section for more information.

Backfill Device Inventory

To backfill all of the lookups related to device inventory, follow the directions below to execute the necessary search query.

Navigate to Cyences App for Splunk > Settings > Searches, reports and alerts. Use the search filter to find a savedsearch named Device Inventory Backfill and click on Run to execute the search.

Use an appropriate time range to backfill all of the lookups, since that determines the search range for all devices (the default time range is set to Last 30 days).

List of Device Inventory related searches that users can execute individually to backfill specific lookups:

  • Device Inventory - CrowdStrike
  • Device Inventory - Lansweeper
  • Device Inventory - Qualys
  • Device Inventory - Sophos Endpoint Protection
  • Device Inventory - Tenable
  • Device Inventory - Tenable Vuln
  • Device Inventory - Windows Defender
  • Device Inventory - Kaspersky
  • Device Inventory - Splunk Internal

To clean up the lookups related to Device Inventory, follow the directions below to execute the necessary search query.

Navigate to Cyences App for Splunk > Settings > Searches, reports and alerts. Use the search filter to find a savedsearch named Device Inventory Lookup CleanUp and click on Run to execute the search.

Caution: We highly recommend that users run the search in the Last 60 days or another time range that is better suited for their environment, since the time range of the search will define which devices will be kept and the rest will be automatically removed.

User Inventory

The User Inventory Table is generated based on user related data coming into Splunk. View the User Inventory section for more information.

Backfill User Inventory

To backfill the user inventory lookup, follow the directions below to execute the search query.

Navigate to Cyences App for Splunk > Settings > Searches, reports and alerts. Use the search filter to find a savedsearch named User Inventory - Lookup Backfill and click on Run to execute the search.

Use an appropriate time range to backfill the lookup, since that determines the search range for all users (the default time range is set to Last 7 days).

CleanUp User Inventory Lookups

To clean up the User Inventory lookup, follow the directions below to execute the necessary search query.

Navigate to Cyences App for Splunk > Settings > Searches, reports and alerts. Use the search filter to find a savedsearch named User Inventory - Lookup CleanUp and click on Run to execute the search.

Caution: We highly recommend that users run the search in the Last 60 days or another time range that is better suited for their environment, since the time range of the search will define which users will be kept and the rest will be automatically removed.


Copyright © 2023 CrossRealms International.