Endpoint Standard Integrations

Carbon Black Cloud Endpoint Standard is the new name for the product formerly called CB Defense.

Integrations developed by Carbon Black all have similar installation instructions, unless otherwise specified.

Integrations may require an API URL, which is accessible through a special hostname assigned to your organization. To find your organization’s API hostname, please refer to this KB article.

Carbon Black Integration Network

Carbon Black partners with industry leaders to create integrated solutions helping you to achieve end-to-end protection across security systems. The Carbon Black Integration Network highlights our Partners and the solutions they have built using our Open APIs.

Members of the Carbon Black partner program can submit their products to Carbon Black for certification and promotion on our Integration Network. Learn more about the Carbon Black Partner Program here.

SIEM Connectors

These connectors allow users to send notifications or alerts into a SIEM like Splunk or QRadar.

Carbon Black Cloud Syslog Connector

The syslog connector lets administrators forward alert notifications and audit logs from their Carbon Black Cloud instance to local, on-premise systems, and:

  • Generates pipe-delimited syslog messages with alert metadata identified by the streaming prevention system
  • Aggregates data from one or more Carbon Black Cloud organizations into a single syslog stream
  • Can be configured to use UDP, TCP, or encrypted (TCP over TLS) syslog protocols

Requirements

Installation

You can install the Syslog Connector using either PyPI or GitHub.

How to Automate the Carbon Black Cloud Syslog Connector

The syslog connector can be automated on all Platforms. Please select your desired Operating System for more information.

Endpoint Standard Splunk Add-On

The Endpoint Standard, or CB Defense Add-On for Splunk allows administrators to forward events and notifications from the industry’s leading NGAV solution into Splunk for correlation and analysis.

This add-on is available on Splunkbase under CB Defense Add-On for Splunk for both Splunk on-premise and Splunk Cloud.

Requirements

This app requires Endpoint Standard and Splunk version 6.4 or above.

No additional hardware requirements are necessary for running this app above the standard requirements for both Carbon Black and Splunk.

Getting Started

Install Endpoint Standard app for Splunk and configure it to connect to your Endpoint Standard server. Do this by creating a Endpoint Standard API Key and attaching it to one or more Notification Rules. To create a SIEM API Key and notification rule:

  1. Log into your Endpoint Standard Dashboard and select the Settings/API Keys menu option
  2. Create a new key of “SIEM” access level and name it. Optionally, restrict access to this connector by IP address range
  3. Select the Settings/Notifications menu option
  4. Create a new Notification Rule and add your new SIEM connector to the list of notifiers. You can search by API Key name. The Notification Rule defines what alerts are sent to the SIEM. No events will be sent to Splunk if a notification rule isn’t linked to the SIEM connector.

Next, configure the Endpoint Standard app for Splunk to connect to your Endpoint Standard server:

  1. Start the Endpoint Standard App in Splunk
  2. Go to the “Configuration” tab - “Add-On Settings” page and fill in the following fields:
    1. Enter the API hostname for your Endpoint Standard instance in the URL field. Example: api-url.conferdeploy.net. Refer to: Endpoint Standard API Basics.
    2. Set SIEM API ID to the API ID obtained from the Carbon Black Cloud Console. Do the same for your SIEM API Secret Key. Refer to: Carbon Black Cloud Authentication.
  3. Go to the “Inputs” tab and click “Create new input” with the following settings:
    1. Set “name” to anything (for example “cbdefense”)
    2. Set “interval” to 60 seconds (the polling interval of the Endpoint Standard notifications API)
    3. Set “index” to whatever Splunk index you’d like the app to place Endpoint Standard events into

The Endpoint Standard app for Splunk uses Splunk’s encrypted credential storage facility to store the API token for your Endpoint Standard server, so the API key is stored securely on the Splunk server.

Last modified on May 6, 2020