Skip to main content
 

Tip

This article was accurate at the time of writing, but changes happen. If you find the instructions are outdated, leave a description in the comment field below and let us know!

Step 1: Enable console access

  1. Administration > User Accounts > Configure.

    Screen Shot 2021-03-05 at 7.33.17 AM.png
  2. Select +Add from the Users List.

    Screen Shot 2021-03-05 at 7.33.52 AM.png
    • For User Type select local.

    • Select Privileges checkbox for Admin.

    • For Username type expelsoc.

    • For First Name type Expel.

    • For Last Name type SOC.

    • Type a Password.

Note

After console access is established, the remaining onboarding steps for this technology can also be performed by Expel. Reach out to your engagement manager and we're happy to complete the integration!

Step 2: Logging Attivo using Sumo Logic and Splunk

Refer to your SIEM documentation or work with your SIEM representative to port in Attivo logs. You can also refer to the following web references for creating a new Syslog source:

Sumo Logic: https://help.sumologic.com/ja/docs/send-data/installed-collectors/sources/syslog-source/

Splunk: https://docs.splunk.com/Documentation/Splunk/7.0.2/Data/Monitornetworkports

Step 3: Configure Attivo in Workbench

  1. In a new browser tab, go to https://workbench.expel.io/settings/security-devices?setupIntegration=attivo.

  2. Select the Assembler with network connectivity to the Attivo device.

    Screen Shot 2021-03-05 at 7.36.20 AM.png
    • For Name type the host name of the Attivo device.

    • For Location type the geographic location of the appliance.

    • For Source Category, type the Sumo Logic source category for this device.

    • For Source Type (SIEM that contains the data) type the Splunk source type for this device.

    • For Username type expelsoc from Step 1.

    • For Password type the expelsoc admin password previously created in the Attivo console in Step 1.