This article explains how to connect Attivo to Workbench.
Step 1: Enable console access
Note
Expel secures all login information our SOC analysts need about your devices in a MFA password product. Access to this login information is protected using our internal MFA processes. To learn more about the IP addresses all Expel traffic comes from, go here.
-
Administration > User Accounts > Configure.
-
Select +Add from the Users List.
-
For User Type select local.
-
Select Privileges checkbox for Admin.
-
For Username type expelsoc.
-
For First Name type Expel.
-
For Last Name type SOC.
-
Type a Password.
-
Note
After console access is established, the remaining onboarding steps for this technology can also be performed by Expel. Reach out to your engagement manager and we're happy to complete the integration!
Step 2: Logging Attivo using Sumo Logic and Splunk
Refer to your SIEM documentation or work with your SIEM representative to port in Attivo logs. You can also refer to the following web references for creating a new Syslog source:
Sumo Logic: https://help.sumologic.com/docs/send-data/installed-collectors/sources/syslog-source/
Splunk: https://docs.splunk.com/Documentation/Splunk/7.0.2/Data/Monitornetworkports
Step 3: Configure Attivo in Workbench
-
In a new browser tab, go to https://workbench.expel.io/settings/security-devices?setupIntegration=attivo.
-
Select the Assembler with network connectivity to the Attivo device. Select the SIEM you created earlier.
-
For Name type the host name of the Attivo device.
-
For Location type the geographic location of the appliance.
-
For Source Category, type the Sumo Logic source category for this device.
-
For Source Type (SIEM that contains the data) type the Splunk source type for this device.
-
For Server address type the address of the server for console access.
-
-
You can provide console access now or set it up later. Use the instructions below to set it up later.
Comments
0 comments
Please sign in to leave a comment.