This article explains how to connect Singularity Hologram to Workbench.
Quick Links
Step 1: Enable Console Access
Having read-only access to the interface of your technology allows Expel to dig deeper during incident investigations. Our device health team uses this access to investigate potential health issues with your tech. For more information, see Why Expel Asks for Console Access.
Note
Expel secures all login information our SOC analysts need about your devices in an MFA password product. Access to this login information is protected using our internal MFA processes. To learn more about the IP addresses all Expel traffic comes from, go here.
-
Administration > User Accounts > Configure.
-
Select +Add from the Users List.
-
For User Type select local.
-
Select Privileges checkbox for Admin.
-
For Username type expelsoc.
-
For First Name type Expel.
-
For Last Name type SOC.
-
Type a Password.
-
-
Click Save.
Note
After console access is established, the remaining onboarding steps for this technology can also be performed by Expel. Contact Support for help completing the integration.
Step 2: Logging Singularity Hologram using Sumo Logic and Splunk
Refer to your SIEM documentation or work with your SIEM representative to port in Singularity Hologram logs. You can also refer to the following web references for creating a new Syslog source:
Sumo Logic: https://help.sumologic.com/docs/send-data/installed-collectors/sources/syslog-source/
Splunk: https://docs.splunk.com/Documentation/Splunk/7.0.2/Data/Monitornetworkports
Step 3: Configure Singularity Hologram in Workbench
Now that we have the correct access configured and noted the credentials, we can integrate your tech with Workbench.
-
In a new browser tab, go to https://workbench.expel.io/settings/security-devices?setupIntegration=attivo.
-
Complete the fields as follows:
- SIEM - select the SIEM you created earlier.
-
Name - enter the host name of the Singularity Hologram device.
-
Location - enter the geographic location of the appliance.
-
Source Category - enter the Sumo Logic source category for this device.
-
Source Type (SIEM that contains the data) - enter the Splunk source type for this device.
-
Server address - enter the address of the server for console access.
- Index - if using Splunk as your SIEM, provide the Splunk Index.
-
Sumologic query indices - if you are utilizing Sumo Logic as your SIEM and are subject to Sumo Logic’s Flex pricing, you will need to provide a comma-separated list of indexes you wish Expel to query in this field. If you are on the traditional Sumo Logic pricing model, do not use this field.
If you are not sure if this applies to you, or for more information, see Considerations for Sumo Logic Flex Pricing Customers.
-
Click Save.
-
You can provide console access now or set it up later. Use the instructions below to set it up later.
You can see if the device is healthy on the Security Devices page. It may take a few minutes to see the device listed as healthy.
To check if alerts are coming through, navigate to the Alerts Analysis page. Scroll to the device you want to check and click View alerts. Switch to grid view, then check the list for device alerts. It can take 36 to 72 hours for alerts to appear after setup, as we tune your device.
Step 4: Edit the Device to Add Console Access
Expel secures all login information our SOC analysts need about your devices in an MFA password product. Access to this login information is protected using our internal MFA processes. To learn more about the IP addresses all Expel traffic comes from, go here.
-
Open Workbench. Go to Organization Settings > Security Devices. Next to the device you just connected, click the down arrow and click Edit.
-
In the Console Login area, type these details:
-
Console URL: type the console URL from the Server address in the Connection Settings area above. At the end of the URL, type /login.
-
Username: type the user name you created above.
-
Password: type the password you created above.
-
Two-factor secret key (32-character code): depending on how your organization enforces log-ins, this field may not apply to you. In these cases, you can leave it blank. This field is optional and if you have questions or concerns, reach out to your engagement manager or to support.
-
-
Click Save.