This article explains how to connect Endpoint Security (HX) to Workbench.
Step 1: Enable console access
This procedure creates a user account for Expel that keeps the Expel activity separate from other activity on the Endpoint Security (HX) console.
Having read-only access to the interface of your technology allows Expel to dig deeper during incident investigations. Our device health team uses this access to investigate potential health issues with your tech.
Note
Expel secures all login information our SOC analysts need about your devices in an MFA password product. Access to this login information is protected using our internal MFA processes. To learn more about the IP addresses all Expel traffic comes from, go here.
-
Navigate to Admin > Appliance Settings.
-
Click User Accounts on the left.
-
For Username, add Expel.
-
Ensure the Role is set to Admin.
-
Type a Password.
-
-
Click Add User.
Step 2: Generate API credentials
To integrate the technology with Workbench, we need to create secure credentials to the API.
This procedure creates an authentication token that allows the Expel Assembler to access the Endpoint Security (HX) API.
-
Go to the User Accounts section.
-
For Username, add expelapi.
-
Make sure the Role is set to API Admin.
-
Type a Password.
-
Click Add User.
Step 3: Configure the technology in Workbench
Now that we have the correct access configured and noted the credentials, we can integrate your tech with Workbench.
-
In a new browser tab, log into https://workbench.expel.io.
-
On the console page, navigate to Settings and click Security Devices.
-
At the top of the page, click Add Security Device.
-
Search for and select Endpoint Security (HX).
-
Make the following selections.
-
(On-prem only) Select an Assembler from the list with network connectivity to the Endpoint Security (HX) device. Select the assembler you set up in Getting connected to Expel Workbench.
-
For Name, type the host name of the Endpoint Security (HX) device.
-
For Location, type the geographic location of the appliance.
-
For Server address, type the Endpoint Security (HX) device IP and communications port in the following format:
https://<serverip>:3000
. Find the Device IP in the Endpoint Security (HX) console > Admin > Appliance Settings > Network. -
For API Password and API Username, type the API Admin credentials previously created in the Endpoint Security (HX) console in Step 2.
-
- Click Save.
- You can provide console access now or set it up later. Use the instructions below to set it up later.
You can see if the device is healthy on the Security Devices page. It may take a few minutes to see the device listed as healthy.
To check if alerts are coming through, navigate to the Alerts Analysis page. Scroll to the device you want to check and click View alerts. Switch to grid view, then check the list for device alerts. It can take 36 to 72 hours for alerts to appear after setup, as we tune your device.
Step 4: Edit the device to add console access
Expel secures all login information our SOC analysts need about your devices in an MFA password product. Access to this login information is protected using our internal MFA processes. To learn more about the IP addresses all Expel traffic comes from, go here.
-
Open Workbench. Go to Organization Settings > Security Devices. Next to the device you just connected, click the down arrow and click Edit.
-
In the Console Login area, type these details:
-
Console URL: type the console URL from the Server address in the Connection Settings area above. At the end of the URL, type /login.
-
Username: type the user name you created above.
-
Password: type the password you created above.
-
Two-factor secret key (32-character code): depending on how your organization enforces log-ins, this field may not apply to you. In these cases, you can leave it blank. This field is optional and if you have questions or concerns, reach out to your engagement manager or to support.
-
-
Click Save.
FireEye, FireEye HX, Fire Eye