Darktrace is an Intrusion Detection Device (IDS) that leverages machine learning to detect emerging threats, including insider threats, low-and-slow attacks, and automated viruses.

In this article

Step 1: Enable console access

Expel requires a Darktrace user account to review Alerts and Models within the console.

  1. From the menu located at the top left, select Add New User.

  2. Username: Expel.

  3. Password: set a temporary password — this is changed on initial login.

  4. Account Permissions: select all available permissions, except User Admin or Group Admin. These can be left cleared.

  5. Click OK.

Step 2: Generate API credentials

  1. Log into the Darktrace console.

  2. Navigate to Admin > System Config.

  3. Near the bottom of the page, under API Token, click New.

  4. The Darktrace system generates a Token and a Private Token. The Private Token can only be seen 1 time after the token pair is initially generated. Make note of the tokens for onboarding in Workbench. The system can only have 1 token pair, so if one already exists and you don't have a record of this, you must generate another token pair.

    Note
    If a replacement Token pair is generated, other clients using the API must be reconfigured with the new credentials.

Step 3: Configure the technology in Workbench

  1. In a new browser tab, log in to https://workbench.expel.io.

  2. On the console page, click Settings and click Security Devices.

  3. At the top of the page, click Add Security Device.

  4. Search for and select your technology.

    Select Darktrace Direct security device
  5. Select an Assembler from the list. Select the assembler you set up in Getting connected to Expel Workbench.

    Add Darktrace Direct security device
    • Type Name and Location.

    • For Server address, type the server address of the vendor’s server, which must include the port. For example: https://127.0.0.1:443 or myvendordevice.acme.com:443.

    • For Public key, type the API token used to authenticate to the device from Step 2.

    • For Private key, type the private token used to authenticate to the device from Step 2.

  6. You can provide console access now or set it up later. Use the instructions below to set it up later.

Step 4: Edit the device to add console access

Expel needs console access to your device to allow our SOC analysts to dig deeper during incident investigations. Additionally, our engineering teams use this access to investigate potential health issues, including proper alert ingestion.

Note
Expel secures all login information our SOC analysts need about your devices in an MFA password product. Access to this login information is protected using our internal MFA processes. To learn more about the IP addresses all Expel traffic comes from, go here.

  1. Open Workbench. Go to Organization Settings > Security Devices. Next to the device you just connected, click the down arrow and click Edit.

  2. In the Console Login area, type these details:

    • Console URL: type the console URL from the Server address in the Connection Settings area above. At the end of the URL, type /login.

    • Username: type the user name you created above.

    • Password: type the password you created above.

    • Two-factor secret key (32-character code): depending on how your organization enforces log-ins, this field may not apply to you. In these cases, you can leave it blank. This field is optional and if you have questions or concerns, reach out to your engagement manager or to support.

  3. Click Save.