Note: VMware Carbon Black Cloud (CBC) was formerly called CB ThreatHunter and CB Defense.
Step 1: Enable console access
Having read-only access to the interface of your technology allows Expel to dig deeper when performing incident investigations. Our device health team uses this access to investigate potential health issues with your tech.
This procedure creates a user account for Expel that keeps the Expel activity separate from other activity on the CBC console.
Create an analyst account
- Navigate to gear icon on left side and click Users. Then click Add User on the top right of the screen.
- For First name enter Expel.
- For Last name enter SOC.
- For Email enter soc+<client name>@expel.io.
- For Role select Level 2 Analyst.
- Click Save.
Step 2: Generate API credentials
To integrate the technology with Expel, we need to create secure credentials to the API. Depending on the permissions allowed in Step 1, Expel may be able to generate API credentials. If you're unsure, reach out to your Expel Customer Success Engineer, or email firstname.lastname@example.org.
Generate an API Key with view all permissions
- In the CBC console, navigate to Settings > Roles.
- Verify that a View All role exists. This should be included by default. To enable the quarantine action, complete the steps below or continue to the next step in this procedure.
- Click the Add Role button to create a new role.
- Fill out name and description. We suggest Expel Custom Role.
- From the Copy Permissions list, select the View All role.
- Add Export device data, Quarantine, & View devices and sensor groups permissions located in the Permission section under Endpoint Management.
- Add Manage Events, View Events, View Third Party Watchlists & View Watchlists permissions located in the Permission section.
- Navigate to Settings > API Keys.
- Create a new API key by selecting Add API Key in the upper right corner.
- Type a name for the new key. We suggest Expel SOC.
- From the Access Level list, select Custom.
- From the Custom Access Level list, select either the View All role or the role you created above.
- Complete the rest of the information and click Save to create the new key.
- Make a record of the API ID and API Secret Key for later.
Step 3: Configure the technology in Workbench
Now that we have the correct access configured and have noted the credentials, we can integrate Carbon Black Cloud with Expel.
Register device in Expel Workbench
- In a new browser tab, login to https://workbench.expel.io/settings/security-devices?setupIntegration=carbon_black_threat_hunter.
- Type in these details:
- For Name type the hostname of the device.
- For Location type the geographic location of the appliance.
- For Org Key, type the Org Key.
- For Org ID, type your CB Organization ID.
- For Server Address, type the CBC server address, which is usually https://defense-prod05. conferdeploy.net/
- For API ID type the API ID created in Step 2.
- For API Key, type the API Secret Key created in Step 2.
- Click Save.
After a few minutes, refresh the Security Devices page and you see your device status reporting as Healthy, or if there is an issue, you see details of what the issue may be.
To check if alerts are coming through, navigate to Alerts on the console page. Click the icon in the upper right to switch to grid view, then check the list for device alerts.