- Supported Cloud Connectors
- Armis Cloud Connector
- AWS Cloud Connector
- AWS Multi-Tenant Cloud Connector
- Azure Cloud Connector
- Azure Cloud Connector Overview
- Azure Audit Source and Event Support
- Prerequisites to Configure the Azure Cloud Connector
- Configure the Azure Cloud Connector
- Collect EventHub Information for Azure EventHub Endpoints
- Collect all Microsoft Defender ATP Events
- Configure Azure to Monitor Security Center Events in Azure VMs
- Bitglass Cloud Connector
- Box Cloud Connector
- Centrify Cloud Connector
- Cisco AMP for Endpoints Cloud Connector
- Cisco Meraki Cloud Connector
- Cisco Umbrella Cloud Connector
- Citrix ShareFile Cloud Connector
- Cloudflare Cloud Connector
- Code42 Incydr Cloud Connector
- CrowdStrike Falcon Cloud Connector
- Cybereason Cloud Connector
- CylanceProtect Cloud Connector
- Dropbox Business Cloud Connector
- Duo Security Cloud Connector
- Egnyte Cloud Connector
- Fidelis Cloud Connector
- GitHub Cloud Connector
- Google Cloud Platform (GCP) Cloud Connector
- Google Cloud Pub/Sub Cloud Connector
- Google Workspace (Formerly G Suite) Cloud Connector
- LastPass Enterprise Cloud Connector
- Mimecast Email Security Cloud Connector
- Netskope Cloud Connector
- Office 365 Cloud Connector
- Okta Cloud Connector
- OneLogin Cloud Connector
- Palo Alto Networks SaaS Security Cloud Connector
- Ping Identity Cloud Connector
- Proofpoint Cloud Connector
- Rapid7 InsightVM Cloud Connector
- Salesforce Cloud Connector
- SentinelOne Cloud Connector
- ServiceNow Cloud Connector
- Slack App Cloud Connector
- Slack Classic App Cloud Connector (Formerly known as Slack Enterprise Grid Cloud Connector)
- Snowflake Cloud Connector
- Sophos Central Cloud Connector
- Symantec CloudSOC Cloud Connector
- Symantec Endpoint Protection (SEP) Mobile Cloud Connector
- Symantec Email Security.cloud Cloud Connector
- Symantec WSS Cloud Connector
- Tenable.io Cloud Connector
- VMware Carbon Black Cloud Endpoint Standard Cloud Connector
- Workday Cloud Connector
- Zoom Cloud Connector
- Custom Cloud Connector
- Webhook Cloud Connector
CylanceProtect Cloud Connector
CylanceProtect is an artificial intelligence (AI) based endpoint security solution that employs machine learning and AI techniques to identify malicious code based on its behavior and prevent breaches, malware, and advanced threats. In addition to AI-driven malware prevention, CylanceProtect provides script management, device usage policy enforcement, memory exploitation detection and prevention, and application control for fixed-function devices. For more information see their website.
Prerequisites to Configure the CylanceProtect Connector
Before you configure the CylanceProtect connector you must obtain the values for application ID, application secret, tenant ID, and region.
Obtain the Application ID and Secret
CylanceProtect APIs are authenticated via application keys. You must obtain the application ID and secret to use while configuring the CylanceProtect connector.
To obtain the tenant ID, application ID, and secret:
Log in to CylanceProtect console by accessing https:/login.cylance.com/Login as an administrator.
Navigate to Settings > Integrations.
Copy and record the tenant ID that appears on the upper right corner.
Click Add Application.
Specify a name for the application.
Define access permissions for console data type by selecting the Read check box for Devices and Threat privileges.
Click Save. Note the values for the application ID and application secret. Use the values while configuring the CylanceProtect Connector on the Exabeam Cloud Connector platform.
Configure the CylanceProtect Connector
CylanceProtect is an artificial intelligence (AI) based endpoint security solution that employs machine learning and AI techniques to identify malicious code based on its behavior and prevent breaches, malware, and advanced threats. In addition to AI-driven malware prevention, CylanceProtect provides script management, device usage policy enforcement, memory exploitation detection and prevention, and application control for fixed-function devices. For more information see their website.
The following table displays audit source API and security events supported by the connector.
Audit Source: API | Service or Module Covered | Event Included |
---|---|---|
Threats | Threat detection alerts and information | |
Memory Protection | Threats related to memory vulnerabilities | |
Devices | Threats detected via endpoints. Used to enrich threats detected alerts with the device specific information |
To configure the CylanceProtect connector to import data into the Exabeam Cloud Connector platform:
Complete the Prerequisites to Configure the CylanceProtect Connector.
Log in to the Exabeam Cloud Connectors platform with your registered credentials.
Navigate to Settings > Accounts > Add Account.
Click Select Service to Add, then select CylanceProtect from the list.
In the Accounts section, enter the required information.
Account Name – Specify a name for the CylanceProtect connector. For example, Corporate endpoint security solution.
(optional) Description – Describe the CylanceProtect connector. For example, CylanceProtect AI-based endpoint security solution.
App ID – Enter the value for application ID that you obtained while completing prerequisites.
App Secret – Enter the value for application secret that you obtained while completing prerequisites.
Tenant ID – Enter the value for tenant ID that you obtained while completing prerequisites.
Region – Select one of the following tenant regions based on your CylanceProtect deployment region.
Asia Pacific – North
Asia Pacific – Southeast
Europe – Central
Government
South America
North America
To confirm that the Exabeam Cloud Connector platform communicates with the service, click Test Connection.
Click Done to save your changes. The cloud connector is now set up on the Exabeam Cloud Connector platform.
To ensure that the connector is ready to send and collect data, Start the connector and check that the status shows
OK
.
Troubleshooting
If you receive an HTTP error when you click Test Connection, run the test script described in the CylanceProtect documentation to analyze and debug the problem.
To run the test script:
Using the Exabeam Cloud Connector command-line interface (CLI), use the following commands to install Python and additional required components:
Install Python: apt install python
Install pip: apt install python-pip
Install pyjwt: pip install pyjwt
Install requests: pip install requests
Note
These commands to install Python and other prerequisites are for the Ubuntu operating system. For other operating systems, run the equivalent package management commands.
Create a new test.py file and add the following syntax to the file.
import jwt # PyJWT version 1.5.3 as of the time of authoring. import uuid import requests # requests version 2.18.4 as of the time of authoring. import json import json from datetime import datetime, timedelta # 30 minutes from now timeout = 1800 now = datetime.utcnow() timeout_datetime = now + timedelta(seconds=timeout) epoch_time = int((now - datetime(1970, 1, 1)).total_seconds()) epoch_timeout = int((timeout_datetime - datetime(1970, 1, 1)).total_seconds()) jti_val = str(uuid.uuid4()) tid_val = "123" # The tenant's unique identifier. app_id = "456" # The application's unique identifier. app_secret = "789" # The application's secret to sign the auth token with. AUTH_URL = "https://protectapi.cylance.com/auth/v2/token" claims = { "exp": epoch_timeout, "iat": epoch_time, "iss": "http:/cylance.com", "sub": app_id, "tid": tid_val, "jti": jti_val # The following is optional and is being noted here as an example on how one can restrict # the list of scopes being requested # "scp": "policy:create, policy:list, policy:read, policy:update" } encoded = jwt.encode(claims, app_secret, algorithm='HS256') print("auth_token:\n" + encoded.decode('utf-8') + "\n") payload = {"auth_token": encoded.decode('utf-8')} headers = {"Content-Type": "application/json; charset=utf-8"} resp = requests.post(AUTH_URL, headers=headers, data=json.dumps(payload)) print("http_status_code: " + str(resp.status_code)) print("access_token:\n" + json.loads(resp.text)['access_token'] + "\n")
Replace the values for tid_val, app_id, app_secret, and AUTH_URL with the correct values for tenant, app ID, app secret, and URL.
Save the file.
Execute the script by entering python test.py in the command line. After executing the script, a token represented by a string of letters and numbers appears.
If you see a token without any error but the test connection fails, contact Exabeam customer support.
If you do not see a token or receive an HTTP error (such as 401 or 403), contact CylanceProtect customer support. For HTTP errors 401 and 403, the CylanceProtect support team must validate the user credentials.