Skip to main content

CollectorsCloud Collectors Administration Guide

Configure the Abnormal Cloud Collector

Set up the Abnormal Security Cloud Collector to continuously ingest events from Abnormal Security data sources: cases and threats.

  1. Before you configure the Abnormal Security Cloud Collector, ensure that you complete the prerequisites.

  2. Log in to the New-Scale Security Operations Platform with your registered credentials as an administrator.

  3. Navigate to Collectors > Cloud Collectors.

  4. Click New Collector.

  5. Click Abnormal Security.

  6. Enter the following information for the cloud collector.

    Abnormal_1.png
    • NAME – Specify a name for the Cloud Collector instance.

    • ATHENTICATION TOKEN – Enter the value for the API token that you obtained while completing the prerequisites.

    • API URL – Select the API URL based on the API endpoint for your region.

      • API URL for the region EU: https://eu.rest.abnormalsecurity.com

      • API URL for regions other than EU: https://api.abnormalplatform.com

    • DATA SOURCES – Select the data sources supported by Abnormal Security from which you want the cloud collector to fetch data: Cases or Threats.

      • Cases – Select this data source to get a list of Abnormal cases identified by Abnormal Security.

      • Threats – Select this data source to get a list of threats identified in Threat Log.

    • INGEST FROM – Select the date and time from which the collector must start ingesting events. This date and time also provides a threshold before which the collector will exclude events. If you leave this field blank and do not provide a threshold, all logs are ingested.

  7. (Optional) SITE – Select an existing site or to create a new site with a unique ID, click manage your sites. Adding a site name helps you to ensure efficient management of environments with overlapping IP addresses.

    By entering a site name, you associate the logs with a specific independent site. A sitename metadata field is automatically added to all the events that are going to be ingested via this collector. For more information about Site Management, see Define a Unique Site Name.

  8. (Optional) TIMEZONE – Select a time zone applicable to you for accurate detections and event monitoring.

    By entering a time zone, you override the default log time zone. A timezone metadata field is automatically added to all events ingested through this collector.

    Timezone_sitename_site_management_1.png
  9. To confirm that the New-Scale Security Operations Platform communicates with the service, click Test Connection.

  10. Click Install.

    AWS_S3_2.png

    A confirmation message informs you that the new cloud collector is created.