The Carbon Black Cloud app includes the following custom commands (default/commands.conf).

cbcdvcinfo

This command enhances data with additional data pulled from the Carbon Black Cloud. This command queries the Carbon Black Cloud API one time per device_id. The arguments are as follows:

Argument Description
device_id The field name that contains the device ID for the command to enrich, as found in the Carbon Black Cloud interface.
org_key The field name that contains the org key that is associated with the credential.
fields A quoted and comma-separated list of fields to return from the query.

Example: fields="last_location,last_name" adds the columns last_location and last_name.

Best Practice: Limit your Splunk SIEM search to 100 devices to avoid potential API throttling.

Sample Usage: Get real-time device information including sensor version and last contact time for the top 10 most frequent devices in high severity alerts:

index="carbonblackcloud" sourcetype="vmware:cbc:s3:alerts" severity >= 8  | stats dc(id) as alert_count by device_id, org_key | sort -alert_count | head 10 | cbcdvcinfo | table org_key, device_id, name, alert_count, sensor_version, last_contact_time, os_version, sensor_states

bchashinfo

This command enhances data with additional data pulled from the Carbon Black Cloud. This command queries the Carbon Black Cloud API one time per hash. The arguments are as follows:

Argument Description
hash The field name that contains the SHA-256 hash for the command to enrich, as found in the Carbon Black Cloud interface.
org_key The field name that contains the org key that is associated with the credential.
fields A quoted and comma-separated list of fields to return from the query.

Example: fields="last_location,last_name" adds the columns last_location and last_name.

Best Practice: Limit your Splunk SIEM search to 100 hashes to avoid potential API throttling.

Sample Usage: Get the device count and first-seen timestamp for the top 10 most frequent hashes found in high severity alerts:

index="carbonblackcloud" sourcetype="vmware:cbc:s3:alerts" severity >= 8 | stats count(id) as alert_count by sha256_process_hash, org_key | sort -alert_count | head 10 | cbchashinfo hash=sha256_process_hash fields="first_seen_device_timestamp,num_devices"