To install and configure the Carbon Black Cloud App for Splunk SOAR, perform the following procedure.
Procedure
- Open the Splunk SOAR console.
- In the left navigation bar, click Apps.
- Click the New Apps menu, locate Carbon Black Cloud, and click Install.
- Click Unconfigured Apps and confirm that Carbon Black Cloud is present.
- For the Carbon Black Cloud app, click Configure New Asset.
- Click the Asset Info tab and enter the Asset name.
- Click the Asset Settings tab.
- Using the values that you pasted into a text editor in Set up Keys and Permissions in Carbon Black Cloud, add the following values to the respective fields:
- Carbon Black Cloud Instance URL
- Carbon Black Cloud Org Key
- API ID
- API Secret Key
- Select the corresponding checkboxes to fetch specific types of alerts:
- CB_ANALYTICS alerts
- DEVICE_CONTROL alerts
- WATCHLIST alerts (requires Carbon Black Cloud Enterprise EDR)
- CONTAINER_RUNTIME alerts (requires Carbon Black Container Security)
- HOST_BASED_FIREWALL alerts (requires Carbon Black Cloud Enterprise EDR)
- INTRUSION_DETECTION_SYSTEM alerts (requires Carbon Black Cloud Enterprise EDR)
- Set Minimum Alert Severity to the lowest severity to be ingested to Splunk SOAR.
- Click the Ingest Settings tab.
- Select a polling interval or schedule to configure polling on this asset. The recommended polling interval is three minutes.
- Click Save.