Workspace ONE Trust Network integrates threat data from security solutions including endpoint detection and response (EDR) solutions, mobile threat defense (MTD) solutions, and cloud access security brokers (CASB). This integration provides Workspace ONE Intelligence users with insights into the risks to devices and users in their environment. See how to register your specific Trust Network system with Intelligence.
Workspace ONE Intelligence displays event data for analysis in the Threats Summary module on the Security Risk dashboard.
The NIST Special Publication 800-47 Rev.1: Managing the Security of Information Exchanges defines a system interconnection as the direct connection of two or more IT systems for the purpose of sharing data and other information resources.
Connecting IT systems is a customer configured capability. Before you connect IT systems in Workspace ONE Intelligence, discuss the risks of connecting non-FedRAMP accredited information systems with your Authorizing Official. Workspace ONE on AWS GovCloud, and by extension, Workspace ONE Intelligence is a FedRAMP Moderate, accredited information system. When you connect information systems to other systems with different security requirements and controls, carefully consider the risks.
Contact the Federal Support line (877-869-2730, OPTION 2) or submit a support request using My Workspace ONE for more details and to enable customer-controlled third party connections to other systems.
To integrate your Trust Network system, perform these general tasks.
Note: If you see no data identified in the Threats Summary after you have configured the service in Integrations, it does not mean that the configuration is broken. It can suggest that there have been no events reported from the Trust Network service.
The Threats Summary module aggregates and displays events collected from your Trust Network services. You can find specific data by dates, event counts, and threat categories. Workspace ONE Intelligence categorizes threats into several groups to help simplify analysis and remediation.
Threat Categories | Descriptions |
---|---|
Anomaly | Threats that involve an application, a device, or a network behavior that is unusual, suspicious, or abnormal. Examples include applications dropping an executable file or a privilege escalation. |
Credential | Threats that involve the attempt to use compromised credentials in a malicious way. Examples include the reading of credentials from a security process and a running application using system credentials. |
Device | Threats that involve using a device or other endpoint component with malicious intent. An example is an unauthorized application accesses a microphone or a camera. |
Exfiltration | Threats that involve an attempt to carry out an unauthorized data transfer. Such a transfer can be manual and carried out by someone with physical access to a computer. It can also be automated and carried out through malicious programming over a network. |
Exploit | Threats that involve taking advantage of a bug or vulnerability in an application or system, causing unintended behavior of that application or system. Examples include code injections and root enablers. |
Malicious Web Host | Threats that involve an attempt to access known malicious site or domain. Examples include spam, phishing, malware, and cryptojacking. |
Malware | Threats that involve malicious software, intentionally designed to damage an endpoint, device, or network. Examples include ransom ware, key logger, and spyware. |
Network | Threats that involve a method or process used to attempt to compromise network security. Examples include man-in-the-middle attacks, port scanning, and unusual network protocols. |
Other | Threats that do not fit into a category. |
Policy | Threats that involve a device or endpoint breaking a company policy. Examples include installing a untrusted application and using a jailbroken or rooted device. |
Integrate your Workspace ONE Mobile Threat Defense service with Workspace ONE Intelligence so that Workspace ONE Intelligence can access threat intelligence data and display it for analysis.
To register Workspace ONE Mobile Threat Defense with Workspace ONE Intelligence, enter the application key generated from your Workspace ONE Mobile Threat Defense console.
https://api.lookout.com
.Integration between Workspace ONE Intelligence and BETTER Mobile involves copying generated data from the Workspace ONE Intelligence console and adding it to your BETTER Mobile administrator portal. This action authorizes Workspace ONE Intelligence to ingest threat intelligence data from BETTER Mobile and to display it for analysis.
This integration works for Android and iOS platforms.
Before you can register BETTER Mobile, integrate your BETTER Mobile and your Workspace ONE UEM environments. For details, access the Setup integration content on the Better Mobile Security documentation site.
Use the Better MTD console 3.x or later for this integration.
In the Network Partner Credentials tab, copy the generated information and add them to your BETTER Mobile administrator portal.
To finish the configuration, select Done.
Enter data that pertains to your Carbon Black connector for the CB Defense agent so that Workspace ONE Intelligence can access threat intelligence data and display it for analysis.
To register Carbon Black with Workspace ONE Intelligence, enter the keys and IDs for your Carbon Black API connector and your Carbon Black SIEM connector.
For information on how to generate API keys, subscribe to Carbon Black event notifications, and the API endpoint URL of your Carbon Black instance, access the topic API Access on the Carbon Black /Developers site.
Carbon Black has privacy controls in place that limit data from being forwarded outside of the region where the Carbon Black tenant is based. For a successful integration with Workspace ONE Intelligence, ensure that the Carbon Black tenant and the Workspace ONE Intelligence instance are both located within the same geographic region.
Find the Workspace ONE Intelligence regions listed at Allowlisting URLs by region. The table depicts the Carbon Black regions mapped to Workspace ONE Intelligence regions.
Carbon Black Cloud Product URL | Carbon Black AWS Region Name | Carbon Black AWS Region | Workspace ONE Intelligence AWS Region |
---|---|---|---|
https://dashboard.confer.net https://defense.conferdeploy.net https://defense-prod05.conferdeploy.net |
US East (Northern Virginia) | us-east-1 | Carbon Black us-east-1 customers can map to the Workspace ONE Intelligence North America regions (examples are NA1, Sandbox, and CA1). |
https://defense-eu.conferdeploy.net | Europe (Frankfurt) | eu-central-1 | Carbon Black eu-central-1 customers can be mapped to the European Workspace ONE Intelligence regions (examples are EU1 and EU2). |
https://ew2.carbonblackcloud.vmware.com | Europe (London) | eu-west-2 | Carbon Black eu-west-2 customers can be mapped to the London Workspace ONE Intelligence regions (an example is UK1). |
https://defense-prodnrt.conferdeploy.net | Asia-Pacific (Tokyo) | ap-northwest-1 | Carbon Black ap-northwest-1 customers can be mapped to the Asia-Pacific Tokyo Workspace ONE Intelligence region (an example is AP1). |
https://defense-prodsyd.conferdeploy.net | Asia-Pacific (Sydney) | ap-southeast-2 | Carbon Black ap-southeast-2 customers can be mapped to the Asia-Pacific Sydney Workspace ONE Intelligence region (an example is AU1). |
https://
.Integration between Workspace ONE Intelligence and Harmony Mobile, Check Point’s Mobile Threat Defense solution, involves copying generated data from Workspace ONE Intelligence and adding it to your Check Point administrator portal. This action authorizes Workspace ONE Intelligence to ingest threat intelligence data from Check Point and to display it for analysis.
This integration works for Android and iOS platforms.
Before you can use this Trust Network integration, integrate your Check Point Harmony Mobile and your Workspace ONE UEM environments. For details, access Integration with Workspace ONE UEM.
In the Network Partner Credentials tab, copy the generated information and add them to your Harmony Mobile administrator portal in Settings > Syslog > Workspace ONE Intelligence.
To finish the configuration, select Done.
Enter data that pertains to your Lookout for Work service so that Workspace ONE Intelligence can access threat intelligence data and display it for analysis.
To register Lookout for Work with Workspace ONE Intelligence, enter the application key configured in your Lookout for Work console.
Integrate Lookout for Work and Workspace ONE UEM so that Workspace ONE UEM manages the Lookout for Work app. For information about this integration, go to the Lookout Enterprise Support site see the Deploying Lookout with VMware AirWatch guide.
You must integrate these systems before you can use threat intelligence data from Lookout for Work in Workspace ONE Intelligence.
As part of the integration, you add application configuration parameters to the Lookout for Work app’s record in the Workspace ONE UEM console.
DeviceUniqueIdentifier
DeviceUUID}
https://api.lookout.com
.Enter data that pertains to your Netskope instance so that Workspace ONE Intelligence can access cloud security threat data and display it for analysis.
To register Netskope with Workspace ONE Intelligence, enter the Netskope application key set in the Netskope console.
Integrate Netskope and Workspace ONE UEM so that Workspace ONE UEM manages the Netskope app.
https://
.Integration between Workspace ONE Intelligence and Pradeo Security involves copying generated data Workspace ONE Intelligence and adding it to your Pradeo administrator portal. This action authorizes Workspace ONE Intelligence to ingest threat intelligence data from Pradeo Security and to display it for analysis.
This integration works for Android and iOS platforms.
Before you can use this Trust Network integration, integrate your Pradeo and your Workspace ONE UEM environments. Access Pradeo enriches VMware Workspace ONE with Mobile Threat Intelligence.
In the Network Partner Credentials tab, copy the generated information and add them to your Pradeo Security administrator portal.
To finish the configuration, select Done.
Integration between Workspace ONE Intelligence and Wandera’s Mobile Threat Defense system involves copying generated data from Workspace ONE Intelligence and adding it to your Wandera administrator portal.
This action authorizes Workspace ONE Intelligence to ingest threat intelligence data from Wandera and to display it for analysis.
This integration works for Android and iOS platforms.
Before you can use this Trust Network integration, integrate your Wandera and your Workspace ONE UEM environments. For details, use your Wandera account to access the listed articles. - Integrating Threat Events Stream with Workspace ONE Intelligence - EMM Connect Workspace ONE Configuration Guide
Integration between Workspace ONE Intelligence and Zimperium involves copying generated data from Workspace ONE Intelligence and adding it to your Zimperium zConsole. This action authorizes Workspace ONE Intelligence to ingest threat intelligence data from Zimperium and to display it for analysis.
This integration works for Android and iOS platforms.