VMware Carbon Black Cloud Platform
Version: 2.4
Updated: Mar 4, 2024
VMware Carbon Black Cloud Platform Integration transform your security with intelligent endpoint and workload protection that adapts to your needs, allows security operators to collect CBC Alerts and Devices information and take action on remote endpoints to Quarantine it or update the Policy of endpoints.
Actions
- Carbon Black Alerts Daemon (Daemon) - Automatically gather alerts from Carbon Black Cloud.
- Add Alert Note (Notification) - Add a note to an alert.
- Delete Endpoint File (Containment) - Delete a File from a device.
- Disable Bypass (Containment) - Disable Bypass on specific Endpoint.
- Dismiss Alert (Containment) - Dismiss an alert in Carbon Black Cloud with comments.
- Dismiss Threat (Containment) - Dismiss a Threat in Carbon Black Cloud with comments.
- Enable Bypass (Containment) - Enable Bypass on specific Endpoint, it should no longer be monitored but may need to in the future.
- Execute Custom Script On Endpoint (Containment) - Execute a PowerShell command on a windows endpoint to gather data.
- Get CBC Alerts (Enrichment) - Queries all Alerts using input search criteria and returns a list of alerts.
- Get Devices (Enrichment) - Retrieve info about a device.
- Get Endpoint Vulnerabilities (Enrichment) - Get the vulnerabilities (CVEs) and their risks/exploitability identified for a given endpoint.
- Get File (Enrichment) - Get the full contents of a suspicious MS Office or PowerShell file that is executed on an endpoint.
- Get Policies (Enrichment) - Get a list of Policies.
- Get Process Details (Enrichment) - Get the most up-to-date metadata of a specific process.
- Get Process Events (Enrichment) - Get relevant endpoint events of a watchlist hit. This is very resource-intensive for CBC and should be used sparingly.
- Get Registry Key (Enrichment) - Identify if a specific registry key has been set.
- Get Vulnerable Endpoints (Enrichment) - Given a vulnerability (CVE) identify which endpoints are vulnerable.
- Kill Process By Path (Containment) - Kill a malicious process by path if it’s still running.
- Kill Process By PID (Containment) - Kill a malicious process by PID if it’s still running.
- List Endpoint Directory (Enrichment) - List the files, including metadata such as size and last write time directly from the endpoint.
- List Running Processes (Enrichment) - Identify if the malicious process is still running.
- Pause Background Scan (Containment) - If the endpoint is sensitive to high CPU, disable background scanning.
- Quarantine Device (Containment) - When the endpoint is suspected to be compromised, isolate it so that the only network communication allowed is with Carbon Black Cloud.
- Search Process (Enrichment) - Find all endpoints where a certain process (by name or hash) has been executed. Find all processes by reputation.
- Start Background Scan (Containment) - Start Background Scan on an endpoint.
- Unquarantine Device (Containment) - Remove the quarantine on the specified Device within Carbon Black.
- Update Device Policy (Containment) - Move the endpoint to a more restrictive policy.
VMware Carbon Black Cloud Platform configuration
- Log in to the CBC Console.
- Navigate to the Settings menu, and then click on API Access.
- From the API ACCESS page, click on Add API Key.
- Populate the name, Access Level type, and click the Save button.
- Copy the API Credentials (API ID and API Secret Key).
- Also you will see the ORG KEY from API Access. You need to copy it.
VMware Carbon Black Cloud Platform in Automation Service and Cloud SOAR
- Access integrations in the Automation Service or Cloud SOAR.
- After the list of the integrations appears, search/look for the VMware Carbon Black Cloud Platform integration and click on it. The integration details will appear. Click on the "+" button to add a new Resource.
- Populate all the required fields (*) and then click SAVE.
- Label. The name of the resource.
- API URL. URL to the API of the VMware Carbon Black Cloud Platform instance
https://defense.conferdeploy.net
. - Organization Key. The Organization Key you copied earlier.
- API ID / Connector ID. The API ID that you copied earlier.
- API Secret Key. The API Secret Key that you copied earlier.
- To make sure the resource is working, hover over the resource and then click the pencil icon that appears on the right.
- Click TEST SAVED SETTINGS.
- You should receive a successful notification in the bottom right corner.
External Libraries
Category
EDR
Change Log
- April 7, 2022 - First upload
- May 11, 2022 - Refactored all actions with CBC SDK
- June 08, 2022 - Updated integration doc
- July 19, 2023 (v2.2) - Removed leading/trailing spaces
- November 7, 2023 (v2.3) - Updated integration for compatibility with new Cloud SOAR API
- March 4, 2024 (v2.4) - Updated code for compatibility with Python 3.12