Current ThreatQ Version Filter
 

Forcepoint Action

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Forcepoint Action integration allows users to export indicators of compromise to Forcepoint from the ThreatQ platform.

The integration provides the following action:

  • Forcepoint - Manage IP Address Lists - uploads indicators to an IP Address List in Forcepoint.  

The integration is compatible with the following indicator types:

  • CIDR Block
  • IP Address
  • IPv6 Address

This action is intended for use with ThreatQ TDR Orchestrator (TQO). An active TQO license is required for this feature.

Prerequisites

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the action zip file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the action zip file using one of the following methods:
    • Drag and drop the zip file into the dialog box
    • Select Click to Browse to locate the zip file on your local machine

    ThreatQ will inform you if the action already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the action contains changes to the user configuration. The new user configurations will overwrite the existing ones for the action and will require user confirmation before proceeding.

You will still need to configure the action.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
 

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Actions option from the Category dropdown (optional).
  3. Click on the action entry to open its details page.
  4. Enter the following parameters under the Configuration tab:

    The configurations set on this page will be used as the default settings when inserting this action into a new workflow. Updating the configurations on this page will not update any instances of this action that have already been deployed to a workflow. In that scenario, you must update the action’s configurations within the workflow itself.

    Parameter Description
    Forcepoint Authentication Key Your Forcepoint Authentication Key that is generated when the API Client element is configured in the Management Client.
    Forcepoint Hostname / IP Enter the hostname or IP address for the Forcepoint API. You may include an HTTP schema, but it is not required and will default to HTTP.
    Forcepoint API Port Enter the port number for your Forcepoint API.  The default value is 8082.
    Enable SSL Certificate  Verification Enable this for the action to validate the host-provided SSL certificate. 
    Disable Proxies Enable this option if the action should not honor proxies set in the ThreatQ UI.
    Forcepoint IP Address List Name Specify the name of the IP Address List where the input collection is uploaded to in Forcepoint.

    If a list exists with that name, the indicators are appended to it.  If the list does not exist, it will created for you.

    Forcepoint IP Address List Comment Specify the comment that should be set for the IP Address List when it is first created.
    Action Select the action performed for each IP Address. Actions include:
    • Add to IP Address List (default)
    • Remove from IP Address List
    Clear IP Address List On Manual Run Enable this parameter to automatically clear the IP Address on manual runs before exporting new objects to it. This is done to ensure that the list is always up-to-date with the ThreatQ data collection.

    This parameter is only accessible if you have selected the Add to IP Address List option for the Action configuration parameter.

    Objects Per Run Enter the number of objects to process per run of the workflow.

    Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.

Actions

The following action is available:

Action Description Object Type Object Subtype
Forcepoint - Manage IP Address Lists Uploads indicators to an IP Address List in Forcepoint Indicator IP Address, CIDR Block, IPv6 Address

Forcepoint - Manage IP Address List

The Forcepoint - Manage IP Address List action exports collection of indicators (IP Address, CIDR Block, IPv6 Address) to a Forcepoint IP Address List. The action will check to see if the IP Address List Name, specified in the action's configuration parameters,  already exists  Forcepoint IP Address list specified in Forcepoint IP Address List Name exists.  If the IP Address List Name does not exist on Forcepoint, one will be created.  

After confirming or creating the IP Address List name, the action will perform its designated functions, either appending or remove indicators from the specified Forcepoint IP Address List.  

Request to Get all Existing IP Address Lists from Forcepoint

GET http://{FORCEPOINT_IP}:8082/7.0/elements/ip_list

Sample Response:

{
  "result": [
    {
      "href": "http://{FORCEPOINT_IP}:8082/7.0/elements/ip_list/1117",
      "name": "ThreatQ Integration",
      "type": "ip_list"
    }
  ]
}

The value of the Forcepoint IP Address List Name configuration parameter is searched in the list returned by the API (.result[]). If the list is found the ID of the list is parsed from the .href key.

Request to Create an IP Address List

POST http://{FORCEPOINT_IP}:8082/7.0/elements/ip_list

Sample Response:

{
  "name": "ThreatQ Action",
  "comment": "ThreatQ Malicious indicators of compromise."
}

The response body is empty. The URL to the new list is added to the header Location.

Request to Get the IP Addresses Already Present in the List

GET http://{FORCEPOINT_IP}:8082/7.0/elements/ip_list/{LIST_ID}/ip_address_list

Sample Response:

{
  "ip": [
    "222.212.94.49/32",
    "20.232.186.34/32",
    "217.113.229.88/32"
  ]
}

Request to Set the IP Addresses of a List

POST http://{FORCEPOINT_IP}:8082/7.0/elements/ip_list/{LIST_ID}/ip_address_list

Sample Response:

{
  "ip": [
    "20.116.63.219/32",
    "69.167.19.32/32"
  ]
}

The response body is empty.

Use Case Example

  1. A Threat Analyst identifies a collection of IP Address they would like to upload to Forcepoint.
  2. The Threat Analyst adds the Forcepoint - Manage IP Address Lists action to a Workflow.
  3. The Threat Analyst configures the action with the desired parameters and enables the Workflow.
  4. The Workflow executes all Actions and uploads the input collection to an IP Address List in Forcepoint.

Change Log

  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
Forcepoint Action Guide v1.0.0 5.29.0 or Greater