Secureworks CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.1.0 |
Compatible with ThreatQ Versions | >= 4.23.1 |
Support Tier | ThreatQ Supported |
Introduction
The Secureworks CDF ingests threat intelligence data on events, indicators, reports, and vulnerabilities from the Secureworks provider.
The integration provides the following feeds:
- Secureworks - ingests Vulnerabilities, Indicators, and Reports from Secureworks.
- Secureworks Alerts - ingests Events objects from Secureworks
The integration ingests the following system object types:
- Events
- Indicators
- Reports
- Vulnerabilities
Prerequisites
The following is required to use the integration:
- Secureworks API Key
- Secureworks API Hostname
- Secureworks Client ID
- Secureworks Client Secret
- Sercureworks Client Tenant
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the integration yaml file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the integration yaml file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the file on your local machine
- Select the feeds to install, when prompted, and click Install.
ThreatQ will inform you if the feed already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the feed contains changes to the user configuration. The new user configurations will overwrite the existing ones for the feed and will require user confirmation before proceeding.
The feed(s) will be added to the integrations page. You will still need to configure and then enable the feed.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Commercial option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Secureworks Parameters
Parameter Description API Key Your Secureworks API Key. Fetch Select the objects types to be ingested into the ThreatQ platform. Options include: - Advisory (default)
- Threat (default)
- Vulnerability (default)
Secureworks Alerts Parameters
Parameter Description Secureworks API Hostname Your Secureworks account API hostname. Client ID Your Secureworks Client ID. Client Secret Your Secureworks Client Secret. Client Tenant Your Securewors Client Tenant.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
Secureworks
The Secureworks feed ingests ingests Vulnerabilities and Reports from Secureworks.
GET https://ws.secureworks.com/ti/feed-token/threatIntel
Sample Response:
<?xml version="1.0" encoding="UTF-8"?> <Intelligence time_t="1558467371598" from="1556668800000" to="1558396800000"> <Threats> <Threat id="1251"> <Created time_t="1555520403000">2019-04-17 17:00:03</Created> <Updated time_t="1557161402000">2019-05-06 16:50:02</Updated> <Impact value="1">Medium</Impact> <Title>Underground Insights Brief - February 2019</Title> <Summary>Dummy Summary</Summary> <Analysis>Dummy Analysis</Analysis> <Solution>Dummy Solution</Solution> <Type>Thread</Type> <ModificationHistory>2019-04-17 17:00:02 UTC - Initial revision</ModificationHistory> <Associations></Associations> </Threat> <Threat id="1257"> <Created time_t="1556882402000">2019-05-03 11:20:02</Created> <Updated time_t="1556882402000">2019-05-03 11:20:02</Updated> <Impact value="1">Medium</Impact> <Title>Country Threat Assessment: People's Republic of China (2019)</Title> <Summary>Dummy Summary</Summary> <Analysis>Dummy Analysis</Analysis> <Solution>Dummy Solution</Solution> <Type>Thread</Type> <ModificationHistory>2019-05-03 11:20:02 UTC - Initial revision</ModificationHistory> <Associations> <Threat id="1089"></Threat> <Vulnerability id="229701"></Vulnerability> <Vulnerability id="229702"></Vulnerability> </Associations> </Threat> <Threat id="1258"> <Created time_t="1556882402000">2019-05-03 11:20:02</Created> <Updated time_t="1556882402000">2019-05-03 11:20:02</Updated> <Impact value="1">Medium</Impact> <Title>Dummy</Title> <Summary>Dummy Summary</Summary> <Analysis>Dummy Analysis</Analysis> <Solution>Dummy Solution</Solution> <Type>Thread</Type> <ModificationHistory>2019-05-03 11:20:02 UTC - Initial revision</ModificationHistory> <Associations> <Threat id="1089"></Threat> <Threat id="1169"></Threat> <Threat id="1233"></Threat> <Threat id="1203"></Threat> <Threat id="1183"></Threat> <Advisory id="1111"></Advisory> </Associations> </Threat> </Threats> <Advisories> <Advisory id="275"> <Created time_t="1560538802000">2019-06-14 19:00:02</Created> <Impact value="2">High</Impact> <Subject>Secureworks Security Advisory - Exploitation of EXIM Mail Transport Agent vulnerability (CVE-2019-10149) - Action Recommended</Subject> <Type>Advisory</Type> <Detail>Dummy Detail</Detail> <Associations> <Vulnerability id="229701"></Vulnerability> </Associations> </Advisory> </Advisories> <Vulnerabilities> <Vulnerability id="232739"> <Created time_t="1562765403000">2019-07-10 13:30:03</Created> <Updated time_t="1562765403000">2019-07-10 13:30:03</Updated> <Impact value="1">Medium</Impact> <ImpactV3 value="2">High</ImpactV3> <Type>Design Error</Type> <CVE>CVE-2019-13351</CVE> <Title>(CVE-2019-13351) JACK2 JackSocket.cpp Double File Descriptor Close Vulnerability</Title> <References> <Reference>https://github.com/jackaudio/jack2/commit/dad4b5702782eef3bd66e3c3f4fefaaae3571208</Reference> <Reference>https://github.com/jackaudio/jack2/pull/480</Reference> <Reference>https://github.com/xbmc/xbmc/issues/16258</Reference> <Reference>http://jackaudio.org</Reference> </References> <Summary>Dummy Summary</Summary> <Analysis>Dummy Analysis</Analysis> <Solution>Dummy Solution</Solution> <Version>1</Version> <ModificationHistory>Initial Revision (rev 0) Entered on July 10, 2019</ModificationHistory> <Associations></Associations> <Affected_Vendors> <Vendor> <Name id="113119">Kodi</Name> <Product id="182859">Kodi</Product> <Version id="0">0</Version> </Vendor> <Vendor> <Name id="125553">jackaudio</Name> <Product id="242795">JACK2</Product> <Version id="0">0</Version> </Vendor> </Affected_Vendors> <AffectedCPEs> <Cpe>cpe:/a:kodi:kodi</Cpe> <Cpe>cpe:/a:jackaudio:jack2</Cpe> </AffectedCPEs> <CVSS> <CVSSv2> <CVSSScore>5.5</CVSSScore> <BaseMetrics> <score>7.5</score> <access_vector>network</access_vector> <access_complexity>low</access_complexity> <authentication_needed>none</authentication_needed> <confidentiality_impact>partial</confidentiality_impact> <integrity_impact>partial</integrity_impact> <availability_impact>partial</availability_impact> </BaseMetrics> <TemporalMetrics> <score>5.5</score> <exploitability>unproven</exploitability> <remediation_level>official_fix</remediation_level> <report_confidence>confirmed</report_confidence> </TemporalMetrics> </CVSSv2> <CVSSv3> <CVSSScore>7.3</CVSSScore> <BaseMetrics> <score>8.4</score> <attack_vector>local</attack_vector> <attack_complexity>low</attack_complexity> <privileges_required>none</privileges_required> <user_interaction>none</user_interaction> <scope>unchanged</scope> <confidentiality>high</confidentiality> <integrity>high</integrity> <availability>high</availability> <uri>CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</uri> </BaseMetrics> <TemporalMetrics> <score>7.3</score> <exploit_code_maturity>unproven</exploit_code_maturity> <remediation_level>official_fix</remediation_level> <report_confidence>confirmed</report_confidence> </TemporalMetrics> </CVSSv3> </CVSS> <ChangeSummary>Initial Revision (rev 0) Entered on July 10, 2019</ChangeSummary> <CWEs> <CWE id="910">CWE-910 - Use of Expired File Descriptor</CWE> </CWEs> </Vulnerability> <Vulnerability id="232741"> <Created time_t="1562767204000">2019-07-10 14:00:04</Created> <Updated time_t="1562767204000">2019-07-10 14:00:04</Updated> <Impact value="1">Medium</Impact> <ImpactV3 value="2">High</ImpactV3> <Type>File Upload</Type> <CVE>CVE-2019-12971</CVE> <Title>(CVE-2019-12971) BKS EBK Ethernet-Buskoppler Pro Arbitrary File Upload Vulnerability</Title> <References> <Reference>https://www.g-u.com/en/service.html</Reference> <Reference>https://seclists.org/bugtraq/2019/Jul/6</Reference> <Reference>https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-017.txt</Reference> <Reference>http://www.packetstormsecurity.com/files/153525/</Reference> </References> <Summary>Dummy Summary</Summary> <Analysis>Dummy Analysis</Analysis> <Solution>Dummy Solution</Solution> <Version>1</Version> <ModificationHistory>Initial Revision (rev 0) Entered on July 10, 2019</ModificationHistory> <Associations></Associations> <Affected_Vendors> <Vendor> <Name id="125555">BKS</Name> <Product id="242797">EBK Ethernet-Buskoppler</Product> <Version id="0">0</Version> </Vendor> <Vendor> <Name id="125555">BKS</Name> <Product id="242799">EBK Ethernet-Buskoppler Firmware</Product> <Version id="0">0</Version> </Vendor> </Affected_Vendors> <AffectedCPEs> <Cpe>cpe:/h:bks:ebk_ethernet-buskoppler:::~~pro~~~</Cpe> <Cpe>cpe:/o:bks:ebk_ethernet-buskoppler_firmware:::~~pro~~~</Cpe> </AffectedCPEs> <CVSS> <CVSSv2> <CVSSScore>5.9</CVSSScore> <BaseMetrics> <score>7.5</score> <access_vector>network</access_vector> <access_complexity>low</access_complexity> <authentication_needed>none</authentication_needed> <confidentiality_impact>partial</confidentiality_impact> <integrity_impact>partial</integrity_impact> <availability_impact>partial</availability_impact> </BaseMetrics> <TemporalMetrics> <score>5.9</score> <exploitability>poc</exploitability> <remediation_level>official_fix</remediation_level> <report_confidence>confirmed</report_confidence> </TemporalMetrics> </CVSSv2> <CVSSv3> <CVSSScore>8.8</CVSSScore> <BaseMetrics> <score>9.8</score> <attack_vector>network</attack_vector> <attack_complexity>low</attack_complexity> <privileges_required>none</privileges_required> <user_interaction>none</user_interaction> <scope>unchanged</scope> <confidentiality>high</confidentiality> <integrity>high</integrity> <availability>high</availability> <uri>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</uri> </BaseMetrics> <TemporalMetrics> <score>8.8</score> <exploit_code_maturity>proof_of_concept</exploit_code_maturity> <remediation_level>official_fix</remediation_level> <report_confidence>confirmed</report_confidence> </TemporalMetrics> </CVSSv3> </CVSS> <ChangeSummary>Initial Revision (rev 0) Entered on July 10, 2019</ChangeSummary> <CWEs> <CWE id="434">CWE-434 - Unrestricted Upload of File with Dangerous Type</CWE> </CWEs> </Vulnerability> </Vulnerabilities> </Intelligence>
ThreatQuotient provides the following default mapping for this feed:
Vulnerabilities Mapping Table
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Examples | Notes |
---|---|---|---|---|
id | Vulnerability.Attribute | ID | <Vulnerability id="232739"> | Note1 |
Created Time | Vulnerability.Attribute | Created Time | <Created time_t="xxx">2019-07-10 13:30:03 | N/A |
Updaed Time | Vulnerability.Attribute | Updated Time | <Updated time_t="xxx">2019-07-10 13:30:03 | N/A |
Impact Value | Vulnerability.Attribute | Impact Value | <Impact value="1"> | N/A |
ImpactV3 Value | Vulnerability.Attribute | ImpactV3 Value | <ImpactV3 value="2"> | N/A |
Type | Vulnerability.Attribute | Type | <Type>Design Error | N/A |
CVE | Related.Indicator | CVE | <CVE>CVE-2019-13351 | N/A |
Title | Vulnerability.Name | N/A | <Title> (CVE-2019-13351) JACK2 Jack |
N/A |
References | Vulnerability.Attribute | Reference | <References>[<Reference>ref1</Reference>] | N/A |
Summary | Vulnerability.Description | N/A | <Summary>Dummy Summary | N/A |
Analysis | Vulnerability.Attribute | Analysis | <Analysis>Dummy Analysis | N/A |
Solution | Vulnerability.Attribute | Solution | <Solution>Dummy Solution | N/A |
Version | Vulnerability.Attribute | Version | <Version>1 | N/A |
Modification History | Vulnerability.Attribute | Comments | <ModificationHistory>Initial Revision... | N/A |
Associations | Vulnerability.Attribute | Associations | List of associated objects (see sample) | See Note 2 |
Note 1: ID is constructed as https://portal.secureworks.com/portal/intel/vulnerability/{Vulnerability_ID}
.
Note 2: Associations are constructed based on the parsed XML node type (Threat/Vulnerability/Advisory) as https://portal.secureworks.com/portal/intel/{Object_Type}/{Parsed_ID}
.
Advisories Mapping Table
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Examples | Notes |
---|---|---|---|---|
id | Report.Attribute | ID | <Advisory id="232739"> | See Note 1 |
Created Time | Report.Attribute | Created Time | <Created time_t="xxx">2019-07-10 13:30:03 | |
Impact Value | Report.Attribute | Impact Value | <Impact value="1"> | |
Subject | Report.Title | N/A | <Subject>Secureworks Security Advisory... | |
Type | Report.Attribute | Type | <Type>Advisory | |
Summary | Report.Description | N/A | <Detail>Dummy Detail. | |
CVE | Related.Indicator | CVE | Value extracted from <Subject> | See Note 2 |
Associations | Report.Attribute | Associations | List of associated objects (see sample) | See Note 3 |
Note 1: ID is constructed as https://portal.secureworks.com/portal/intel/advisory/{Advisory_ID}
Note 2: The related CVE Indicator value is extracted from the Subject xml node, example: CVE-2019-10149
(Value between brackets)
Note 3: Associations are constructed based on the parsed XML node type (Threat/Vulnerability/Advisory) as https://portal.secureworks.com/portal/intel/{Object_Type}/{Parsed_ID}
Threats Mapping Table
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Examples | Notes |
---|---|---|---|---|
id | Report.Attribute | ID | <Advisory id="232739"> | See Note 1 |
Created Time | Report.Attribute | Created Time | <Created time_t="xxx">2019-07-10 13:30:03 | |
Updaed Time | Report.Attribute | Updated Time | <Updated time_t="xxx">2019-07-10 13:30:03 | |
Impact Value | Report.Attribute | Impact Value | <Impact value="1"> | |
Title | Report.Title | N/A | <Title> Secureworks Security Advisory... |
|
Summary | Report.Description | N/A | <Summary>Dummy Summary | |
Analysis | Report.Attribute | Analysis | <Analysis>Dummy Analysis | |
Solution | Report.Attribute | Solution | <Solution>Dummy Solution | |
Associations | Report.Attribute | Associations | List of associated objects (see sample) | See Note 2 |
Note 1: ID is constructed as https://portal.secureworks.com/portal/intel/threat/{Advisory_ID}
.
Note 2: Associations are constructed based on the parsed XML node type (Threat/Vulnerability/Advisory) as https://portal.secureworks.com/portal/intel/{Object_Type}/{Parsed_ID}
.
Secureworks Alerts
The Secureworks Alerts feed ingests Events objects from Secureworks.
POST https://{secureworks_host}/graphql
Sample Response:
{
"data": {
"alertsServiceSearch": {
"reason": "success",
"search_id": null,
"status": "OK",
"alerts": {
"previous_offset": 0,
"total_results": 1,
"first_offset": 0,
"group_by": null,
"last_offset": 0,
"next_offset": 0,
"total_parts": 1,
"list": [
{
"resolution_reason": "",
"third_party_details": null,
"id": "alert://priv:domain_blacklist:146063:1702484636095:b9186e8a-a118-57bd-9ca6-257c919e19d6",
"parent_tenant_id": "",
"metadata": {
"confidence": 0.9,
"began_at": {
"seconds": 1702484487,
"nanos": 850866000
},
"full_title": null,
"title": "watchlist-test.ctpx.secureworks.com was identified as malicious on 2 watchlists",
"severity_updated_at": {
"seconds": 1702484652,
"nanos": 508564718
},
"first_seen_at": null,
"created_at": {
"seconds": 1702484636,
"nanos": 95629378
},
"inserted_at": {
"seconds": 1702484656,
"nanos": 66277636
},
"first_investigated_at": null,
"description": "watchlist-test.ctpx.secureworks.com was identified as malicious on the following watchlists:\nCTU Protection Domain List:\nReason: Test - Dell SecureWorks AttackerDB Customer Test Event (non-malicious)\nConfidence: 90\n\nCTU Malicious Domain Watchlist:\nReason: Test - Dell SecureWorks AttackerDB Customer Test Event (non-malicious)\nConfidence: 90\n",
"updated_at": {
"seconds": 1702484671,
"nanos": 146287578
},
"engine": {
"version": "1.9.0",
"name": "app:detect:domain_blacklist"
},
"origin": "INTERNAL",
"first_resolved_at": null,
"creator": {
"rule": {
"version": "1665757166",
"rule_id": "dff1c8f1-79ad-4349-85dc-66414009dd87"
},
"detector": {
"detector_id": "app:detect:domain_blacklist",
"detector_name": "Domain Blocklist",
"version": "1.9.0"
}
},
"ended_at": {
"seconds": 1702484538,
"nanos": 0
},
"severity": 0.75
},
"severity_history": [
{
"id": "17fefaf1-1c5f-5d3e-ad13-3e96b68a8db1",
"changed_at": {
"seconds": 1702484652,
"nanos": 508564718
},
"severity": 0.75
}
],
"enrichment_details": null,
"priority": null,
"sensor_types": [
"ENDPOINT_TAEGIS"
],
"events_metadata": {
"began_at": {
"seconds": 1702484487,
"nanos": 850866000
},
"first_event_id": "event://priv:scwx.dnsquery:146063:1702484538000:1bea9e97-2658-58ed-a3dd-f7a5a408a75c",
"last_event_id": null,
"updated_at": {
"seconds": 1702484656,
"nanos": 84478550
},
"total_events": 1,
"ended_at": {
"seconds": 1702484538,
"nanos": 0
}
},
"reference_details": null,
"group_key": [
"2023-12-13:app:detect:domain_blacklist:146063:watchlist-test.ctpx.secureworks.com"
],
"entities": {
"relationships": [
{
"to_entity": "ipAddress:fe80::d424:9103:e253:54c2",
"relationship": "is",
"from_entity": "hostName:aa3d5a88-9140-4fd4-8528-4ca28def18f1",
"type": ""
},
{
"to_entity": "sensorHostId:4ba68135-42f5-50e8-bd63-c91eb4bfce2d",
"relationship": "is",
"from_entity": "hostName:aa3d5a88-9140-4fd4-8528-4ca28def18f1",
"type": ""
},
{
"to_entity": "ipAddress:::ffff:96.82.141.209",
"relationship": "resolvedTo",
"from_entity": "ipDomain:watchlist-test.ctpx.secureworks.com",
"type": ""
},
{
"to_entity": "ipDomain:watchlist-test.ctpx.secureworks.com",
"relationship": "connectedTo",
"from_entity": "sensorHostId:4ba68135-42f5-50e8-bd63-c91eb4bfce2d",
"type": ""
}
],
"entities": [
"hostId:4ba68135-42f5-50e8-bd63-c91eb4bfce2d",
"hostName:aa3d5a88-9140-4fd4-8528-4ca28def18f1",
"hostNameAndHostId:aa3d5a88-9140-4fd4-8528-4ca28def18f1:4ba68135-42f5-50e8-bd63-c91eb4bfce2d",
"hostNameAndHostIpAddress:aa3d5a88-9140-4fd4-8528-4ca28def18f1:fe80::d424:9103:e253:54c2",
"ipAddress:::ffff:96.82.141.209",
"ipDomain:watchlist-test.ctpx.secureworks.com",
"sensorHostId:4ba68135-42f5-50e8-bd63-c91eb4bfce2d",
"sensorId:4ba68135-42f5-50e8-bd63-c91eb4bfce2d",
"sensorType:ENDPOINT_TAEGIS",
"topPrivateIpDomain:secureworks.com"
]
},
"event_ids": [
{
"id": "event://priv:scwx.dnsquery:146063:1702484538000:1bea9e97-2658-58ed-a3dd-f7a5a408a75c"
}
],
"tags": [
"alertRule:dff1c8f1-79ad-4349-85dc-66414009dd87",
"compactor:handler"
],
"suppressed": false,
"resolution_history": null,
"tenant_id": "146063",
"key_entities": null,
"observation_ids": [
{
"id": "observation://priv:domain_blacklist:146063:1702484636095:21a583b0-b6ba-4b5c-acec-39008fd46511"
}
],
"visibility": "DEPLOYED",
"suppression_rules": null,
"alerting_rules": [
{
"id": "dff1c8f1-79ad-4349-85dc-66414009dd87",
"version": "1665757166"
}
],
"collection_ids": null,
"status": "OPEN",
"attack_technique_ids": null,
"investigation_ids": null
}
],
"part": 1
}
}
}
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
data.alertsServiceSearch.alerts.list[].metadata.title |
Event.Title | N/A | data.alertsServiceSearch.alerts.list[].metadata.created_at.seconds |
watchlist-test.ctpx.secureworks.com was identified as malicious on 2 watchlists |
N/A |
data.alertsServiceSearch.alerts.list[].metadata.description |
Event.Description | N/A | data.alertsServiceSearch.alerts.list[].metadata.created_at.seconds |
watchlist-test.ctpx.secureworks.com was identified as malicious... |
N/A |
data.alertsServiceSearch.alerts.list[].metadata.created_at.seconds |
Event.Happened_At | N/A | data.alertsServiceSearch.alerts.list[].metadata.created_at.seconds |
2023-12-13 16:21:27 |
N/A |
data.alertsServiceSearch.alerts.list[].tags |
Event.Tag | N/A | N/A |
compactor:handler |
N/A |
data.alertsServiceSearch.alerts.list[].metadata.confidence |
Event.Attribute | Confidence | data.alertsServiceSearch.alerts.list[].metadata.created_at.seconds |
0.9 |
If the attribute already exists, the value will be updated. |
data.alertsServiceSearch.alerts.list[].metadata.engine.version |
Event.Attribute | Engine Version | data.alertsServiceSearch.alerts.list[].metadata.created_at.seconds |
1.9.0 |
N/A |
data.alertsServiceSearch.alerts.list[].metadata.engine.name |
Event.Attribute | Engine Name | data.alertsServiceSearch.alerts.list[].metadata.created_at.seconds |
app:detect:domain_blacklist |
N/A |
data.alertsServiceSearch.alerts.list[].metadata.origin |
Event.Attribute | Origin | data.alertsServiceSearch.alerts.list[].metadata.created_at.seconds |
INTERNAL |
N/A |
data.alertsServiceSearch.alerts.list[].metadata.severity |
Event.Attribute | Severity | data.alertsServiceSearch.alerts.list[].metadata.created_at.seconds |
0.75 |
If the attribute already exists, the value will be updated. |
data.alertsServiceSearch.alerts.list[].sensor_types |
Event.Attribute | Sensor Types | data.alertsServiceSearch.alerts.list[].metadata.created_at.seconds |
ENDPOINT_TAEGIS |
N/A |
data.alertsServiceSearch.alerts.list[].visibility |
Event.Attribute | Visibility | data.alertsServiceSearch.alerts.list[].metadata.created_at.seconds |
DEPLOYED |
N/A |
data.alertsServiceSearch.alerts.list[].status |
Event.Attribute | Status | data.alertsServiceSearch.alerts.list[].metadata.created_at.seconds |
OPEN |
If the attribute already exists, the value will be updated. |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Secureworks
Metric | Result |
---|---|
Run Time | 2 minutes |
Indicators | 3 |
Reports | 9 |
Reports Attributes | 36 |
Vulnerabilities | 20 |
Vulnerabilities Attributes | 47 |
Secureworks Alerts
Metric | Result |
---|---|
Run Time | 1 minute |
Event | 1 |
Event Attributes | 8 |
Change Log
- Version 1.1.0
- Added new feed: Secureworks Alerts.
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Secureworks CDF Guide v1.1.0 | 4.23.1 or Greater |