Corelight Fleet Manager Portal Exports
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Export Details
ThreatQuotient provides the following details for this export:
Current Guide Version | 1.0.0 |
Compatible with Corelight Fleet Manager Versions | >= 27.14 |
Support Tier | ThreatQ Supported |
Introduction
Use the steps provided in this guide to create a ThreatQ export for Corelight Fleet Manager Portal.
Creating the Export
The following section will detail how to create a ThreatQ export for Corelight Fleet Manager.
- Select the Settings icon > Exports.
The Exports page appears with a table listing all exports in alphabetical order.
- Click Add New Export
The Connection Settings dialog box appears.
- Enter an Export Name.
- Click Next Step.
The Output Format dialog box appears.
- Provide the following information:
See the Output Format Options topic for more information on using logical operators in exports. If a specific score or ranges of scores is required, then the following should be added to the end of the special parameters configuration.
Field Value Which type of information
would you like to export?Indicators Output Type Text/plain Filter by TLP Optional - select a TLP filter if needed. Special Parameters indicator.status=Active&indicator.deleted=NOutput Format Template #fields{$tab}indicator{$tab}indicator_type{$tab}meta.source{$tab}meta.url
{foreach $data as $indicator}
{$indicator_type=""}
{$source_found=0}
{if $indicator.type eq "CIDR Block"}{$indicator_type="Intel::SUBNET"}{/if}
{if $indicator.type eq "IP Address"}{$indicator_type="Intel::ADDR"}{/if}
{if $indicator.type eq "URL"}{$indicator_type="Intel::URL"}{/if}
{if $indicator.type eq "Email Address"}{$indicator_type="Intel::EMAIL"}{/if}
{if $indicator.type eq "FQDN"}{$indicator_type="Intel::DOMAIN"}{/if}
{if $indicator.type eq "MD5"}{$indicator_type="Intel::FILE_HASH"}{/if}
{if $indicator.type eq "SHA-1"}{$indicator_type="Intel::FILE_HASH"}{/if}
{if $indicator.type eq "SHA-256"}{$indicator_type="Intel::FILE_HASH"}{/if}
{if $indicator.type eq "SHA-384"}{$indicator_type="Intel::FILE_HASH"}{/if}
{if $indicator.type eq "SHA-512"}{$indicator_type="Intel::FILE_HASH"}{/if}
{if $indicator.type eq "Filename"}{$indicator_type="Intel::FILE_HASH"}{/if}
{if $indicator_type ne ""}
{$indicator.value}{$tab}{$indicator_type}{$tab}{foreach $indicator.Sources item=source name=Sources}{if $smarty.foreach.Sources.first == true}
{$source.value}{$source_found=1}{/if}{/foreach}{if $source_found == 0}-{/if}
{$tab}https://{$http_host}/indicators/{$indicator.id}/details
{/if}
{/foreach} - Click Save Settings.
- Under On/Off, toggle the switch to enable the export.
Corelight Fleet Configuration
Use the following steps to configure create a new Corelight Fleet policy for the ThreatQ export..
- Log into the Corelight Fleet Manager UI.
- Navigate to Policies > Intel Policies and then click on New Intel Policy.
- Enter a name for the new policy and click on Save.
- Click on New Intel Source and provide the URL to the TQ Export.
Adding the ThreatQ Certificate
In the event that you encounter an SSL certificate warning from CoreLight, you will need to add the ThreatQ certificate to Corelight's trusted store using the steps below.
- Confirm that you have a CA signed certificate.
- Navigate to the ca-certificates directory:
cd /usr/local/share/ca-certificates
- Retrieve the entire ThreatQ certificate chain:
openssl s_client -showcerts -verify 5 -connect <ThreatQ Host>:443 < /dev/null | awk '/BEGIN CERTIFICATE/,/END CERTIFICATE/{ if(/BEGIN CERTIFICATE/){a++}; out="cert"a".pem"; print >out}' for cert in *.pem; do newname=$(openssl x509 -noout -subject -in $cert | sed -nE 's/.*CN ?= ?(.*)/\1/; s/[ ,.*]/_/g; s/__/_/g; s/_-_/-/; s/^_//g;p' | tr '[:upper:]' '[:lower:]').pem; echo "${newname}"; mv "${cert}" "${newname}" ; done
- Convert the PEM file to CRT:
openssl x509 -outform der -in <name_of_pem_file_from_step3>.pem -out <name_of_pem_file_from_step3>.crt
- Update the Corelight trust store:
sudo update-ca-certificates
- Restart the Corelight Fleet Manager:
sudo systemctl restart corelight-fleetd
- Confirm system status once the restart process has completed:
sudo systemctl status corelight-fleetd
- Change the IP in the ThreatQ Export URL to ThreatQ hostname.
Change Log
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Corelight Fleet Manager Portal Export Guide v1.0.0 | N/A |