Fidelis Elevate Exports
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Export Details
ThreatQuotient provides the following details for this export:
Current Guide Version | 1.0.0 |
Compatible with ThreatQ Versions | >= 4.40.0 |
Support Tier | ThreatQ Supported |
Fidelis Elevate CommandPost Version | 9.3.3 |
Introduction
ThreatQ exports to send indicators of compromise (Email Address, IP Address, MD5, URL and FQDN) to Fidelis Elevate. Elevate has the capability to ingest IOCs from external threat feeds and use them to create rules and policies, and define the reaction by the sensors if such a policy is violated. The exports defined here are in an XML format, although Elevate offers also the option to ingest feed in CSV format.
More details about custom threat feeds and their configuration in Elevate can be found on the help pages of a Fidelis Elevate device:
https://<Fidelis Elevate Host or IP>/help/MyWebHelp/Content/FidelisCreatePoliciesHelpVersion/P_InsightCustomFeed.htm
Exporting Steps per Type
The following section provides the steps required to created exports for specific indicator types.
See the Managing Exports topic for more details on ThreatQ exports.
Exporting an Email Address
- Select the Settings icon > Exports.
The Exports page appears with a table listing all exports in alphabetical order.
- Click Add New Export
The Connection Settings dialog box appears.
- Enter an Export Name.
- Click Next Step.
The Output Format dialog box appears.
- Provide the following information:
Field Value Type of information you
would like to export?Indicators Output type text/plain Special Parameters indicator.status=Active&indicator.deleted=N&indicator.type=EmailAddress&indicator.class=network&differential=1
- Under Output Format Template, enter:
<ThreatQEmailAddressFeed> <description>Email addresses feed from ThreatQ</description> <entries> {foreach $data as $indicator} <entry> <email>{$indicator.value}</email> <extra_info>{$indicator.id}</extra_info> </entry> {if !$indicator.last}{/if} {/foreach} </entries> </ThreatQEmailAddressFeed>
- Click Save Settings.
- Under On/Off, toggle the switch to enable the export.
- Click on the export URL with the data.
Make sure to remove the limit parameter from the URL:
limit=10&
.
The URL should be similar to this one:
https://<ThreatQ Host>/api/export/<export ID>/?token=<Authentication Token>
Exporting IP Addresses
- Select the Settings icon > Exports.
The Exports page appears with a table listing all exports in alphabetical order.
- Click Add New Export.
The Connection Settings dialog box appears.
- Enter an Export Name.
- Click Next Step.
The Output Format dialog box appears.
- Provide the following information:
Field Value Type of information you
would like to export?Indicators Output type text/plain Special Parameters indicator.status=Active&indicator.deleted=N&indicator.type=IP Address&indicator.class=network&differential=1
- Under Output Format Template, enter:
<ThreatQIPAddressFeed> <description>IP address feed from ThreatQ</description> <entries> {foreach $data as $indicator} <entry> <ip>{$indicator.value}</ip> <extra_info>{$indicator.id}</extra_info> </entry> {if !$indicator.last}{/if} {/foreach} </entries> </ThreatQIPAddressFeed>
- Click Save Settings.
- Under On/Off, toggle the switch to enable the export
- Click on the export URL with the data.
Make sure to remove the limit parameter from the URL:
limit=10&
.
The URL should be similar to this one:
https://<ThreatQ Host>/api/export/<export ID>/?token=<Authentication Token>
Exporting MD5 Hashes
- Select the Settings icon > Exports.
The Exports page appears with a table listing all exports in alphabetical order.
- Click Add New Export.
The Connection Settings dialog box appears.
- Enter an Export Name.
- Click Next Step.
The Output Format dialog box appears.
- Provide the following information:
Field Value Type of information you
would like to export?Indicators Output type text/plain Special Parameters indicator.status=Active&indicator.deleted=N&indicator.type=MD5& indicator.class=network&differential=1
- Under Output Format Template, enter:
<ThreatQMD5Feed> <description>MD5 feed from ThreatQ</description> <entries> {foreach $data as $indicator} <entry> <md5>{$indicator.value}</md5> <extra_info>{$indicator.id}</extra_info> </entry> {if !$indicator.last}{/if} {/foreach} </entries> </ThreatQMD5Feed>
- Click Save Settings.
- Under On/Off, toggle the switch to enable the export.
- Click on the export URL with the data. Make sure to delete from the URL this parameter
limit=10&
. The URL should be similar to this onehttps://<ThreatQ Host>/api/export/<export ID>/?token=<Authentication Token>
Exporting FQDNs and URLs
- Select the Settings icon > Exports.
The Exports page appears with a table listing all exports in alphabetical order.
- Click Add New Export.
The Connection Settings dialog box appears.
- Enter an Export Name.
- Click Next Step.
The Output Format dialog box appears.
- Provide the following information:
Field Value Type of information you
would like to export?Indicators Output type text/plain Special Parameters indicator.status=Active&indicator.deleted=N&indicator.type=URL&indicator.type=FQDN&indicator.class=network&differential=1
- Under Output Format Template, enter:
<ThreatQFQDNURLFeed> <description>Threat feed from ThreatQ with FQDNs and URLs</description> <entries> {foreach $data as $indicator} <entry> <url>{$indicator.value}</url> <extra_info>{$indicator.id}</extra_info> </entry> {if !$indicator.last}{/if} {/foreach} </entries> </ThreatQFQDNURLFeed>
- Click Save Settings.
- Under On/Off, toggle the switch to enable the export.
- Click on the export URL with the data.
Make sure to remove the limit parameter from the URL:
limit=10&
.
The URL should be similar to this one:
https://<ThreatQ Host>/api/export/<export ID>/?token=<Authentication Token>
Adding Exports as Custom Threat Feeds in Fidelis Elevate
For a detailed description of the configuration steps, visit the following page on your Fidelis Elevate CommandPost appliance:
https://<Fidelis Elevate Host>/help/MyWebHelp/Content/FidelisCreatePoliciesHelpVersion/P_InsightAddCustomFeed.htm.
To add a new feed:
- Go to Policies -> Threat Feeds -> Feed Config and click on Add Feed.
- Enter the name of the feed.
The entered name must be unique among all custom feeds on CommandPost.
- Optional - Add a description that will be displayed in the list of feeds on the Feed Config page.
- Select XML as the feed format.
- Enter entry for the XML format descriptor.
- Click the Add button.
- Enter a Description of the feed on the detailed configuration page.
- Select the feed content for the indicator type that is being ingested.
- Make sure the following boxes are checked, at a minimum:
- Enable
- Dynamic
- Verify SSL Certificate
- Select the Refresh Frequency that is needed for the environment.
- Enter the ThreatQ export URL in the Location (URL) box.
- Click the Save button to save the configuration. To test the feed click on the Download Now button
Custom feeds can be set up for a one-time manual upload, manual refresh, or automated refresh.
Change Log
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Fidelis Elevate Exports Guide v1.0.0 | 4.40.0 or Greater |