Current ThreatQ Version Filter

Securonix Operation

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Securonix Operation enables ThreatQ to enrich platform objects with sighting and activity data sourced from the Securonix SNYPR SIEM. Through its Lookup capability, the operation queries the Securonix Activity Index to retrieve relevant intelligence and correlate observed activity with existing ThreatQ objects.

The integration provides the following action:

  • Lookup - enriches ThreatQ objects with intelligence from the Securonix Activity Index.

The integration is compatible with the following object types:

  • Assets
  • Identities
  • Indicators
    • Email Address
    • File Path
    • File Name
    • FQDN
    • IP Address
    • IPv6 Address
    • MD5
    • SHA-1
    • SHA-256
    • SHA-384
    • SHA-512
    • URL
    • Username

Prerequisites

The following is required to run the integration:

  • A Securonix SNYPR Account along with a valid username and password for the Securonix instance. 

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the integration file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the integration file on your local machine

    ThreatQ will inform you if the operation already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the operation contains changes to the user configuration. The new user configurations will overwrite the existing ones for the operation and will require user confirmation before proceeding.

The operation is now installed and will be displayed in the ThreatQ UI. You will still need to configure and then enable the operation.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Operation option from the Type dropdown (optional).
  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    Securonix Host / IP Enter the Securonix Hostname or IP Address to connect to with integration. Do not include the HTTP or HTTPS protocol. Example: <tenant>.securonix.net.
    Username Enter your Securonix username for authentication.
    Password Enter your Securonix username for authentication.
    Enable SSL Certificate Verification Enable this parameter if the integration should validate the host-provided SSL certificate. 

    Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

Actions

The operation provides the following action:

Action Description Object Type Object Subtype
Lookup Enriches ThreatQ objects with Securonix data Asset, Indicator, Identity IP, IPv6, Email, File Path, File Name, FQDN, MD5, SHA-1, SHA-256, SHA-384, SHA-512, URL, Username

Lookup

The Lookup action queries the Securonix activity index and returns a summary information about the query and a list of detailed context attributes found in the events.

GET https://{host}/Snypr/ws/spotter/index/search

Sample Request Parameters:

{
  "query": "index=\"activity\" and (ipaddress=\"8.8.8.8\" or sourceaddress=\"8.8.8.8\" or destinationaddress=\"8.8.8.8\")",
  "eventtime_from": "02/01/2026 11:46:32",
  "eventtime_to": "02/03/2026 11:46:32",
  "data_labels": "true"
}

Sample Response:

{
  "totalDocuments": 83046,
  "events": [
    {
      "ipaddress": "8.8.8.8",
      "deviceaction": "allow",
      "resourcename": "Palo_H4X",
      "resourcetype": "Palo Alto Next-Generation Firewall",
      "categoryoutcome": "Success",
      "rg_vendor": "Palo Alto Networks",
      "deviceseverity": "Information",
      "deviceeventcategory": "NetworkConnect",
      "categorybehavior": "Connection Request",
      "resourcegroupname": "Palo_H4X",
      "categoryobject": "Network",
      "devicehostname": "H4X-PA",
      "eventtime": "1770023160000"
    },
    {
      "ipaddress": "8.8.8.8",
      "deviceaction": "Network connection detected",
      "resourcename": "COLLECTOR.hax.local",
      "resourcetype": "Microsoft Windows Sysmon",
      "categoryoutcome": "Attempt",
      "rg_vendor": "Microsoft Corporation",
      "deviceseverity": "Information",
      "deviceeventcategory": "Filtering Platform Connection",
      "categorybehavior": "Connection Request",
      "resourcegroupname": "SysmonH4X",
      "categoryobject": "Network",
      "devicehostname": "COLLECTOR.hax.local",
      "eventtime": "1770026460000"
    }
  ]
}

ThreatQuotient provides the following default mapping for this action based on each item with the .events list.

Provider Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
categorybehavior Attribute Category Behavior Connection Request N/A
.categoryobject Attribute Category Object Network N/A
.categoryoutcome Attribute Category Outcome Success, Attempt N/A
.deviceaction Attribute Device Action allow, Network connection detected N/A
.deviceseverity Attribute Device Severity N/A N/A
.deviceeventcategory Attribute Device Event Category Filtering Platform Connection N/A
.resourcegroupname Attribute Resource Group Name SysmonH4X N/A
.resourcename Attribute Resource Name COLLECTOR.hax.local N/A
.devicehostname Attribute Device Hostname H4X-PA N/A
.resourcetype Attribute Resource Type Palo Alto Next-Generation Firewall N/A
.rg_functionality Attribute Resource Group Functionality Microsoft Windows N/A
.rg_vendor Attribute Resource Group Vendor Microsoft Corporation N/A

Run Configuration Options

The following configuration option is available after selecting the action:

Run Option Description
Days to Search Enter the historical timeframe to search through. The default value is 3 and the maximum allowed value is 7. 

This configuration option is set after selecting the Lookup action to run against an object and is not set from the operation's configuration screen.

Run Options

Queries

The following queries are used (%s is the placeholder for the object's value). Additionally, the date range is appended to filter the events by their timestamps.

ThreatQ Object Type ThreatQ Object Subtype Securonix Query    
Asset N/A ipaddress="%s"    
Identity N/A accountname="%s"    
Indicator Email Address (emailsender="%s" or emailrecipient="%s")    
Indicator File Path (filepath="%s" or oldfilepath="%s")    
Indicator FQDN (destinationhostname="%s" or sourcehostname="%s")    
Indicator IP Address (ipaddress="%s" or sourceaddress="%s" or destinationaddress="%s")    
Indicator IPv6 Address (ipaddress="%s" or sourceaddress="%s" or destinationaddress="%s")    
Indicator MD5 (filehash="%s" or oldfilehash="%s")    
Indicator SHA-1 (filehash="%s" or oldfilehash="%s")    
Indicator SHA-256 (filehash="%s" or oldfilehash="%s")    
Indicator SHA-384 (filehash="%s" or oldfilehash="%s")    
Indicator SHA-512 (filehash="%s" or oldfilehash="%s")    
Indicator URL requesturl=\"%s\"    
Indicator Username accountname="%s"    

Change Log

  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
Securonix Operation Guide v1.0.0 5.29.0 or Greater