diff --git a/docs/xdr/features/collect/integrations/cloud_and_saas/extrahop_revealx_360.md b/docs/xdr/features/collect/integrations/cloud_and_saas/extrahop_revealx_360.md new file mode 100644 index 0000000000..8c560b7d7f --- /dev/null +++ b/docs/xdr/features/collect/integrations/cloud_and_saas/extrahop_revealx_360.md @@ -0,0 +1,71 @@ +uuid: 1df44c62-33d3-41d4-8176-f1fa13589eea +name: ExtraHop Reveal(x) 360 +type: intake + +## Overview + +ExtraHop Reveal(x) 360 is a cloud-based network detection and response platform offering protection and detections for on-premises and cloud environments. + +In this documenation we will explain how to collect and send Reveal(x) 360 events to Sekoia.io. + +!!! warning + Important note - This format is currently in beta. We highly value your feedback to improve its performance. + + +{!_shared_content/operations_center/detection/generated/suggested_rules_1df44c62-33d3-41d4-8176-f1fa13589eea_do_not_edit_manually.md!} + +{!_shared_content/operations_center/integrations/generated/1df44c62-33d3-41d4-8176-f1fa13589eea.md!} + +## Configure + +### Prerequisites +- System and access administration privileges for ExtraHop Reveal(x) 360 +- Access to Sekoia.io Intakes and Playbook pages with write permissions + +### How to create REST API credentials +1. Log in to Reveal(x) 360. +2. Click the System Settings icon at the top right of the page and then click **All Administration**. +3. Click **API Access**. +4. Click **Create Credentials**. +5. In the **Name** field, type a name for the credentials. +6. In the **Privileges** field, specify a privilege level for the credentials. + +!!! Note + The privilege level determines which actions can be performed with the credential. Do not grant more privileges to REST API credentials than needed because it can create a security risk. For example, applications that only retrieve metrics should not be granted credentials that grant administrative privileges. For more information about each privilege level, see [User privileges](https://docs.extrahop.com/9.5/users-overview/#user-privileges). + +!!! Note + System and Access Administration privileges are similar to Full write privileges and allow the credentials to connect self-managed sensors and Trace appliances to Reveal(x) 360. + +7. In the **Packet Access** field, specify whether you can retrieve packets and session keys with the credentials. +8. Click **Save**. + The Copy REST API Credentials pane appears. +9. Under ID, click **Copy to Clipboard** and save the ID to your local machine. +10. Under Secret, click **Copy to Clipboard** and save the secret to your local machine. + +!!! Important + The secret cannot be viewed or retrieved later. + +12. Click **Done**. + + +### Create your intake + +1. Go to the [intake page](https://app.sekoia.io/operations/intakes) and create a new intake from the `ExtraHop Reveal(x) 360`. +2. Copy the associated Intake key + +### Pull the logs to collect them on Sekoia.io + +Go to the Sekoia.io [playbook page](https://app.sekoia.io/operations/playbooks), and follow these steps: + +- Click on **+ PLAYBOOK** button to create a new one +- Select **Create a playbook from scratch** +- Give it a name in the field **Name** +- Open the left panel, click **ExtraHop** then select the trigger `Fetch new alerts from ExtraHop Reveal(x) 360` +- Click on **Create** + +- Create a **Module configuration** using your REST API credentials created on the *How to create REST API credentials* step. Name the module configuration as you wish +- Create a **Trigger configuration** and Type the `Intake key` created on the previous step +- Click on the **Save** button +- **Activate the playbook** with the toggle button on the top right corner of the page + +### Enjoy your events on the [Events page](https://app.sekoia.io/operations/events) diff --git a/mkdocs.yml b/mkdocs.yml index ba13991550..f65bf86701 100644 --- a/mkdocs.yml +++ b/mkdocs.yml @@ -121,6 +121,7 @@ nav: - Digital Shadows SearchLight: xdr/features/collect/integrations/cloud_and_saas/digital_shadows.md - Cisco Duo Security: xdr/features/collect/integrations/cloud_and_saas/cisco_duo_security.md - Claroty xDome: xdr/features/collect/integrations/cloud_and_saas/claroty_xdome.md + - ExtraHop Reveal(x) 360: xdr/features/collect/integrations/cloud_and_saas/extrahop_revealx_360.md - Github Audit Logs: xdr/features/collect/integrations/cloud_and_saas/github_audit_logs.md - Google Cloud: - Google Cloud Audit Logs: xdr/features/collect/integrations/cloud_and_saas/google/google_cloud_audit.md