Loading

Cybereason

Version 1.4.0 (View all)
Compatible Kibana version(s) 8.13.0 or higher
9.0.0 or higher
Supported Serverless project types
What's this?
Security
Observability
Subscription level
What's this?
Basic
Level of support
What's this?
Elastic

Cybereason is a cybersecurity company that specializes in endpoint detection and response (EDR) solutions to help organizations detect and respond to cyber threats. Cybereason's goal is to provide a comprehensive cybersecurity solution that helps organizations defend against a wide range of cyber threats, including malware, ransomware, and advanced persistent threats (APTs).

Use the Cybereason integration to collect and parse data from the REST APIs. Then visualize that data in Kibana.

This module has been tested against the latest Cybereason On-Premises version 23.2.

The Cybereason integration collects six types of logs: Logon Session, Malop Connection, Malop Process, Malware, Poll Malop and Suspicions Process.

  • Logon Session - This data stream helps security teams monitor and analyze logon sessions within their network, identifying potential threats and taking appropriate action to mitigate risks.

  • Malop Connection - This data stream provides detailed insights into network connections observed by the endpoint detection and response (EDR) system.

  • Malop Process - This data stream provides details about malicious processes detected within their environment, aiding in the detection and mitigation of security threats.

  • Malware - This data stream provides detailed information about a malware detection event, including the detected file, its type, detection method, and additional metadata for analysis and response.

  • Poll Malop - This data stream provides comprehensive information about Malops detected by Cybereason's EDR system, enabling security teams to analyze and respond to potential threats effectively.

  • Suspicions Process - This data stream provides detailed information about processes that are suspected or deemed malicious within the endpoint detection and response (EDR) system.

Note

Suspicions Process has the same endpoint as the first three data streams, we have added a filter - hasSuspicions : true and some custom fields to get the logs related to suspicions.

Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions.

  1. To deploy a Cybereason instance in your environment, refer to the Cybereason documentatiion.
  2. Once deployed, you'll obtain the parameters such as host, port, username and password to configure Cybereason integration within your Elasticsearch environment.
  1. In Kibana navigate to Management > Integrations.
  2. In the search bar, type Cybereason.
  3. Select the Cybereason integration and add it.
  4. While adding the integration, enter the following details to collect logs via REST API:
    • Host
    • Port
    • Username
    • Password
    • Initial Interval
    • Interval
    • Batch Size

This is the Logon Session dataset.

This is the Malop Connection dataset.

This is the Malop Process dataset.

This is the Malware dataset.

This is the Poll Malop dataset.

This is the Suspicions Process dataset.