Loading

Abnormal Security

<div class="condensed-table">
| | |
| --- | --- |
| Version | 1.2.0 (View all) |
| Compatible Kibana version(s) | 8.13.0 or higher |
| Supported Serverless project types
What’s this? | Security
Observability |
| Subscription level
What’s this? | Basic |
| Level of support
What’s this? | Elastic |

</div>
Abnormal Security is a behavioral AI-based email security platform that learns the behavior of every identity in a cloud email environment and analyzes the risk of every event to block even the most sophisticated attacks.

The Abnormal Security integration collects data for AI Security Mailbox (formerly known as Abuse Mailbox), Audit, Case, and Threat logs using REST API.

The Abnormal Security integration collects four types of logs:

  • https://app.swaggerhub.com/apis-docs/abnormal-security/abx/1.4.3#/AI%20Security%20Mailbox%20(formerly%20known%20as%20Abuse%20Mailbox)[AI Security Mailbox] - Get details of AI Security Mailbox.
  • https://app.swaggerhub.com/apis-docs/abnormal-security/abx/1.4.3#/Audit%20Logs[Audit] - Get details of Audit logs for Portal.
  • https://app.swaggerhub.com/apis-docs/abnormal-security/abx/1.4.3#/Cases[Case] - Get details of Abnormal Cases.
  • https://app.swaggerhub.com/apis-docs/abnormal-security/abx/1.4.3#/Threats[Threat] - Get details of Abnormal Threat Logs.

You need to have Elastic Agent installed. For detailed guidance, refer to the Elastic Agent installation instructions.

There are several options for installing and managing Elastic Agent:

With this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.

With this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.

You can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.

Before installing the Elastic Agent, check the minimum requirements.

  • Retrieve your authentication token. This token will be used further in the Elastic integration setup to authenticate and access different Abnormal Security Logs.
  • Abnormal Security requires you to restrict API access based on source IP. So in order for the integration to work, user needs to update the IP allowlisting to include the external source IP of the endpoint running the integration via Elastic Agent.
  1. In Kibana navigate to Management > Integrations.
  2. In "Search for integrations" top bar, search for Abnormal Security.
  3. Select the "Abnormal Security" integration from the search results.
  4. Select "Add Abnormal Security" to add the integration.
  5. Add all the required integration configuration parameters, including Access Token, Interval, Initial Interval and Page Size to enable data collection.
  6. Select "Save and continue" to save the integration.
Note

By default, the URL is set to https://api.abnormalplatform.com. We have observed that Abnormal Security Base URL changes based on location so find your own base URL.

This is the ai_security_mailbox dataset.

This is the audit dataset.

This is the case dataset.

This is the threat dataset.