Loading

Cybereason

<div class="condensed-table">
| | |
| --- | --- |
| Version | 1.2.0 (View all) |
| Compatible Kibana version(s) | 8.13.0 or higher |
| Supported Serverless project types
What’s this? | Security
Observability |
| Subscription level
What’s this? | Basic |
| Level of support
What’s this? | Elastic |

</div>

Cybereason is a cybersecurity company that specializes in endpoint detection and response (EDR) solutions to help organizations detect and respond to cyber threats. Cybereason’s goal is to provide a comprehensive cybersecurity solution that helps organizations defend against a wide range of cyber threats, including malware, ransomware, and advanced persistent threats (APTs).

Use the Cybereason integration to collect and parse data from the REST APIs. Then visualize that data in Kibana.

This module has been tested against the latest Cybereason On-Premises version 23.2.

The Cybereason integration collects six types of logs: Logon Session, Malop Connection, Malop Process, Malware, Poll Malop and Suspicions Process.

  • https://api-doc.cybereason.com/en/latest/APIReference/QueryAPI/queryElementFeatures.html#logon-session-edr[Logon Session] - This data stream helps security teams monitor and analyze logon sessions within their network, identifying potential threats and taking appropriate action to mitigate risks.
  • https://api-doc.cybereason.com/en/latest/APIReference/QueryAPI/queryElementFeatures.html#connection-edr-and-xdr[Malop Connection] - This data stream provides detailed insights into network connections observed by the endpoint detection and response (EDR) system.
  • https://api-doc.cybereason.com/en/latest/APIReference/QueryAPI/queryElementFeatures.html#malop-process-edr[Malop Process] - This data stream provides details about malicious processes detected within their environment, aiding in the detection and mitigation of security threats.
  • https://api-doc.cybereason.com/en/latest/APIReference/MalwareAPI/queryMalwareTypes.html#querymalware[Malware] - This data stream provides detailed information about a malware detection event, including the detected file, its type, detection method, and additional metadata for analysis and response.
  • https://api-doc.cybereason.com/en/latest/APIReference/MalopAPI/getMalopsMalware.html#getmalopsmalware[Poll Malop] - This data stream provides comprehensive information about Malops detected by Cybereason’s EDR system, enabling security teams to analyze and respond to potential threats effectively.
  • [Suspicions Process] - This data stream provides detailed information about processes that are suspected or deemed malicious within the endpoint detection and response (EDR) system.
Note

Suspicions Process has the same endpoint as the first three data streams, we have added a filter - hasSuspicions : true and some custom fields to get the logs related to suspicions.

  • Elastic Agent must be installed. For more details and installation instructions, please refer to the Elastic Agent Installation Guide.
  • You can install only one Elastic Agent per host.
  • Elastic Agent is required to stream data through the REST API and ship the data to Elastic, where the events will then be processed via the integration’s ingest pipelines.

There are several options for installing and managing Elastic Agent:

With this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.

With this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.

You can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.

Please note, there are minimum requirements for running Elastic Agent. For more information, refer to the Elastic Agent Minimum Requirements.

  • Visit this page to deploy a Cybereason instance in your environment.
  • Once deployed, you’ll obtain the parameters such as host, port, username and password for configuring Cybereason integration within your Elasticsearch environment.
  1. In Kibana navigate to Management > Integrations.

  2. In "Search for integrations" top bar, search for Cybereason.

  3. Select the "Cybereason" integration from the search results.

  4. Select "Add Cybereason Integration" to add the integration.

  5. While adding the integration, please enter the following details to collect logs via REST API:

    • Host
    • Port
    • Username
    • Password
    • Initial Interval
    • Interval
    • Batch Size

This is the Logon Session dataset.

This is the Malop Connection dataset.

This is the Malop Process dataset.

This is the Malware dataset.

This is the Poll Malop dataset.

This is the Suspicions Process dataset.