Sophos Threat Analysis Center
Overview
The Sophos Threat Analysis Center (STAC), is a dedicated tool for research and analysis of cybersecurity threats. so it can help continuously on monitoring the cyber threat landscape and analyze new forms of malware, attack techniques, and cybercrime trends. which has also the most important part which the live Discover , with usage of queries you can have device informations from Sophos data lake.
Warning
Important note - This format is currently in beta. We highly value your feedback to improve its performance.
Configure
Prerequisites
You can find the system requirements for each respective platform below :
Warning
It's also necessary to know that you have to install Sophos agents on the necessary machines.
Create Sophos Threat Analysis Center Credentials
In the Sophos Central Admin console:
- Go to
Global Settings
>API Credentials Management
. - Click
Add Credential
and give the credential a name and description. - Choose which role you want to assign. You can choose from the following roles:
- Service Principal Super Admin: Users with this role can perform all API operations with full CRUD (Create Read Update Delete) capabilities and have access to queries.
- Service Principal Forensics: Users with this role can create, view, run, and delete Live Discover queries.
- Click
Add
.
This generates the credential, together with a Client ID and a Client Secret. Copy the Client ID and Client Secret.
Enable logs to Sophos data lake
Log on your Sophos Interface and follow this guide.
Create the intake
- Go to the intake page and create a new intake from the format Sophos Analysis Threat Center.
- Copy the associated Intake key
Pull events
- Go to the Playbook page.
- Click on
+ PLAYBOOK
and chooseCreate a playbook from scratch
. - Give it a name and a description and click on
Next
. - In
Choose a trigger
, select theQuery IOC from data lake
. - Click on the
Query IOC from data lake
module on the right sidebar and in theModule Configuration
section, selectCreate new configuration
. - Write a
name
and paste theclient_id
andclient_secret
from the Sophos console and click onSave
. - In the
Trigger Configuration
section, click onCreate new configuration
. - Write a
name
, choose afrequency
- Default is60
-, paste theintake_key
associated to yourSophos Threat Analysis Center
intake and click onSave
. - On the top right corner, start the Playbook. You should see monitoring messages in the
Logs
section. - Check on the Events page that the Sophos logs are being received.