Synchronize Alerts with Palo Alto Cortex XSOAR
This use case describes how to automatically create an incident on Palo Alto Cortex XSOAR when a new alert is raised on Sekoia.io.
This integration uses the Sekoia.io Playbook and the Generic Webhook of Palo Alto XSOAR to interact between both products. Some information will be automatically sent to Cortex XSOAR but you will be able to adapt it to your needs.
Here is a schema that illustrates this interconnection:
Prerequisites
- A Sekoia.io XDR licence
- Access to Sekoia.io Playbooks
- The user w configures the Playbook should have access to the Sekoia.io Playbooks
- An API Key with a role that contains at least the following permissions:
SIC_READ_ALERTS
SIC_READ_INTAKES
- The
SYMPHONY_*
permissions
- Admin access to Cortex XSOAR
- Cortex XSOAR available on the internet
Note
To create your API Key, follow this documentation.
Configure
Create an new Incident type on Palo Alto Cortex XSOAR
A dedicated incident type for Sekoia.io will allow to enable specific Incident Fields and decide what XSOAR playbook to use.
Follow these steps to create a new Incident type:
- From the XSOAR GUI, click on
Settings
>OBJECTS SETUP
>Types
- Click on
+ New Incident Type
and give it the nameSekoia.io
. Please configure the other parameters depending on your needs. - Click on
Save
Create a webhook on Palo Alto Cortex XSOAR
To allow Sekoia.io to create a new incident when a new alert is raised, we need to create a Webhook.
To create this webhook, follow these steps:
- From the XSOAR GUI, install the
Generic Webhook
published by XSOAR from the Market Place - Go to
Settings
>INTEGRATIONS
>Instances
and searchGeneric Webhook
- Click on
Add instance
and give it the namesekoia
- Under
Incident type
, selectSekoia.io
- Follow the webhook documentation and configure Cortex XSOAR server rerouting to make your webhook available from your XSOAR Url in HTTPS
- Fill out
Username
with_header: Authorization
andPassword
withBearer YOUR_XSOAR_TOKEN
. ReplaceYOUR_XSOAR_TOKEN
with a complex string. It will be used as an authentication - To be able to map information easily into XSOAR, check the option
Store sample events for mapping
- Click on
Save and exit
Create and configure a playbook on Sekoia.io
To create and configure a Cortex XSOAR playbook on Sekoia.io, follow these steps:
- Go the Playbook page page and click
+ Playbook
- Select
Use a template
and choose the templateAutomatically create an incident on Palo Alto Cortex XSOAR
- Click on the
Alert Created
module to configure it - On the right panel, under the
Module Configuration
section, click on+ Create new configuration
- Complete the form with the following information and click on
Save
:- Name: Sekoia.io config
- Api_key:
<YOUR_SEKOIA_APIKEY>
- Base_url:
https://api.sekoia.io
- Under the
Trigger Configuration
section, click on+ Create new configuration
- Complete the form with the following information and click on
Save
:- name: Default
- Rule Filter:
<LEAVE_IT_EMPTY>
- Click on the
Get Alert
module and on the right panel, select the Sekoia.io config previously created - Select the
Get events from the alert
and on the right panel, elect the Sekoia.io config previously created - Click on the
Create incident on XSOAR
module and adapt the configuration:- In the
Headers
section, change the value ofYOUR_XSOAR_TOKEN
with the complex string your defined during the configuration of the XSOAR webhook - In the
Url
section, change<YOUR_XSOAR_DOMAIN>
with the correct value - The
Json
section contains the information that will be sent to XSOAR. By default, it will send the name of the rule that triggered the alert, the creation date, the alert short id, the alert URL, the urgency of the alert and the first event associated to the alert. Please adapt it to your needs if you want more information to be sent.
- In the
Your playbook is now ready!
- Save your Playbook by clicking on the
Save
button on the center of the page - Activate your Playbook by toggling the value from
Off
toOn
, on the top right of the page
Now, when a new alert is raised on Sekoia.io, this playbook will run and call the XSOAR webhook to create an incident.
XSOAR Mapping
By default, only the name of the incident and the creation date are used in the Incident.
To use the alert short ID, the alert URL, the urgency of the alert and the first event associated to the alert, you need to define a mapping on XSOAR.
Those values can be mapped as follow :
JSON key name | Cortex XSOAR field |
---|---|
alertId | Alert ID |
alertUrl | Alert URL |
events | Events |
urgency | severity |
To do this mapping, follow these steps:
- Go to
Settings
>OBJECTS SETUP
>Incident Fields
and edit the fieldsAlert ID
,Alert URL
,Events
andseverity
areUsed In
to use them for the Incident typeSekoia.io
- Go to
Classification & Mapping
and click+ New
- Select
Incident Mapper (incoming)
and give it the nameSekoia.io mapping
- On the left panel, find the XSOAR fields
Alert ID
,Alert URL
,Events
andseverity
and clickChoose data path
to give them the value of the correspondingJSON key name
(for instanceAlert ID
>alertId
) - Click on
Save Version
To use this mapping with the Generic Webhook:
- Go back to
Settings
>INTEGRATIONS
>Instances
and find theGeneric Webhook
, - On the
sekoia
instance, click on the edit button - Under
Mapper (incoming)
, select theSekoia.io mapping
previously created - Click on
Save and exit
Congratulations! The integration with Palo Alto XSOAR is now complete!
View Sekoia.io playbook runs
To access Sekoia.io playbook runs, follow these steps:
- On the Sekoia.io GUI, go to the Playbooks page
- Select your playbook
Automatically create an incident on Palo Alto Cortex XSOAR
and click onEdit
- On the top right of the page, click on
Runs
- Verify that the displayed
Status
isSucceeded
- If you click on a run from the history, you will be redirected to the Graph page. From there, you will be able to see the results of each block by clicking on it: