McAfee MVISION EDR
Integration version: 8.0
Configure McAfee MVISION EDR integration in Google Security Operations SOAR
For detailed instructions on how to configure an integration in Google Security Operations SOAR, see Configure integrations.
Integration parameters
Use the following parameters to configure the integration:
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
API Root | String | https://<address>:<port> | Yes | Trellix EDR API Root. Note: Provide either the Client ID and Client Secret or Username and Password parameters. If both parameters are provided, the integration use the Client ID and Client Secret parameters for authentication. |
Username | String | N/A | Yes | Username of Trellix EDR account. Note: Provide either the Client ID and Client Secret or Username and Password parameters. If both parameters are provided, the integration use the Client ID and Client Secret parameters for authentication. |
Password | Password | N/A | Yes | Password of the Trellix EDR account. Note: Provide either the Client ID and Client Secret or Username and Password parameters. If both parameters are provided, the integration use the Client ID and Client Secret parameters for authentication. |
Client ID | String | N/A | No | Client ID of the Trellix EDR account. Note: Provide either the Client ID and Client Secret or Username and Password parameters. If both parameters are provided, the integration use the Client ID and Client Secret parameters for authentication. |
Client Secret | Password | N/A | No | Client Secret of the Trellix EDR account. Note: Provide either the Client ID and Client Secret or Username and Password parameters. If both parameters are provided, the integration use the Client ID and Client Secret parameters for authentication. |
Verify SSL | Checkbox | Checked | Yes | If enabled, verifies that the SSL certificate for the connection to the Trellix EDR public cloud server is valid. |
How to generate Client ID and Client Secret
For more information on how to generate Client ID and Client Secret, see the McAfee MVISION EDR Integrations document.
Use Cases
- Ingest Trellix EDR threats and detections to use them to create Google Security Operations SOAR alerts. Next, in Google Security Operations SOAR, alerts can be used to perform orchestrations with playbooks or manual analysis.
- Perform enrichment actions - get data from Trellix EDR to enrich data in Google Security Operations SOAR Alerts.
- Perform active actions - quarantine a host using Trellix EDR agent from Google Security Operations SOAR.
Actions
Ping
Description
Test connectivity to Trellix EDR with parameters provided at the integration configuration page in the Google Security Operations Marketplace tab.
Parameters
N/A
Use Cases
The action is used to test connectivity at the integration configuration page in the Google Security Operations Marketplace tab, and it can be executed as a manual action, not used in playbooks.
Run On
This action doesn't run on entities, nor has mandatory input parameters.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
N/A
Entity Enrichment
N/A
Insights
N/A
Enrich Endpoint
Description
Fetch endpoint's system information by its hostname or IP address.
Parameters
N/A
Run On
This action runs on the following entities:
- IP Address
- Hostname
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
{
"total": 9,
"skipped": 0,
"items": 1,
"hosts": [
{
"maGuid": "3975892D-E16D-45C0-8795-164CFDF27946",
"hostname": "AWS-LT-EDR1",
"os": {
"major": 10,
"minor": 0,
"build": 18362,
"sp": "",
"desc": "Windows 10"
},
"lastBootTime": "2020-02-24T21:41:38Z",
"netInterfaces": [
{
"name": "Ethernet 2",
"macAddress": "02:33:86:c2:6b:d4",
"ip": "10.0.3.212",
"type": 6
}
],
"traceExtendedVisibility": 0
}
]
}
Entity Enrichment
Enrichment Field Name | Source (JSON Key) | Logic - When to apply |
---|---|---|
MMV_EDR_maGuid | hosts/maGuid | When available in JSON |
MMV_EDR_hostname | hosts/hostname | When available in JSON |
MMV_EDR_OS | hosts/os/desc | When available in JSON |
MMV_EDR_lastBootTime | hosts/lastBootTime | When available in JSON |
MMV_EDR_certainty | hosts/certainty | When available in JSON |
MMV_EDR_ips | Space separated results/net_interfaces/ip | When available in JSON |
Insights
N/A
Quarantine Endpoint
Description
Create quarantine endpoint task on the Trellix EDR server based on the Google Security Operations SOAR IP Address or Hostname entities.
Known Issue from Trellix
Reference: Trellix EDR Known Issues
When you quarantine an endpoint connected to a VPN, the endpoint becomes unreachable. You can't send the reaction to End the Quarantine.
Workaround:
- Gain physical access to the endpoint.
- Uninstall the EDR Client from Add and Remove Programs.
- Install the EDR client again.
Parameters
N/A
Run On
This action runs on the following entities:
- IP Address
- Hostname
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
N/A
Entity Enrichment
N/A
Insights
N/A
Unquarantine Endpoint
Description
Create unquarantine endpoint task on the McAfee MVISION EDR server based on the Google Security Operations SOAR IP Address or Hostname entities.
Known Issue from Trellix
Reference: Trellix EDR Known Issues
When you quarantine an endpoint connected to a VPN, the endpoint becomes unreachable. You can't send the reaction to End the Quarantine.
Workaround:
- Gain physical access to the endpoint.
- Uninstall the EDR Client from Add and Remove Programs.
- Install the EDR client again.
Parameters
N/A
Run On
This action runs on the following entities:
- IP Address
- Hostname
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
N/A
Entity Enrichment
N/A
Insights
N/A
Remove File
Description
Remove a file from the endpoint.
Action execution known issue
McAfee may not remove files and still show in the WebUI that action was executed successfully. The following issue can be related to permissions on agent. Verify that the agent has the required permissions and try again.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Full File Path | String | N/A | Yes | Specify the full path to the file that you want to remove. |
Safe Removal | Checkbox | Unchecked | Yes | If enabled, ignores files that may be critical or trusted. |
Run On
This action runs on the following entities:
- IP Address
- Hostname
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
N/A
Entity Enrichment
N/A
Insights
N/A
Stop And Remove Content
Description
Stop interpreter process by PID, for example Python or Bash, and remove the associated script by full path on the McAfee MVISION EDR.
Action execution known issue
McAfee may not remove or kill associated files and still show in the WebUI that action was executed successfully. The following issue can be related to permissions on agent. Verify that the agent has the required permissions and try again.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
PID | Integer | N/A | Yes | Specify the PID of the interpreter. |
Full File Path | String | N/A | Yes | Specify the full path to the file that you want to remove. |
Run On
This action runs on the following entities:
- IP Address
- Hostname
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
N/A
Entity Enrichment
N/A
Insights
N/A
Kill Process
Description
Stop a running process and remove its file. If the process is not running, then its file is just removed from the managed endpoint.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Process Identifier Type | DDL | PID Possible Values:
|
Yes | Specify which process identifier type to use. |
Process Identifier | String | N/A | Yes | Specify the value for the process identifier. |
Run On
This action runs on the following entities:
- IP Address
- Hostname
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
N/A
Entity Enrichment
N/A
Insights
N/A
Dismiss Threat
Description
Dismiss threat in Trellix EDR.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Threat ID | String | N/A | Yes | Specify the ID of the threat that you want to dismiss. |
Run On
This action doesn't run on entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
N/A
Entity Enrichment
N/A
Insights
N/A
Connectors
McAfee MVISION EDR - Threats Connector
Description
Trellix EDR threats can be updated with new detections with time. Right now, in order to process new detections, you would need to dismiss the threat. This way Trellix EDR will create a new threat and it will be ingested into Google Security Operations SOAR with those new detections. In other cases, new detections that were added after ingestion of threat will not be available within Google Security Operations SOAR.
Configure McAfee MVISION EDR - Threats Connector in Google Security Operations SOAR
For detailed instructions on how to configure a connector in Google Security Operations SOAR, see Configuring the connector.
Connector parameters
Use the following parameters to configure the connector:
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Product Field Name | String | Product Name | Yes | Enter the source field name in order to retrieve the Product Field name. |
Event Field Name | String | eventType | Yes | Enter the source field name in order to retrieve the Event Field name. |
Environment Field Name |
String | "" | No | Describes the name of the field where the environment name is stored. If the environment field isn't found, the environment is the default environment. |
Environment Regex Pattern |
String | .* | No | A regex pattern to run on the value found in the "Environment Field Name" field. Default is .* to catch all and return the value unchanged. Used to allow the user to manipulate the environment field via regex logic. If the regex pattern is null or empty, or the environment value is null, the final environment result is the default environment. |
Script Timeout (Seconds) | Integer | 180 | Yes | Timeout limit for the python process running the current script. |
API Root | String | https://x.x.x.x | Yes | API root of Trellix EDR server. |
Username | String | N/A | Yes | Trellix EDR account username. Note: Provide either the Client ID and Client Secret or Username and Password parameters. If both parameters are provided, the integration use the Client ID and Client Secret parameters for authentication. |
Password | Password | N/A | Yes | Trellix EDR account password. Note: Provide either the Client ID and Client Secret or Username and Password parameters. If both parameters are provided, the integration use the Client ID and Client Secret parameters for authentication. |
Client ID | String | N/A | No | Client ID of the Trellix EDR account. Note: Provide either the Client ID and Client Secret or Username and Password parameters. If both parameters are provided, the integration use the Client ID and Client Secret parameters for authentication. |
Client Secret | Password | N/A | No | Client Secret of the Trellix EDR account. Note: Provide either the Client ID and Client Secret or Username and Password parameters. If both parameters are provided, the integration use the Client ID and Client Secret parameters for authentication. |
Lowest Severity To Fetch | String | Medium | Yes | Lowest severity that will be used to fetch threats. Possible values: Medium High Critical |
Fetch Max Hours Backwards | Integer | 1 | No | Amount of hours from where to fetch threats. |
Max Threats To Fetch | Integer | 25 | No | How many threats to process per one connector iteration. |
Use whitelist as a blacklist | Checkbox | Unchecked | Yes | If enabled, whitelist will be used as a blacklist. |
Verify SSL | Checkbox | Checked | Yes | If enabled, verify the SSL certificate for the connection to the Trellix EDR public cloud server is valid. |
Proxy Server Address | String | N/A | No | The address of the proxy server to use. |
Proxy Username | String | N/A | No | The proxy username to authenticate with. |
Proxy Password | Password | N/A | No | The proxy password to authenticate with. |
Connector Rules
Proxy Support
The connector supports proxy.