Providing Cylance Credentials to Arctic Wolf
Overview Direct link to this section
This document describes how to retrieve the credentials that Arctic Wolf® needs to monitor Cylance. After you complete this configuration, Arctic Wolf can monitor logs from your Cylance environment.
Note: We currently support the CylancePROTECT and CylanceOPTICS products. We integrate with the Threats, Detection, and MemoryProtection API endpoints.
As part of this configuration, you must provide the following information about your Cylance application to Arctic Wolf using the Arctic Wolf Portal:
- Tenant ID
- Application ID
- Application Secret
- Base URL
Before you begin Direct link to this section
This process requires you to have administrator access to the Cylance console.
Create an API application Direct link to this section
To create an API application:
-
Sign in to the Cylance console as an administrator.
-
Select Settings > Integrations.
-
Click Add Application.
-
Enter a memorable name for the application in the Application Name text box.
-
Select READ for Access Privilege for all console data types.
-
Click Save. A dialog box opens that displays the Application ID and the Application Secret.
-
Copy both the Application ID and the Application Secret values to a secure location. You need to provide these values to Arctic Wolf as part of Provide credentials to Arctic Wolf.
-
Click OK to dismiss the dialog box.
-
Go to Settings > Integrations.
-
Copy the Tenant ID, located near the Application list, to a secure location. You need to provide this value to Arctic Wolf as part of Provide credentials to Arctic Wolf.
-
Proceed to Provide credentials to Arctic Wolf.
Provide credentials to Arctic Wolf Direct link to this section
To provide your cloud application details to Arctic Wolf on the Arctic Wolf Portal:
-
Sign in to the Arctic Wolf Portal.
-
Select Connected Accounts in the banner menu to open the Connected Accounts page.
-
Select +Add Account to open the Add Account form.
-
Select Cloud Detection and Response as the Account Type.
-
Select Cylance from the list of cloud services, and then:
-
Enter a descriptive name for the credentials.
-
Paste these values from Create an API application:
-
Tenant ID
-
Application ID
-
Application Secret
-
-
Select a service endpoint for your location from the list.
-
-
Select Submit to CST.
-
When prompted with the confirmation message, review your submission, and then select Done. You are returned to the Connected Accounts page.
-
Verify that the newly-submitted credential entry appears in the cloud services list with the status Connection Pending.
After your Concierge Security® Team provisions security monitoring for your account, the status of your credentials changes to Connected.
Note: All third-party API integrations that are part of the Arctic Wolf® Managed Detection and Response (MDR) offering are designed with a polling frequency of approximately 15 minutes. Time-based events are polled with a 5-to-40-minute delay to ensure data availability within the third-party API endpoint. For new deployments, after the API integration is successfully configured with the necessary credentials, we begin polling and reviewing activity from approximately 1 hour prior to configuration success.
If credentials fail, for example, due to expired credentials, we notify you and request a new set of API credentials. After a polling failure, we only replay data for a period of 12 hours starting from when the refreshed credentials are provided.